Tech Bytes

The State Bar of Texas Computer and Technology Section worked with TexasBarCLE to create a series of short videos about technology-related topics, from legal ethics to cybersecurity.

5 Scanning Apps in 5 Minutes

A look at five scanning apps for smartphones, including Office Lens, Evernote Scannable, JotNot, Cam Scanner, and ScanSnap Connect Application. These apps, some of which are free, are recommended for scanning documents, business cards, whiteboards, and other items.

 

Encryption Made Easy (For Lawyers and Clients)

A discussion on the importance of data encryption and a look at the requirements of the encryption process, such as it being easy and free for people to use and that it works across multiple operating systems. Bonus: Check out an app called 7 Zip.

 

How to Install the Section Legal App

Instructions on how to install and download the Computer & Technology Section app. Plus: Logging in to the app and adding the modules for different practice areas.

 

5 Cloud Editing Apps in 5 Minutes

A look at five cloud editing apps and why it is important to trust the cloud service used. The apps recommended include Office Online, Google Docs, HemingwayApp.com, Evernote, and Easel.ly.

 

What to Look For In a Forensics Expert

What should you look for in a forensics expert? An overview of the issues involved in forensics and the complications that can arise with forensics experts. Plus: Forensic software costs and the necessity to reduce the cost to clients.

 

Why cybersecurity is a legal issue

Is cybersecurity a legal issue? A look at the different issues regarding cybersecurity, including the tension between privacy and security. Plus: The different data protection laws and the legal obligations a company has to protect its data.

 

A basic primer on cyber insurance

An overview of cyber insurance and why it is important to advise clients on cyber risks and cyber insurance coverage.

 

What every lawyer should know about the Texas data breach notification law

A look at the Texas Data Breach Notification Law, from explaining how clients must report data breaches to advising clients to report data breaches.

 

Part 1: Informed consent implications for Cloud Computing, Engagement Agreements and Cyber insurance coverage

A look at ethics in cloud computing, data security risks with various cloud-based software, and why lawyers should beware.

 

Part 2: Informed consent implications for Cloud Computing, Engagement Agreements and Cyber insurance coverage

A look at engagement agreement disclosures, cloud computing ethics opinions, cloud contract clauses, and a lawyer’s responsibility to clients to encrypt sensitive data.

 

Part 3: Informed consent implications for Cloud Computing, Engagement Agreements and Cyber insurance coverage

A look at why it is important to have cyber insurance coverage, how encryption allows cloud use to be both ethical and a solution to IT challenges, and why encryption is not made more a part of engagement agreements.

 

Essential cybersecurity steps every law firm should take to better protect their clients’ data

Lawyers have a duty and responsibility to protect their clients’ data. A look at the steps law firms should take to protect client data via different encryption methods.

 

P1-Don’t Be Socially Unacceptable: Legal Ethics Concerns in Using Social Media

A look at the legal ethics ramifications of attorneys’ use of social media, why it’s important for attorneys to know how to use social media responsibly and ethically, and unethical information gathering via social media.

 

P2-Don’t Be Socially Unacceptable: Legal Ethics Concerns in Using Social Media

A look at why it is important to keep tabs on what clients are doing on social media, the extent to which an attorney can advise a client to clean up a social media account, and the ethics behind it all. Plus: The rule of not communicating with a party who’s represented by counsel without consent applies in online form as well.

 

P3-Don’t Be Socially Unacceptable: Legal Ethics Concerns in Using Social Media

A look at evidence preservation and spoliation, researching jurors online, the ethics of judges posting on social media, the ethical implications of attorneys using social media, and how the same rules of ethics apply in cyberspace as they do everywhere else.

 

Ransomware

An overview of ransomware—what it is, who is at risk, and a lawyer’s duty to notify clients.

 

Duty to Preserve Evidence in Fed Court

An overview of the elements of the duty to preserve evidence, from where it comes from and what law governs it to when the duty is triggered and what lawyers must do when it is.

 

Current State of Sanctions Law in Fed Court

An overview of the federal rule of civil procedure that is the basis for sanctions in federal court and why spoliation is a concern.

 

Proportionality in Discovery in Federal Court

A look at proportionality and discovery, from how to implement proportionality in a balanced and fair way to what proportionality applies to. Plus: An overview of the relevant federal rules of civil procedure and Texas rules of civil procedure that apply.

 

What Is & Why & How to Remove Metadata

A look at metadata and why lawyers should care about it.

 

What Is & Why & How to Remove Exif Data

A look at what Exif (Exchangeable Image File Format) is and why lawyers should care about it.

 

How to Annotate PDF Documents

A tutorial on how to annotate PDFs and why lawyers should care about doing it.

 

How to Effectively and Properly Redact Documents within the Rules

A tutorial on how to redact documents. Bonus: Steps on how to redact in Adobe Acrobat.

 

How to Protect and Send Large Files through Secure Means

A tutorial on how to send large files securely and why lawyers should care about doing it.

 

Is Your Law Office on the Dark Web?

A few tips on how to avoid exposing your firm or client’s information when you browse the Dark Web.

 

Are Your Clients on the Dark Web (because of you?)

Have someone in your firm monitor the Dark Web, which can be done with special software or by obtaining a service to do that for you.

 

VPNs Presentation

Learn why you should use a virtual private network, or VPN, and how to choose one.

 

Encryption for Lawyers

A few things to consider with encryption: cost, complexity (single key encryption vs. public/private key encryption), platform interaction, and intended audience.

 

5 Apps Impacting the Law

A look at five apps that allow lawyers to assess how they can change the way they practice law and improve their practice to remain competitive.

 

Privacy Rights in Public Society

A discussion on invasion of privacy, confidentiality for lawyers, Texas Business and Commerce Code, and the ABA Model Rules.

 

Admissibility and Authentication of (Some) Electronic Evidence

Steps on how to authenticate electronic evidence such as cellphone text messages and social media postings.

 

What is MetaData?

An overview of metadata types and functions.

 

Best Practices on Information Security

Three layers of information security safeguards are reviewed: administrative, technological, and physical.

 

Cyber Due Diligence

Problems and issues in-house lawyers face during cyber due diligence, including new regulations and security standards.

 

Are You a Mobile Attorney?

Tools, tips, and benefits of being a mobile attorney. Cybersecurity and data protection are also discussed.

 

Mandatory Provisions for Cyber Insurance

An overview of cyber security coverage and a review of six important policy provisions.

 

Digging for the Digital Dirt: Discovery of Social Media Evidence

Social media platforms provide a vast amount of digital treasure troughs. Follow the same rules as you would with other discovery.

 

Authentication of Social Media Content

A look at different methods to authenticate, from direct and stipulation by the parties to self-authentication and circumstantial.

 

When To Adopt a Mechanism for International Transfer of Personal Data

A discussion on different international mechanisms for transferring personal data outside of the E.U.

 

Top 10 Requirements Under the General Data Protection Regulations

Top 10 takeaways of the GDPRs.

 

Concerns for Lawyers in Responding to Online Reviews

Your online presence and who is talking about you is very important, including sites that offer reviews and/or ratings about you.

 

Association of Corp Counsel New Model Information Protection and Security Controls for Outside Counsel

Find out why law firms are targets of sophisticated hacking attacks and how the Association of Corp Counsel’s security controls can help secure law firm data.



Legacy Systems

Legacy systems are technology computer systems or applications that are no longer supported by the manufacturer. Find out about tips on how to avoid problems and issues when using legacy systems.

 

Free Legal Research

An overview of legal research tools and services that are available to State Bar of Texas members and/or members of the State Bar of Texas Computer & Technology section:  Computer and Technology Section app, Casemaker, and Fastcase.

 

Gone Fishing Email Scams Impacting Lawyers

An overview of email fraud and examples and tips on phishing prevention.

 

The Virtual Office

A look at the absolute must-haves for a virtual office, including a portable computer, cloud storage, VoIP/Mobile Telephony, and secure communications.

 

What Texas Lawyers Need to Know About the Texas Revenge Porn Law

A comparison on how revenge porn cases were handled prior and after the Texas Revenge Porn statute became law in 2015.

 

What You Need to Know About the Texas Biometric Privacy Statute

A review of the statute and how biometric data presents certain issues and legal obstacles from a data privacy standpoint.

{Back to top}

We use cookies to analyze our traffic and enhance functionality. More Information agree