My Two Cents: With AI Creeping Into Our Computers, Tablets, and Smartphones, Lawyers Need to Be Diligent About The Software They Use.

Lawyers need to be weary about the computer company behind the curtin as to what information they are taking from your data!

As Apple is anticipated to announce a new iPhone with AI baked into its operating system, lawyers, like Dorothy in the Wizard of Oz, can no longer stand idly by and trust that the person behind the curtain, i.e., the software creator or owner of their software product, is both trustworthy and not going to use the customer’s data in ways inconsistent with the data owners’ objectives or to protect their data personal identification information. Per ABA Model Rule 1.6(a), lawyers must reasonably ensure that their client’s Personal Identification Information (PII) is protected. And recent events are providing a bit of a minefield for not just lawyers.

I use a popular subscription service application called SetApp. It’s a subscription service that gives me access to over 240 applications. I use many of them daily. But one of its applications, Bartender (which helps clean up and manage your Mac computer’s toolbar), was recently but secretively purchased by a private company. The problem is that little is known about the company. There is a very legitimate concern that Bartender may be improperly using its customer’s computer data – apparently (but not confirmed to be) making unauthorized screenshots. (Note that this is not a critique of SetApp, but I am going to reevaluate my use of Bartender – here are some alternatives you may want to check out.) But this general concern does not end with just “unknown” Wizards.

Lawyers need to be weary about the computer company behind the curtin as to what information they are taking from your data!

It was recently discovered that Adobe changed customer's terms of service. Lawyers should be deeply concerned about Adobe's updated terms of use for Photoshop, which grant the company broad rights to access and remove users' cloud-stored content. This raises significant privacy and confidentiality issues, particularly for legal professionals handling sensitive client data under non-disclosure agreements (NDAs), protecting PII, and trial strategies. Adobe's ability to view and potentially mishandle files covered by NDAs could lead to damaging leaks and breaches of client trust. You can “opt out” of this by going to your account’s privacy settings, going to “Content analysis,” and making sure the “Allow my content to be analyzed by Adobe for product improvement and development purposes” option is not selected. You can also not upload your material to Adobe’s could service – these steps may provide an extra layer of protection, but no one is 100% sure.

As custodians of confidential information, lawyers have an ethical duty to safeguard client secrets. Adobe's overreaching policy raises significant concerns for the legal community. These concerns extend beyond software, as computer companies now integrate AI into their hardware systems.

Many Windows machines are developing their computers to work inherently with MS Windows' own AI, Copilot. At the time of this writing, Apple is expected to announce a new operating system with an AI built into it to work with its new M4 chip. In other words, hardware and software companies work together to have their machines work naturally with operating systems that have AI built into their software. The biggest concern that should be on lawyers' minds is how their data is being used to train a company’s AI. What protections are being built into the systems? Can users opt-out? What does this all mean for us lawyers?

This means that lawyers at any computer skill level must pay attention to the Terms of Service (ToS) for the computers and software they use for work. The warning signs are there. So, stay tuned to your Tech-Savvy Lawyer as we navigate through this together!

MTC

Monday Morning Humor: Dumb Ways to Use Technology In Court . . . 😱

One of the pillars of Zooming into a hearing that I impress on everyone is to be weary of what is behind you. Avoid having a messy kitchen, bedroom, inappropriate pictures, or any scenery that might be offensive or off-putting to others. Apparently, this gentleman did not get the memo about not committing the very violation he is being brought to court for while attending his Zoom hearing. 🙄

My Two Cents: Lawyers Need to Remember to Navigate Ethical Boundaries When Using Listservs: ABA's Guidance on Client Information Sharing.

Lawyers need to maintain client confidentiality when talking with colleagues in online forums.

The legal profession's reliance on technology continues to grow, facilitating collaboration and knowledge sharing among practitioners. Listservs, e.g., the American Bar Association's (ABA) own “solosez”, serve as an excellent medium for lawyers to discuss day-to-day law office management concerns, legal issues, and even their own cases.  But, when doing so, lawyers must still remember to keep their (former or current) client’s confidentiality when using these public forums.

The ABA recently issued Formal Opinion 511 to address ethical concerns surrounding the dissemination of client information on listservs and similar platforms.  The opinion emphasizes the need for lawyers to exercise caution when discussing client matters online, even in closed forums intended for professional discourse. Revealing confidential client information without proper consent can violate the duty of confidentiality enshrined in Model Rule 1.6.

While listservs offer a valuable resource for seeking guidance from peers, the ABA underscores that lawyers must refrain from disclosing information that could reasonably lead to the identification of a client. This includes details about the client's identity, legal issues, or other specifics that may compromise confidentiality.  But to emphasize the point of the opinion, it’s not just keeping confidential the identity, legal issues, or other specifics that may compromise confidentiality; this includes any information that could reasonably lead to the identification of a client.

To strike a balance between confidentiality and the benefits of professional collaboration, the opinion suggests several best practices:

Lawyers need to maintain client confidentiality with even some of the most minute details if it could “reasonably” reveal the client when talking with colleagues in online forums.

  • Anonymization: Lawyers should carefully anonymize client information by removing identifiers and altering specific facts to prevent inadvertent disclosure;

  • Client Consent: Obtaining the client's informed consent before sharing any details about their matter is the safest approach, though not always practical.

  • Forum Vetting: Evaluate the listserv's membership, policies, and security measures to ensure it provides adequate safeguards against unauthorized access or dissemination of shared information.

  • Contextual Consideration: Assess the sensitivity of the client's matter and the potential risks of disclosure before deciding whether to share information on a listserv.

In today’s social media age, it is easy for people to feel anonymous online. This can lead some people to let their safeguards down and reveal too much personal information. Or, quite frankly, say things they would not say to others in public.  Lawyers, too, need to ensure they are not revealing client information that may breach their ethical obligations to their clients (both current and former).

So, I’d like to repeat myself from above, while digital platforms facilitate knowledge sharing and professional development, lawyers must exercise vigilance to protect client confidentiality.  By adhering to the ABA's guidance and implementing robust safeguards, lawyers can leverage the benefits of online collaboration while upholding their ethical duties. Striking this balance is crucial for maintaining public trust and preserving the integrity of the legal profession in the digital age.

MTC.

BOLO: New Malicious Android Apps Targeting Lawyers - How to Protect Yourself

As lawyers, we rely heavily on our mobile devices to stay connected and productive while on the go. However, a recent report has uncovered a disturbing trend of malicious Android apps specifically designed to target professionals like us. These apps can compromise sensitive client data, steal login credentials, and even enable remote monitoring of our devices.

The Problem: Malicious Apps Masquerading as Legitimate Tools

According to the report, cybercriminals are creating fake apps that mimic popular productivity tools and utilities - including those used by attorneys! These malicious apps often sneak into official app stores by bypassing security checks through clever obfuscation techniques. Once installed, they can grant remote access to your device, enabling cybercriminals to monitor your activities, steal confidential data, and even record audio or video without your knowledge. This poses a severe risk to attorney-client privilege and data privacy.

Suggestions to Avoid Malicious Apps

As lawyers, we must remain vigilant and take proactive steps to protect ourselves, our clients, and our firms from these threats. Here are some suggestions to help you avoid falling victim to malicious apps:

  1. Stick to Official App Stores
    While not foolproof, official app stores like Google Play have more robust security measures in place. Avoid downloading apps from third-party sources or untrusted websites.

  2. Research Apps Before Installing
    Before installing any app, thoroughly research it. Read reviews, check the developer's reputation, and look for any red flags or suspicious behavior reported by other users.

  3. Keep Your Device Updated
    Ensure that your Android device is running the latest version of the operating system and that all apps are up-to-date. Software updates often include critical security patches that can protect against known vulnerabilities.

  4. Use Reputable Antivirus and Security Apps
    Install a reputable antivirus and mobile security app on your device. These apps can scan for and detect malicious software, protecting you from potential threats.

  5. Be Cautious with Permissions
    When installing an app, carefully review the permissions it requests. If an app asks for excessive or unnecessary permissions (e.g., a calculator app requesting access to your contacts or location), it could be a red flag.

  6. Regularly Review Installed Apps
    Periodically review the apps installed on your device and remove any that you no longer use or recognize. Unused apps can become potential entry points for cybercriminals.

  7. Implement Firm-Wide Security Policies
    If you work at a law firm, collaborate with your IT department to implement firm-wide security policies and best practices for mobile device usage and app installation.

Staying vigilant and taking proactive measures to protect your mobile devices is crucial in today's threat landscape. By following these suggestions, you can significantly reduce the risk of falling victim to malicious apps and safeguard your clients' sensitive information. Remember, as lawyers, we have an ethical obligation to maintain the confidentiality and integrity of client data. Prioritizing mobile security is not just a best practice; it's a professional responsibility.

Happy Lawyering!

Episode 89: Effortless CRM, LPM Transitions - Tony Valenti of Universal Migrator.

Tony Valenti, CEO of UniversalMigrator.com, is a visionary leader in legal tech, transforming the complex process of data migration for lawyers of any law firm size. Under his guidance, Universal Migrator makes it effortless to transfer data between law practice management systems, ensuring that migrations don't have to suck. Tony's innovative approach simplifies transitions, empowering firms to move forward with confidence.

Join Tony and me as we discuss the following three questions and more!

  1. What are the top three factors lawyers should consider when choosing their first or next CRM in terms of traceability? If their choice turns out not to be the right one, what should they do?

  2. Universal Migrator does not always transfer every data set from one CRM to another. What are your top three tips for lawyers to transfer those data sets in a different way?

  3. What are your top three tips for lawyers after they make the transfer, before fully committing to the new CRM and canceling their old one?

In our conversation, we cover the following:

[01:06] Tony's current tech setup

[08:02] Key Considerations for Lawyers When Choosing a CRM

[22:26] Tips for Lawyers on Migrating Incompatible Data and Tasks

[28:18] Critical Steps for Lawyers Before Fully Committing to a New CRM

[30:41] CRM Choices and the Role of Universal Migrator in Legal Tech Transitions

[32:32] How Universal Migrator Protects Client Data During Legal Tech Migrations

[34:23] The Role of AI in Legal Data Migrations

[37:03] Connect with Tony

Resources:

Connect with Tony:

Hardware mentioned in the conversation:

Monday Morning Humor: Before there was Google -

Remember library cards! The original Google for lawyers! Before algorithms, we had librarians—our analog search engines. Those trusty cards led us to our research, biographies, and science fiction. Now, with tech at our fingertips, let's not forget our first love: the Dewey Decimal System.

Or our second love, Shepardizing with books and pamphlets!

Long live analog searches!

BOLO/Word-Phrase of the Week/How to . . . Update your Chrome Browser ASAP!

Lawyers need to ensure their software is always up to date protect themselves from unkown software security flaws!

BOLO: Google has released an urgent security update for Chrome to address a critical zero-day vulnerability, identified as CVE-2024-4671. This vulnerability is a "use-after-free" issue within Chrome's visual component, which could allow remote attackers to execute arbitrary code on an affected system just by visiting a malicious website. This flaw is actively being exploited in the wild, making it essential for both Mac and Windows OS users to update their browsers immediately to protect against potential attacks.

While this alert should be troubling, Chrome users and users who use Chrome-based browsers, e.g., Brave, Microsoft Edge, and Opera, should also be aware that this is the seventh of eight security warnings this year (with four of the alerts just this month). It is imperative that you regularly check that your software is up to date from zero-day software vulnerabilities.

keeping your software up to date can help mitigate against “zero-day” secuirty flaws!

Word/Phrase of the Week – What is a “Zero-Day” vulnerability?  A "zero-day" security flaw refers to a software vulnerability that is unknown to the software's developers or the public. Because the developers are unaware of the flaw, there is no patch or fix available. The term "zero-day" highlights that there are zero days between the discovery of the vulnerability and its exploitation, meaning the flaw can be exploited by attackers immediately after its discovery. This makes zero-day vulnerabilities particularly dangerous, as they can be used to launch attacks before any defense or mitigation can be implemented.

How To update Chrome:  Users should go to the menu (three dots in the upper-right corner) on your browser window, select "Help," then "About Google Chrome," and follow the instructions to install the update and relaunch the browser. This update also impacts other Chromium-based browsers, see above, which should also be updated as soon as possible to mitigate this security risk.

Happy Lawyering and Stay Safe Out There!

Word (Phrase) of the Week: What do they mean by the term "Internet of Things (IoT)"?

You may have heard the term "Internet of Things," but not exactly what it means - it can be a little ambiguous.  So let me explain: The "Internet of Things" (IoT) refers to the interconnected network of physical devices, vehicles, home appliances, and other items embedded with sensors, software, and network connectivity that enable them to collect and exchange data.

The “internet of things” (IOT) covers so many common items in our office1

These devices can communicate and interact with each other, as well as with centralized systems and services over the internet or other networks. The IoT allows objects to be sensed and controlled remotely across existing network infrastructure.

Key Aspects of IoT

  • Connectivity: IoT devices are equipped with wired or wireless connectivity, allowing them to connect to the internet and communicate with other devices or systems.

  • Data Exchange: IoT devices can send and receive data, enabling them to share information and coordinate their actions.

  • Sensors: Many IoT devices incorporate sensors that can detect and measure various physical properties, such as temperature, motion, humidity, or pressure.

  • Actuators: Some IoT devices have actuators that can influence the physical world, like turning on lights, adjusting thermostats, or opening doors.

  • Intelligence: IoT systems often employ artificial intelligence and machine learning capabilities to analyze data, identify patterns, and make decisions or optimizations.

Applications of IoT

The “Internet of things” (Iot) has many potential applications in the courtrooM!

  • IoT has numerous applications across various domains:

    • Smart Homes: IoT devices like smart thermostats, security cameras, and appliances enable home automation and remote monitoring.

    • Industrial IoT: IoT sensors and systems are used in manufacturing, supply chain management, and predictive maintenance.

    • Healthcare: IoT devices can monitor patients, track medical assets, and assist with medication adherence.

    • Smart Cities: IoT technologies are employed in traffic management, waste management, and environmental monitoring.

As the IoT continues to evolve, it holds the potential to revolutionize how we interact with the physical world and enhance efficiency, productivity, and convenience in numerous aspects of our lives. Lawyers may encounter the "Internet of Things" (IoT) in various aspects of their work, particularly in litigation and regulatory compliance. Here are some key ways IoT data could be relevant:

Litigation and Discovery Applications

  • IoT devices like smart home assistants (Amazon Alexa, Apple Siri, Google Home), wearable fitness trackers, and connected vehicles can potentially provide evidence in criminal cases or civil lawsuits. For example, audio recordings from smart speakers or location data from wearables could be sought as evidence.

  • In product liability or personal injury cases, data from IoT devices may help establish facts about an incident, such as the timing, location, or sequence of events.

  • IoT data could be subject to discovery requests in litigation, requiring lawyers to understand how to preserve, collect, and review this new form of electronically stored information (ESI).

 Data Privacy and Security Issues

  • Lawyers advising clients on data privacy and cybersecurity must consider the risks associated with IoT devices, which often collect and transmit sensitive personal data with potential security vulnerabilities.

lawyer not only need to know how the “Internet of things” (IOT) apply at work but how it may apply to thier clients!

  • IoT devices and their data flows may be subject to various data protection regulations like California’s Consumer Privacy Act (CCPA) and the European Union’s General Data Protection Regulation (GDPR), etc., requiring legal counsel to ensure compliance.

Intellectual Property Rights

The development and deployment of IoT technologies involve complex intellectual property considerations around patents, copyrights, and licensing agreements that lawyers may need to navigate.

Product Liability

IoT devices raise novel product liability issues, as defects or security flaws in these interconnected products could lead to harm, requiring lawyers to advise manufacturers on potential liabilities and risk mitigation strategies.

As IoT adoption grows across industries, lawyers will increasingly need to understand the legal implications and evidentiary value of IoT data, as well as the associated privacy, security, and liability risks.

Happy Lawyering!

Lawyers, Beware! AI is Encroaching into Your Google Searches.

Attorneys need to worry even more about how ai may creep into their work!

The integration of Artificial Intelligence (AI) into Google searches has marked a significant shift in how information is processed, accessed, and delivered. While beneficial across various sectors, this technological advancement poses unique concerns for the legal profession. Lawyers, in our pursuit of justice and accurate representation of our clients, rely heavily on the precision and reliability of the information we gather. The obvious concern lawyers should have is how is AI manipulating this information before we get it (and whether it is accurate).    

Recall, AI's role in refining search algorithms has made finding relevant information more efficient. But, this efficiency comes with a caveat for the legal field. The primary concern revolves around the inherent biases and limitations within AI systems. These systems are trained on vast datasets that inevitably contain biases from past cases and decisions. For lawyers, this means that search results could be skewed or incomplete, potentially overlooking critical precedents or interpretations of law that might significantly impact our case.   

Taking a break from the conference and getting some work done at a coffee shop in Omaha’s old market district!

Moreover, the opaque nature of AI algorithms makes it difficult to understand how certain results are prioritized over others. This lack of transparency can be particularly problematic for lawyers who require a comprehensive understanding of all relevant legal precedents and interpretations to build their cases effectively. The fear is not just about missing out on crucial pieces of information but also about the reliability and authenticity of what is presented.     

As I have previously blogged, Judges, too, have expressed reservations about the uncritical use of AI in legal research and courtroom proceedings. They caution against an over-reliance on technology that may not fully grasp the nuances and complexities inherent in legal reasoning and judgment. Judges underscore the importance of human oversight in interpreting legal texts and making judicial decisions—an aspect that AI currently cannot replicate. Some judges have outright banned the use of AI in their courtrooms - signaling severe punishment should a lawyer be caught using AI in their work.   

Given these concerns, it's imperative for lawyers to adopt strategies to mitigate the influence of AI biases on any research process, including Google searches. The straightforward approach would be not to use Google. But I’m sure the other search engines are catching up to Google and will have their own “AI” search capabilities soon.  Lawyers could try diversifying their sources beyond Google searches by utilizing specialized legal databases that offer peer-reviewed articles and verified case laws - but even Lexis (with Lexis AI) and Westlaw (with Westlaw Precision are getting into the AI game. This just creates more hurdles for lawyers practicing before judges who prohibit the use of AI in their courtrooms. Another approach would be to turn off the “AI” function in your Google searching, but that is easier said than done (stay tuned for an upcoming “How to Turn Off ‘AI’ in Your Google Searches”!) In the end, lawyers can benefit from staying up-to-date with developments in AI technology to understand its capabilities and limitations better and know where it is being used.

A great view from getting a little work done in omaha! Remember, always use a vpn when on public wifi!!!

Lawyers of all ilk need to foster a culture within law firms where continuous learning about technological advancements becomes a priority can equip lawyers with knowledge on navigating through an increasingly digital landscape without overly depending on automated systems. This was something we discussed at the 2024 GPSolo, LP & YLD Joint Spring Conference.  One place you might consider staying abreast of these issues is following your friendly neighborhood, The Tech-Savvy Lawyer.Page Blog! 🤗

Stay Tuned and Happy Lawyering!

Episode 88: Maximizing Legal Tech with Katherine Porter of the Resourceful Lawyer.

In the labyrinth of legal tech, attorneys often waste resources on redundant software, overlook key workflows like client onboarding, and falter in choosing the right CRM. Join Katherine Porter as she guides us through these challenges!

Katherine is the founder of The Resourceful Lawyer, and she facilitates workshops for law firm leaders so they can align with their goals and create actionable strategies for growth and profitability. Katherine blends the best of project management, human-centered design, and two decades of legal experience to tailor workshops for each of her law firm clients. She earned her law degree at UCLA, holds the Project Management Professional (PMP) credential, and is certified in Design Thinking.

Join Katherine and me as we discuss the following three questions and more!

  1. What are the top three areas of tech software that attorneys are wasting their money on?

  2. What are the three common workflows attorneys are not utilizing? And how do we create each one?

  3. What are your top three tips when vetting a new CRM LPM?

In our conversation, we cover the following:

[01:10] Tech Setup Overview and Preferences

[07:08] Top Three Areas Where Attorneys Overpay for Tech Software

[12:37] Essential Attorney Workflows: Key Areas for Improvement and Implementation

[14:09] Tips for Creating Effective Workflows

[15:31] Top Three Tips for Vetting a New CRM or LPM System

[17:21] CRM/LPM Transition War Stories: Challenges and Solutions

Resources:

Connect with Katherine:

Mentioned in the episode:

Hardware mentioned in the conversation:

Software & Cloud Services mentioned in the conversation: