BOLO: LexisNexis Data Breach: What Legal Professionals Need to Know Now—and Why All Lexis Products Deserve Scrutiny!

LAWYERS NEED TO BE BOTH TECH-SAVVY AND Cyber-SavvY!

On December 25, 2024, LexisNexis Risk Solutions (LNRS)—a major data broker and subsidiary of LexisNexissuffered a significant data breach that exposed the personal information of over 364,000 individuals. This incident, which went undetected until April 2025, highlights urgent concerns for legal professionals who rely on LexisNexis and its related products for research, analytics, and client management.

What Happened in the LexisNexis Breach?

Attackers accessed sensitive data through a third-party software development platform (GitHub), not LexisNexis’s internal systems. The compromised information includes names, contact details, Social Security numbers, driver’s license numbers, and dates of birth. Although LexisNexis asserts that no financial or credit card data was involved and that its main systems remain secure, the breach raises red flags about the security of data handled across all Lexis-branded platforms.

Why Should You Worry About Other Lexis Products?

LexisNexis Risk Solutions is just one division under the LexisNexis and RELX umbrella, which offers a suite of legal, analytics, and data products widely used by law firms, courts, and corporate legal departments. The breach demonstrates that vulnerabilities may not be limited to one product or platform; third-party integrations, development tools, and shared infrastructure can all present risks. If you use LexisNexis for legal research, client intake, or case management, your clients’ confidential data could be at risk—even if the breach did not directly affect your specific product.

Ethical Implications: ABA Model Rules of Professional Conduct

ALL LawyerS NEED TO BE PREPARED TO FighT Data LeakS!

The American Bar Association’s Model Rules of Professional Conduct require lawyers to safeguard client information and maintain competence in technology. Rule 1.6(c) mandates that attorneys “make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.” Rule 1.1 further obligates lawyers to keep abreast of changes in law and its practice, including the benefits and risks associated with relevant technology.

In light of the LexisNexis breach, lawyers must:

  • Assess the security of all third-party vendors, including legal research and data analytics providers.

  • Promptly notify clients if their data may have been compromised, as required by ethical and sometimes statutory obligations.

  • Implement additional safeguards, such as multi-factor authentication and regular vendor risk assessments.

  • Stay informed about ongoing investigations and legal actions stemming from the breach.

What Should Legal Professionals Do Next?

  • Review your firm’s use of LexisNexis and related products.

  • Ask vendors for updated security protocols and breach response plans.

  • Consider offering affected clients identity protection services.

  • Update internal policies to reflect heightened risks associated with third-party platforms.

The Bottom Line

The LexisNexis breach is a wake-up call for the legal profession. Even if your primary Lexis product was not directly affected, the interconnected nature of modern legal technology means your clients’ data could still be at risk. Proactive risk management and ethical vigilance are now more critical than ever.

🚨 BOLO: Android Ad Fraud Malware and Your ABA Ethical Duties – What Every Lawyer Must Know in 2025 🚨

Defend Client Data from Malware!

The discovery of the “Kaleidoscope” ad fraud malware targeting Android devices is a wake-up call for legal professionals. This threat, which bombards users with unskippable ads and exploits app permissions, is not just an annoyance - it is a direct risk to client confidentiality, law firm operations, and compliance with the ABA Model Rules of Professional Conduct. Lawyers must recognize that cybersecurity is not optional; it is an ethical mandate under the ABA Model Rules, including Rules 1.1, 1.3, 1.4, 1.6, 5.1, and 5.3.

Why the ABA Model Rules Matter

  • Rule 1.6 (Confidentiality): Lawyers must make reasonable efforts to prevent unauthorized disclosure of client information. A compromised device can leak confidential data, violating this core duty.

  • Rule 1.1 (Competence): Competence now includes understanding and managing technological risks. Lawyers must stay abreast of threats like Kaleidoscope and take appropriate precautions.

  • Rule 1.3 (Diligence): Prompt action is required to investigate and remediate breaches, protecting client interests.

  • Rule 1.4 (Communication): Lawyers must communicate risks and safeguards to clients, including the potential for data breaches and the steps being taken to secure information.

  • Rules 5.1 & 5.3 (Supervision): Law firm leaders must ensure all personnel, including non-lawyers, adhere to cybersecurity protocols.

Practical Steps for Lawyers – Backed by Ethics and The Tech-Savvy Lawyer.Page

Lawyers: Secure Your Practice Now!

  • Download Only from Trusted Sources: Only install apps from the Google Play Store, leveraging its built-in protections. Avoid third-party stores, the main source of Kaleidoscope infections.

  • Review App Permissions: Be vigilant about apps requesting broad permissions, such as “Display over other apps.” These can enable malware to hijack your device.

  • Secure Devices: Use strong, unique passwords, enable multi-factor authentication, and encrypt devices-simple but essential steps emphasized by our blog posts on VPNs and ABA guidance.

  • Update Regularly: Keep your operating system and apps up to date to patch vulnerabilities.

  • Educate and Audit: Train your team about mobile threats and run regular security audits, as highlighted in Cybersecurity Awareness Month posts on The Tech-Savvy Lawyer.Page.

  • Incident Response: Have a plan for responding to breaches, as required by ABA Formal Opinion 483 and best practices.

  • Communicate with Clients: Discuss with clients how their information is protected and notify them promptly in the event of a breach, as required by Rule 1.4 and ABA opinions.

  • Label Confidential Communications: Mark sensitive communications as “privileged” or “confidential,” per ABA guidance.

Advanced Strategies

Lawyers need to have security measures in place to protect client data!

  • Leverage AI-Powered Security: Use advanced tools for real-time threat detection, as recommended by The Tech-Savvy Lawyer.Page.

  • VPN and Secure Networks: Avoid public Wi-Fi. But if/when you do be sure to use VPNs (see The Tech-Savvy Lawyer.Page articles on VPNs) to protect data in transit.

  • Regular Backups: Back up data to mitigate ransomware and other attacks.

By following these steps, lawyers fulfill their ethical duties, protect client data, and safeguard their practice against evolving threats like Kaleidoscope.

🚨 BOLO: Zoom Remote Access Attacks – Critical Security Alert for Legal Professionals 🚨

Zoom Attack Exposes Lawyers to Major Cyber Risk: Why Vigilance Is Now an Ethical Imperative!

Lawyers need to be able to Spot fake Zoom invites—protect your client data now!

A sophisticated cyberattack targeting Zoom users has recently emerged, with direct implications for lawyers and legal professionals. The attack, detailed by Malwarebytes, involves a crime group dubbed ELUSIVE COMET that lures victims into Zoom meetings and tricks them into granting remote access. This enables the installation of malware and theft of sensitive data, including financial assets and confidential client information, e.g., PII.

How the Attack Works

  • Attackers pose as reputable contacts (e.g., media invitations) and set up Zoom calls.

  • During the meeting, the attacker often sends a remote control request with their camera off, disguising their screen name as “Zoom” to appear legitimate.

  • If the victim approves, the attacker gains full control of the victim’s system, installs malware, and can access files, emails, and even financial accounts.

Why Lawyers Must Be Extra Cautious

Ethical Duties Under ABA Model Rules

You need to be careful who you let into your zoom conferences!

  • Competence (Rule 1.1): Lawyers must provide competent representation, which now explicitly includes technological competence. Comment 8 to Rule 1.1 states:
    To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject.

  • Confidentiality (Rule 1.6): Attorneys are ethically obligated to protect client information from unauthorized disclosure. Allowing remote access to your device can expose privileged communications, work product, and sensitive client data to malicious actors.

  • Failing to maintain technological competence or safeguard client data can result in ethical violations, malpractice claims, and reputational harm.

Best Practices to Prevent Zoom-Based Attacks

  • Never accept remote control requests from unknown or unverified participants.

  • Use Zoom via your web browser when possible, as the browser version does not support remote control, reducing risk.

  • Enable meeting passwords and waiting rooms to control access.

  • Restrict screen sharing and disable remote control features unless absolutely necessary.

  • Verify all meeting invitations-scrutinize the sender’s identity, and be wary of unsolicited requests, especially those involving media opportunities or unfamiliar contacts.

  • Keep Zoom and all security software updated to address known vulnerabilities.

  • Educate staff and colleagues about the risks and proper protocols for virtual meetings.

What to Do If You Suspect a Breach

You control access—deny hackers, defend your practice.

  • Disconnect from the internet immediately to limit further access.

  • Contact your IT or cybersecurity team and initiate your incident response plan.

  • Notify affected clients and relevant authorities as required by law and ethical rules.

  • Document the incident and steps taken for compliance and potential reporting obligations.

  • Review and update your security protocols to prevent future incidents.

Let’s be careful out there - it could cost you your job or, worse yet, your bar license if you don’t!

Happy Lawyering!!!

🚨BOLO🚨: All Gmail Users at Risk: Sophisticated Replay Attack Exploits Google Infrastructure, Posing Major Threat to Legal Professionals!

Protect your law firm's Gmail accounts from phishing and cyberattacks.

Gmail users, especially those in the legal field, face a new, highly sophisticated phishing campaign that leverages Google’s own infrastructure to convincingly impersonate official communications and steal sensitive credentials. According to Pieter Arntz of Malewarebytes, this replay attack, first identified by Nick Johnson, lead developer of the Ethereum Name Service, demonstrates how attackers can bypass traditional security filters and trick even experienced professionals into compromising their Google accounts.

The attack begins with a realistic security alert, allegedly from Google, referencing a subpoena for account information. The email contains a link to a page hosted on sites.google.com, which is a legitimate Google domain but can be created by anyone with a Google account. The page is a near-perfect replica of the official Google support portal. Unsuspecting recipients who click “Upload additional documents” or “View case” are redirected to a fake Google sign-in page designed to harvest their credentials

What makes this campaign particularly dangerous is its use of DKIM (DomainKeys Identified Mail), an email authentication protocol. Attackers exploit DKIM by forwarding legitimate, DKIM-signed security alerts that embed the phishing message within the OAuth app name. Because the email body remains unchanged, the DKIM signature stays valid-even when replayed-allowing these phishing emails to pass through most security filters and appear authentic to recipients.

Legal professionals are prime targets because a compromised Google account can expose Gmail, Drive, Calendar, Contacts, and even third-party services accessed via Google authentication. The consequences can include identity theft, unauthorized access to confidential client information, and reputational harm.

Key Red Flags for Legal Practitioners:

Gmail phishing warning: Legal professional safeguard YOUR CLIENT’S sensitive case files online!

  • Official Google support or sign-in pages should be hosted on support.google.com or accounts.google.com, not sites.google.com.

  • Examine email headers carefully; a mismatch between the sender and the signed domain is suspicious.

  • Never click links in unsolicited emails or provide credentials on unfamiliar pages.

  • Avoid using Google or Facebook accounts to log in to other services; create dedicated accounts for each service.

The attack is repeatable and difficult to mitigate, as malicious pages on sites.google.com are hard to report and remove quickly. Google initially dismissed the issue as “Working as Intended,” but after review, it has committed to addressing the OAuth bug.

Action Steps:

  • Educate your staff about this specific phishing method.

  • Implement multi-factor authentication (MFA) on all Google accounts.

  • Regularly audit account activity and access permissions.

  • Report suspicious emails and phishing attempts to your IT or security team immediately.

Staying vigilant and following these best practices can help protect your firm’s sensitive data and maintain client trust in an evolving threat landscape.

🚨 BOLO: Critical Windows OS Update - Lawyers, Secure Your Data Now! 🛡️

Lawyers make sure your computer’s operating system is secure and up-to-date!

Attention legal professionals: Microsoft's February 2025 Patch is crucial. This update fixes 55 security flaws, including four zero-day vulnerabilities. Two of these have been actively exploited, potentially compromising client data. One flaw allows file deletion, while another grants system privileges to attackers. Protect your practice and client information by updating immediately. The ABA Model Rules of Professional Conduct requires it! See Rule 1.1[8].

Navigate to Start > Settings > Windows Update and select "Check for Windows updates.”

Remember, maintaining technological competence is an ethical duty. Stay vigilant and prioritize cybersecurity to safeguard your legal practice. 💼🔒

🚨 BOLO: Apple's Latest Update Activates AI - Lawyers, Protect Your Clients' Data! 🚨

Attention tech-savvy lawyers! 📱💼 Apple's recent iOS and macOS updates have automatically enabled Apple Intelligence, raising significant concerns about client confidentiality and data privacy. As legal professionals, we must remain vigilant in protecting our clients' sensitive information. Here's what you need to know:

The Stealth Activation 🕵️‍♂️

In the last 24 hours, Apple released iOS 18.3, iPadOS 18.3, and macOS Sequoia 15.3, which automatically activate Apple Intelligence on compatible devices. This AI-powered suite offers various features, including rewriting text, generating images, and summarizing emails. While these capabilities may seem enticing, they pose potential risks to client confidentiality. 🚨

Privacy Concerns 🔒

Apple claims that Apple Intelligence uses on-device processing to enhance privacy. However, the system still requires 7GB of local storage and may analyze user interactions to refine its functionality. This level of data access and analysis raises red flags for lawyers bound by ethical obligations to protect client information.

Ethical Obligations ⚖️

Check your apple setting if you want to turn off “Apple Intelligence”!

The ABA Model Rules of Professional Conduct, particularly Rule 1.6, emphasize the duty of confidentiality. This rule extends to all forms of client data, including information stored on devices or accessed remotely. As tech-savvy lawyers, we must exercise reasonable care to prevent unauthorized disclosure of client information.

Potential Risks 🚫

Using AI-powered features without fully understanding their implications could lead to inadvertent breaches of client confidentiality. As we've discussed in our previous blog post, "My Two Cents: With AI Creeping Into Our Computers, Tablets, and Smartphones, Lawyers Need to Be Diligent About The Software They Use," lawyers must be cautious about adopting new technologies without proper vetting.

Lawyers MUST maintain reasonable competency in the use of technology! 🚨 ABA MRPC 1.1 [8] 🚨

Lawyers MUST maintain reasonable competency in the use of technology! 🚨 ABA MRPC 1.1 [8] 🚨

Steps to Take 🛡️

  1. Disable Apple Intelligence: Navigate to Settings > Apple Intelligence & Siri to turn off specific features or disable the entire suite.

  2. Educate Your Team: Ensure all staff members are aware of the potential risks associated with AI-powered features.

  3. Review Privacy Policies: Carefully examine Apple's privacy policies and terms of service related to Apple Intelligence.

  4. Implement Additional Safeguards: Consider using encrypted communication tools and secure cloud storage solutions for client data.

Final Thoughts 🧐

As we navigate this rapidly evolving technological landscape, it's essential to balance innovation with ethical obligations. Lawyers can thrive as tech-savvy professionals by embracing technology to enhance their practice while safeguarding client trust. Remember, maintaining reasonable competency in the use of technology is not just advisable—it’s an ethical duty. See Comment, #8, to ABA Model Rule, #1.1.

Subscribe to The Tech-Savvy Lawyer.Page for updates on this developing situation, news on the evolving impact of AI on the practice of law. Together, we can navigate the complexities of legal technology while upholding our professional responsibilities.

Stay safe, stay informed, and stay tech-savvy! 🚀📚💻

Happy Lawyering!

MTC/BOLO: 🚨 Cybersecurity Alert: Chinese Hack Exposes Vulnerabilities in Mobile Data 🚨

A massive Chinese espionage campaign has recently targeted major U.S. telecommunications companies, compromising data from hundreds of thousands of American mobile phone users. This unprecedented cyber assault, dubbed "Salt Typhoon," has affected at least eight major telecom providers, including Verizon and AT&T, ranking among the most extensive intelligence breaches in American history. 📱💻

The Scope of the Breach 🔍

The Chinese hackers exploited weaknesses in the communications networks of top telecommunications companies. They gained access to a vast amount of data, including:

  • Who mobile phone users were talking to

  • When conversations took place

  • User locations

  • In some cases, audio calls and text messages

Initially focusing on the national capital region, the hackers narrowed their targets to high-profile Americans, including:

  • Top government officials in the Biden administration

  • At least one cabinet secretary

  • A top White House Homeland Security Adviser

  • President-elect Donald Trump

  • Vice President-elect JD Vance

  • Staff of Senator Chuck Schumer

The breach also compromised data about sensitive Department of Justice warrants. 🏛️

Ongoing Threat and Uncertain Timeline

U.S. officials warn that the breach is ongoing. They cannot confirm that the hackers have been fully removed from the affected networks. The FBI and Cybersecurity and Infrastructure Security Agency (CISA) are still trying to understand the full scope of this activity. There is no clear timeline for when telecommunications companies will be fully secure. 🕵️‍♀️

Ethical Obligations for Lawyers 📜⚖️

For lawyers and legal professionals, the ethical obligation to protect client data extends beyond general cybersecurity practices. The American Bar Association (ABA) Model Rules of Professional Conduct provide specific guidance on this matter.

1. Duty of Competence 🧠

ABA Model Rule 1.1 requires lawyers to provide competent representation to clients. This includes staying current with technology. Comment 8 to Rule 1.1 explicitly states that lawyers must understand "the benefits and risks associated with relevant technology". This means lawyers must:

  • Understand the technologies they use in their practice

  • Stay informed about evolving cybersecurity threats

  • Implement appropriate security measures

2. Duty of Confidentiality 🤐

Rule 1.6(c) mandates that lawyers "make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client". This rule directly applies to electronic communications and data storage. Lawyers must:

  • Assess the sensitivity of client information

  • Implement appropriate security measures based on the nature of the data

  • Regularly review and update security protocols

3. Communicating with Clients 💬

Under Rule 1.4, lawyers have a duty to communicate with clients about the means by which their objectives are to be accomplished. This includes discussing:

  • Risks associated with various communication methods

  • Potential need for enhanced security measures

  • Client preferences regarding communication methods

Recommendations for Securing Mobile Data 🔒

In light of this breach and to meet ethical obligations, lawyers, their clients, and the general public should take the following steps to secure their mobile data:

1. Use Encrypted Communication Apps 🔐

U.S. officials strongly recommend using encrypted communication apps like Signal. These apps offer end-to-end encryption, making it extremely difficult for hackers to intercept messages or calls.

2. Enable Multi-Factor Authentication (MFA) 🔑

Turn on MFA for all your accounts. This adds an extra layer of security beyond just a password, significantly reducing the risk of unauthorized access.

3. Use Strong Passwords and Biometric Authentication 👆

Create complex, unique passwords for each account. Consider using a password manager. Enable biometric authentication methods like fingerprint or facial recognition where available.

4. Keep Software Updated 🔄

Regularly update your device's operating system and apps. These updates often include critical security patches.

5. Be Cautious with Public Wi-Fi 📶

Avoid using unsecured public Wi-Fi networks. If necessary, use a VPN to encrypt your internet traffic.

6. Only Download Apps from Trusted Sources 📲

Stick to official app stores like Google Play or the Apple App Store. Avoid downloading apps from unknown websites or sources.

7. Implement Device Encryption 🔒

Ensure your device's storage is encrypted. Most modern smartphones offer built-in encryption options.

8. Use Secure Cloud Storage ☁️

Store sensitive documents in secure, encrypted cloud storage services.

See my earlier post:  “How too …”: 🔒 Securing Cloud Storage for Lawyers: Best Practices and Ethical Considerations!.

9. Enable Remote Wipe Capabilities 🧹

Set up the ability to remotely wipe your device if it's lost or stolen.

See my earlier post:  "How to ....": Enable Remote Wipe Capabilities 🧹 (Mobile Phone📱/Tablet Edition).

10. Be Wary of Phishing Attempts 🎣

Stay alert for phishing emails or messages. Verify the sender's identity before sharing any sensitive information.

Special Considerations for Lawyers 👨‍⚖️👩‍⚖️

In some cases, standard security measures may not be sufficient. The ABA Opinion 477R suggests that lawyers may need to take special precautions when:

  • Handling particularly sensitive client information

  • Complying with specific client instructions or agreements

  • Adhering to regulatory requirements (e.g., HIPAA, GDPR)

In such instances, lawyers might need to employ:

  • End-to-end encryption for all communications

  • Multi-factor authentication for all systems

  • Regular third-party security audits

My Final Thoughts 🏁

The recent and ongoing Chinese hack of major U.S. telecom providers highlights the critical need for robust mobile security measures. For lawyers, maintaining technological competence and protecting client data is not just a matter of good practice—it's an ethical imperative. By staying informed about cybersecurity risks, implementing robust security measures, and communicating clearly with clients about these issues, lawyers can fulfill their ethical obligations and protect their clients' interests in the digital age.

Remember, cybersecurity is an ongoing process. Stay vigilant and regularly review and update your security practices. In today's digital landscape, protecting your mobile data is not just a matter of personal privacy—it's a professional and ethical obligation, especially for those handling sensitive client information. 🛡️📱💼

MTC

🚨BOLO: AI Malpractice🚨: Texas Lawyer Fined for AI-Generated Fake Citations! 😮

We’ve been reporting on lawyers incorrectly using AI in their work; but, the lesson has not yet reached all practicing lawyers: Here is another cautionary tale for legal professionals!

No lawyer wants to be disciplined for using generative ai incorrectly - check your work!

A Texas lawyer, Brandon Monk, has been fined $2,000 for using AI to generate fake case citations in a court filing. U.S. District Judge Marcia Crone of the Eastern District of Texas imposed the penalty and ordered Monk to complete a continuing legal education course on generative AI. This incident occurred in a wrongful termination case against Goodyear Tire & Rubber Co., where Monk submitted a brief containing non-existent cases and fabricated quotes. Concernedly, he was using Lexis AI function in his work - check out the report card a Canadian law professor gave Lexis+ AI in my editorial here. The case highlights the ethical challenges and potential pitfalls of using AI in legal practice.

The judge's ruling emphasizes that attorneys remain accountable for the accuracy of their submissions, regardless of the tools used.

Read the full article on Reuters for an in-depth look at this landmark case and its implications for the legal profession.

Be careful out there!

MTC/🚨BOLO🚨: Lexis+ AI™️ Falls Short for Legal Research!

As artificial intelligence rapidly transforms various industries, the legal profession is no exception. However, a recent evaluation of Lexis+ AI™️, a new "generative AI-powered legal assistant" from LexisNexis, raises serious concerns about its reliability and effectiveness for legal research and drafting.

Lexis+ AI™️ gets a failing grade!

In a comprehensive review, University of British Columbia, Peter A. Allard School of Law law Professor Benjamin Perrin put Lexis+ AI™️ through its paces, testing its capabilities across multiple rounds. The results were disappointing, revealing significant limitations that should give legal professionals pause before incorporating this tool into their workflow.

Key issues identified include:

  1. Citing non-existent legislation

  2. Verbatim reproduction of case headnotes presented as "summaries"

  3. Inaccurate responses to basic legal questions

  4. Inconsistent performance and inability to complete requested tasks

Perhaps most concerning was the AI's tendency to confidently provide incorrect information, a phenomenon known as "hallucination" that poses serious risks in the legal context. For example, when asked to draft a motion, Lexis+ AI™️ referenced a non-existent section of Canadian legislation. In another instance, it confused criminal and tort law concepts when explaining causation.

These shortcomings highlight the critical need for human oversight and verification when using AI tools in legal practice. While AI promises increased efficiency, the potential for errors and misinformation underscores that these technologies are not yet ready to replace traditional legal research methods or professional judgment.

For lawyers considering integrating AI into their practice, several best practices emerge:

lawyers need to be weary when using generative ai! 😮

  1. Understand the technology's limitations

  2. Verify all AI-generated outputs against authoritative sources

  3. Maintain client confidentiality by avoiding sharing sensitive information with AI tools

  4. Stay informed about AI developments and ethical guidelines

  5. Use AI as a supplement to, not a replacement for, human expertise

Just like in the United States, Canadian law societies and bar associations are beginning to address the ethical implications of AI use in legal practice. The Law Society of British Columbia has published guidelines emphasizing the importance of understanding AI technology, prioritizing confidentiality, and avoiding over-reliance on AI tools. Meanwhile, The Law Society of Ontario has set out its own set of similar guidelines. Canadian bar ethics codes may be structured somewhat differently than the ABA Model Rules of Ethics and some of the provisions may diverge from each other, the themes regarding the use of generative AI in the practice of law ring similar to each other.

Canadian law societies and bar associations, mirroring their U.S. counterparts, are actively addressing the ethical implications of AI in legal practice. The Law Society of British Columbia has issued comprehensive guidelines that underscore the critical importance of understanding AI technology, safeguarding client confidentiality, and cautioning against excessive reliance on AI tools. Similarly, the Law Society of Ontario has established its own set of guidelines, reflecting a growing consensus on the need for ethical AI use in the legal profession.

While the structure of Canadian bar ethics codes may differ from the ABA Model Rules of Ethics, and specific provisions may vary between jurisdictions, the overarching themes regarding the use of generative AI in legal practice are strikingly similar. These common principles include:

  1. Maintaining competence in AI technologies

  2. Ensuring client confidentiality when using AI tools

  3. Exercising professional judgment and avoiding over-reliance on AI

  4. Upholding the duty of supervision when delegating tasks to AI systems

  5. Addressing potential biases in AI-generated content

Hallucinations can end a lawyers career!

This alignment in ethical considerations across North American jurisdictions underscores the universal challenges and responsibilities that AI integration poses for the legal profession. As AI continues to evolve, ongoing collaboration between Canadian and American legal bodies will likely play a crucial role in shaping coherent, cross-border approaches to AI ethics in law.

It is crucial for legal professionals to approach these tools with a critical eye. AI has the potential to streamline certain aspects of legal work. But Professor Perrin’s review of Lexis+ AI™️ serves as a stark reminder that the technology is not yet sophisticated enough to be trusted without significant human oversight.

Ultimately, the successful integration of AI in legal practice will require a delicate balance – leveraging the efficiency gains offered by technology while upholding the profession's core values of accuracy, ethics, and client service. As we navigate this new terrain, ongoing evaluation and open dialogue within the legal community will be essential to ensure AI enhances, rather than compromises, the quality of legal services.

MTC

🚨 BOLO 🚨 : Beware of phishing emails impersonating federal court CM/ECF notifications!

🚨 Today, I received notices from two different courts about illicit emails posing as court communications (see pictures below). 📨 It can sometimes be easy to ignore the “generic” clerk’s e-mail.

🔒 Remember, scammers may send fake emails with malicious links or attachments claiming to be from courts. Always verify emails before clicking links or downloading files. Access court documents directly through official PACER/CM/ECF portals. 🛡️

🚫 Report suspicious emails to your court.

Stay vigilant to protect sensitive case information and maintain cybersecurity. 🛡️💻

From the United States District Court of Maryland…

From the United States Southern District Court of indiana…