On Demand Audio

Data Protection, Security & Legal Ethics (Update)

(325 reviews)

Produced on August 26, 2019

Taught by
$ 89 Ethics and Privacy & Cybersecurity In Stock
Get started now

$299 / year - Access to this Course and 1,500+ Lawline courses


Course Information

Time 98 minutes
Difficulty Intermediate

Course Description

It was once a poorly kept secret that hackers routinely target law firms. This fact is rather difficult to miss nowadays. Moreover, the threats to the confidential data kept and used by attorneys and law firms are always evolving. These include sophisticated – and sometimes not so sophisticated – electronic attacks, lost and stolen devices, an endless variety of tricks and scams, and even simple attorney (and employee) errors. Any of these can lead to serious consequences for attorneys and firms alike.

In 2012 the American Bar Association amended a number of the Model Rules of Professional Conduct to address the increasing use of technology in legal practice and the ongoing need to safeguard client and firm data. Attorney and information security consultant Scott Aurnou discusses the amended Rules, subsequent ABA Formal Opinions clarifying the Rules’ application in practice, as well as the basic steps needed to comply with the Rules. This will include measures to secure the confidential client and firm data on your firm’s computer network, individual computers, and mobile devices.

Learning Objectives:

  1. Address ethical obligations under the ABA Model Rules related to technology and attorney competence, data confidentiality and the use of outside services
  2. Identify the wide array of electronic threats facing attorneys
  3. Take the essential steps involved in safeguarding a modern law firm computer networks, computers, and mobile devices
  4. Discuss the methods hackers use to trick people and how to avoid becoming a victim
  5. Establish the basic steps needed to prepare for and respond to a security incident

Credit Information

After completing this course, Lawline will report your attendance information to {{ accredMasterState.state.name }}. Please ensure your license number is filled out in your profile to ensure timely reporting. For more information, see our {{ accredMasterState.state.name }} CLE Requirements page . After completing this course, {{ accredMasterState.state.name }} attorneys self-report their attendance and CLE compliance. For more information on how to report your CLE courses, see our {{ accredMasterState.state.name }} CLE Requirements FAQ .


Scott Aurnou

The Security Advocate

Scott Aurnou, Esq., CISSP is an attorney and founder of The Security Advocate, which helps organizations with information security and data privacy issues. This includes privacy and security awareness training, security consulting, compliance with cyber security and privacy laws and related legal concerns.

Scott spent over a decade as a litigation attorney in the NYC area, and served as lead counsel for a private client services group at Smith Barney. He uses his legal, security, and business background to make complex information security concepts easy to understand (and even entertaining on occasion) for non-technical audiences. He has published security related articles in national publications ranging from the New York Law Journal to SC Magazine. In addition, he has created and delivered numerous presentations on information security and data privacy issues for executives, managers, and professionals.

Scott is a Certified Information Systems Security Professional (CISSP), Certified Information Privacy Technologist (CIPT), Certified Information Privacy Professional (CIPP/US) and a Fellow of Information Privacy (FIP). He is admitted to practice law in New York, Colorado, the U.S. District Courts for the Eastern and Southern Districts of New York; as well as the U.S. Court of Appeals for the Second Circuit. He is also the author of the Introduction to Information Security LiveLessons video training series for Pearson Publishing. 


C. Peyton E.

Very engaging and knowledgeable instructor. This is a vast subject, and it was masterfully edited and presented.

Allison P.

Taught in very understandable terms. Very informative, thanks!

Benjamin F.

I think a lot of us lawyers don't know that much about technology and the teacher did a very good job of making everything understandable.

Sue L.

Excellent course. Very informative.

William C.

Great overview course!

Elisa V.

He is an excellent presenter, knowledge base is so deep and he covers both a vast breadth and depth of subject matter. I wish he would instruct all CLE courses. He's the best on this site.

Thomas D.


Philip H.


Peter V.

Good job. Organized and easy to follow.

Lisa M.

Really enjoyed the course - very informative!

Andrew W.

This is the best CLE program I have ever viewed. The speaker was informative and very familiar with the material. His speaking style and delivery were excellent despite a tight time constaint given the volume and specifics of the course material. Great presentation!

Kathryn F.

LOVED this course!!

Terry Q.

Great presentation!

Lisa P.

Great explanations and analogies

Magin P.

This was truly a very good course, great overview of the subject matter. Very helpful recommendations.

Kyoko I.


Lawton B.

Fantastic! Great information!

C. T. A.

Obviously, an expert!

William B.

The course and the presenter were both excellent.

Philip S.

very good speaker

Pamela C.

An impressive amount of useful information.

Load More