A great deal of the information underlying the modern commercial and legal marketplace is electronic. Consequently, potential evidence can be found on an increasingly wide array of devices and storage systems. Whether it’s computer drives produced by (or to) an adversary/third party or critical investigative material found on your own company or firm network, mishandling it can lead to a number of problems. Mistakes can lead to accidental data breaches and the inadvertent disclosure of privileged materials. Improperly accessed data can also alter underlying evidence, potentially rendering it inadmissible. Ultimately, attorneys can be held responsible when this information is mishandled.
The American Bar Association’s Model Rules of Professional Conduct were amended in 2012 to address the increasing use of technology in legal practice and the ongoing need to safeguard client and firm data. Attorney and information security consultant Scott Aurnou discusses the amended Rules and the fundamental steps needed to comply with them, including measures to secure confidential client and e-discovery information. He will provide an overview of how electronic data is stored, outline the forensic investigative process and highlight steps needed to mitigate computer forensic errors, and the overall risk of mishandling electronic evidence.
Scott Aurnou, Esq., CISSP is an attorney and founder of The Security Advocate, which helps organizations with information security and data privacy issues. This includes privacy and security awareness training, security consulting, compliance with cyber security and privacy laws and related legal concerns.
Scott spent over a decade as a litigation attorney in the NYC area, and served as lead counsel for a private client services group at Smith Barney. He uses his legal, security, and business background to make complex information security concepts easy to understand (and even entertaining on occasion) for non-technical audiences. He has published security related articles in national publications ranging from the New York Law Journal to SC Magazine. In addition, he has created and delivered numerous presentations on information security and data privacy issues for executives, managers, and professionals.
Scott is a Certified Information Systems Security Professional (CISSP), Certified Information Privacy Technologist (CIPT), Certified Information Privacy Professional (CIPP/US) and a Fellow of Information Privacy (FIP). He is admitted to practice law in New York, Colorado, the U.S. District Courts for the Eastern and Southern Districts of New York; as well as the U.S. Court of Appeals for the Second Circuit. He is also the author of the Introduction to Information Security LiveLessons video training series for Pearson Publishing.
Unlimited CLE Subscription gives you access to take almost any course from our catalog and earn as much CLE credit as you need.