SlideShare a Scribd company logo
1 of 70
Presented by Cynthia Sharp
• Professional CLE Speaker
• Attorney Business Coach
The ethics of legal marketing & law practice
in a social media environment
2
Event Sponsor:
Featuring
Cynthia Sharp
The Sharper Lawyer
March 13, 2014
Indianapolis, IN
@thesharperlawyer
Preliminary Thoughts
•I would be really happy if we could cover the following:
•I decided to attend “Social Media” because:
3 @thesharperlawyer
Wake Up To Social Media!
4 @thesharperlawyer
5 @thesharperlawyer
Attorneys Using Social Media
15%
43%
56%
Quadrupled in
2 years!
6 @thesharperlawyer
Attorneys Using Social Media
7 @thesharperlawyer
Legal Tech Survey Report
Attorneys Obtaining Clients
Through Social Media
8 @thesharperlawyer
Legal Tech Survey Report
The Cultureist
9
• 2,405,518,376 Worldwide Internet Users
• 78.6% North Americans on Internet
• Over 1 billion Social Network Users
@thesharperlawyer
10
Facebook Friends
Cynthia Sharp
Bruce Steiner Ron Fatoullah
@thesharperlawyer
11
Facebook Friends
Cynthia Sharp
Bruce Steiner Ron Fatoullah
@thesharperlawyer
Facts About
•100% of Fortune 500 Companies Have Executives on
Linkedin
•238 Million Members
•Every Second - 2 New Member Joins
12 @thesharperlawyer
13
1.6 billion
search queries
500 million
tweets
@thesharperlawyer
Social Media
Practical Applications
14
• Marketing
• Practice Area
• Develop Internal Social Media Policy
• Compliance Procedures
• Criminal Defense
• Civil Litigation
• Litigation/Research Tool
@thesharperlawyer
Social Media
•New Case Law
•Interesting Ethical Issues
15 @thesharperlawyer
Digital Immigrant or
Digital Native?
16 @thesharperlawyer
Social Media as a
Marketing Tool
17
STRATEGY
BRAND
PROFILE
EXECUTION
@thesharperlawyer
Information About Legal Services
•Protected Form of Commercial Speech
•Subject to Rules 4-7.1 - 7.5
18 @thesharperlawyer
Information About
Legal Services
• Rule 7.1 - Communication Concerning a Lawyer's
ServicesRule 7.2 - AdvertisingRule 7.3 - Direct
Contact with Prospective ClientsRule 7.4 - Com
munication of Fields of Practice and
SpecializationRule 7.5 - Firm Names and
Letterheads
19 @thesharperlawyer
20 @thesharperlawyer
American Bar Association
Formal Opinion 10-457
21 @thesharperlawyer
Free Commercial Speech or
Regulated Attorney Advertising
22 @thesharperlawyer
23 @thesharperlawyer
blawgsearch.justia.com
24 @thesharperlawyer
25 @thesharperlawyer
26 @thesharperlawyer
•Endorsement Feature
•“Specialties” Field
•“Answers” Section
27 @thesharperlawyer
28 @thesharperlawyer
Use Common Sense!
29 @thesharperlawyer
30 @thesharperlawyer
31 @thesharperlawyer
32 @thesharperlawyer
33 @thesharperlawyer
www.lextweet.com
34 @thesharperlawyer
Research Tool
Write down 3 ways that you
use the internet to research
35 @thesharperlawyer
www.jdsupra.com
36 @thesharperlawyer
Citation Forms Developed
Rittman, S. (Spring 2008). Don’t Use the “R” Word. Retrieved
on January 25, 2011 from www.mo-legal-ethics.org
www.mo-legal-ethics.org
37 @thesharperlawyer
legalonramp.com
38 @thesharperlawyer
Litigation Tool
39 @thesharperlawyer
Mining Information
•Vetting Jurors
•Pretexting (“Friending”)
40 @thesharperlawyer
41 @thesharperlawyer
Internet Research by
Jurors
42 @thesharperlawyer
Discovery
•Warn clients not to discuss their case online
•Standard Applied: Reasonably calculated to lead to
discovery of admissible evidence
•Notice to produce
43 @thesharperlawyer
Technical Revolution -
Ethical Evolution
Ethical Evolution
44 @thesharperlawyer
Confidentiality Notice
This electronic transmission and any attached documents or
other writings are confidential and are for the sole use of the
intended recipient(s) identified above. This message may
contain information that is privileged, confidential or
otherwise protected from disclosure under applicable law. If
the receiver of this information is not the intended recipient,
or the employee, or agent responsible for delivering the
information to the intended recipient, you are hereby notified
that any use, reading, dissemination, distribution, copying or
storage of this information is strictly prohibited. If you have
received this information in error, please notify the sender by
return email and delete the electronic transmission, including
all attachments from your system.
This electronic transmission and any attached documents or
other writings are confidential and are for the sole use of the
intended recipient(s) identified above. This message may
contain information that is privileged, confidential or
otherwise protected from disclosure under applicable law. If
the receiver of this information is not the intended recipient,
or the employee, or agent responsible for delivering the
information to the intended recipient, you are hereby notified
that any use, reading, dissemination, distribution, copying or45 @thesharperlawyer
Ethical Evolution
•Terminology
•Competence
•Confidentiality
•Communication
•Duties to Prospective Clients
•Receipt of Erroneously Sent
Document
•Supervision of NonLawyer
Assistants
•Advertising
46 @thesharperlawyer
Terminology
MRPC 1.0 Terminology
(o) Writing or Written
Comment 9 to MRPC 1.0
{Screening}
47 @thesharperlawyer
“To maintain the requisite knowledge and skill, a
lawyer should keep abreast of changes in the law
and its practice, including the benefits and risks
associated with relevant technology, engage in
continuing study and education and comply with
all continuing legal education requirements to
which the lawyer is subject.”
- Comment 6 to MRPC 1.1 (as amended)
Competence
48 @thesharperlawyer
Redaction Issues
Long gone are the days when the attorney duty of confidentiality imposed by Model Rule 1.6
was satisfied by maintaining a fireproof steel locked filing cabinet behind a secured office door.
The technological revolution has taken us beyond the world of desktop computers with a
dedicated server to the stratosphere of cloud computing and the genius of smartphones and
electronic tablets.The portability of our “second brain” results in additional ethical responsibilities
that must not be ignored. Lawyers’ obligations have radically changed in light of the methods by
which confidential client and personal information is now carried and stored.
49 @thesharperlawyer
Data Disaster
50 @thesharperlawyer
Duty of Confidentiality
MRPC 1.6
51 @thesharperlawyer
Communication
“... A lawyer should promptly respond to or
acknowledge client communications.”
- Comment [4] of MRPC 1.4 (as
amended)
52 @thesharperlawyer
Duties to Prospective Clients
“...[a] person becomes a prospective client by
consulting with a lawyer about a client-lawyer
relationship with respect to a matter”.
- Comment 2 to MRPC 1.18 (as
amended)
53 @thesharperlawyer
Does a Communication
Constitute a Consultation?
•Did the lawyer encourage or solicit inquiries about a
proposed representation?
•Did the person encounter any warnings or cautionary
statements that were intended to limit, condition, waive or
disclaim the lawyer’s obligations? Were those warnings or
cautionary statements clear and reasonably understandable?
Did the lawyer act or communicate in a manner that was
contrary to the warnings or cautionary statements?
54 @thesharperlawyer
Receipt of Erroneously
Sent Documents
Lawyer receiving electronically stored information that
he or she knows or reasonably should know was sent
inadvertently must  promptly notify the sender of the
mistake (Model Rule 4.4(b)) 
Duty to notify extends to metadata.
(Comment 2)
55 @thesharperlawyer
Recommended
Metadata Scrubbers
Metadata Assistant:
http://www.payneconsulting.com/products/metadataretail/
iScrub: http://esqinc.com/section/products/2/iscrub.html
Workshare Protect: http://www.workshare.com/products/wsprotect/
Metadact: http://www.litera.com/Products/Metadact%AE.aspx
56 @thesharperlawyer
Do You Secure PDF Files Before
You Transmit?
Suggested Office Policy:
“When there is no
legitimate reason to
transmit an editable
document, we will always
send SECURE PDFs.”
“When there is no
legitimate reason to
transmit an editable
document, we will always
send SECURE PDFs.”
57 @thesharperlawyer
You Cannot Delegate
Ethical Responsibilities
Model Rule 5.3 requires attorneys who outsource
work to non-attorneys to “make reasonable efforts
to ensure that the non-lawyers’ services are provided
in a manner that is compatible with the lawyer’s
professional obligations”.
58 @thesharperlawyer
Attorney Advertising Rules
Lawyers may pay Internet-based lead generators for
generating client leads, as long as the lead generator does
not “recommend” the lawyer.   (MRPC 7.2, Comment 5)
Only a “target communication initiated by the lawyer”
directed to a “specific person” that “offers to provide”
legal services is a solicitation. Communications to the
general public, including Internet banners, are not
solicitations. (MRPC 7.3)
59 @thesharperlawyer
“A lawyer shall act with reasonable diligence and
promptness in representing a client.”
Comment 2 - “A lawyer's work load must be
controlled so that each matter can be handled
competently.”
Rule 1.3
60
Diligence
@thesharperlawyer
www.evernote.com
61 @thesharperlawyer
www.pomodorotechnique.com
62 @thesharperlawyer
Law Firm Social Media
Policy
63 @thesharperlawyer
Online or In Line
•Keep client confidences
•Avoid appearance of establishing client-
attorney relationship
•Be polite
•Don’t fight
•Don’t bad mouth law firm, colleagues or
judges.
64 @thesharperlawyer
Moving Forward
•Did you learn anything new today?
•Did you gain any insight into yourself or someone else?
•Do you plan to change any of your behaviors as a result
of today’s session?
@thesharperlawyer
Evaluations
66 @thesharperlawyer
@thesharperlawyer
Connect with Cindy
like us follow us follow us share with us
The Sharper Lawyer
connect with us
@thesharperlawyer
The Sharper Lawyer
now offers
a complimentary
half hour coaching session.
Email Cindy for more details!
cindy@thesharperlawyer.com
@thesharperlawyer
Thank You
The Sharper Lawyer
www.thesharperlawyer.com

More Related Content

What's hot

Ajs 524 Extraordinary Success/newtonhelp.com
Ajs 524 Extraordinary Success/newtonhelp.com  Ajs 524 Extraordinary Success/newtonhelp.com
Ajs 524 Extraordinary Success/newtonhelp.com amaranthbeg130
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach AnalysisTal Be'ery
 
Digital Forensics Company
Digital Forensics CompanyDigital Forensics Company
Digital Forensics Companycyberrecovery
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerAnonDownload
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite
 
Osint overview 26 mar 2015
Osint overview  26 mar 2015Osint overview  26 mar 2015
Osint overview 26 mar 2015Mats Björe
 
Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...dbpublications
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?Michael Soltys
 
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...eFax Corporate®
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data securityUlf Mattsson
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
Investigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsInvestigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsrcorrigan
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 

What's hot (20)

Ajs 524 Extraordinary Success/newtonhelp.com
Ajs 524 Extraordinary Success/newtonhelp.com  Ajs 524 Extraordinary Success/newtonhelp.com
Ajs 524 Extraordinary Success/newtonhelp.com
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach Analysis
 
Digital Forensics Company
Digital Forensics CompanyDigital Forensics Company
Digital Forensics Company
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
 
Osint overview 26 mar 2015
Osint overview  26 mar 2015Osint overview  26 mar 2015
Osint overview 26 mar 2015
 
Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
Investigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsInvestigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRs
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 

Viewers also liked

Ch 6 7 international political and legal environment
Ch 6 7 international political and legal environmentCh 6 7 international political and legal environment
Ch 6 7 international political and legal environmentAniruddha Maurya
 
Marketing of Financial Services (Nepalese Context)
Marketing of Financial Services (Nepalese Context)Marketing of Financial Services (Nepalese Context)
Marketing of Financial Services (Nepalese Context)Sohan Khatri
 
Holistics marketing2
Holistics marketing2Holistics marketing2
Holistics marketing2srikirthi
 
The Holistic Marketing Approach
The Holistic Marketing ApproachThe Holistic Marketing Approach
The Holistic Marketing ApproachLori Fisher
 
Micro and Macro Environment Factor of Marketing
Micro and Macro Environment Factor of MarketingMicro and Macro Environment Factor of Marketing
Micro and Macro Environment Factor of MarketingSagar Garg
 
Marketing micro environment
Marketing micro environmentMarketing micro environment
Marketing micro environment17somya
 
Modern marketing organizational structure @kaykas - jascha kaykas-wolff
Modern marketing organizational structure   @kaykas - jascha kaykas-wolffModern marketing organizational structure   @kaykas - jascha kaykas-wolff
Modern marketing organizational structure @kaykas - jascha kaykas-wolffJascha Kaykas-Wolff
 
Universidad técnica de ambato final
Universidad técnica de ambato finalUniversidad técnica de ambato final
Universidad técnica de ambato finalyeseduvillacis
 
Shared Compliance Management Office - sCMO
Shared Compliance Management Office - sCMOShared Compliance Management Office - sCMO
Shared Compliance Management Office - sCMONavin Malhotra
 
Presentacion folleto
Presentacion folletoPresentacion folleto
Presentacion folletoKarina Flores
 
How to talk_to_parents_so_they'll_understand_ppt
How to talk_to_parents_so_they'll_understand_pptHow to talk_to_parents_so_they'll_understand_ppt
How to talk_to_parents_so_they'll_understand_pptRoger Hernandez
 
UNICEF Russian digital landscape exploratory paper
UNICEF Russian digital landscape exploratory paperUNICEF Russian digital landscape exploratory paper
UNICEF Russian digital landscape exploratory paperAkshay Sinha
 
Marketin industrial
Marketin industrialMarketin industrial
Marketin industrialcharlierod62
 
Cours photo contemporaine 2012bis
Cours photo contemporaine 2012bisCours photo contemporaine 2012bis
Cours photo contemporaine 2012bisdiedrich2
 
Printing During Network Outages
Printing During Network OutagesPrinting During Network Outages
Printing During Network OutagesPlus Technologies
 
Secrets for Growing Conference Sponsorship Revenues
Secrets for Growing Conference Sponsorship RevenuesSecrets for Growing Conference Sponsorship Revenues
Secrets for Growing Conference Sponsorship RevenuesDonna Kastner
 

Viewers also liked (20)

Ch 6 7 international political and legal environment
Ch 6 7 international political and legal environmentCh 6 7 international political and legal environment
Ch 6 7 international political and legal environment
 
Marketing of Financial Services (Nepalese Context)
Marketing of Financial Services (Nepalese Context)Marketing of Financial Services (Nepalese Context)
Marketing of Financial Services (Nepalese Context)
 
Holistics marketing2
Holistics marketing2Holistics marketing2
Holistics marketing2
 
The Holistic Marketing Approach
The Holistic Marketing ApproachThe Holistic Marketing Approach
The Holistic Marketing Approach
 
Micro and Macro Environment Factor of Marketing
Micro and Macro Environment Factor of MarketingMicro and Macro Environment Factor of Marketing
Micro and Macro Environment Factor of Marketing
 
Marketing micro environment
Marketing micro environmentMarketing micro environment
Marketing micro environment
 
Modern marketing organizational structure @kaykas - jascha kaykas-wolff
Modern marketing organizational structure   @kaykas - jascha kaykas-wolffModern marketing organizational structure   @kaykas - jascha kaykas-wolff
Modern marketing organizational structure @kaykas - jascha kaykas-wolff
 
Universidad técnica de ambato final
Universidad técnica de ambato finalUniversidad técnica de ambato final
Universidad técnica de ambato final
 
Shared Compliance Management Office - sCMO
Shared Compliance Management Office - sCMOShared Compliance Management Office - sCMO
Shared Compliance Management Office - sCMO
 
Presentacion folleto
Presentacion folletoPresentacion folleto
Presentacion folleto
 
Wedding_slideshow
Wedding_slideshowWedding_slideshow
Wedding_slideshow
 
11 3
11 311 3
11 3
 
How to talk_to_parents_so_they'll_understand_ppt
How to talk_to_parents_so_they'll_understand_pptHow to talk_to_parents_so_they'll_understand_ppt
How to talk_to_parents_so_they'll_understand_ppt
 
E i e i oops!
E i e i oops!E i e i oops!
E i e i oops!
 
UNICEF Russian digital landscape exploratory paper
UNICEF Russian digital landscape exploratory paperUNICEF Russian digital landscape exploratory paper
UNICEF Russian digital landscape exploratory paper
 
Marketin industrial
Marketin industrialMarketin industrial
Marketin industrial
 
Cours photo contemporaine 2012bis
Cours photo contemporaine 2012bisCours photo contemporaine 2012bis
Cours photo contemporaine 2012bis
 
Printing During Network Outages
Printing During Network OutagesPrinting During Network Outages
Printing During Network Outages
 
Secrets for Growing Conference Sponsorship Revenues
Secrets for Growing Conference Sponsorship RevenuesSecrets for Growing Conference Sponsorship Revenues
Secrets for Growing Conference Sponsorship Revenues
 
Open Craft Lab
Open Craft LabOpen Craft Lab
Open Craft Lab
 

Similar to THE ETHICS OF LEGAL MARKETING AND LAW PRACTICE IN A SOCIAL MEDIA ENVIRONMENT - ICLEF 2014

The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...Cynthia Sharp
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
Are Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordAre Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordMia Eaker
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxPallawiBulakh1
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...William Tanenbaum
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Logikcull.com
 
3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docxasharshaikh8
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansRob Ragan
 
CloudCamp Chicago - Healthcare IT
CloudCamp Chicago - Healthcare ITCloudCamp Chicago - Healthcare IT
CloudCamp Chicago - Healthcare ITCloudCamp Chicago
 
Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBIBenjamin Ang
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeCompliancy Group
 
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua LenonUnderstanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua LenonClio - Cloud-Based Legal Technology
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityShawn Tuma
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxbalewayalew
 
Moving to the Cloud: Client Communication Best Practices for Law Firms
Moving to the Cloud: Client Communication Best Practices for Law FirmsMoving to the Cloud: Client Communication Best Practices for Law Firms
Moving to the Cloud: Client Communication Best Practices for Law FirmsClio - Cloud-Based Legal Technology
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxjennyJey2
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller
 

Similar to THE ETHICS OF LEGAL MARKETING AND LAW PRACTICE IN A SOCIAL MEDIA ENVIRONMENT - ICLEF 2014 (20)

The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Cybersecurity 101 final
Cybersecurity 101 finalCybersecurity 101 final
Cybersecurity 101 final
 
Are Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordAre Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- Spafford
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery
 
3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
 
CloudCamp Chicago - Healthcare IT
CloudCamp Chicago - Healthcare ITCloudCamp Chicago - Healthcare IT
CloudCamp Chicago - Healthcare IT
 
Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBI
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challenge
 
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua LenonUnderstanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
 
Moving to the Cloud: Client Communication Best Practices for Law Firms
Moving to the Cloud: Client Communication Best Practices for Law FirmsMoving to the Cloud: Client Communication Best Practices for Law Firms
Moving to the Cloud: Client Communication Best Practices for Law Firms
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
 

More from Cynthia Sharp

STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014Cynthia Sharp
 
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014Cynthia Sharp
 
Technical Revolution - Ethical Evolution Keynote
Technical Revolution - Ethical Evolution KeynoteTechnical Revolution - Ethical Evolution Keynote
Technical Revolution - Ethical Evolution KeynoteCynthia Sharp
 
Strategies for Taking Charge of Your Law Practice
Strategies for Taking Charge of Your Law PracticeStrategies for Taking Charge of Your Law Practice
Strategies for Taking Charge of Your Law PracticeCynthia Sharp
 
Take Charge of Your Life - Personal & Professional (ICLEF)
Take Charge of Your Life - Personal & Professional (ICLEF)Take Charge of Your Life - Personal & Professional (ICLEF)
Take Charge of Your Life - Personal & Professional (ICLEF)Cynthia Sharp
 
Strategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law PracticeStrategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law PracticeCynthia Sharp
 

More from Cynthia Sharp (6)

STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014
 
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014
 
Technical Revolution - Ethical Evolution Keynote
Technical Revolution - Ethical Evolution KeynoteTechnical Revolution - Ethical Evolution Keynote
Technical Revolution - Ethical Evolution Keynote
 
Strategies for Taking Charge of Your Law Practice
Strategies for Taking Charge of Your Law PracticeStrategies for Taking Charge of Your Law Practice
Strategies for Taking Charge of Your Law Practice
 
Take Charge of Your Life - Personal & Professional (ICLEF)
Take Charge of Your Life - Personal & Professional (ICLEF)Take Charge of Your Life - Personal & Professional (ICLEF)
Take Charge of Your Life - Personal & Professional (ICLEF)
 
Strategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law PracticeStrategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law Practice
 

Recently uploaded

BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
How to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setupsHow to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setupsssuser4571da
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationtbatkhuu1
 
Factors-Influencing-Branding-Strategies.pptx
Factors-Influencing-Branding-Strategies.pptxFactors-Influencing-Branding-Strategies.pptx
Factors-Influencing-Branding-Strategies.pptxVikasTiwari846641
 
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Social Media Marketing PPT-Includes Paid media
Social Media Marketing PPT-Includes Paid mediaSocial Media Marketing PPT-Includes Paid media
Social Media Marketing PPT-Includes Paid mediaadityabelde2
 
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...ChesterYang6
 
Cash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girlCash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girlCall girl Jaipur
 
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Richard Ingilby
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...aditipandeya
 
Uncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsUncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsVWO
 
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptxDigital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptxZACGaming
 
Call Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRCall Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRSapana Sha
 
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Unraveling the Mystery of the Hinterkaifeck Murders.pptx
Unraveling the Mystery of the Hinterkaifeck Murders.pptxUnraveling the Mystery of the Hinterkaifeck Murders.pptx
Unraveling the Mystery of the Hinterkaifeck Murders.pptxelizabethella096
 
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO SuccessBrighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO SuccessVarn
 

Recently uploaded (20)

BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
 
How to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setupsHow to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setups
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentation
 
Factors-Influencing-Branding-Strategies.pptx
Factors-Influencing-Branding-Strategies.pptxFactors-Influencing-Branding-Strategies.pptx
Factors-Influencing-Branding-Strategies.pptx
 
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
 
Social Media Marketing PPT-Includes Paid media
Social Media Marketing PPT-Includes Paid mediaSocial Media Marketing PPT-Includes Paid media
Social Media Marketing PPT-Includes Paid media
 
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
 
Cash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girlCash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girl
 
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting GroupSEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
 
Digital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew RupertDigital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew Rupert
 
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
 
Brand Strategy Master Class - Juntae DeLane
Brand Strategy Master Class - Juntae DeLaneBrand Strategy Master Class - Juntae DeLane
Brand Strategy Master Class - Juntae DeLane
 
Uncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsUncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 Reports
 
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptxDigital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptx
 
Call Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRCall Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCR
 
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose GuirgisCreator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
 
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
 
Unraveling the Mystery of the Hinterkaifeck Murders.pptx
Unraveling the Mystery of the Hinterkaifeck Murders.pptxUnraveling the Mystery of the Hinterkaifeck Murders.pptx
Unraveling the Mystery of the Hinterkaifeck Murders.pptx
 
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO SuccessBrighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
 

THE ETHICS OF LEGAL MARKETING AND LAW PRACTICE IN A SOCIAL MEDIA ENVIRONMENT - ICLEF 2014