The Council of the Computer & Technology Section has released some of the older versions of its Circuits eJournal to the public. You no longer need a password to enjoy issues of Circuits. Links to some of the previous versions are below:
The Computer & Technology Section will be hosting (virtually) its 4th Annual “Technology and Justice for All” CLE — Vaccinating Your Technology Tools for Practice in a Pandemic — from 8:45 a.m. – 4:00 p.m. CST on Friday, December 11, 2020. You don’t want to miss this outstanding CLE providing 5.5 hours of continuing legal education credit, including .75 of ethics.
FREE for any legal aid providers or justice incubators
FULL AGENDA
4th Annual Technology and Justice for All CLE: Vaccinating Your Technology Tools for Practice in a Pandemic
8:45 Welcome, Opening Remarks and Announcements Shawn Tuma, Chair, Computer & Technology Section William Smith, Course Director; Assistant General Counsel at Business Talent Group LLC, CIPP/E
9:00 Ransomware – a True Existential Threat to Your Practice! (1 hr / .25 ethics) Lavonne Hopkins, Sr. Legal Director – Cybersecurity, Product & App Security, IT Security at Dell Technologies Brett Leatherman, Supervisory Special Agent at the Federal Bureau of Investigation Shawn Tuma, Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane, LLP
10:00 Ethical Considerations for Practicing Remote and in a Pandemic (.5 hr ethics) Hon. Roy Ferguson, Judge 394th Judicial District Court Craig Haston, Attorney at Law at The Haston Law Firm, P.C.
10:30 Break
10:45 Trials, Depositions, Hearings, and other Remote Proceedings (1 hr) Sammy Ford, Trial Lawyer, Ahmad, Zavitsanos, Anaipakos, Alavi & Mensing P.C. or AZA Tim Shelby, Partner at Ahmad, Zavitsanos, Anaipakos, Alavi & Mensing P.C. or AZA Monica Uddin, Attorney at Ahmad, Zavitsanos, Anaipakos, Alavi & Mensing P.C. or AZA Jason McManis, Trial Lawyer for Business and IP Disputes, Ahmad, Zavitsanos, Anaipakos, Alavi & Mensing P.C. or AZA Paul Turkevich, Attorney at Ahmad, Zavitsanos, Anaipakos, Alavi & Mensing P.C. or AZA
11:45 Break
12:00 Celebrating 30 Years of the Computer and Technology Section (No MCLE Credit) Peter Vogel, Cyber, IT, eCommerce, eDiscovery, Arbitrator, Mediator, Trial Lawyer, & Of Counsel at Foley & Lardner
12:45 Break
1:00 U.S. Supreme Court Technology Case Roundup (1 hr)
Matthew Murrel, Partner at Soltero Sapire Murrell PLLC Pierre Grosdidier, Senior Assistant City Attorney at City of Houston Ron Chichester, Attorney at Law at Ronald Chichester, P.C.
2:00 #SoEasyEvenMarkCanDoIt: Practice Management Systems and Virtual Law Practice with Mitchell and Mark (.5 hr) Mitch Zoll, Founder & Principal at Zoll Firm, PLLC Mark Unger, Attorney at The Unger Law Firm and Consultant at Muse Legal Technology Consulting
2:30 Expert Panel – Q&A With the Techies (.5 hr)
3:00 60 Apps in 60 Minutes (1 hr) Michael Curran, Executive Legal Professional, CEO ➲ Leading Financial & Technology Expertise for Risk Mitigation & Asset Protection Shannon Warren, Patent Attorney at The Law Office of Shannon Warren, PLLC Robert Ray, Attorney At Law at TexasAntiSlapp.Com Al “VirtuAl” Harrison, VP at Harrison Law Office, P.C.
4:00 Closing Remarks and Adjourn William Smith, Course Director; Assistant General Counsel at Business Talent Group LLC, CIPP/E
HEY, WHILE YOU’RE HERE, CONNECT WITH US ON SOCIAL MEDIA!
We are excited to provide you with seven social media channels to interact with others and stay connected to the Section:
The Section’s Facebook Group, Computer & Technology Section – State Bar of Texas, https://www.facebook.com/groups/ComputerTechnologySection/, is limited to only active members of the Section and provides a great opportunity to communicate with other members of the Section.
The Section’s Facebook Page, Computer & Technology Section – State Bar of Texas, https://www.facebook.com/TXBarTech, is a Page that anyone on Facebook can “Like” and “Follow” and is a great way to stay updated on Section news and events.
The Section’s LinkedIn Group, Computer & Technology Section – State Bar of Texas, https://www.linkedin.com/groups/1890047/ is limited to only active members of the Section and provides a great opportunity to communicate with other members of the Section.
The Section’s Twitter, @TXBarCompTechSection, https://twitter.com/TXBarCompTech, is a Twitter account that anyone can “Follow” and is a great way to stay updated on Section news and events.
The Section’s Instagram, @TxBarTech, https://www.instagram.com/txbartech/, is an Instagram account that anyone can “Follow” and is a great way to stay connected to the Section.
Former Chair, App Developer, Council Member, Musician, Friend
It is with immense sadness that we share that Josh Hamilton, former Chair, passed away from glioblastoma, an aggressive brain tumor. Josh was as amazing a friend as anyone could have known. He was kind beyond words or actions, transcending this quality to an art that is so rarely seen that it appears to perhaps be endangered. In essence, he was quite literally the ‘nicest guy you might ever want to meet.’ He was smart beyond knowledge, wise beyond years and gracious beyond anyone’s ability to ask.
Josh was an integral part of the team creating the Computer & Technology Section app for its members, figuring out how to authenticate a user’s identity with the State Bar of Texas and writing the code to accomplish this that was adopted by the company that made the app.
In 2011, he received The State Bar of Texas Presidents/Directors Certificate of Merit, State Bar of Texas Annual Meeting, and Computer & Technology Section Award of Merit for his work on the App and his contribution to the State Bar.
Josh was a true husband and partner to his wife, Jane, devoted and loving father to his children, Bethany, Josiah, and Sophia and many other family and friends. How his children grew up, and how they are now is a testimonial of Josh as a father. How his wife loved him is a testimonial of Josh as a husband. How he treated his fellow attorneys is a testimonial of Josh as a friend.
Those who knew him admired his ability as a first-class hacker. He was easily the best Perl hacker that the State Bar could call their own. He built his own home security system (from cobbled-together parts). He created spamgourmet.com (a great website that provided disposable email addresses that helped thousands of people avoid unwanted spam/corporate messages). That’s what Josh did best. He used his considerable hacking skills to devise creative solutions for the common good — all on a shoestring budget. Practical as well as pragmatic. He was level-headed, and did not possess any of the idiosyncrasies common to geeks.
We, the Council and section members, lawyers and friends, will miss him more than we have words. Thank you Josh, for what you were and what you have done to make us better.
Memorial Service and reception:
Friday, February 14, 2020 at 11:00 AM Christ Church Cathedral 1117 Texas Avenue Houston, Texas 77002
Mark I. Unger, Former Chair of the Computer & Technology Section
William D. Smith, Council Member of the Computer & Technology Section
From the Attendee’s Perspective
William: Thursday, February 27, 2019
I was very excited to attend my first ABA Techshow- enough to brave Chicago in February!
For a lawyer or IT
professional with any responsibility for security and data privacy in their
organization, these conferences are always a tremendous source of learning, in
terms of best practices, new tools, and assuaging that am-I-the-crazy-one?
feeling by learning that many others deal with the same challenges you do.
However, there’s also an element of masochism as you learn of new threats and
vulnerabilities which you hadn’t known you needed to be worried about. (I’m
reminded of my high school biology teacher, who subscribed to Infectious
Diseases Quarterly, a perpetual source of existential terror for him. That’s
probably why he chose to live in the country outside of Weatherford and commute
to work, notwithstanding the threat of squirrels and other wild animals.)
Privacy concerns presented themselves immediately upon my arrival
at the ABA Techshow- literally! At the registration table I was greeted by a
box full of these friendly little guys:
In
case you’re as puzzled as me and the woman next to me in the registration line
were, those are laptop camera covers. A useful reminder that sometimes the most
effective security measures are the simplest, low-tech ones. (Though there’s a
certain irony to having eyes on the thing.)
Of course, the inverse is also true- simple human laziness or
ignorance can defeat the most sophisticated infrastructure. This theme was
repeated throughout the information security related sessions I attended today.
Remember the Hawaii nuclear attack false alarm? Turns out that the vulnerability
arose when an employee of the emergency notifications center posted a picture
of himself online that included his password on a Post-it note attached to his
monitor in the background.
Craig Bayer (Optiable) and Stanley Louissaint (Fluid Designs) shared
how Mobile Device Management (MDM) software can at least put some guardrails
around what mistakes users are able to make. Many organizations face the
challenge of enforcing appropriate security configurations in a Bring Your Own
Device environment. Mobile Application Management software can be a really
helpful tool here- it enables you to create a secure container within an
employee’s smartphone that it controlled by the organization. This not only
helps to secure firm or company information, but also addresses employee
concerns about granting total access to everything on their personal device.
Sherri Davidoff (LMG
Security) and David Ries (Clark Hill) delivered a session, “Security Practices
That Won’t Bust Your Budget” that focused on the importance of the less
technical side of cybersecurity- being aware of what data you have, where
you’re keeping it, and when you’re getting rid of it, and having and following
security processes- as well as some important technical tools like multi-factor
authentication and password managers. Sherri said that she likes to think of
data like hazardous waste- the more of it you keep around, the more likely it
is that something harmful (a breach) will happen. David and Sherri also
illustrated just how vibrant the dark web market for stolen data is now.
“Fullz”, or full personal details including SSN, DoB, and account info, can be
had for anywhere from $1-$60 per individual- and group discounts are available!
Mark tells me vendors
are always a big part of the Techshow, and not just because they underwrite the
happy hours. The vendor Expo hall certainly has several interesting booths this
year. One company, Omega Secure, originally came out of the retail industry
where they developed a device to ringfence systems processing payment card
information from the rest of the IT environment (pictured below).
hey’ve now adapted this device to allow users to put any kind ofsensitive system behind it. OmegaSecure also offers network monitoring andother organizational security services. Their representative Ash Swamy made the interesting point that law isactually the least regulated industry they have worked in, relative to retailpayment processing, healthcare, and others. Of course, even though securitybest practices are not prescribed for lawyers in terms of what specific stepsto take, the consequences of failing to do it properly can be just as severe.
Lawclerk is another very interesting vendor, though not
specifically related to security or privacy issues. They offer a platform where
attorneys (and only attorneys) can find and engage freelance lawyers. This can
be done for specific tasks, via a project post, or users can build a team of
freelance lawyers with particular skillsets who are ready to utilize when the
needs arise. For solo practitioners, this could be a great way of handling an
overload of work, by getting assistance with drafting a particular document or
doing a piece of research. Mike Graner with Lawclerk told me that they have a
number of customers who are “the lawyer” in a small town, and Lawclerk enables
them to handle a broader range of matters and accept more business. For
in-house lawyers like me, Lawclerk could be a handy way to get subject matter
expertise on a niche topic or jurisdiction where the business has some needs
but engaging a specialist or local firm isn’t yet justified.
Techshow is off to a
great start and I’m looking forward to updating the Section on what tomorrow
brings!
William: Friday,
February 28, 2019
One of the most exciting things about technology is that it can enable you to save time, money, and stress by doing things differently, and hopefully better. But to do differently you have to think differently first, and so it was great to see so many lawyers engaging with Techshow sessions today oriented around taking new approaches to old problems.
Checklists aren’t the
most attention-grabbing topic, but “Ready for Process Automation? Start by
Developing Checklists and Maps” was one of the most well-attended modules I saw
at Techshow. Mary Vandenack (Vandenack Weaver LLC) and Micah Ascano
(Polsinelli) shared an approach for documenting repeatable and predictable
processes in checklists that will immediately result in more efficiency and
fewer mistakes, and in the longer term enable you to actually start to
partially or completely automate those processes. They showed a detailed
process map for patent prosecution, which includes client inputs and action
steps as well as internal ones. Impressively, Mary also walked through an
automated entity formation workflow. While automation is talked about a lot in
general terms in legal tech circles, it was really cool to see the presenters
break down the nuts and bolts of how to get there in a practical, real-world
way. Much of the audience seemed to feel the same way, judging by how many
questions were asked. I think we will see more and more lawyers engaging in
these process mapping and eventually automation exercises, as clients demand more
cost-effective services and more efficient delivery models. There’s also a
natural alignment between mapping, defining and automating routine parts of
work and the alternative fee arrangements that are increasingly appealing to
clients.
If you’re interested in learning more about how to use process
mapping and checklists to reduce the time and effort you spend doing repetitive
tasks, you can check out the book “Checklists for Lawyers” by Dan Siegel, and
also the software tools Vizio and Hotdocs.
Dan Lear (Right Brain Law) and Susan Letterman White’s (Mass
LOMAP) “Design Thinking for Law Firms” session was explicitly about getting
lawyers to use a different approach to problem solving.
“Design thinking” is a very common method of
problem solving in the tech and product development world, but not one
typically employed by lawyers. The basic steps are to:
Frame thechallenge (“how might we”) in a group discussion
Reframe the challenge and its context – get in the “field” to collect data
Make sense of the data and prioritize. Generate possible solutions
Experiment with a prototype
Dan used to work for Avvo, which may count as a strike against for
many readers, but he made the good point that at Avvo they wanted to change the
discussion about the practice of law to put the “consumer” back in the center
of the discussion. Since “human centered design” is another term for design
thinking, that principle of being user/customer/client centered is a key part
of this approach. What’s most unique about design thinking relative to other
problem solving techniques is that it is highly visual, group based, and
emphasizes experimentation. The hope is that this approach will allow you to
consider options that would not have occurred to you otherwise. That’s where
the “framing the challenge” component is really powerful- an audience member
shared the metaphor of someone presenting you with a bike that has a flat, and
asking you to fix the tire. But asking some thoughtful questions would elicit
the fact that the real problem is that the person needs to get to the other
side of town by 6pm. Once you know that, a whole world of solutions beyond
fixing the bike opens up.
“Experimentation” is easier to do in many parts of the tech world
where design thinking is widely practiced, because the impact of mistakes is
often minor and corrections can be easily made. To their credit, Susan and Dan
acknowledged that this isn’t the case in legal practice, and emphasized that
resiliency in the face of failed experiments was key, as well as a focus on
learning from those failures. I asked a question to press on this a bit in the
contracts and transactions context, where a mistake often has a hard dollar
cost. Another member of the audience provided the really helpful suggestion of
working with your leadership (or yourself) to create a “failure budget”. This
enables you to be honest about the possible costs of experimentation, while
also building the business case for why those short-term costs are worth the
long-term benefits. If
you’re interested in learning more about design thinking, you can check out
“Law by Design” by Margaret Hagan or “A Whole New Mind” by Dan Pink.
Another session thattook place had a demonstration of visual notetaking along with it, which seems to me philosophically aligned with this design thinking technique. I was in a different session on security when this module was presented, but the illustration that resulted was posted in the hall for everybody to check out, and I think it’s quite cool.
William D. Smith
William is Assistant General Counsel of
Business Talent Group, the leading marketplace for independent strategy and
operations consulting professionals. He is on the Council of the Computer and
Technology Section of the State Bar of Texas.