TechBytes

Using AI Models On Your Own Machine
 
In this video, Ron Chichester, former chair of the Computer & Technology Section, explains how Texas attorneys can use AI models on their own machines to better protect client confidentiality. The discussion covers the difference between cloud-based AI and local AI models, why Texas Disciplinary Rule 1.05 matters when using AI tools, and how options like Ollama can help lawyers keep sensitive information local while experimenting with legal technology.
 
As part of the Computer & Technology Section's TECHBytes series, this video is designed to help Texas lawyers understand practical legal technology issues in a clear, usable format. Learn more at SBOT.org.
 
NOTICE: This video reflects the presenter’s opinion only and not necessarily the views of the State Bar of Texas or the Computer & Technology Section. Legal technology changes quickly, and this material may become outdated. Lawyers should do their own research and follow applicable ethics opinions, court rulings, and client engagement agreements.
5 Scanning Apps in 5 Minutes
Encryption Made Easy (For Lawyers and Clients)
How to Install the Section Legal App
5 Cloud Editing Apps in 5 Minutes
What To Look For In a Forensics Expert
Why cybersecurity is a legal issue
A basic primer on cyber insurance
What every lawyer should know about the Texas data breach notification law
Part 1 – Informed consent implications for Cloud Computing, Engagement Agreements and Cyber insurance coverage
Part 2 – Informed consent implications for Cloud Computing, Engagement Agreements and Cyber insurance coverage
Part 3 – Informed consent implications for Cloud Computing, Engagement Agreements and Cyber insurance coverage
Essential cybersecurity steps every law firm should take to better protect their clients’ data
Part 1 – Don’t Be Socially Unacceptable: Legal Ethics Concerns in Using Social Media
Part 2 – Don’t Be Socially Unacceptable: Legal Ethics Concerns in Using Social Media
Part 3 – Don’t Be Socially Unacceptable: Legal Ethics Concerns in Using Social Media
Ransomware
Duty to Preserve Evidence in Fed Court
Current State of Sanctions Law in Fed Court
Proportionality in Discovery in Federal Court
What Is & Why & How To Remove Metadata
What Is & Why & How To Remove Exif Data
How to Annotate PDF Documents
How to Effectively and Properly Redact Documents Within the Rules
How to Protect and Send Large Files through Secure Means
Is Your Law Office on the Dark Web?
Are Your Clients on the Dark Web (because of you?)
VPNs Presentation
Encryption for Lawyers
5 Apps Impacting the Law
Privacy Rights in Public Society
Admissibility and Authentication of (Some) Electronic Evidence
What is MetaData?
Best Practices on Information Security
Cyber Due Diligence
Are You a Mobile Attorney?
Mandatory Provisions for Cyber Insurance
Digging for the Digital Dirt: Discovery of Social Media Evidence
Authentication of Social Media Content
When To Adopt a Mechanism for International Transfer of Personal Data
Top 10 Requirements Under the General Data Protection Regulations
Concerns for Lawyers in Responding to Online Reviews
Association of Corporate Counsel New Model Information Protection and Security Controls for Outside Counsel
Legacy Systems
Free Legal Resources for Lawyers
Gone Fishing Email Scams Impacting Lawyers
The Virtual Office
What Texas Lawyers Need to Know About the Texas Revenge Porn Law
What You Need to Know About the Texas Biometric Privacy Statute