SEMINAR AGENDA


LAW OFFICE MANAGEMENT SEMINAR SERIES:

 

Course VI

"LAWYERS & ELECTRONIC DOCUMENTS:

DISCOVERY PITFALLS, CLIENT SECURITY CONCERNS
& OTHER NOT SO COMMON PROBLEMS"

 

Seminar Sponsor:
Technology 4 Attorneys, LLC

 

APPROVALS

 

**Approved for 3.5 Hrs CLE Credits (1.0 Hr Ethics) by Utah State Board of Continuing Legal Education**
**Approved for 3.75 Hrs General CLE Credits by Oregon State Bar (Ethics credit pending)**
**Approved for 3.5 Hrs CLE Credits (1.0 Hr Ethics) by Idaho State Bar**
**Approved for 3.5 Hrs CLE Credits (1.0 Hr Ethics) by Washington State Bar**

 

 

FACULTY

 

Kenneth O. Kreis, J.D., a former Assistant Attorney General, State of Illinois, and a former Assistant District Attorney, 47th Judicial District, State of Texas, has also engaged in the private practice of law in Idaho for more than 20 years, and is now the President and CEO of Technology 4 Attorneys, LLC.  He has undertaken specific training and research into web page design issues, html coding, computer hardware, and software issues. Currently, he is developing a prototype law firm web page, a wireless mobile law office for frequent traveler or trial attorneys, and a simple, yet technologically advanced law office, to all be linked to incorporate many of the ideas presented at our seminars. He has lectured at multiple state bar approved CLE seminars in 10 different states to date on law related technology topics.


AGENDA TIMELINE: 3.5 CLE CREDIT HOURS (1.0 Hour of Ethics)

 

Morning Seminar Program

8:15 - 8:45am Registration

8:45 - 10:15 am
Section I: Electronic Discovery Problems & Issues

A. Seeking the Adverse Party's Files & Documents
1) Electronic vs. Paper Documents
2) Records Management Policy Issues

3) Document Portability
4) Deletion, Corruption, & Other Media Problems
5) Format Issues

6) Software Obsolescence
7) "Smoking Gun E-Mails"

 

B. Providing Your Client's Files & Documents
1) Staff Training For Discovery Responses
2) Due Diligence: What to Look For & Where
3) Your Client's Record Management Policy?
4) Avoiding Software Obsolescence Issues
5) Handling Your Client's Deletion, Corruption, & Other Media Problems

 

C. Discovery of HTML Documents
1) Web Page Issues
2) Understanding the E-Mail Transmission Process

3) Falsifying Online Evidence

 

D. Cost Issues in Electronic Discovery

1) Be Concerned, Be Very Concerned

10:15 - 10:45 am
Section II: Securing & Protecting Electronic Documents

A. Restricting Access to Electronic Documents
1) Saving and Formatting
2) Editing & Alteration
3) Locking Down Documents

B. Encryption as a Necessity

1) Multiple Options & Alternatives
2) Decryption Concerns

 

C. Password Protection as a Necessity
1) The Do's & Dont's of Using Passwords

 

D. Backup & Storage
1) Backing up Files & Folders Securely
2) Weighing the Storage Options & the Risks

 

E. Other Forms of Security
1) Hiding Data: Steganography, etc.
2) Biometric et al

 

10:45 - 11:00 am MORNING BREAK

 

11:00 - 11:30 am
Section III: Organizing & Processing Electronic Documents

A. Internally Created & Incoming Third Party Documents
1) Creating an Effective File Management System
2) Intelligent Design: Analyzing Strengths & Weaknesses

 

B. Processing Outgoing Documents
1) Formatting & Securing Documents to Transmit
2) E-Mail Issues

 

11:30 - 12:30 pm
Section IV: Ethics Problems & Electronic Documents

A. Ethics Issues Unique to Electronic Documents
1) E-Mail
2) HTML
3) Discovery

B. Sins of Omission: When Your Client Does Not Comply
1) Knowingly vs. Unknowingly

C. The Ethics of Handling Deleted, Corrupted, or Missing Media

1) How Far Do You Have to Go?


***********************************************************************

Afternoon Seminar Program

 

1:00 - 1:30pm Registration

1:30 - 3:00 pm
Section I: Electronic Discovery Problems & Issues

A. Seeking the Adverse Party's Files & Documents
1) Electronic vs. Paper Documents
2) Records Management Policy Issues

3) Document Portability
4) Deletion, Corruption, & Other Media Problems
5) Format Issues

6) Software Obsolescence
7) "Smoking Gun E-Mails"

 

B. Providing Your Client's Files & Documents
1) Staff Training For Discovery Responses
2) Due Diligence: What to Look For & Where
3) Your Client's Record Management Policy?
4) Avoiding Software Obsolescence Issues
5) Handling Your Client's Deletion, Corruption, & Other Media Problems

 

C. Discovery of HTML Documents
1) Web Page Issues
2) Understanding the E-Mail Transmission Process

3) Falsifying Online Evidence

 

D. Cost Issues in Electronic Discovery

1) Be Concerned, Be Very Concerned

3:00 - 3:30 pm
Section II: Securing & Protecting Electronic Documents

A. Restricting Access to Electronic Documents
1) Saving and Formatting
2) Editing & Alteration
3) Locking Down Documents

B. Encryption as a Necessity

1) Multiple Options & Alternatives
2) Decryption Concerns

 

C. Password Protection as a Necessity
1) The Do's & Dont's of Using Passwords

 

D. Backup & Storage
1) Backing up Files & Folders Securely
2) Weighing the Storage Options & the Risks

 

E. Other Forms of Security
1) Hiding Data: Steganography, etc.
2) Biometric et al

 

3:30 - 3:45 pm AFTERNOON BREAK

 

3:45 - 4:15 pm
Section III: Organizing & Processing Electronic Documents

A. Internally Created & Incoming Third Party Documents
1) Creating an Effective File Management System
2) Intelligent Design: Analyzing Strengths & Weaknesses

 

B. Processing Outgoing Documents
1) Formatting & Securing Documents to Transmit
2) E-Mail Issues

 

4:15 - 5:15 pm
Section IV: Ethics Problems & Electronic Documents

A. Ethics Issues Unique to Electronic Documents
1) E-Mail
2) HTML
3) Discovery

B. Sins of Omission: When Your Client Does Not Comply
1) Knowingly vs. Unknowingly

C. The Ethics of Handling Deleted, Corrupted, or Missing Media

1) How Far Do You Have to Go?