The practice of law is not the same animal, and this is not your grandfather’s professional conduct program. We’ll move through a fast and furious review of the grievance procedures and the 2018 year in review of discipline cases.
The premature closing of a law office can result from the unexpected disability, death, disappearance, or discipline of a lawyer. The failure to plan adequately for the unexpected can result in harm to clients and in confusion and hardship for the lawyer’s family, staff and professional colleagues. Developing a succession plan in advance ensures the orderly transfer of a client’s affairs and file to a new lawyer, as well as the return of moneys held in trust, and satisfies the lawyer’s ethical obligation to provide competent and diligent representation.
The practice of law is not the same animal, and this is not your grandfather’s professional conduct program. Learn more about “The Business of Law” as part of the practice of law. Social media has changed the game, so be sure that your current social media presence toes the line for your professional conduct requirements. Lastly, we’ll wrap up with a quick review of the grievance procedures and a year in review of discipline cases. Don’t Let It Be You in our 2018 review.
Prof. Porter will focus on the legal distinctions between sexual assault and sexual harassment as well as compare and contrast them in 3 separate areas of applicable law: criminal, Title Vii of the Civil Rights Act of 1964 and Title IX. She will also explain the proposed changes to the regulations implementing Title IX.
The Ohio Data Protection Act provides a legal Safe Harbor for covered entities that implement a qualifying cybersecurity program. Covered entities that implement such a plan are entitled to an affirmative defense that helps protect them from tort liability in the event of a data breach.
We’ll explore the specific requirements of DPA implementation, and provide a hands-on overview of a compliance framework by reviewing the National Institute of Standards and Technology’s Framework for Improving Critical Infrastructure Cybersecurity, V 1.1.