Using Technology to Communicate with Clients

Size: px
Start display at page:

Download "Using Technology to Communicate with Clients"

Transcription

1 Using Technology to Communicate with Clients 21 st Century Client Communications Opportunities: More, better ways to interact, educate, collaborate, and communicate with clients Challenges: Perception of being on call 24/7/365 No time to think 1

2 Client Communication is Key Rule 1.4 Communication (a) A lawyer shall: (2) reasonably consult with the client about the means by which the client's objectives are to be accomplished; (3) keep the client reasonably informed about the status of the matter; (4) promptly comply with reasonable requests for information; excerpted from 2010 Illinois Rules of Professional Conduct Client Communication is Key In 2013 the Commission docketed 6,073 investigations (4% of all registered attorneys) Top three types of grievances are: conduct involving fraud or deceit (77%) allegations of neglect (29%) failing to communicate (27%) Investigations by Years in Practice Fewer than % Between 5 and % Between 10 and % Between 20 and % 30 or more... 34% (source: Annual Report of the Attorney Registration & Disciplinary Commission for 2013) 2

3 Communication in the 21 st Century Law Office How does the client want to communicate? Fax? Paper? ? Website? Telephone? Be able to deal with client s technology needs, not make the client deal with yours Discuss appropriate delegation Staff will handle some client communication Manage expectations Do you have a guaranteed response time? Include this in the engagement letter 3

4 Communication in the 21 st Century Law Office Guard the client s confidentiality Mobile devices Laptops, smartphones, tablets Digital Voic Electronic Documents Third party vendors/cloud services Gotchas Mis-sent Reply All Forwarding long threads BCC 4

5 And even MORE Using spam filters? Don t forget to whitelist the court! Don t fall prey to spear phishing, whaling and scams What about your clients: What address did your client provide? Is there a work policy that would cause privilege waiver? See ABA Duty to Protect the Confidentiality of Communications with One s Clients Need to encrypt? Encryption: ABA Formal Opinion But, what about disclaimers? 5

6 Disclaimers and the Firm s Website ABA Formal Opinion August 5, 2010 Websites have become a common means by which lawyers communicate with the public. Lawyers must not include misleading information on websites, must be mindful of the expectations created by the website, and must carefully manage inquiries invited through the website. Websites that invite inquiries may create a prospective client-lawyer relationship under Rule Lawyers who respond to website-initiated inquiries about legal services should consider the possibility that Rule 1.18 may apply. 6

7 What NOT To Tweet Transmitting Electronic Files Password protection Encryption Authentication Acrobat, MS Get a certificate E-signatures Registered Hightail, rpost 7

8 Know What You Are Sending Forget ! Try Online Collaboration Engage the client in the work Web conferencing E.g. Webex, Join.me, GotoMeeting, FreeScreenSharing.com Chat, screen/application share, audio, video, whiteboard, etc. Document collaboration AgileWords, MS Office 365, Box 8

9 Extranets Empower Your Clients Clients can review, approve, check out their own files Password protection, only see what you want them to Extend your workflow: ClioConnect NetDocuments MyCase Box.net Basecamp Invoices as Client Communication 20% of grievances: failing to communicate with client, including failing to communicate the basis of a fee Don t use shorthand or cryptic descriptions Show the value of your bill 9

10 Invest in Law Office Software Time/billing/accounti ng Don t forget Smartphone/Tabl et Conflict of interest checking Calendar/docketing Case/practice management Document management Document assembly Pro-Active Communication Automagic communication Clipping services Google Alerts, WatchthatPage enewsletters icontact, Constant Contact Shared Research Instapaper, Evernote Blogs, Social Media Networks 10

11 How to Capture and Keep Clients Stop, look, and listen Communicate Establish and meet expectations Pick the right clients Seek feedback Google Forms, SurveyMonkey, Constant Contact for online survey tools that are easy to use and inexpensive Thanks! 11

12 Catherine Sanders Reach Law Practice Management & Technology The Chicago Bar Association linkedin.com/in/catherinereach 12

Session Title. Popular Cloud Services for Lawyers. Written and Presented by. {Name} April 11-13,

Session Title. Popular Cloud Services for Lawyers. Written and Presented by. {Name}  April 11-13, April 11-13, 13, 2011 Popular Cloud Services for Lawyers Session Title Written and Presented by Stephanie Presenters Kimbro Tom Mighell {Name} {Name} PRESENTED BY THE Time, Billing & Invoicing Increases

More information

PRIVACY POLICY. https://www.damar.org - Privacy Policy

PRIVACY POLICY. https://www.damar.org - Privacy Policy PRIVACY POLICY https://www.damar.org - Privacy Policy This privacy policy has been compiled to better serve those who are concerned with how their Personally identifiable information (PII) is being used

More information

Michael Downey Downey Law Group LLC

Michael Downey Downey Law Group LLC Using Technology in Your Practice Michael Downey Downey Law Group LLC 2016 Downey Law Group LLC. For educa onal purposes only. What s Your Tech Savvy? 5 Written code for my law practice 4 Automated documents

More information

Compliance & HIPAA Annual Education

Compliance & HIPAA Annual Education Compliance & HIPAA Annual Education 1 The purpose of this education is to UPDATE The purpose and of this education REFRESH is to UPDATE your and REFRESH understanding understanding of: of: Aultman s Compliance

More information

Canada s Anti-Spam Legislation (CASL) What it means for Advisors. Distributor Learning & Development

Canada s Anti-Spam Legislation (CASL) What it means for Advisors. Distributor Learning & Development Canada s Anti-Spam Legislation (CASL) What it means for Advisors Distributor Learning & Development Learning objectives By the end of this session, you will be able to: Describe CASL and how it impacts

More information

CLOUD COMPUTING BY DENNIS KENNEDY

CLOUD COMPUTING BY DENNIS KENNEDY BY DENNIS KENNEDY A recent Gartner report forecasts a growth of 18% in spending on public clouds across all businesses for 2017, similar to that in 2016. Other surveys show that the use of cloud computing

More information

Employee Departure Checklist

Employee Departure Checklist Employee Departure Checklist Departing employee's name: Departure date: Supervisor's name: Employee to be terminated: Yes No DO NOT NOTIFY EMPLOYEE OF THIS LIST IF YES Person responsible for completing

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology RUTGERS POLICY Section: 70.2.8 Section Title: Legacy UMDNJ policies associated with Information Technology Policy Name: Information Security: Acceptable Use Formerly Book: 95-01-09-05:00 Approval Authority:

More information

WHITE PAPER TWENTY-ONE PRODUCTIVITY TOOLS

WHITE PAPER TWENTY-ONE PRODUCTIVITY TOOLS WHITE PAPER TWENTY-ONE PRODUCTIVITY TOOLS Whether it is gaining visibility on the internet, scheduling social media posts, or managing your growing list of clients, we compiled a list of some of the best

More information

Candidate Handbook Certified Commissioning Firm (CCF) Program

Candidate Handbook Certified Commissioning Firm (CCF) Program Candidate Handbook Certified Commissioning Firm (CCF) Program Building Commissioning Certification Board 1600 NW Compton Drive, Suite 200 Beaverton, OR 97006 Phone: (844) 881-8601 E-mail: certification@bcxa.org

More information

This privacy policy has been compiled to better serve those who are concerned with

This privacy policy has been compiled to better serve those who are concerned with This privacy policy has been compiled to better serve those who are concerned with how their Personally identifiable information (PII) is being used online. PII, as used in US privacy law and information

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

Guide. Video Conferencing for Small Business

Guide. Video Conferencing for Small Business Guide Video Conferencing for Small Business 0345 600 3936 www.sfbcornwall.co.uk Contents Introduction... 3 What is video conferencing?... 4 What type of video conferencing systems are available?... 5 Why

More information

Openfolio, LLC Privacy Policy

Openfolio, LLC Privacy Policy Overview Openfolio, LLC Privacy Policy Welcome to Openfolio. The Openfolio Site and service are provided by Openfolio, LLC ( Openfolio, we, us or our ). Openfolio knows that you care how information about

More information

CAREERBUILDER.COM - PRIVACY POLICY

CAREERBUILDER.COM - PRIVACY POLICY Effective Date: September 15, 2010 CareerBuilder, LLC and its subsidiaries and divisions (collectively, CareerBuilder, We or Our ) has drafted its Privacy Policy to ensure that you can use CareerBuilder

More information

Microsoft Office 365 A Power Boost for Your Law Office

Microsoft Office 365 A Power Boost for Your Law Office Meet the "new kid" on the block Microsoft Office 365 a new hosted service for productivity and email! This comprehensive, introductory overview examines the online and offline cloud features of Office

More information

Self-Represented Litigants How to E-File in Odyssey Step 2: Register to E-File

Self-Represented Litigants How to E-File in Odyssey Step 2: Register to E-File ILLINOIS SUPREME COURT COMMISSION ON ACCESS TO JUSTICE E-Filing Guide for Self-Represented Litigants How to E-File in Odyssey Step 2: Register to E-File E-filing Steps 1 2 3 4 5 6 7 8 9 10 Prepare Documents

More information

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems. BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.

More information

Management for Lawyers By Barron K. Henley Affinity Consulting Group, LLC Columbus, Ohio. Submitted by

Management for Lawyers By Barron K. Henley Affinity Consulting Group, LLC Columbus, Ohio. Submitted by 27 THE AMERICAN LAW INSTITUTE Continuing Legal Education Email Management for Lawyers: How to Tame the Monster January 22, 2016 Telephone Seminar/Audio Webcast Email Management for Lawyers By Barron K.

More information

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Seven Requirements for Successfully Implementing Information Security Policies and Standards Seven Requirements for Successfully Implementing and Standards A guide for executives Stan Stahl, Ph.D., President, Citadel Information Group Kimberly A. Pease, CISSP, Vice President, Citadel Information

More information

Maritime Union of Australia. Privacy Policy 2014

Maritime Union of Australia. Privacy Policy 2014 Maritime Union of Australia Privacy Policy 2014 Introduction The Maritime Union of Australia (Union) is the Union representing persons employed in diving, ferries, offshore oil and gas, port services,

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established

More information

Future Of File Sharing: Challenges of Portals, PDF Encryption, Tax Return Delivery & E-Signatures

Future Of File Sharing: Challenges of Portals, PDF Encryption, Tax Return Delivery & E-Signatures Future Of File Sharing: Challenges of Portals, PDF Encryption, Tax Return Delivery & E-Signatures Presented by: Sponsored by: Administrative Items 90 Minutes (Education, Demo, Q&A) Participants are muted.

More information

CHANGES TO THIS POLICY

CHANGES TO THIS POLICY Privacy Policy Your personal and corporate privacy is important to FunkyCouture.com. This privacy policy ( Policy ) applies to the FunkyCouture.com e Web sites and services and tells you how personal and

More information

and Privacy HIPAA-Compliance Checklist

and Privacy HIPAA-Compliance Checklist Email and Privacy HIPAA-Compliance Checklist TBHI Checklist Copyright 2017 Telebehavioral Health Institute All rights reserved. Telebehavioral Health Institute www.telehealth.org No part of this publication

More information

Acceptable Use Policy

Acceptable Use Policy IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations

More information

Privacy Shield Policy

Privacy Shield Policy Privacy Shield Policy Catalyst Repository Systems, Inc. (Catalyst) has adopted this Privacy Shield Policy ("Policy") to establish and maintain an adequate level of Personal Data privacy protection. This

More information

CONFERENCING & COLLABORATION

CONFERENCING & COLLABORATION F E A T U R E C O M P A R I S O N M A T R I Web Conferencing Product Comparison We offer a range of web conferencing solutions designed for use with different types of meetings: from less formal on-the-fly

More information

Help! My Inbox is Exploding! Management With Outlook

Help! My Inbox is Exploding!  Management With Outlook Help! My Inbox is Exploding! Email Management With Outlook Prepared For: Legal Education Society of Alberta Law and Practice Update Presented by: Barron Henley Affinity Consulting Group, LLC Columbus,

More information

How to Interact with the Natural and Non-prescription Health Products Directorate Electronically. Guidance Document

How to Interact with the Natural and Non-prescription Health Products Directorate Electronically. Guidance Document How to Interact with the Natural and Non-prescription Health Products Directorate Electronically Guidance Document Table of Contents 1. INTRODUCTION... 3 1.1 System Requirements... 3 2. EPOST CONNECT...

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.

More information

Privacy Statement Tai Ceredigion Cyf Site Privacy Statement

Privacy Statement Tai Ceredigion Cyf Site Privacy Statement Privacy Statement Tai Ceredigion Cyf Site Privacy Statement Introduction to this Statement This Privacy statement relates to this site together with any associated software applications or devices. You

More information

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database Making the UK more resilient against Cybercrime Date: August 2017 Reference: 0449-CYB This Red Alert is issued by the United Kingdom

More information

OPD PRESS/PUBLIC COMMENT/LEGISLATIVE/GUBERNATORIAL/ COMMENT POLICY (rev )

OPD PRESS/PUBLIC COMMENT/LEGISLATIVE/GUBERNATORIAL/ COMMENT POLICY (rev ) OPD PRESS/PUBLIC COMMENT/LEGISLATIVE/GUBERNATORIAL/ COMMENT POLICY (rev. 1-2017) I. MEDIA CONTACTS A. OPD Employees Need Advance Approval Before Making Public Statements or Responding to Media Requests

More information

FERPA & Student Data Communication Systems

FERPA & Student Data Communication Systems FERPA & Student Data Ellevation is subject to the Family Educational Rights and Privacy Act (FERPA) as operating under the "school official" exception, wherein student directory and PII (Personal Identifying

More information

Date Approved: Board of Directors on 7 July 2016

Date Approved: Board of Directors on 7 July 2016 Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

Autofill and Other Disasters: The Ethics of Inadvertent Disclosures

Autofill and Other Disasters: The Ethics of Inadvertent  Disclosures Autofill and Other Disasters: The Ethics of Inadvertent Email Disclosures Deborah C. Meiners, Esq. DeWitt Ross & Stevens, S.C. (608) 252 9266 dcm@dewittross.com SCR 20:1.6 Confidentiality for Lawyers (a)

More information

RISK MANAGEMENT INFORMATION MINNESOTA GOVERNMENT DATA PRACTICES ACT YOU WANT WHAT? WHEN?

RISK MANAGEMENT INFORMATION MINNESOTA GOVERNMENT DATA PRACTICES ACT YOU WANT WHAT? WHEN? RISK MANAGEMENT INFORMATION MINNESOTA GOVERNMENT DATA PRACTICES ACT YOU WANT WHAT? WHEN? Overview The Minnesota Government Data Practices Act, Minn. Stat. ch. 13, attempts to balance the public s right

More information

Privacy Notice. Introduction. What is personal data? Date Updated: 2/11/2019

Privacy Notice. Introduction. What is personal data? Date Updated: 2/11/2019 Privacy Notice Date Updated: 2/11/2019 Introduction NERCOMP is committed to informing its membership and the general public about services, and professional learning opportunities to advance higher education

More information

Mobile Apps Webinar. Welcome to the continuing webinar series provided by BusinessCreator, Inc.

Mobile Apps Webinar. Welcome to the continuing webinar series provided by BusinessCreator, Inc. Mobile Apps Webinar Welcome to the continuing webinar series provided by BusinessCreator, Inc. We are pleased to present Daniel S. Rosemark, Esq. as our guest speaker for this week s presentation on mobile

More information

Adopting the Electronic Credit Application

Adopting the Electronic Credit Application Adopting the Electronic Credit Application With major advances in digital technology and a drive to reduce or eliminate paper as a vehicle to gather and store information related to credit and receivable

More information

TITLE SOCIAL MEDIA AND COLLABORATION POLICY

TITLE SOCIAL MEDIA AND COLLABORATION POLICY DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the

More information

Dot-Tech LLC DBA Fallout-Hosting Privacy Policy

Dot-Tech LLC DBA Fallout-Hosting Privacy Policy Dot-Tech LLC DBA Fallout-Hosting Privacy Policy This privacy policy has been compiled to better serve those who are concerned with how their 'Personally Identifiable Information' (PII) is being used online.

More information

Candidate Manual Certified Commissioning Firm (CCF) Program

Candidate Manual Certified Commissioning Firm (CCF) Program Candidate Manual Certified Commissioning Firm (CCF) Program Building Commissioning Certification Board 1600 NW Compton Drive, Suite 200 Beaverton, OR 97006 Phone: 1-877-666-BCXA (2292) E-mail: certification@bcxa.org

More information

APPLICATION FOR RE-CERTIFICATION IN ELDER LAW

APPLICATION FOR RE-CERTIFICATION IN ELDER LAW : Date Certified: Date Certification Expires: Re-Certification Application MUST be filed between: (Applications for re-certification received less than two months before the expiration date will be assessed

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Privacy Policy. Information about us. What personal data do we collect and how do we use it?

Privacy Policy. Information about us. What personal data do we collect and how do we use it? This privacy policy sets out the way in which your personal data is handled by Leeds Bradford Airport Limited (referred to as "we", "us" and "our") whether collected through one of the websites we operate,

More information

Safeguarding Attorney-Client Privilege in a Wireless World

Safeguarding Attorney-Client Privilege in a Wireless World Safeguarding Attorney-Client Privilege in a Wireless World What to consider when communicating with your clients Marc S. Martin, Partner 202-778-9859 mmartin@klng.com www.klng.com Attorney Treatment of

More information

BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)

BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) CLAUSE 13 ON-LINE BIDDING 13.1 ON-LINE BIDDING.1 Definitions: Owner means the party and/or their agent designated to receive on-line

More information

Overview. Filing an Amalgamation Application (Regular) Background. Downloads Download this overview for printing

Overview. Filing an Amalgamation Application (Regular) Background. Downloads Download this overview for printing Overview Filing an Amalgamation Application (Regular) The following overview provides information on how to file an Amalgamation Application (Regular) to amalgamate two or more BC companies. It also provides

More information

UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS

UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS July 2015 212001734.08 Contents 1. CORE STANDARDS FOR PLT COURSES 1 1.1 Fundamental requirement 1 1.2 Course objectives 1 1.3 Course content 1 1.4 Teaching

More information

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

Internet,  , Social Networking, Mobile Device, and Electronic Communication Policy TABLE OF CONTENTS Internet, Email, Social Networking, Mobile Device, and... 2 Risks and Costs Associated with Email, Social Networking, Electronic Communication, and Mobile Devices... 2 Appropriate use

More information

Northern Virginia Community College Social Media Guidelines

Northern Virginia Community College Social Media Guidelines Northern Virginia Community College Social Media Guidelines APRIL 2017 Table of Contents NOVA Social Media Guidelines... 3 Purpose... 3 Scope... 3 NOVA s Current Official Social Media... Error! Bookmark

More information

Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS

Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS IMPORTANT: This FAQ is intended to assist UofL staff and faculty members to understand their obligations under CASL. It is an overview of

More information

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information

More information

Quick Start Guide. Quick Setup Add Your First Client & Case Track Time & Get Paid Bonus Setup Tips Additional Resources For Your Business

Quick Start Guide. Quick Setup Add Your First Client & Case Track Time & Get Paid Bonus Setup Tips Additional Resources For Your Business Quick Start Guide Quick Setup Add Your First Client & Case Track Time & Get Paid Bonus Setup Tips Additional Resources For Your Business Table of Contents INTRODUCTION 2 PART 1: Quick Setup 3 Add Firm

More information

Shielding the Organization from Data Risk & E- Discovery Failures

Shielding the Organization from Data Risk & E- Discovery Failures Shielding the Organization from Data Risk & E- Discovery Failures Ignatius Grande, Senior Discovery Attorney, Hughes Hubbard Jordan Razza, Senior Counsel and Director of U.S. Litigation, Diageo North America,

More information

An introduction to the Rapport admin system

An introduction to the Rapport admin system An introduction to the Rapport admin system A close and harmonious relationship in which the people or groups concerned understand each other's feelings or ideas and communicate well Oxford Dictionaries

More information

WebEx. Web Conferencing Tool. Fordham IT

WebEx. Web Conferencing Tool. Fordham IT WebEx Web Conferencing Tool Faculty + Staff User Guide Fordham IT Contents WebEx Faculty + Staff User Guide Schedule a Meeting Using the WebEx Meeting Site 1 WebEx Scheduling Template 2 Join a Meeting

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

Each member of the St. Margaret s Community has the privilege to access Google Apps  provided by the school s network NETWORK APPROPRIATE USE AGREEMENT 2018-2019 We are pleased to offer students of St. Margaret s School access to our computer network for electronic mail and the Internet. To gain access to e-mail and the

More information

Cognizant Careers Portal Privacy Policy ( Policy )

Cognizant Careers Portal Privacy Policy ( Policy ) Cognizant Careers Portal Privacy Policy ( Policy ) Date: 22 March 2017 Introduction This Careers Portal Privacy Policy ("Policy") applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers

More information

DEVELOPEO.COM PRIVACY POLICY

DEVELOPEO.COM PRIVACY POLICY DEVELOPEO.COM PRIVACY POLICY Please check and read Developeo.com Privacy Policy to get a clear grasp of how Developeo protects, uses, collects or handles your information in accordance with the website.

More information

KIN GROUP PTY LTD PRIVACY POLICY

KIN GROUP PTY LTD PRIVACY POLICY KIN GROUP PTY LTD PRIVACY POLICY 1. Purpose of this policy The Group respects the privacy of the personal information you may provide to it when it deals with you. The way the Group manages your personal

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

HIPAA For Assisted Living WALA iii

HIPAA For Assisted Living WALA iii Table of Contents The Wisconsin Assisted Living Association... ix Mission... ix Vision... ix Values... ix Acknowledgments... ix Who Should Use This Manual... x How to Use This Manual... x Updates and Forms...

More information

Approved by: Supervisory Board. Complaint Policy. Almaty Complaint Policy, ACF

Approved by: Supervisory Board. Complaint Policy. Almaty Complaint Policy, ACF Approved by: Supervisory Board 2013 Complaint Policy Almaty Complaint Policy, ACF Content 1. General Provisions... 3 2. Goals and Objectives... 3 3. Authority and Responsibility... 3 4. Forms of Applications

More information

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website Privacy Policy 1. Policy Objectives 1.1 The Police Association Victoria (the Association) is the organisation representing sworn police officers at all ranks, protective services officers, police reservists

More information

American Dental Hygienists Association Privacy Policy

American Dental Hygienists Association Privacy Policy American Dental Hygienists Association Privacy Policy The American Dental Hygienists Association ( ADHA, we, or us ) has created and posted this privacy policy in an effort to maintain efficient service

More information

Deloitte Audit and Assurance Tools

Deloitte Audit and Assurance Tools Deloitte Audit and Assurance Tools Privacy Statement Last updated: 26 September 2017 Introduction This Privacy Statement applies to our various audit and assurance tools and other related online tools

More information

This Questionnaire contains the Privacy Policy Statement; Part A: General Information of Respondents; and Part B: Consultation Questions.

This Questionnaire contains the Privacy Policy Statement; Part A: General Information of Respondents; and Part B: Consultation Questions. QUESTIONNAIRE ON CAPITAL RAISINGS BY LISTED ISSUERS We invite interested parties to respond to the Consultation Paper on Capital Raisings by Listed Issuers (Consultation Paper), which can be downloaded

More information

register to use the Service, place an order, or provide contact information to an Independent Business Owner;

register to use the Service, place an order, or provide contact information to an Independent Business Owner; Privacy Policy Stella & Dot LLC (d/b/a Stella & Dot Family Brands, KEEP Collective, and EVER LLC) and its wholly-owned U.S. subsidiary, Stella & Dot Jewelry LLC (collectively, Stella & Dot, we, us, or

More information

HOSTING A WEBINAR BEST PRACTICE GUIDE

HOSTING A WEBINAR BEST PRACTICE GUIDE HOSTING A WEBINAR BEST PRACTICE GUIDE Summary Short for web based seminars, webinars are online methods of communication which are transmitted over the internet and aimed to reach large audiences. A key

More information

Standard: Event Monitoring

Standard: Event Monitoring October 24, 2016 Page 1 Contents Revision History... 4 Executive Summary... 4 Introduction and Purpose... 5 Scope... 5 Standard... 5 Audit Log Standard: Nature of Information and Retention Period... 5

More information

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

HF Markets SA (Pty) Ltd Protection of Personal Information Policy Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and

More information

TechTarget, Inc. Privacy Policy

TechTarget, Inc. Privacy Policy This Privacy Policy (the Policy ) is designed to inform users of TechTarget, Inc., and its affiliates (collectively TechTarget ) network of websites about how TechTarget gathers and uses information provided

More information

KSi Malta Privacy Policy

KSi Malta Privacy Policy KSi Malta Privacy Policy CONTENTS KSi Malta Privacy Policy 6 Details about the data controller & Scope 6 How information is collected from you 7 Legal basis of data processing 8 What information we collect

More information

This policy has been developed to ensure compliance with Canada's Anti-Spam Legislation ("CASL").

This policy has been developed to ensure compliance with Canada's Anti-Spam Legislation (CASL). POLICY 1094 Page 1 of 10 Subject: Canada s Anti-Spam Legislation Effective: June 2017 Revised: 1.0 PURPOSE This policy has been developed to ensure compliance with Canada's Anti-Spam Legislation ("CASL").

More information

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.

More information

The Center for Affiliated Learning ( the CAL ) Privacy Policy

The Center for Affiliated Learning ( the CAL ) Privacy Policy The Center for Affiliated Learning ( the CAL ) Privacy Policy Welcome to the Center for Affiliated Learning ( the CAL ) an education and training platform owned and operated by Affiliates Risk Management

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM COLDWELL BANKER-D ANN HARPER REALTY PROPERTY MANAGEMENT JULY 1, 2013 COLDWELL BANKER-D ANN HARPER REALTY PROPERTY MANAGEMENT, located in SAN ANTONIO, TX 78258 developed

More information

COPY2CONTACT TRACK YOUR TIME LIFE OF THE LAWYER 1/15/2013

COPY2CONTACT TRACK YOUR TIME LIFE OF THE LAWYER 1/15/2013 LIFE OF THE LAWYER COPY2CONTACT The quintessential Outlook utility Highlight contact info in any program and with one click, turn it into a contact entry in Outlook amazing! www.copy2contact.com TRACK

More information

BISHOP GROSSETESTE UNIVERSITY. Document Administration. This policy applies to staff, students, and relevant data subjects

BISHOP GROSSETESTE UNIVERSITY. Document Administration. This policy applies to staff, students, and relevant data subjects BISHOP GROSSETESTE UNIVERSITY Document Administration Document Title: Document Category: Privacy Policy Policy Version Number: 1.0 Status: Reason for development: Scope: Author / developer: Owner Approved

More information

CONFLICT OF INTEREST SYSTEMS

CONFLICT OF INTEREST SYSTEMS CONFLICT OF INTEREST SYSTEMS Conflicts of interest can lead to serious malpractice and ethical problems. To detect conflicts, a good conflicts checking system is essential. No lawyer can remember every

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

Enterprise Search at White & Case

Enterprise Search at White & Case Enterprise Search at White & Case ILTA Conference August 27, 2012 Philip Bryce Knowledge Resources Counsel White & Case LLP PART I: INTRODUCTION Philip Bryce Knowledge Resources Counsel Search at White

More information

Overwhelmed by ? Best Practices for Ethics, Discovery and Trial Evidence

Overwhelmed by  ? Best Practices for Ethics, Discovery and Trial Evidence Overwhelmed by Email? Best Practices for Ethics, Discovery and Trial Evidence THE ETHICS OF EMAIL Lynda C. Shely The Shely Firm, PC Scottsdale, Arizona 1. Definitions and Basic Ethics Standards Emails

More information

ETHIOPIAN NATIONAL ACCREDITATION OFFICE. Minimum Requirements For The Operation Of Product Certification Bodies

ETHIOPIAN NATIONAL ACCREDITATION OFFICE. Minimum Requirements For The Operation Of Product Certification Bodies ETHIOPIAN NATIONAL ACCREDITATION OFFICE Minimum Requirements For The Operation Of Product Certification Bodies April 2011 Page 1 of 7 NO CONTENTS Page 1. Introduction 2 2. Scope 2 3. Definitions 2 4 Management

More information

NASD NOTICE TO MEMBERS 97-58

NASD NOTICE TO MEMBERS 97-58 NASD NOTICE TO MEMBERS 97-58 NASD Regulation Requests Comment On Proposed Interpretive Material 1031 Regarding Cold Calling Activity; Comment Period Expires October 31, 1997 Suggested Routing Senior Management

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,

More information

EXCEL HEALTHCARE STAFFING AND REFERRAL AGENCY

EXCEL HEALTHCARE STAFFING AND REFERRAL AGENCY APPLICATION FOR EMPLOYMENT (Please Fill Out Completely) Date of Application Social Security Number / / Print Full Name Home Phone: Mobile: Email: Address City State Zip Code Position Applied For Documents

More information

Frequently Asked Questions About Getting On NCAtrak

Frequently Asked Questions About Getting On NCAtrak Frequently Asked Questions About Getting On NCAtrak Frequently Asked Questions About Getting on NCAtrak (technology reaching all kids) 1. What is NCAtrak? NCAtrak is a computerized, web-based case tracking

More information

This policy should be read in conjunction with LEAP s Conflict of Interest Policy.

This policy should be read in conjunction with LEAP s Conflict of Interest Policy. Policy Number 4.1 Policy Name Release No. 2 Release Date August 2017 Date For Next Review August 2018 Policy LEAP Social Services/Different Abilities Services (LEAP) is committed to the effective, timely

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

SOUTHERN ILLINOIS UNIVERSITY SCHOOL OF LAW. PROFESSIONALISM & THE LAW Dean Cynthia Fountaine. Fall 2012 Friday 10:00-10:50 a.m.

SOUTHERN ILLINOIS UNIVERSITY SCHOOL OF LAW. PROFESSIONALISM & THE LAW Dean Cynthia Fountaine. Fall 2012 Friday 10:00-10:50 a.m. SOUTHERN ILLINOIS UNIVERSITY SCHOOL OF LAW PROFESSIONALISM & THE LAW Dean Cynthia Fountaine Fall 2012 Friday 10:00-10:50 a.m. CONTACTING ME: Email: The best way to reach me is by email. You should feel

More information

Vbill User Manual. For Service of Process (05/24/2012)

Vbill User Manual. For Service of Process (05/24/2012) Vbill User Manual For Service of Process (05/24/2012) Introduction Vbill is a World Wide Web (Web) based billing system, developed by the Committee for Public Counsel Services, for Massachusetts State/CPCS

More information