Skip to Content

School of Law

Fall 2016

E-Discovery: Some Technical Things Lawyers Need to Know

September 8, 2016
Faculty: Sarah Montgomery, Attorney with the Executive Office of the U.S. Department of Justice & Adjunct Professor, University of South Carolina School of Law

Attendees will learn the basics about metadata, as well as metrics and technical terms that will help them navigate in E-Discovery or other matters where computer files and technology impact their area of practice

Identity Theft

September 22, 2016
Faculty: Marti Phillips, Director, Identity Theft Unit | Deputy Administrator

Have you ever received a data breach notice? Do you know how valuable your personal information is? During 2015, at least 626,300 South Carolina residents had their information compromised by data breaches. And according to the Bureau of Justice Statistics, an estimated 17.6 million people, or about 7 percent of U.S. residents age 16 or older, were victims of at least one incident of identity theft in 2014. This presentation will provide an introduction and overview of identity theft trends in South Carolina as well remedies for victims.

Protecting Health Information: HIPAA and Beyond

October 20, 2016
Faculty: Alexander M White, Deputy Chief Privacy Officer for the State of South Carolina

Since the passage of the Health Insurance Portability and Accountability Act (HIPAA) in 1996, health information privacy has become one of the more defined areas of privacy law in the United States. However, that does not mean the field is standing still: both the law and the technology are constantly evolving. In this session, we will discuss the important concepts that make up HIPAA and subsequent laws; how newly-implemented audits are changing healthcare regulation; and how the trendy devices collecting the most health information, wearables, fit in to existing regulatory frameworks.

Police Body-Cams: Practical, Policy, and Legal Implications

October 27, 2016
Faculty: Seth Stoughton, Assistant Professor of Law

Body-worn camera systems are quickly becoming an essential piece of policing equipment at agencies across the country. In this seminar, Professor Seth Stoughton will identify the potential advantages that police body-cams offer to law enforcement and to police/community relations. He will discuss the practical, policy, and legal implications that must be kept in mind as lawyers, police executives, policymakers, and communities adopt and evaluate this promising new technology.

Practice Management — Why It Is “Sanity Software” for Lawyers

November 3, 2016
Faculty: Steve Best, Partner for the Affinity Consulting Group and chair of the 2016 ABA Techshow

It’s impossible to manage any law practice if you don’t have a good handle on the status of every matter. The Model Rules require that a lawyer act with reasonable diligence and promptness when representing a client and knowing how to harness the power of practice management is key. Our presenter will cover both cloud-based and traditional software offerings for practice management and highlight the differences & similarities so you can make an informed decision on what system will work best for you and your practice.

Defense and Offense on the Internet: The Terminology of ‘Attacks’

November 17, 2016
Faculty: Marcos Vieyra, Chief Information Security Officer for the State of South Carolina

What is defense and offense in the context of the Internet? Do offensive activities always constitute an attack? Could some defensive actions, such as “hunting” within one’s own organizational boundaries, constitute an attack by a defender? Is accurate attribution of an attack within reach of average organizations, and if not, where does that leave us?

As an attorney, how would you advise a client with regard to these questions, either from an offensive-capability perspective or from a what-to-do-as-a-defender perspective? How might you help a client develop effective information security policy and governance given this state of affairs? Join us for a brief overview of these topics, and a defense-oriented approach to life on the Internet.

Challenge the conventional. Create the exceptional. No Limits.