Legal Malpractice Avoidance Tips – Write Down All Of Your Work

If you don’t have any writing about what work you did, it’s pretty difficult to justify the work that you did perform.

I suggest this to everybody. Even if you’re not billing hourly it’s easier to write down what you did because if you get in that situation later, it’s a lot easier to say this is the work I did and I earned that fee; I know that because I wrote it down.

And you don’t need to, but if you write down and send the work that you are doing to your client periodically, it’s even better.

Scott Eberle is on several insurance carriers defense panels. He’s been doing this type of work for many years. In my opinion, he’s one of the best presenters of legal malpractice and how to prevent it. So I think you’re in for a treat in terms of taking back some good information that you can implement in your firms.

Meet Scott Eberle

Scott Eberle Attorney

“My name is Scott Eberle, I am an attorney at Burns White in Pittsburgh where my practice focuses on representation of professionals, lawsuits and ethics matters. I’m focused on representation of lawyers in legal malpractice lawsuits, as well as ethics issues either in front of the office of disciplinary Council, or just general ethics consultation. I help attorneys navigate the issues that come up in their practice and I’m able to provide guidance on what you need to do to follow the rules of professional conduct to not get yourself in potential trouble with the disciplinary council.”

Legal Malpractice Avoidance Tips – Identify Who You Represent and What You Are Doing on His or Her Behalf

With any representation that you enter into make sure that you are adequately identifying who you represent and what you are doing on behalf of that party and that is that that will help you navigate your way and to avoid potential conflict situations.

Scott Eberle is on several insurance carriers defense panels. He’s been doing this type of work for many years. In my opinion, he’s one of the best presenters of legal malpractice and how to prevent it. So I think you’re in for a treat in terms of taking back some good information that you can implement in your firms.

Meet Scott Eberle

Scott Eberle Attorney

“My name is Scott Eberle, I am an attorney at Burns White in Pittsburgh where my practice focuses on representation of professionals, lawsuits and ethics matters. I’m focused on representation of lawyers in legal malpractice lawsuits, as well as ethics issues either in front of the office of disciplinary Council, or just general ethics consultation. I help attorneys navigate the issues that come up in their practice and I’m able to provide guidance on what you need to do to follow the rules of professional conduct to not get yourself in potential trouble with the disciplinary council.”

Legal Malpractice Avoidance Tips – Use Countersigned Engagement Letters

Scott Eberle is on several insurance carriers defense panels. He’s been doing this type of work for many years. In my opinion, he’s one of the best presenters of legal malpractice and how to prevent it. So I think you’re in for a treat in terms of taking back some good information that you can implement in your firms.

Meet Scott Eberle

“My name is Scott Eberle, I am an attorney at Burns White in Pittsburgh where my practice focuses on representation of professionals, lawsuits and ethics matters. I’m focused on representation of lawyers in legal malpractice lawsuits, as well as ethics issues either in front of the office of disciplinary Council, or just general ethics consultation. I help attorneys navigate the issues that come up in their practice and I’m able to provide guidance on what you need to do to follow the rules of professional conduct to not get yourself in potential trouble with the disciplinary council.”

The technique of adding a signature to a previously signed document is known as countersigning. The agreement between two or more parties is approved by the countersignature. By having a client countersign documents, you have proof that the client received it and they read it.

Just remember, you must look at the engagement letter as a contract between you and the client. It’s a contract that basically says what you’re going to do, and how you’re going to do it. If you must approach that every time, there are some good samples out there that you can get on the internet. Those are great, I think, but I do caution you, I think the best way to effectively utilize an engagement letter is to customize it every time. Because if you’re not customizing the letter, you’re missing out on an opportunity to really limit your potential liability down the road if anything should ever come up.

Cyber Security Challenge Level 4: Always enable multi-factor authentication

Welcome to the level up your cyber security in October program courtesy of integrity first Corporation. 

We’re on level four, the final week, which is enabling multi-factor authentication, or you might know it as two factor authentication. 

Now in computer security an authentication factor is anything you use to authenticate yourself with a system. Using a password is the most common type of authentication. With multi factor authentication, MFA, or two factor authentication 2FA, you use two or more different factors to log in. 

One example is a password and a verification code sent to your smartphone. This is something that’s really common whenever you sign into banks. This is an extra layer of security. So even if one of your factors is stolen, like your password, the hacker doesn’t have access to the other authentication factor like your phone. 

This stops them from accessing your account. As more and more organizations implement multi-factor authentication to strengthen their security practices, you might encounter different types of authentication factors. 

There are three different types you might be asked to provide. So something you know, which are passwords and security questions. Something you have, such as a verification code on your phone or a key card or something you are such as biometrics, like your fingerprint or a scan of your face. The more factors you use, the better your security. 

Having a combination of authentication factors is an even better way to keep your data protected. 

If you have any questions about any of these levels, please contact integrity first Corporation for help.

Cyber Security Challenge Level 3: Update Often

Welcome to level up your cybersecurity in October program from integrity first Corporation. It’s week three, and we’re going to talk about updating your software and the importance of it. 

Hackers can exploit vulnerabilities in unpatched software. When new software updates come out to the public, it allows everyone, especially hackers, to learn about the weaknesses that were there and take advantage of them. 

Public Knowledge of those holes leave you and your organization as easy prey. So what should you do? You should update or patch your software. That makes you less vulnerable to security risks. If an update becomes available on your device, update it properly. Better yet, enable your phone, desktop, laptop to auto update, which will automatically install anything security wise that you might need automatically as soon as it’s available to you. 

In the case of a Red Cross breach as an example, they did not install an update fast enough and gave hackers access to over 50,000 people’s data. This is just one example of many malicious software attacks that happen every day and a perfect reason why you should update your software.

Join us next week for level four!

Cyber Security Challenge Level 2: Passwords – Long, Unique and Complex

Welcome to integrity first Corporation, cybersecurity in October program. In week two, we are going to discuss using strong passwords and perhaps a password manager. 

To create a strong password, there are a few tips and tricks to remember. The reason that you want a strong password is it’ll help you keep your data secure. In fact, according to IDtheftcenter.org studies have found that a passwords guessability by hacking software decreases exponentially with every additional character. 

Creating something that’s easy to remember, but hard to guess is key to a successful password. 

Perhaps you’ll want to incorporate a favorite song, a favorite quote, your favorite sports player into a password and it becomes more complex and difficult to guess. You’ll want to make sure that it’s at least 12 characters long, has uppercase and lowercase letters in it, has at least two numbers, and it has at least one symbol in it. 

One thing that I commonly suggest is use the lyrics to one of your favorite songs like flymetothemoon!12 or something along those lines. You want to make sure that it’s something that might be a little bit more difficult for someone to perhaps put in, guess, or even have machine learning guess. 

The other thing is, you’ll want to have a unique password for each account. 

The average American has over 90 passwords. So one thing that you’ll want to do or look into is a password manager app that can help you remember your passwords. A password manager is basically a secure vault for all of your passwords. Basically like a glorified post-it note that sticks on your computer, but a lot more secure. 

You only have to remember the one password to get into your Password Manager app, which will allow you and your computer to access the rest of your passwords for all of your logins. 

Typically, depending upon the application that you purchase, you can access these passwords on your phone, tablet, laptop or desktop. This also means you can and should create different passwords for every single online account that you have. This should keep you ahead of any hackers.

Let INF know if you have any questions and join us next week for Level Three.

Cyber Security Challenge Level 1: How To Spot A Phishing Email

Welcome to integrity first corporations cyber security in October program. Week one, we’re going to talk about recognizing and reporting phishing. 

A few quick facts: cybercriminals sent over 3.3 billion phishing emails last year. This caused over 4000 data breaches then exposed over 22 billion personal records. 

But it’s not enough to know that phishing emails are out there. You also need to be able to recognize them and report them. 

So today, we’re just going to quickly review a few of the highly used phishing email types and tactics. 

The first type is a reward or a free gift message. Free things are really enticing, but they can also be dangerous. If you get an email saying you won a free TV or click here to enter a prize drawing, you need to be on high alert. Hackers are definitely trying to bait you into clicking a malicious link. 

The second type is a login or password message. Another type of phishing email will ask you to verify your account by logging into a fake web page or updating your credentials on this fake web page. These emails will collect your username and password which gives a hacker instant access to your account. 

A third phishing email type is an urgent message. An urgent message email is designed to get you to act fast. It might tell you that your account was hacked or it’ll be deactivated; click here to restore it. Fear makes people do things without thinking, so slow down and make sure that this urgent message is from who you think it’s from. 

The final type of common message is internal messages. This type of phishing is also called spoofing. Hackers will try to impersonate or spoof people at your company, like your HR rep, somebody in your IT department, or maybe even a co-worker. An internal phishing message email might ask you to click on a link to read and sign a policy, read a new document about company wide updates, or even handover sensitive information via purchase. 

If you think you’ve encountered a phishing email, you need to follow your company’s procedures for recording it. Once the right people are notified, they can help you to determine if it’s a phishing email. Whatever you do, do not click on the links, don’t reply to the email and don’t send it to anyone else.

We’ll see you next week for Level Two.

What Is Directors And Officers Liability Insurance?

A common practice amongst professionals, especially attorneys, is the acceptance of board positions on for-profit and not-for-profit entities. And although most of the time the decision to accept these positions is done with all good intentions, it doesn’t mean that there is no exposure related to the acceptance of those positions. 

If you’re an attorney, or if you’re any professional, and you’re sitting on a board now or you’re contemplating the acceptance of a board position, I think there’s a couple of things you need to do. 

First off, you need to go to that organization and ask them if they have a separate directors and officers policy. If they do, great! Ask them for a copy of that. That way, you can put it in your file, and you’ll know you know the limits that they have to cover you, the deductible if there is any deductible and it’s applicable to you and the policy period so you know when it expires, and when it needs to be renewed. 

If the organization comes back to you and says no, that they don’t have a separate D&O policy, I think you need to ask them if they would consider or have they ever considered purchasing a D&O policy. And this is not just for you, the person asking the question. You’re asking for all of the other directors and officers, the employees of the organization, and even sometimes the volunteers of that organization. It’s something that they really need to consider and look at. Secondly, you need to contact your legal malpractice insurance company. 

Now, how does accepting a board position affect your coverage? Most policies actually exclude your acts as an officer or director of an outside organization. There is also an ownership interest in most policies that state that if you have any type of ownership, or even if you just own, manage or control an outside entity, your professional services that you provide to them are excluded under the policy. 

So there are definitely exposures that can and do arise when you accept a position on a board, be it not-for-profit or for-profit. 

My comments are not intended to stop you from accepting any position on any board. My comments here are merely to ask you to take a step back before you accept, ask a couple questions, and make sure you know the exposure that you’re accepting by accepting the board position.

Term Life Insurance vs. Whole Life Insurance

Labor Day is upon us, which means it’s the month of September, which brings us back to the fact that September is Life Insurance Awareness Month. You know, when most people think about life insurance, they’re usually thinking about two different types of policy – either a term life policy, or a whole life insurance policy. Do you know the difference?

Term Life Insurance

My opinion is pretty straightforward and pretty cut and dry. Term Life insurance is just that – it’s only life insurance. You purchase the policy for a certain amount of time, and you have the life insurance for the length of that term, or that amount of time.

Most people consider a term life policy when they’re buying a house. Let’s say you buy a house for about $300,000; you have a 30-year mortgage on it, you then go out and you buy a 30-year term life policy for $300,000. In the unfortunate event that you perish during that term, the $300,000 is paid out, and that goes to pay off the mortgage on the house. There is no cash value at the end of the 30 years.

If you’re fortunate enough to live a long life and you live past that 30-year term, the insurance just ends, and you walk away from the contract.

Whole Life Insurance

Whole Life insurance is a little bit different. Whole life insurance does have a savings component associated with it. Therefore, every time that you pay your premium, a certain amount of that premium will go to pay for the life insurance and a certain amount of that premium will go into an investment vehicle.

At some point during the term of that whole life policy, you’ll start to build up a little bit of a nest egg or a value or sum that you’re able to withdraw from. Some of them allow you to even take a loan against it. Again, in the unfortunate event that you do pass during the term of whole life insurance policy, the life insurance proceeds are in fact paid out.

But again, if you do live that long and happy life, and you live past the term of that whole life insurance policy, you will in fact have a nest egg that you can withdraw or take a loan from and spend any way that you want to.

One thing to keep in mind is that term life insurance policies are usually less expensive than a whole life policy. I hope this little bit of information helps you decide which type of life insurance is best for you.

Life Insurance Awareness Month Is Approaching

It’s hard to believe it’s mid-August already. Pretty soon it’ll be September and fall will be here. Speaking of September, I want you to keep in mind that September is life insurance Awareness Month. It gives us all a good chance to sit back and review the changes that have occurred over the past year, and how those changes affect our life insurance coverage.

If you bought a new house, sold a house, had a new baby, maybe your oldest child went to college, or there’s several other situations that could impact the life insurance coverage, but certainly those ones just mentioned really do impact your need for life insurance.

Take a couple of minutes during the month of September and review your situation. If you have any questions with regards to life insurance, give me Don Ivol a call at 412-563-2106. I’ll be happy to review it with you.

In the meantime, don’t forget, take a couple of seconds and enjoy the last couple of weeks of summer. Whether you go golfing, go on vacation, or visit one of our lakes in Pennsylvania like I am. Everybody deserves to enjoy a couple weeks of rest and relaxation.