{"id":8,"date":"2015-06-24T13:01:00","date_gmt":"2015-06-24T13:01:00","guid":{"rendered":"https:\/\/www.sherin.com\/professional-liability\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/"},"modified":"2017-09-28T20:20:11","modified_gmt":"2017-09-28T20:20:11","slug":"get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct","status":"publish","type":"post","link":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/","title":{"rendered":"Get Ready for New Technology Rules in the Revised MA Rules of Professional Conduct"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" id=\"img-1435153933768\" class=\"alignRight\" style=\"float: right;\" src=\"\/wp-content\/uploads\/sites\/2\/9917973_m.jpg\" alt=\"9917973 m\" width=\"312\" height=\"207\" border=\"0\" \/><\/p>\n<p>It would be a nightmare for any lawyer to find that someone had hacked into their firm\u2019s computer network and stolen confidential client information.\u00a0 That nightmare will get even scarier beginning July 1, 2015 when revisions to the Massachusetts Rules of Professional Conduct take effect, with the potential for new rules violations.<\/p>\n<p><!--more--><\/p>\n<p>An overhaul of the Massachusetts Rules of Professional Conduct will take effect on July 1, 2015.\u00a0 The changes potentially affect all lawyers, regardless of their practice area, and regardless of whether they practice alone or in large firms.\u00a0 Most of the Rules will receive at least a minor update, and Massachusetts lawyers should pay attention lest they step into some new traps. \u00a0One of the most significant changes to the Rules will impose affirmative obligations with respect to information technology and data security.\u00a0 Lawyers who fail to take appropriate steps to secure their clients\u2019 confidential information could find themselves in violation of the Rules.<\/p>\n<p>For example, a new Rule, 1.6(c), states that a \u201clawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, confidential information relating to the representation of a client.\u201d\u00a0 A new comment to that Rule, comment18, clarifies that \u201c[t]he unauthorized access to, or the inadvertent or unauthorized disclosure of, confidential information relating to the representation of a client does not constitute a violation of paragraph (c) if the lawyer has made reasonable efforts to prevent the access or disclosure.\u201d\u00a0 However, the standard for what is \u201creasonable\u201d is less than clear.\u00a0 The comment states that\u00a0 \u201c[f]actors to be considered in determining the reasonableness of the lawyer\u2019s efforts include, but are not limited to, the sensitivity of the information, the likelihood of disclosure if additional safeguards are not employed, the cost of employing additional safeguards, the difficulty of implementing the safeguards, and the extent to which the safeguards adversely affect the lawyer\u2019s ability to represent clients\u2026\u201d<\/p>\n<p>Imagine you find yourself as lead counsel in a highly publicized celebrity divorce.\u00a0 You have a computer and a smartphone stuffed with \u201csensitive information\u201d about your high-profile client, but no, or only rudimentary, encryption and security.\u00a0 It may be \u201clikely\u201d that someone (the paparazzi?) will try to hack your computer or phone and disclose your client\u2019s confidential information across the Internet.<\/p>\n<p>If such a hacker-driven debacle occurs, will you face discipline for having lax computer security?\u00a0 Also, even if your security measures were \u201cgood enough\u201d for lower-profile clients\u2019 information, will they pass muster when you take on a high-profile client in a case that is a matter of intense public interest?\u00a0 Even for lower-profile clients, identity thieves, fraudsters, and corporate espionage agents may be highly interested in a lawyer\u2019s confidential electronic files \u2013 and they can cause great damage.<\/p>\n<p>The upshot is that, even though the revised Rule does not say what constitutes \u201creasonable\u201d security, lawyers may find themselves having to defend their data security in the aftermath of a breach.\u00a0 In addition to ensuring that basic security measures are in place, namely, encrypted email systems, phones and laptops that automatically lock, policies concerning using public internet connections, and a clear social media policy that prevents the dissemination of sensitive information or the use of personal email, lawyers with access to especially sensitive data may want to discuss information security with their clients.\u00a0 Comment 18 \u00a0allows the client to \u201crequire the lawyer to implement special security measures not required by this Rule or [to] give informed consent to forgo security measures that would otherwise be required.\u201d<\/p>\n<p>Other changes to the Rules with respect to technology include a new comment 3 to Rule 5.3 which \u00a0obligates lawyers to at least consider a client\u2019s information security when hiring an outside technology vendor.\u00a0 Comment 3 states that when employing the assistance of \u201cnonlawyers outside the firm\u201d a lawyer \u201cmust make reasonable efforts to ensure that the services are provided in a manner that is compatible with the lawyer\u2019s professional obligations.\u201d\u00a0 A lawyer fulfills this obligation, in part, through \u201carrangements concerning the protection of client information.\u201d\u00a0 Lawyers should consider this obligation when they retain vendors, and they may want to consider requiring that their vendors agree to basic confidentiality and data security agreements, and permit the law firms to monitor compliance or at least audit their security measures.<\/p>\n<p>Also, as a sort of technology catchall, revised Comment 8 to Rule 1.1 (concerning competence) now states that \u201cTo maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, and engage in continuing study and education.\u201d<\/p>\n<p>The Supreme Judicial Court has established a <a href=\"http:\/\/www.mass.gov\/courts\/case-legal-res\/rules-of-court\/rule-changes-invitations-comment\/sjc-adopts-revised-rules-of-professional-conduct-march-2015.html\">web site<\/a> with useful links concerning the revised Rules. These include a <a href=\"http:\/\/www.mass.gov\/courts\/docs\/sjc\/docs\/rules\/c-rules-of-professional-confuct-adopted-by-sjc-marked-for-changes-from-current-rules-effective-july-2015.pdf\">redlined version showing changes to the Rules<\/a>, and a <a href=\"http:\/\/www.mass.gov\/courts\/docs\/sjc\/docs\/rules\/e-committee-report-on-adoption-of-revised-rules-of-professional-conduct-effective-july-2015.pdf\">report<\/a> by the Court\u2019s Standing Advisory on the Rules of Professional Conduct summarizing additional changes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It would be a nightmare for any lawyer to find that someone had hacked into their firm\u2019s computer network and stolen confidential client information.\u00a0 That nightmare will get even scarier beginning July 1, 2015 when revisions to the Massachusetts Rules of Professional Conduct take effect, with the potential for new rules violations.<\/p>\n","protected":false},"author":9,"featured_media":76,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[26,29,5,32],"class_list":["post-8","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-board-of-bar-overseers-bbo","tag-data-security","tag-rules-of-professional-conduct","tag-supreme-judicial-court"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Get Ready for New Technology Rules in the Revised MA Rules of Professional Conduct - Law Firm Defense<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Get Ready for New Technology Rules in the Revised MA Rules of Professional Conduct - Law Firm Defense\" \/>\n<meta property=\"og:description\" content=\"It would be a nightmare for any lawyer to find that someone had hacked into their firm\u2019s computer network and stolen confidential client information.\u00a0 That nightmare will get even scarier beginning July 1, 2015 when revisions to the Massachusetts Rules of Professional Conduct take effect, with the potential for new rules violations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/\" \/>\n<meta property=\"og:site_name\" content=\"Law Firm Defense\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-24T13:01:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-09-28T20:20:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherin.com\/law-firm-defense\/wp-content\/uploads\/sites\/3\/9917973_m.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"849\" \/>\n\t<meta property=\"og:image:height\" content=\"564\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sherin and Lodgen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sherin and Lodgen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/2015\\\/06\\\/24\\\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/2015\\\/06\\\/24\\\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\\\/\"},\"author\":{\"name\":\"Sherin and Lodgen\",\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/#\\\/schema\\\/person\\\/96bd34e7823afde2e3e7e561023c5a44\"},\"headline\":\"Get Ready for New Technology Rules in the Revised MA Rules of Professional Conduct\",\"datePublished\":\"2015-06-24T13:01:00+00:00\",\"dateModified\":\"2017-09-28T20:20:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/2015\\\/06\\\/24\\\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\\\/\"},\"wordCount\":820,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/2015\\\/06\\\/24\\\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/9917973_m.jpg\",\"keywords\":[\"Board of Bar Overseers (BBO)\",\"Data Security\",\"Rules of Professional Conduct\",\"Supreme Judicial Court\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/2015\\\/06\\\/24\\\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\\\/\",\"url\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/2015\\\/06\\\/24\\\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\\\/\",\"name\":\"Get Ready for New Technology Rules in the Revised MA Rules of Professional Conduct - Law Firm Defense\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/2015\\\/06\\\/24\\\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/2015\\\/06\\\/24\\\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/9917973_m.jpg\",\"datePublished\":\"2015-06-24T13:01:00+00:00\",\"dateModified\":\"2017-09-28T20:20:11+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/#\\\/schema\\\/person\\\/96bd34e7823afde2e3e7e561023c5a44\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/2015\\\/06\\\/24\\\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/2015\\\/06\\\/24\\\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/2015\\\/06\\\/24\\\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/9917973_m.jpg\",\"contentUrl\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/9917973_m.jpg\",\"width\":849,\"height\":564,\"caption\":\"a keybord with a chain and lock on it\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/2015\\\/06\\\/24\\\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Get Ready for New Technology Rules in the Revised MA Rules of Professional Conduct\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/#website\",\"url\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/\",\"name\":\"Law Firm Defense\",\"description\":\"Law Firm Defense News from Sherin and Lodgen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/#\\\/schema\\\/person\\\/96bd34e7823afde2e3e7e561023c5a44\",\"name\":\"Sherin and Lodgen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d98a5f87b44b7c14488b62c802e175aba108d19bda0d855a9f1cc4924948f5fa?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d98a5f87b44b7c14488b62c802e175aba108d19bda0d855a9f1cc4924948f5fa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d98a5f87b44b7c14488b62c802e175aba108d19bda0d855a9f1cc4924948f5fa?s=96&d=mm&r=g\",\"caption\":\"Sherin and Lodgen\"},\"url\":\"https:\\\/\\\/www.sherin.com\\\/law-firm-defense\\\/author\\\/sherinlodgen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Get Ready for New Technology Rules in the Revised MA Rules of Professional Conduct - Law Firm Defense","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/","og_locale":"en_US","og_type":"article","og_title":"Get Ready for New Technology Rules in the Revised MA Rules of Professional Conduct - Law Firm Defense","og_description":"It would be a nightmare for any lawyer to find that someone had hacked into their firm\u2019s computer network and stolen confidential client information.\u00a0 That nightmare will get even scarier beginning July 1, 2015 when revisions to the Massachusetts Rules of Professional Conduct take effect, with the potential for new rules violations.","og_url":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/","og_site_name":"Law Firm Defense","article_published_time":"2015-06-24T13:01:00+00:00","article_modified_time":"2017-09-28T20:20:11+00:00","og_image":[{"width":849,"height":564,"url":"https:\/\/www.sherin.com\/law-firm-defense\/wp-content\/uploads\/sites\/3\/9917973_m.jpg","type":"image\/jpeg"}],"author":"Sherin and Lodgen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sherin and Lodgen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/#article","isPartOf":{"@id":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/"},"author":{"name":"Sherin and Lodgen","@id":"https:\/\/www.sherin.com\/law-firm-defense\/#\/schema\/person\/96bd34e7823afde2e3e7e561023c5a44"},"headline":"Get Ready for New Technology Rules in the Revised MA Rules of Professional Conduct","datePublished":"2015-06-24T13:01:00+00:00","dateModified":"2017-09-28T20:20:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/"},"wordCount":820,"commentCount":0,"image":{"@id":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sherin.com\/law-firm-defense\/wp-content\/uploads\/sites\/3\/9917973_m.jpg","keywords":["Board of Bar Overseers (BBO)","Data Security","Rules of Professional Conduct","Supreme Judicial Court"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/","url":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/","name":"Get Ready for New Technology Rules in the Revised MA Rules of Professional Conduct - Law Firm Defense","isPartOf":{"@id":"https:\/\/www.sherin.com\/law-firm-defense\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/#primaryimage"},"image":{"@id":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sherin.com\/law-firm-defense\/wp-content\/uploads\/sites\/3\/9917973_m.jpg","datePublished":"2015-06-24T13:01:00+00:00","dateModified":"2017-09-28T20:20:11+00:00","author":{"@id":"https:\/\/www.sherin.com\/law-firm-defense\/#\/schema\/person\/96bd34e7823afde2e3e7e561023c5a44"},"breadcrumb":{"@id":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/#primaryimage","url":"https:\/\/www.sherin.com\/law-firm-defense\/wp-content\/uploads\/sites\/3\/9917973_m.jpg","contentUrl":"https:\/\/www.sherin.com\/law-firm-defense\/wp-content\/uploads\/sites\/3\/9917973_m.jpg","width":849,"height":564,"caption":"a keybord with a chain and lock on it"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherin.com\/law-firm-defense\/2015\/06\/24\/get-ready-for-new-technology-rules-in-the-revised-ma-rules-of-professional-conduct\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherin.com\/law-firm-defense\/"},{"@type":"ListItem","position":2,"name":"Get Ready for New Technology Rules in the Revised MA Rules of Professional Conduct"}]},{"@type":"WebSite","@id":"https:\/\/www.sherin.com\/law-firm-defense\/#website","url":"https:\/\/www.sherin.com\/law-firm-defense\/","name":"Law Firm Defense","description":"Law Firm Defense News from Sherin and Lodgen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherin.com\/law-firm-defense\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherin.com\/law-firm-defense\/#\/schema\/person\/96bd34e7823afde2e3e7e561023c5a44","name":"Sherin and Lodgen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d98a5f87b44b7c14488b62c802e175aba108d19bda0d855a9f1cc4924948f5fa?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d98a5f87b44b7c14488b62c802e175aba108d19bda0d855a9f1cc4924948f5fa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d98a5f87b44b7c14488b62c802e175aba108d19bda0d855a9f1cc4924948f5fa?s=96&d=mm&r=g","caption":"Sherin and Lodgen"},"url":"https:\/\/www.sherin.com\/law-firm-defense\/author\/sherinlodgen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.sherin.com\/law-firm-defense\/wp-json\/wp\/v2\/posts\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherin.com\/law-firm-defense\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherin.com\/law-firm-defense\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherin.com\/law-firm-defense\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherin.com\/law-firm-defense\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":0,"href":"https:\/\/www.sherin.com\/law-firm-defense\/wp-json\/wp\/v2\/posts\/8\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherin.com\/law-firm-defense\/wp-json\/wp\/v2\/media\/76"}],"wp:attachment":[{"href":"https:\/\/www.sherin.com\/law-firm-defense\/wp-json\/wp\/v2\/media?parent=8"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherin.com\/law-firm-defense\/wp-json\/wp\/v2\/categories?post=8"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherin.com\/law-firm-defense\/wp-json\/wp\/v2\/tags?post=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}