If you are an active attorney, you may request a Certificate of Good Standing from the Supreme Court of Pennsylvania Prothonotary’s Office. Please call one of the following numbers for additional information:
If you are on voluntary inactive status, you may request
a Certification of Status in Lieu of a Certificate of Good Standing from the
Disciplinary Board. Check for instructions under “Attorney Registration”
If you need a statement regarding your disciplinary record (or lack thereof), you should make a written request stating that you authorize the Disciplinary Board of the Supreme Court of Pennsylvania to search and release any information (public or private) found in your disciplinary file. Please provide a check for $25.00 (made payable to PA Disciplinary Board) and a pre-paid self-addressed envelope to:
Office of the Chief Disciplinary Counsel
200 N. Third Street, Suite 1400
Harrisburg, PA 17101
Of all the wonders technology has brought us, few are so elegantly wonderful as the flash drive. Imagine a device smaller than a pack of chewing gum which can hold all your important files– word processing, spreadsheets, slide shows, images, movies, anything you can put on a computer – that can be carried on a keychain and accessed from almost any computer anywhere. And they make small backup tasks simpler than ever.
But such convenience also comes with risks. Carelessly used, they can present great risks. Viruses, spyware, and other malicious software can be carried on the drives and transferred to systems. Also, they are susceptible to loss. Keychains have been known to be dropped, briefcases and purses have been known to be left behind, and the little metal (or, horror of horrors) plastic devices that secure the drives to their moorings will break, not if but when. Sensitive and confidential data can be exposed to loss. For these reasons, some security-conscious offices have adopted policies prohibiting the connection of flash drives to their systems, or employ software designed to frustrate their use.
Some flash drives come with built-in security systems that allow their contents to be password-protected, but many don’t. Also, it is unknown how well such systems will stand up to determined hacking. And whenever a drive uses encryptation to enhance security, there is a corresponding risk that the user will lose access.
Careful users will ensure that any sensitive files are kept behind a security wall on the drive at a minimum. Even more important, discretion in the selection of files to be placed on portable drives is wise.
Or a comment, a question, a request, a suggestion? Let us know at email@example.com.