SlideShare una empresa de Scribd logo
1 de 41
Descargar para leer sin conexión
Smart, Ethical Use of Mobile, Tablet, &
          Cloud Computing

                Nicole Black
 Attorney, author and founder of lawtechTalk
          www.nicoleblackesq.com
Cloud and mobile computing for lawyers
What is cloud computing and why
        should you care?
Source:YouTube http://bit.ly/75FAx4
Source:YouTube http://bit.ly/75FAx4
A fundamentalist is a person
who considers whether a fact is
acceptable to their faith before
they explore it. As opposed to
a curious person who explores
first and then considers
whether or not they want to
accept the ramifications.
          --Seth Godin
Cloud and mobile computing for lawyers
Do you or your clients use gmail?
Do you use Lexis or Westlaw?
Do you use Wikipedia?
Do you use flickr or snapfish?
Cloud and Mobile Computing: Not
            a Trend
• Cloud computing is the top technology trend for
                      2010

 • By 2012, 20% of businesses will own no IT assets
    and will conduct business solely in the Cloud

 • By 2013, mobile phones will overtake PCs as the
    most common Web access device worldwide

   • By 2014, over 3 billion of the world’s adult
population will be able to transact electronically via
          mobile or Internet technology

* Gartner’s Top Predictions for IT Organizations and Users, 2010 and
                      Beyond: A New Balance
But what
   about
lawyers and
   cloud
computing?
• Nearly 98% of respondents
   incorporated virtualization
technologies into their law firms.
Some used virtual servers, while
 others brought virtualization to
    their desktop computers.

 • Nearly 84% of responding firms
     reported using SaaS-based
      products as well. Typically,
     however, cloud computing
products were used for secondary
    functions like eDiscovery or
          human resources.
         *Am Law 2009 Tech Survey
• 80% of firms use cloud
computing--mostly for non-critical
  tasks like e-discovery and HR

 • 60% of firms use cloud-based
    services for e-discovery or
 litigation support features, and
many use it for important (but not
   bread-and-butter) tasks like
benefits or expense management

    •5% use cloud services for
     document management

     • 6% use it for storage

         *Am Law 2010 Tech Survey
“14% of law firms plan to invest in
 some type of cloud computing or
   software-as-a-service solution.
   However, it must be noted that
    lack of familiarity with cloud
  computing and related emerging
   technologies may be inhibiting
 adoption. Among attorneys, only
  30% rate themselves as familiar
      with the concept of cloud
 computing, while only 45% claim
     knowledge of the concept of
         managed services.”
* Comp TIA 2010 survey (a non-profit trade association for
                   the IT industry)
Cloud and mobile computing for lawyers
Cloud computing is a “type of computing that is comparable to grid
computing, relies on sharing computing resources rather than having local
servers or personal devices to handle applications. The goal of cloud
computing is to apply traditional supercomputing power (normally used by
military and research facilities) to perform tens of trillions of computations per
second.”
Cloud computing is a “type of computing that is comparable to grid
computing, relies on sharing computing resources rather than having local
servers or personal devices to handle applications. The goal of cloud
computing is to apply traditional supercomputing power (normally used by
military and research facilities) to perform tens of trillions of computations per
second.”

         Software as a service —or SaaS —is “[a] software delivery
         model in which a software firm provides daily technical
         operation, maintenance, and support for the software
         provided to their client.”
For summaries of a few ethics
 decisons: http://bit.ly/81K2jZ
Ethical issues to consider:


 A. Attorney client confidentiality


 B.
Compare/contrast to traditional outsourcing relationships


 C.
Transborder data flow


 D.
Meeting obligations of “reasonable” security


 E.
Electronic evidence/e-discovery
QUESTION:

  What are the ethical obligations of
lawyers in regard to data stored on the
    hard drives of “storage media”.
   Florida Bar Ethics Opinion 10-12 (September 2010)
ANSWER:
Lawyers who use devices that contain storage media such as
computers, printers, copiers, scanners, cellular phones, personal
digital assistants, flash drives, memory sticks, facsimile machines and
other electronic or digital devices must take reasonable steps to
ensure that client confidentiality is maintained and that the device
is sanitized before disposition, including: (1) identification of the
potential threat to confidentiality along with the development and
implementation of policies to address the potential threat to
confidentiality; (2) inventory of the Devices that contain Hard
Drives or other Storage Media; (3) supervision of nonlawyers to
obtain adequate assurances that confidentiality will be maintained;
and (4) responsibility for sanitization of the Device by requiring
meaningful assurances from the vendor at the intake of the Device
and confirmation or certification of the sanitization at the
disposition of the Device.
Lawyers using these devices must familiarize themselves with new technologies and
“have a duty to keep abreast of changes in technology to the extent that the lawyer
            can identify potential threats to maintaining confidentiality.”

  Also, lawyers must take reasonable steps to ensure that client confidentiality is
 maintained. One important part of this duty includes the obligation to identify any
       “potential threat(s) to confidentiality along with the development and
   implementation of policies to address the potential threat to confidentiality.”

The Committee noted that lawyers who use mobile devices also have a supervisory
   responsibility that extends to not only to the lawyer’s own employees but to
 “entities outside the lawyer’s firm with whom the lawyer contracts to assist in the
 care and maintenance of the Devices in the lawyer’s control.” Part of the lawyer’s
 supervisory duty requires that the lawyer obtain assurances from any nonlawyers
     who will have access to confidential information that confidentiality of the
                           information will be maintained.
QUESTION:

Whether an attorney can use an online system to store
 confidential client data and, if so, what steps must be
        taken to ensure the data are secure?
   New York State Bar Association’s Committee on Professional Ethics, Opinion 842
                                 (September 2010)
ANSWER:
It is permissible for attorneys to store confidential client data in the
cloud, but only if reasonable steps are taken to ensure the data would be
adequately protected from unauthorized disclosure: “A lawyer may use
an online data storage system to store and back up client confidential
information provided that the lawyer takes reasonable care to ensure
that confidentiality will be maintained in a manner consistent with the
lawyer’s obligations under Rule 1.6. In addition, the lawyer should stay
abreast of technological advances to ensure that the storage system
remains sufficiently advanced to protect the client’s information, and
should monitor the changing law of privilege to ensure that storing the
information online will not cause loss or waiver of any privilege.”

Importantly, the committee noted that “exercising ‘reasonable care’ under Rule
1.6 does not mean that a lawyer guarantees that the information is secure
from any unauthorized access.”
QUESTION:

“May a lawyer use an e-mail service provider that scans
e-mails by computer for keywords and then sends or
displays instantaneously (to the side of the e-mails in
question) computer-generated advertisements to users
of the service based on the e-mail communications?”

     The New York State Bar Association Committee on Professional Ethics, Opinion
                                    820-2/08/08
ANSWER:
“Unless the lawyer learns information suggesting that
the provider is materially departing from conventional
privacy policies or is using the information it obtains by
computer-scanning of e-mails for a purpose that, unlike
computer-generated advertising, puts confidentiality at
risk, the use of such e-mail services comports with DR
4-101…A lawyer may use an e-mail service provider
that conducts computer scans of e-mails to generate
computer advertising, where the e-mails are not
reviewed by or provided to other individuals.”
QUESTION:
The question addressed in this opinion is whether a lawyer violates
SCR 156 by storing confidential client information and/or
communications, without client consent, in an electronic format on
a server or other device that is not exclusively in the lawyer’s
control.

State Bar of Nevada Standing Committee on Ethics and Professional Responsibility,
Formal Opinion No. 33
ANSWER:

In order to comply with the rule, the lawyer must act competently and
reasonably to safeguard confidential client information and communications
from inadvertent and unauthorized disclosure. This may be accomplished
while storing client information electronically with a third party to the same
extent and subject to the same standards as with storing confidential paper
files in a third party warehouse. If the lawyer acts competently and
reasonably to ensure the confidentiality of the information, then he or she
does not violate SCR 156 simply by contracting with a third party to store the
information, even if an unauthorized or inadvertent disclosure should occur...

The ABA Committee addressed an issue much closer to that discussed here
in Formal Opinion number 95-398, and concluded that a lawyer may give a
computer maintenance company access to confidential information in client
files, but that in order to comply with the obligation of client confidentiality, he
or she “must make reasonable efforts to ensure that the company has in
place, or will establish, reasonable procedures to protect the confidentiality
of client information.”
4th Amendment issues

In a decision issued by the United States District Court, District of Oregon
Opinion and Order in In re: US, Nos. 08-9131-MC, 08-9147-MC, (2009), the
government successfully argued that it need not notify the account holder regarding
a warrant that is served upon the ISP holder of the email account (gmail). In
reaching its decision, the court gave lip service to the concept that emails are
entitled to Fourth Amendment protection, but then stated:

“Much of the reluctance to apply traditional notions of third party disclosure to the
e-mail context seems to stem from a fundamental misunderstanding of the lack of
privacy we all have in our e-mails. Some people seem to think that they are as
private as letters, phone calls, or journal entries. The blunt fact is, they are not.”
In comparison, however, see footnote 7 from the October 2009 Memorandum and
Order issued by the United States District Court, Eastern District of New York, in
US v. Cioffi, Case No. 08-CR-415 (FB):

One preliminary matter is not in question: The government does not dispute that
Tannin has a reasonable expectation of privacy in the contents of his personal email
account. See United States v. Zavala, 541 F.3d 562,577 (5th Cir. 2008) ("[C]ell
phones contain a wealth of private information, including emails, text messages, call
histories, address books, and subscriber numbers. [The defendant] had a reasonable
expectation of privacy regarding this information."); United States v. Forrester, 512
F.3d 500, 511 (9th Cir. 2008) ("E-mail, like physical mail, has an outside address
'visible' to the third-party carriers that transmit it to its intended location, and also
a package of content that the sender presumes will be read only by the intended
recipient. The privacy interests in these two forms of communication are identical.
The contents may deserve Fourth Amendment protection, but the address and size
of the package do not.").
Security issues to
      consider:

1. Encryption
2. Geo-redundancy
3. Data back ups
4. Extraction of data
What questions should you ask cloud providers?
• What type of facility will host the data?

  • Who else has access to the cloud facility, the servers and the data and what
 mechanisms are in place to ensure that only authorized personnel will be able to
  access your data? How does the vendor screen its employees? If the vendor
  doesn’t own the data center, how does the data center screen its employees?

• Does the contract include terms that limit data access by the vendor’s employees
             to only those situations where you request assistance?


                        For full list see: http://bit.ly/hyFBxo
• Does the contract address confidentiality? If not, is the vendor willing to sign a
                           confidentiality agreement?

• How frequently are back-ups performed? How are you able to verify that backups
                        are being performed as promised?

  • Is data backed up to more than one server? Where are the respective servers
     located? Will your data, and any back up copies of it, always stay within the
                          boundaries of the United States?

        • How secure are the data centers where the servers are housed?

 • What types of encryption methods are used and how are passwords stored? Is
          your data encrypted while in transit or only when in storage?

                        For full list see: http://bit.ly/hyFBxo
• Has a third party, such as McAfee, evaluated or tested the vendor’s security
   measures to assess the strength of, among other things, firewalls, encryption
techniques, and intrusion detection systems? Are the audits of the security system
                              available for your review?

             • Are there redundant power supplies for the servers?

  • Does the contract include a guarantee of uptime? How much uptime? What
happens in the event that the servers are down? Will you be compensated if there
 is an unexpected period of downtime that exceeds the amount set forth in the
                                   agreement?

 • If a natural disaster strikes one geographic region, would all data be lost? Are
                            there geo-redundant back ups?

                       For full list see: http://bit.ly/hyFBxo
• What remedies does the contract provide? Are consequential damages included? Are total
                      damages capped or are specific remedies limited?

   • Does the agreement contain a forum selection clause? How about a mandatory arbitration
                                            clause?

• If there is a data breach, will you be notified? How are costs for remedying the breach allocated?

 • What rights do you have upon termination? Does the contract contain terms that require the
               vendor to assist you in transitioning from their system to another?

• What rights do you have in the event of a billing or similar dispute with the vendor? Do you have
  the option of having your data held in escrow by a third party, so that it is fully accessible in the
  event of a dispute? Alternatively can you back up your data locally so that it is accessible to you
                                         should you need it?

   • Does the provider carry cyber insurance? If so, what does it cover? What are the coverage
                                             limits?

                                 For full list see: http://bit.ly/hyFBxo
Additional cloud computing
resources: http://bit.ly/86ILNI
Cloud and mobile computing for lawyers
Thanks for listening!

             Nicole Black
     Of Counsel, Fiandach & Fiandach
         Founder of lawtechTalk
        www.nicoleblackesq.com

Social Media for Lawyers: the Next Frontier
     published by the ABA in July 2010
    (http://bit.ly/socmed4lawyersbook)

   Cloud Computing for Lawyers to be
    published by the ABA in May 2011

Más contenido relacionado

La actualidad más candente

170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibits170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibitsAndrey Apuhtin
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningUlf Mattsson
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the CloudCourtney Fisk
 
8MAN-Public_Sector_Data_and_Information_Security_Survey 2016
8MAN-Public_Sector_Data_and_Information_Security_Survey 20168MAN-Public_Sector_Data_and_Information_Security_Survey 2016
8MAN-Public_Sector_Data_and_Information_Security_Survey 2016Andi Robinson
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019Ulf Mattsson
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Ted Myerson
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMADomenico Catalano
 
Cloud computing
Cloud computingCloud computing
Cloud computingAli Raza
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaTakshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaThe Takshashila Institution
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)Dr Dev Kambhampati
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentAubrey Owens
 

La actualidad más candente (17)

170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibits170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibits
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Ccs16
Ccs16Ccs16
Ccs16
 
Ch12
Ch12Ch12
Ch12
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the Cloud
 
8MAN-Public_Sector_Data_and_Information_Security_Survey 2016
8MAN-Public_Sector_Data_and_Information_Security_Survey 20168MAN-Public_Sector_Data_and_Information_Security_Survey 2016
8MAN-Public_Sector_Data_and_Information_Security_Survey 2016
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaTakshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 

Destacado

Beyond LinkedIn: Advanced Social Media for Lawyers
Beyond LinkedIn: Advanced Social Media for LawyersBeyond LinkedIn: Advanced Social Media for Lawyers
Beyond LinkedIn: Advanced Social Media for LawyersMartha Sperry
 
Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers Nicole Black
 
Social Media for Lawyers & Law Firms : Chicago Bar Association
Social Media for Lawyers & Law Firms : Chicago Bar AssociationSocial Media for Lawyers & Law Firms : Chicago Bar Association
Social Media for Lawyers & Law Firms : Chicago Bar AssociationKevin O'Keefe
 
AHLA Annual Meeting 2011 Social Media for Lawyers by David Harlow
AHLA Annual Meeting 2011 Social Media for Lawyers by David HarlowAHLA Annual Meeting 2011 Social Media for Lawyers by David Harlow
AHLA Annual Meeting 2011 Social Media for Lawyers by David HarlowDavid Harlow
 
Social Media for Lawyers
Social Media for LawyersSocial Media for Lawyers
Social Media for LawyersShani Magosky
 
Florida social media
Florida social mediaFlorida social media
Florida social mediaNicole Black
 
Social media for lawyers
Social media for lawyersSocial media for lawyers
Social media for lawyersColin Yeo
 
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersThe ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersNicole Black
 

Destacado (8)

Beyond LinkedIn: Advanced Social Media for Lawyers
Beyond LinkedIn: Advanced Social Media for LawyersBeyond LinkedIn: Advanced Social Media for Lawyers
Beyond LinkedIn: Advanced Social Media for Lawyers
 
Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers
 
Social Media for Lawyers & Law Firms : Chicago Bar Association
Social Media for Lawyers & Law Firms : Chicago Bar AssociationSocial Media for Lawyers & Law Firms : Chicago Bar Association
Social Media for Lawyers & Law Firms : Chicago Bar Association
 
AHLA Annual Meeting 2011 Social Media for Lawyers by David Harlow
AHLA Annual Meeting 2011 Social Media for Lawyers by David HarlowAHLA Annual Meeting 2011 Social Media for Lawyers by David Harlow
AHLA Annual Meeting 2011 Social Media for Lawyers by David Harlow
 
Social Media for Lawyers
Social Media for LawyersSocial Media for Lawyers
Social Media for Lawyers
 
Florida social media
Florida social mediaFlorida social media
Florida social media
 
Social media for lawyers
Social media for lawyersSocial media for lawyers
Social media for lawyers
 
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersThe ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyers
 

Similar a Cloud and mobile computing for lawyers

Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersRobert Ambrogi
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesCassie McGarvey, JD
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docxoswald1horne84988
 
Moving to the Cloud: Client Communication Best Practices for Law Firms
Moving to the Cloud: Client Communication Best Practices for Law FirmsMoving to the Cloud: Client Communication Best Practices for Law Firms
Moving to the Cloud: Client Communication Best Practices for Law FirmsClio - Cloud-Based Legal Technology
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsCloudMask inc.
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualWilliam Tanenbaum
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsNehal Madhani
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...William Tanenbaum
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWilliam Tanenbaum
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
Technologies for Lawyers - Legal Sector
Technologies for Lawyers - Legal SectorTechnologies for Lawyers - Legal Sector
Technologies for Lawyers - Legal SectorSatya Pal
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?Mohammad Mydul Islam
 

Similar a Cloud and mobile computing for lawyers (20)

Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and Employees
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docx
 
Moving to the Cloud: Client Communication Best Practices for Law Firms
Moving to the Cloud: Client Communication Best Practices for Law FirmsMoving to the Cloud: Client Communication Best Practices for Law Firms
Moving to the Cloud: Client Communication Best Practices for Law Firms
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerations
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business Cases
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Technologies for Lawyers - Legal Sector
Technologies for Lawyers - Legal SectorTechnologies for Lawyers - Legal Sector
Technologies for Lawyers - Legal Sector
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
 

Más de Nicole Black

Women in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessageWomen in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessageNicole Black
 
Social Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersSocial Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersNicole Black
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeNicole Black
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015Nicole Black
 
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaiPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaNicole Black
 
Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2Nicole Black
 
Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1Nicole Black
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011Nicole Black
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingNicole Black
 
Lawyers Collective Milkshake Mistake
Lawyers Collective Milkshake MistakeLawyers Collective Milkshake Mistake
Lawyers Collective Milkshake MistakeNicole Black
 
Technology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast SpeedsTechnology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast SpeedsNicole Black
 
Legal Technology: Change is Good
Legal Technology: Change is GoodLegal Technology: Change is Good
Legal Technology: Change is GoodNicole Black
 
Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?Nicole Black
 
Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!Nicole Black
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationNicole Black
 
6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social MediaNicole Black
 

Más de Nicole Black (17)

Women in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessageWomen in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessage
 
Social Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersSocial Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for Lawyers
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law Practice
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015
 
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaiPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social media
 
Point1 law
Point1 lawPoint1 law
Point1 law
 
Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2
 
Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
 
Lawyers Collective Milkshake Mistake
Lawyers Collective Milkshake MistakeLawyers Collective Milkshake Mistake
Lawyers Collective Milkshake Mistake
 
Technology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast SpeedsTechnology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast Speeds
 
Legal Technology: Change is Good
Legal Technology: Change is GoodLegal Technology: Change is Good
Legal Technology: Change is Good
 
Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?
 
Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
 
6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media
 

Último

Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfAnna Loughnan Colquhoun
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 

Último (20)

Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 

Cloud and mobile computing for lawyers

  • 1. Smart, Ethical Use of Mobile, Tablet, & Cloud Computing Nicole Black Attorney, author and founder of lawtechTalk www.nicoleblackesq.com
  • 3. What is cloud computing and why should you care?
  • 6. A fundamentalist is a person who considers whether a fact is acceptable to their faith before they explore it. As opposed to a curious person who explores first and then considers whether or not they want to accept the ramifications. --Seth Godin
  • 8. Do you or your clients use gmail?
  • 9. Do you use Lexis or Westlaw?
  • 10. Do you use Wikipedia?
  • 11. Do you use flickr or snapfish?
  • 12. Cloud and Mobile Computing: Not a Trend • Cloud computing is the top technology trend for 2010 • By 2012, 20% of businesses will own no IT assets and will conduct business solely in the Cloud • By 2013, mobile phones will overtake PCs as the most common Web access device worldwide • By 2014, over 3 billion of the world’s adult population will be able to transact electronically via mobile or Internet technology * Gartner’s Top Predictions for IT Organizations and Users, 2010 and Beyond: A New Balance
  • 13. But what about lawyers and cloud computing?
  • 14. • Nearly 98% of respondents incorporated virtualization technologies into their law firms. Some used virtual servers, while others brought virtualization to their desktop computers. • Nearly 84% of responding firms reported using SaaS-based products as well. Typically, however, cloud computing products were used for secondary functions like eDiscovery or human resources. *Am Law 2009 Tech Survey
  • 15. • 80% of firms use cloud computing--mostly for non-critical tasks like e-discovery and HR • 60% of firms use cloud-based services for e-discovery or litigation support features, and many use it for important (but not bread-and-butter) tasks like benefits or expense management •5% use cloud services for document management • 6% use it for storage *Am Law 2010 Tech Survey
  • 16. “14% of law firms plan to invest in some type of cloud computing or software-as-a-service solution. However, it must be noted that lack of familiarity with cloud computing and related emerging technologies may be inhibiting adoption. Among attorneys, only 30% rate themselves as familiar with the concept of cloud computing, while only 45% claim knowledge of the concept of managed services.” * Comp TIA 2010 survey (a non-profit trade association for the IT industry)
  • 18. Cloud computing is a “type of computing that is comparable to grid computing, relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of cloud computing is to apply traditional supercomputing power (normally used by military and research facilities) to perform tens of trillions of computations per second.”
  • 19. Cloud computing is a “type of computing that is comparable to grid computing, relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of cloud computing is to apply traditional supercomputing power (normally used by military and research facilities) to perform tens of trillions of computations per second.” Software as a service —or SaaS —is “[a] software delivery model in which a software firm provides daily technical operation, maintenance, and support for the software provided to their client.”
  • 20. For summaries of a few ethics decisons: http://bit.ly/81K2jZ
  • 21. Ethical issues to consider: A. Attorney client confidentiality B. Compare/contrast to traditional outsourcing relationships C. Transborder data flow D. Meeting obligations of “reasonable” security E. Electronic evidence/e-discovery
  • 22. QUESTION: What are the ethical obligations of lawyers in regard to data stored on the hard drives of “storage media”. Florida Bar Ethics Opinion 10-12 (September 2010)
  • 23. ANSWER: Lawyers who use devices that contain storage media such as computers, printers, copiers, scanners, cellular phones, personal digital assistants, flash drives, memory sticks, facsimile machines and other electronic or digital devices must take reasonable steps to ensure that client confidentiality is maintained and that the device is sanitized before disposition, including: (1) identification of the potential threat to confidentiality along with the development and implementation of policies to address the potential threat to confidentiality; (2) inventory of the Devices that contain Hard Drives or other Storage Media; (3) supervision of nonlawyers to obtain adequate assurances that confidentiality will be maintained; and (4) responsibility for sanitization of the Device by requiring meaningful assurances from the vendor at the intake of the Device and confirmation or certification of the sanitization at the disposition of the Device.
  • 24. Lawyers using these devices must familiarize themselves with new technologies and “have a duty to keep abreast of changes in technology to the extent that the lawyer can identify potential threats to maintaining confidentiality.” Also, lawyers must take reasonable steps to ensure that client confidentiality is maintained. One important part of this duty includes the obligation to identify any “potential threat(s) to confidentiality along with the development and implementation of policies to address the potential threat to confidentiality.” The Committee noted that lawyers who use mobile devices also have a supervisory responsibility that extends to not only to the lawyer’s own employees but to “entities outside the lawyer’s firm with whom the lawyer contracts to assist in the care and maintenance of the Devices in the lawyer’s control.” Part of the lawyer’s supervisory duty requires that the lawyer obtain assurances from any nonlawyers who will have access to confidential information that confidentiality of the information will be maintained.
  • 25. QUESTION: Whether an attorney can use an online system to store confidential client data and, if so, what steps must be taken to ensure the data are secure? New York State Bar Association’s Committee on Professional Ethics, Opinion 842 (September 2010)
  • 26. ANSWER: It is permissible for attorneys to store confidential client data in the cloud, but only if reasonable steps are taken to ensure the data would be adequately protected from unauthorized disclosure: “A lawyer may use an online data storage system to store and back up client confidential information provided that the lawyer takes reasonable care to ensure that confidentiality will be maintained in a manner consistent with the lawyer’s obligations under Rule 1.6. In addition, the lawyer should stay abreast of technological advances to ensure that the storage system remains sufficiently advanced to protect the client’s information, and should monitor the changing law of privilege to ensure that storing the information online will not cause loss or waiver of any privilege.” Importantly, the committee noted that “exercising ‘reasonable care’ under Rule 1.6 does not mean that a lawyer guarantees that the information is secure from any unauthorized access.”
  • 27. QUESTION: “May a lawyer use an e-mail service provider that scans e-mails by computer for keywords and then sends or displays instantaneously (to the side of the e-mails in question) computer-generated advertisements to users of the service based on the e-mail communications?” The New York State Bar Association Committee on Professional Ethics, Opinion 820-2/08/08
  • 28. ANSWER: “Unless the lawyer learns information suggesting that the provider is materially departing from conventional privacy policies or is using the information it obtains by computer-scanning of e-mails for a purpose that, unlike computer-generated advertising, puts confidentiality at risk, the use of such e-mail services comports with DR 4-101…A lawyer may use an e-mail service provider that conducts computer scans of e-mails to generate computer advertising, where the e-mails are not reviewed by or provided to other individuals.”
  • 29. QUESTION: The question addressed in this opinion is whether a lawyer violates SCR 156 by storing confidential client information and/or communications, without client consent, in an electronic format on a server or other device that is not exclusively in the lawyer’s control. State Bar of Nevada Standing Committee on Ethics and Professional Responsibility, Formal Opinion No. 33
  • 30. ANSWER: In order to comply with the rule, the lawyer must act competently and reasonably to safeguard confidential client information and communications from inadvertent and unauthorized disclosure. This may be accomplished while storing client information electronically with a third party to the same extent and subject to the same standards as with storing confidential paper files in a third party warehouse. If the lawyer acts competently and reasonably to ensure the confidentiality of the information, then he or she does not violate SCR 156 simply by contracting with a third party to store the information, even if an unauthorized or inadvertent disclosure should occur... The ABA Committee addressed an issue much closer to that discussed here in Formal Opinion number 95-398, and concluded that a lawyer may give a computer maintenance company access to confidential information in client files, but that in order to comply with the obligation of client confidentiality, he or she “must make reasonable efforts to ensure that the company has in place, or will establish, reasonable procedures to protect the confidentiality of client information.”
  • 31. 4th Amendment issues In a decision issued by the United States District Court, District of Oregon Opinion and Order in In re: US, Nos. 08-9131-MC, 08-9147-MC, (2009), the government successfully argued that it need not notify the account holder regarding a warrant that is served upon the ISP holder of the email account (gmail). In reaching its decision, the court gave lip service to the concept that emails are entitled to Fourth Amendment protection, but then stated: “Much of the reluctance to apply traditional notions of third party disclosure to the e-mail context seems to stem from a fundamental misunderstanding of the lack of privacy we all have in our e-mails. Some people seem to think that they are as private as letters, phone calls, or journal entries. The blunt fact is, they are not.”
  • 32. In comparison, however, see footnote 7 from the October 2009 Memorandum and Order issued by the United States District Court, Eastern District of New York, in US v. Cioffi, Case No. 08-CR-415 (FB): One preliminary matter is not in question: The government does not dispute that Tannin has a reasonable expectation of privacy in the contents of his personal email account. See United States v. Zavala, 541 F.3d 562,577 (5th Cir. 2008) ("[C]ell phones contain a wealth of private information, including emails, text messages, call histories, address books, and subscriber numbers. [The defendant] had a reasonable expectation of privacy regarding this information."); United States v. Forrester, 512 F.3d 500, 511 (9th Cir. 2008) ("E-mail, like physical mail, has an outside address 'visible' to the third-party carriers that transmit it to its intended location, and also a package of content that the sender presumes will be read only by the intended recipient. The privacy interests in these two forms of communication are identical. The contents may deserve Fourth Amendment protection, but the address and size of the package do not.").
  • 33. Security issues to consider: 1. Encryption 2. Geo-redundancy 3. Data back ups 4. Extraction of data
  • 34. What questions should you ask cloud providers?
  • 35. • What type of facility will host the data? • Who else has access to the cloud facility, the servers and the data and what mechanisms are in place to ensure that only authorized personnel will be able to access your data? How does the vendor screen its employees? If the vendor doesn’t own the data center, how does the data center screen its employees? • Does the contract include terms that limit data access by the vendor’s employees to only those situations where you request assistance? For full list see: http://bit.ly/hyFBxo
  • 36. • Does the contract address confidentiality? If not, is the vendor willing to sign a confidentiality agreement? • How frequently are back-ups performed? How are you able to verify that backups are being performed as promised? • Is data backed up to more than one server? Where are the respective servers located? Will your data, and any back up copies of it, always stay within the boundaries of the United States? • How secure are the data centers where the servers are housed? • What types of encryption methods are used and how are passwords stored? Is your data encrypted while in transit or only when in storage? For full list see: http://bit.ly/hyFBxo
  • 37. • Has a third party, such as McAfee, evaluated or tested the vendor’s security measures to assess the strength of, among other things, firewalls, encryption techniques, and intrusion detection systems? Are the audits of the security system available for your review? • Are there redundant power supplies for the servers? • Does the contract include a guarantee of uptime? How much uptime? What happens in the event that the servers are down? Will you be compensated if there is an unexpected period of downtime that exceeds the amount set forth in the agreement? • If a natural disaster strikes one geographic region, would all data be lost? Are there geo-redundant back ups? For full list see: http://bit.ly/hyFBxo
  • 38. • What remedies does the contract provide? Are consequential damages included? Are total damages capped or are specific remedies limited? • Does the agreement contain a forum selection clause? How about a mandatory arbitration clause? • If there is a data breach, will you be notified? How are costs for remedying the breach allocated? • What rights do you have upon termination? Does the contract contain terms that require the vendor to assist you in transitioning from their system to another? • What rights do you have in the event of a billing or similar dispute with the vendor? Do you have the option of having your data held in escrow by a third party, so that it is fully accessible in the event of a dispute? Alternatively can you back up your data locally so that it is accessible to you should you need it? • Does the provider carry cyber insurance? If so, what does it cover? What are the coverage limits? For full list see: http://bit.ly/hyFBxo
  • 41. Thanks for listening! Nicole Black Of Counsel, Fiandach & Fiandach Founder of lawtechTalk www.nicoleblackesq.com Social Media for Lawyers: the Next Frontier published by the ABA in July 2010 (http://bit.ly/socmed4lawyersbook) Cloud Computing for Lawyers to be published by the ABA in May 2011

Notas del editor

  1. \n
  2. Today: 1) why CC and mobile tech matters 2) what CC is 3) ethical and security issues.\n\nBottom line--CC is the future. For some firms, the current tech and security may be insufficient, but that will change quickly. Learn about it, understand it and position your firm for the future. \n
  3. Information is changing--we must rethink “information”--be curious\n
  4. Explore the benefits. Balance the risks. Be curious.\n\n
  5. \n
  6. \n
  7. \n
  8. \nSimple definition of CC: data/software stored on someone else’s server.\n
  9. \n
  10. Mobile tech in the legal field is a given--after all lawyers were crackberry addicts before anyone else. So let’s talk about cloud computing.\n
  11. \n
  12. \n
  13. \n
  14. Legal specific apps (prac man, billing, doc management) and general apps (google apps, dropbox).\n
  15. Legal specific apps (prac man, billing, doc management) and general apps (google apps, dropbox).\n
  16. Ethics and security seems to be a thorny maze of issues.\n
  17. \n
  18. \n
  19. \n
  20. ABA Ethics 20/20--my take--can’t be tasked with supervising them re: their tech skills.\n
  21. \n
  22. \n
  23. \n
  24. Note: Gmail language re: free email. Option is to use Google Apps--$50 per user per month.\n
  25. \n
  26. \n
  27. Electronic Communications Privacy Act (ECPA)--no significant revisions since 1986\n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n