SlideShare una empresa de Scribd logo
1 de 35
Cloud computing & your law practice

                                        Nicole Black
                                    Founder of lawtechTalk
                                     www.lawtechtalk.com




Sunday, November 15, 2009
Sunday, November 15, 2009
What is cloud computing and why
                  should you care?
Sunday, November 15, 2009
Sunday, November 15, 2009
Cloud computing is a “type of computing that is comparable to grid
                    computing, relies on sharing computing resources rather than having local
                    servers or personal devices to handle applications. The goal of cloud
                    computing is to apply traditional supercomputing power (normally used by
                    military and research facilities) to perform tens of trillions of computations per
                    second.”




Sunday, November 15, 2009
Cloud computing is a “type of computing that is comparable to grid
                    computing, relies on sharing computing resources rather than having local
                    servers or personal devices to handle applications. The goal of cloud
                    computing is to apply traditional supercomputing power (normally used by
                    military and research facilities) to perform tens of trillions of computations per
                    second.”

                             Software as a service —or SaaS —is “[a] software delivery
                             model in which a software firm provides daily technical
                             operation, maintenance, and support for the software
                             provided to their client.”




Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
A fundamentalist is a person
                            who considers whether a fact is
                            acceptable to their faith before
                            they explore it. As opposed to
                            a curious person who explores
                            first and then considers
                            whether or not they want to
                            accept the ramifications.
                               --Seth Godin




Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
Ethical issues to consider:

                
 A. Attorney client confidentiality
                
                
 B.
Compare/contrast to traditional outsourcing relationships

                
 C.
Transborder data flow
                
                
 D.
Meeting obligations of “reasonable” security
                
                
 E.
Electronic evidence/e-discovery




Sunday, November 15, 2009
QUESTION

               “May a lawyer use an e-mail service provider that scans
               e-mails by computer for keywords and then sends or
               displays instantaneously (to the side of the e-mails in
               question) computer-generated advertisements to users of
               the service based on the e-mail communications?”

                       The New York State Bar Association Committee on Professional Ethics, Opinion
                                                       820-2/08/08




Sunday, November 15, 2009
ANSWER

               “Unless the lawyer learns information suggesting that
               the provider is materially departing from conventional
               privacy policies or is using the information it obtains by
               computer-scanning of e-mails for a purpose that,unlike
               computer-generated advertising, puts confidentiality at
               risk, the use of such e-mail services comports with DR
               4-101…A lawyer may use an e-mail service provider
               that conducts computer scans of e-mails to generate
               computer advertising, where the e-mails are not
               reviewed by or provided to other individuals.”



Sunday, November 15, 2009
QUESTION

               The question addressed in this opinion is whether a lawyer violates SCR 156
               by storing confidential client information and/or communications, without
               client consent, in an electronic format on a server or other device that is not
               exclusively in the lawyer’s control.



                                                   ANSWER

               In order to comply with the rule, the lawyer must act competently and
               reasonably to safeguard confidential client information and communications
               from inadvertent and unauthorized disclosure. This may be accomplished
               while storing client information electronically with a third party to the same
               extent and subject to the same standards as with storing confidential paper
               files in a third party warehouse. If the lawyer acts competently and
               reasonably to ensure the confidentiality of the information, then he or she
               does not violate SCR 156 simply by contracting with a third party to store the
               information, even if an unauthorized or inadvertent disclosure should occur.


Sunday, November 15, 2009
The ABA Committee addressed an issue much closer to that discussed here
               in Formal Opinion number 95-398, and concluded that a lawyer may give a
               computer maintenance company access to confidential information in client
               files, but that in order to comply with the obligation of client confidentiality, he
               or she “must make reasonable efforts to ensure that the company has in
               place, or will establish, reasonable procedures to protect the confidentiality
               of client information.”

                 State Bar of Nevada Standing Committee on Ethics and Professional Responsibility, Formal Opinion
                                                            No. 33




Sunday, November 15, 2009
In a decision issued last week by the United States District Court, District of
               Oregon Opinion and Order in In re: US, Nos. 08-9131-MC, 08-9147-MC, the
               government successfully argued that it need not notify the account holder
               regarding a warrant that is served upon the ISP holder of the email account
               (gmail). In reaching its decision, the court gave lip service to the concept that
               emails are entitled to Fourth Amendment protection, but then stated:

               “Much of the reluctance to apply traditional notions of third party disclosure to
               the e-mail context seems to stem from a fundamental misunderstanding of the
               lack of privacy we all have in our e-mails. Some people seem to think that they




Sunday, November 15, 2009
In comparison, however, see footnote 7 from the October 2009 Memorandum
               and Order issued by the United States District Court, Eastern District of New
               York, in US v. Cioffi: “One preliminary matter is not in question: The
               government does not dispute that Tannin has a reasonable expectation of privacy
               in the contents of his personal email account. See United States v. Zavala, 541 F.
               3d 562,577 (5th Cir. 2008) ("[C]ell phones contain a wealth of private
               information, including emails, text messages, call histories, address books, and
               subscriber numbers. [The defendant] had a reasonable expectation of privacy
               regarding this information."); United States v. Forrester, 512 F.3d 500, 511 (9th
               Cir. 2008) ("E-mail, like physical mail, has an outside address 'visible' to the
               third-party carriers that transmit it to its intended location, and also a package of
               content that the sender presumes will be read only by the intended recipient. The
               privacy interests in these two forms of communication are identical. The
               contents may deserve Fourth Amendment protection, but the address and size of
               the package do not.").”




Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
1. Encryption
                            2. Geo-redundancy
                            3. Data back ups
                            4. Extraction of data




Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009
Sunday, November 15, 2009

Más contenido relacionado

La actualidad más candente

Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Tom Kulik
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
The Legality of Electronic Signatures
The Legality of Electronic SignaturesThe Legality of Electronic Signatures
The Legality of Electronic SignaturesDocuSign
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoTnsangary
 
CLE Webinar: eSignature, an overview of legal validity and case law
CLE Webinar: eSignature, an overview of legal validity and case lawCLE Webinar: eSignature, an overview of legal validity and case law
CLE Webinar: eSignature, an overview of legal validity and case lawDocuSign
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeRobert Ambrogi
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...Robert Ambrogi
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeAhmed Banafa
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanismGanesh Chindanuru
 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsSimon Moffatt
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingAmy Larrimore
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 

La actualidad más candente (20)

Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
The Legality of Electronic Signatures
The Legality of Electronic SignaturesThe Legality of Electronic Signatures
The Legality of Electronic Signatures
 
Compliance & Value of Digital Signatures
Compliance & Value of Digital SignaturesCompliance & Value of Digital Signatures
Compliance & Value of Digital Signatures
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
CLE Webinar: eSignature, an overview of legal validity and case law
CLE Webinar: eSignature, an overview of legal validity and case lawCLE Webinar: eSignature, an overview of legal validity and case law
CLE Webinar: eSignature, an overview of legal validity and case law
 
Cloud
CloudCloud
Cloud
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the Hype
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security Concerns
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud Computing
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 

Destacado

Florida social media
Florida social mediaFlorida social media
Florida social mediaNicole Black
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015Nicole Black
 
6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social MediaNicole Black
 
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersThe ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersNicole Black
 
Social Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersSocial Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersNicole Black
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeNicole Black
 

Destacado (6)

Florida social media
Florida social mediaFlorida social media
Florida social media
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015
 
6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media
 
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersThe ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyers
 
Social Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersSocial Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for Lawyers
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law Practice
 

Similar a Cloud Computing Benefits Law Practices

Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersRobert Ambrogi
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Logikcull.com
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Current Ethical Issues for Legal Professionals.ppt
Current Ethical Issues for Legal Professionals.pptCurrent Ethical Issues for Legal Professionals.ppt
Current Ethical Issues for Legal Professionals.pptVidyaAdsule1
 
Ethics and our Electronic Toys
Ethics and our Electronic Toys Ethics and our Electronic Toys
Ethics and our Electronic Toys Kevin O'Shea
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
Aba gp solo magazine schumann technology article-20160319_as published
Aba gp solo magazine   schumann technology article-20160319_as publishedAba gp solo magazine   schumann technology article-20160319_as published
Aba gp solo magazine schumann technology article-20160319_as publishedRalph Schumann
 
Legal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud ServiceLegal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud Servicesubtitle
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller SolicitorBrian Miller, Solicitor
 
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
ACEDS-Recommind 1-28-15 Webcast Slides
ACEDS-Recommind 1-28-15 Webcast SlidesACEDS-Recommind 1-28-15 Webcast Slides
ACEDS-Recommind 1-28-15 Webcast SlidesLogikcull.com
 
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Chad Gilles
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentAubrey Owens
 
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfSecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingNicole Black
 

Similar a Cloud Computing Benefits Law Practices (20)

Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Current Ethical Issues for Legal Professionals.ppt
Current Ethical Issues for Legal Professionals.pptCurrent Ethical Issues for Legal Professionals.ppt
Current Ethical Issues for Legal Professionals.ppt
 
Ethics and our Electronic Toys
Ethics and our Electronic Toys Ethics and our Electronic Toys
Ethics and our Electronic Toys
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Cloud security - Publication
Cloud security - Publication Cloud security - Publication
Cloud security - Publication
 
Aba gp solo magazine schumann technology article-20160319_as published
Aba gp solo magazine   schumann technology article-20160319_as publishedAba gp solo magazine   schumann technology article-20160319_as published
Aba gp solo magazine schumann technology article-20160319_as published
 
Legal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud ServiceLegal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud Service
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
 
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
 
ACEDS-Recommind 1-28-15 Webcast Slides
ACEDS-Recommind 1-28-15 Webcast SlidesACEDS-Recommind 1-28-15 Webcast Slides
ACEDS-Recommind 1-28-15 Webcast Slides
 
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)
 
Cyber
CyberCyber
Cyber
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfSecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
 

Más de Nicole Black

Women in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessageWomen in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessageNicole Black
 
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaiPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaNicole Black
 
Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2Nicole Black
 
Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1Nicole Black
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011Nicole Black
 
Lawyers Collective Milkshake Mistake
Lawyers Collective Milkshake MistakeLawyers Collective Milkshake Mistake
Lawyers Collective Milkshake MistakeNicole Black
 
Technology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast SpeedsTechnology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast SpeedsNicole Black
 
Legal Technology: Change is Good
Legal Technology: Change is GoodLegal Technology: Change is Good
Legal Technology: Change is GoodNicole Black
 
Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers Nicole Black
 
Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!Nicole Black
 

Más de Nicole Black (11)

Women in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessageWomen in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessage
 
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaiPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social media
 
Point1 law
Point1 lawPoint1 law
Point1 law
 
Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2
 
Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011
 
Lawyers Collective Milkshake Mistake
Lawyers Collective Milkshake MistakeLawyers Collective Milkshake Mistake
Lawyers Collective Milkshake Mistake
 
Technology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast SpeedsTechnology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast Speeds
 
Legal Technology: Change is Good
Legal Technology: Change is GoodLegal Technology: Change is Good
Legal Technology: Change is Good
 
Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers
 
Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!
 

Último

Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 

Último (20)

Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 

Cloud Computing Benefits Law Practices

  • 1. Cloud computing & your law practice Nicole Black Founder of lawtechTalk www.lawtechtalk.com Sunday, November 15, 2009
  • 3. What is cloud computing and why should you care? Sunday, November 15, 2009
  • 5. Cloud computing is a “type of computing that is comparable to grid computing, relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of cloud computing is to apply traditional supercomputing power (normally used by military and research facilities) to perform tens of trillions of computations per second.” Sunday, November 15, 2009
  • 6. Cloud computing is a “type of computing that is comparable to grid computing, relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of cloud computing is to apply traditional supercomputing power (normally used by military and research facilities) to perform tens of trillions of computations per second.” Software as a service —or SaaS —is “[a] software delivery model in which a software firm provides daily technical operation, maintenance, and support for the software provided to their client.” Sunday, November 15, 2009
  • 10. A fundamentalist is a person who considers whether a fact is acceptable to their faith before they explore it. As opposed to a curious person who explores first and then considers whether or not they want to accept the ramifications. --Seth Godin Sunday, November 15, 2009
  • 17. Ethical issues to consider: A. Attorney client confidentiality B. Compare/contrast to traditional outsourcing relationships C. Transborder data flow D. Meeting obligations of “reasonable” security E. Electronic evidence/e-discovery Sunday, November 15, 2009
  • 18. QUESTION “May a lawyer use an e-mail service provider that scans e-mails by computer for keywords and then sends or displays instantaneously (to the side of the e-mails in question) computer-generated advertisements to users of the service based on the e-mail communications?” The New York State Bar Association Committee on Professional Ethics, Opinion 820-2/08/08 Sunday, November 15, 2009
  • 19. ANSWER “Unless the lawyer learns information suggesting that the provider is materially departing from conventional privacy policies or is using the information it obtains by computer-scanning of e-mails for a purpose that,unlike computer-generated advertising, puts confidentiality at risk, the use of such e-mail services comports with DR 4-101…A lawyer may use an e-mail service provider that conducts computer scans of e-mails to generate computer advertising, where the e-mails are not reviewed by or provided to other individuals.” Sunday, November 15, 2009
  • 20. QUESTION The question addressed in this opinion is whether a lawyer violates SCR 156 by storing confidential client information and/or communications, without client consent, in an electronic format on a server or other device that is not exclusively in the lawyer’s control. ANSWER In order to comply with the rule, the lawyer must act competently and reasonably to safeguard confidential client information and communications from inadvertent and unauthorized disclosure. This may be accomplished while storing client information electronically with a third party to the same extent and subject to the same standards as with storing confidential paper files in a third party warehouse. If the lawyer acts competently and reasonably to ensure the confidentiality of the information, then he or she does not violate SCR 156 simply by contracting with a third party to store the information, even if an unauthorized or inadvertent disclosure should occur. Sunday, November 15, 2009
  • 21. The ABA Committee addressed an issue much closer to that discussed here in Formal Opinion number 95-398, and concluded that a lawyer may give a computer maintenance company access to confidential information in client files, but that in order to comply with the obligation of client confidentiality, he or she “must make reasonable efforts to ensure that the company has in place, or will establish, reasonable procedures to protect the confidentiality of client information.” State Bar of Nevada Standing Committee on Ethics and Professional Responsibility, Formal Opinion No. 33 Sunday, November 15, 2009
  • 22. In a decision issued last week by the United States District Court, District of Oregon Opinion and Order in In re: US, Nos. 08-9131-MC, 08-9147-MC, the government successfully argued that it need not notify the account holder regarding a warrant that is served upon the ISP holder of the email account (gmail). In reaching its decision, the court gave lip service to the concept that emails are entitled to Fourth Amendment protection, but then stated: “Much of the reluctance to apply traditional notions of third party disclosure to the e-mail context seems to stem from a fundamental misunderstanding of the lack of privacy we all have in our e-mails. Some people seem to think that they Sunday, November 15, 2009
  • 23. In comparison, however, see footnote 7 from the October 2009 Memorandum and Order issued by the United States District Court, Eastern District of New York, in US v. Cioffi: “One preliminary matter is not in question: The government does not dispute that Tannin has a reasonable expectation of privacy in the contents of his personal email account. See United States v. Zavala, 541 F. 3d 562,577 (5th Cir. 2008) ("[C]ell phones contain a wealth of private information, including emails, text messages, call histories, address books, and subscriber numbers. [The defendant] had a reasonable expectation of privacy regarding this information."); United States v. Forrester, 512 F.3d 500, 511 (9th Cir. 2008) ("E-mail, like physical mail, has an outside address 'visible' to the third-party carriers that transmit it to its intended location, and also a package of content that the sender presumes will be read only by the intended recipient. The privacy interests in these two forms of communication are identical. The contents may deserve Fourth Amendment protection, but the address and size of the package do not.").” Sunday, November 15, 2009
  • 29. 1. Encryption 2. Geo-redundancy 3. Data back ups 4. Extraction of data Sunday, November 15, 2009