Enviar búsqueda
Cargar
Does Cloud Computing Compromise Clients?
•
0 recomendaciones
•
394 vistas
Nicole Black
Seguir
Empresariales
Empleo
Denunciar
Compartir
Denunciar
Compartir
1 de 1
Descargar ahora
Descargar para leer sin conexión
Recomendados
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Nicole Black
Digital inheritance final
Digital inheritance final
Priyaranjan Mestri
Electronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principles
Caroline B Ncube
Whitt a deference to protocol revised journal draft december 2012 120612
Whitt a deference to protocol revised journal draft december 2012 120612
rswhitt1
Cr4 tpp fgv
Cr4 tpp fgv
Carolina Rossini
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
Carolina Rossini
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issues
Lilian Edwards
My DocSafe white paper 1
My DocSafe white paper 1
danielstachowiak
Recomendados
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Nicole Black
Digital inheritance final
Digital inheritance final
Priyaranjan Mestri
Electronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principles
Caroline B Ncube
Whitt a deference to protocol revised journal draft december 2012 120612
Whitt a deference to protocol revised journal draft december 2012 120612
rswhitt1
Cr4 tpp fgv
Cr4 tpp fgv
Carolina Rossini
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
Carolina Rossini
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issues
Lilian Edwards
My DocSafe white paper 1
My DocSafe white paper 1
danielstachowiak
Visibility and digital art: Blockchain as an ownership layer on the Internet
Visibility and digital art: Blockchain as an ownership layer on the Internet
eraser Juan José Calderón
Building Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
Ritesh Nayak
Sarah Jamieson_corrections
Sarah Jamieson_corrections
Sarah Jamieson
Internet Jurisdiction Primer
Internet Jurisdiction Primer
Graham Smith
Norton scientific news
Norton scientific news
sheltonwaltz
MongoDB Blockchain
MongoDB Blockchain
Mark Kershaw
WIPO: What are Internet Intermediaries and their various types?
WIPO: What are Internet Intermediaries and their various types?
Shane Coughlan
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law Center
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
cscpconf
Ecommerce legal exchange beijing
Ecommerce legal exchange beijing
Internet Law Center
Access to Electronic Communications of Government Officials in the 50 States
Access to Electronic Communications of Government Officials in the 50 States
Umesh Heendeniya
Forensic data investigations in China
Forensic data investigations in China
Enterprise Security Risk Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
Internet Law Center
P14 towards using blockchain technology for e health
P14 towards using blockchain technology for e health
devid8
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure Laws
Brian Honan
Sookman justice canada_keynote
Sookman justice canada_keynote
bsookman
Blog Wars at New Media Expo
Blog Wars at New Media Expo
Internet Law Center
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
anthonywong
Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2
Matthew MacNabb
Cloud computing legal issues
Cloud computing legal issues
Adv Prashant Mali
2001 What Affects Reputation
2001 What Affects Reputation
Ana ADI
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Nicole Black
Más contenido relacionado
La actualidad más candente
Visibility and digital art: Blockchain as an ownership layer on the Internet
Visibility and digital art: Blockchain as an ownership layer on the Internet
eraser Juan José Calderón
Building Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
Ritesh Nayak
Sarah Jamieson_corrections
Sarah Jamieson_corrections
Sarah Jamieson
Internet Jurisdiction Primer
Internet Jurisdiction Primer
Graham Smith
Norton scientific news
Norton scientific news
sheltonwaltz
MongoDB Blockchain
MongoDB Blockchain
Mark Kershaw
WIPO: What are Internet Intermediaries and their various types?
WIPO: What are Internet Intermediaries and their various types?
Shane Coughlan
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law Center
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
cscpconf
Ecommerce legal exchange beijing
Ecommerce legal exchange beijing
Internet Law Center
Access to Electronic Communications of Government Officials in the 50 States
Access to Electronic Communications of Government Officials in the 50 States
Umesh Heendeniya
Forensic data investigations in China
Forensic data investigations in China
Enterprise Security Risk Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
Internet Law Center
P14 towards using blockchain technology for e health
P14 towards using blockchain technology for e health
devid8
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure Laws
Brian Honan
Sookman justice canada_keynote
Sookman justice canada_keynote
bsookman
Blog Wars at New Media Expo
Blog Wars at New Media Expo
Internet Law Center
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
anthonywong
Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2
Matthew MacNabb
Cloud computing legal issues
Cloud computing legal issues
Adv Prashant Mali
La actualidad más candente
(20)
Visibility and digital art: Blockchain as an ownership layer on the Internet
Visibility and digital art: Blockchain as an ownership layer on the Internet
Building Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
Sarah Jamieson_corrections
Sarah Jamieson_corrections
Internet Jurisdiction Primer
Internet Jurisdiction Primer
Norton scientific news
Norton scientific news
MongoDB Blockchain
MongoDB Blockchain
WIPO: What are Internet Intermediaries and their various types?
WIPO: What are Internet Intermediaries and their various types?
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
Ecommerce legal exchange beijing
Ecommerce legal exchange beijing
Access to Electronic Communications of Government Officials in the 50 States
Access to Electronic Communications of Government Officials in the 50 States
Forensic data investigations in China
Forensic data investigations in China
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
P14 towards using blockchain technology for e health
P14 towards using blockchain technology for e health
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure Laws
Sookman justice canada_keynote
Sookman justice canada_keynote
Blog Wars at New Media Expo
Blog Wars at New Media Expo
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2
Cloud computing legal issues
Cloud computing legal issues
Destacado
2001 What Affects Reputation
2001 What Affects Reputation
Ana ADI
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Nicole Black
Global Marine Renewable Energy Presentation
Global Marine Renewable Energy Presentation
Carolyn Elefant
Cake recipe
Cake recipe
Sara
Cooperative federalism and energy law
Cooperative federalism and energy law
Carolyn Elefant
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011
Nicole Black
Los derechos son de todos
Los derechos son de todos
CCEIP Campo de Borja
Scratch!1
Scratch!1
Babita Baruah
Jornada Inter universitaria TICs y Data Center 2015
Jornada Inter universitaria TICs y Data Center 2015
Gonzalo Espinosa
Digtial citizenship
Digtial citizenship
Jackie Gerstein, Ed.D
Destacado
(10)
2001 What Affects Reputation
2001 What Affects Reputation
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Global Marine Renewable Energy Presentation
Global Marine Renewable Energy Presentation
Cake recipe
Cake recipe
Cooperative federalism and energy law
Cooperative federalism and energy law
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011
Los derechos son de todos
Los derechos son de todos
Scratch!1
Scratch!1
Jornada Inter universitaria TICs y Data Center 2015
Jornada Inter universitaria TICs y Data Center 2015
Digtial citizenship
Digtial citizenship
Similar a Does Cloud Computing Compromise Clients?
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Tim Hsieh
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
iFour Technolab Pvt. Ltd.
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
International Journal of Science and Research (IJSR)
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
Nicole Black
Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017
Ian Beckett
Introduction1 On a warm summer evening in Northeast Ohio, .docx
Introduction1 On a warm summer evening in Northeast Ohio, .docx
vrickens
Cloud
Cloud
alberto0
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
CloudMask inc.
Electronic evidence
Electronic evidence
Ronak Karanpuria
identifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docx
mckerliejonelle
INFOGRAPHIC: Legal Technology Timeline
INFOGRAPHIC: Legal Technology Timeline
Liquid Litigation Management
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Tom Kulik
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocol
Afnic
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...
IJERA Editor
Fourth amendment cloud darren chaker
Fourth amendment cloud darren chaker
Darren Chaker
Legal issues in technology
Legal issues in technology
EzraGray1
Keynote on Future of Legal Services Delivery
Keynote on Future of Legal Services Delivery
Stephanie Kimbro Dolin
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
Nicole Black
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
Robert Ambrogi
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)
Chad Gilles
Similar a Does Cloud Computing Compromise Clients?
(20)
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017
Introduction1 On a warm summer evening in Northeast Ohio, .docx
Introduction1 On a warm summer evening in Northeast Ohio, .docx
Cloud
Cloud
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
Electronic evidence
Electronic evidence
identifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docx
INFOGRAPHIC: Legal Technology Timeline
INFOGRAPHIC: Legal Technology Timeline
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocol
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...
Fourth amendment cloud darren chaker
Fourth amendment cloud darren chaker
Legal issues in technology
Legal issues in technology
Keynote on Future of Legal Services Delivery
Keynote on Future of Legal Services Delivery
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)
Más de Nicole Black
Women in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessage
Nicole Black
Social Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for Lawyers
Nicole Black
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law Practice
Nicole Black
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyers
Nicole Black
Social media marketing 2015
Social media marketing 2015
Nicole Black
Florida social media
Florida social media
Nicole Black
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social media
Nicole Black
Point1 law
Point1 law
Nicole Black
Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2
Nicole Black
Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1
Nicole Black
Lawyers Collective Milkshake Mistake
Lawyers Collective Milkshake Mistake
Nicole Black
Technology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast Speeds
Nicole Black
Legal Technology: Change is Good
Legal Technology: Change is Good
Nicole Black
Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers
Nicole Black
Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!
Nicole Black
6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media
Nicole Black
Más de Nicole Black
(16)
Women in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessage
Social Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for Lawyers
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law Practice
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyers
Social media marketing 2015
Social media marketing 2015
Florida social media
Florida social media
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social media
Point1 law
Point1 law
Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1
Lawyers Collective Milkshake Mistake
Lawyers Collective Milkshake Mistake
Technology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast Speeds
Legal Technology: Change is Good
Legal Technology: Change is Good
Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers
Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!
6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media
Último
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Rakhi Bazaar
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
ssuserf63bd7
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
ASGITConsulting
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
SOFTTECHHUB
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
KnowledgeSeed
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
elgieurope
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
Operational Excellence Consulting
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
Exhibitors Data
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
One Monitar
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
Peter Ward
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Aggregage
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
Shaun Heinrichs
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
JamesConcepcion7
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
NZSG
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
mbikashkanyari
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
HajeJanKamps
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
Western Alaska Minerals Corp.
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
cathy664059
Cyber Security Training in Office Environment
Cyber Security Training in Office Environment
elijahj01012
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
WhittensFineJewelry1
Último
(20)
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
Cyber Security Training in Office Environment
Cyber Security Training in Office Environment
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Does Cloud Computing Compromise Clients?
1.
Monday, November 9,
2009 THE DAILY RECORD WESTERN NEW YORK’S SOURCE FOR LAW, REAL ESTATE, FINANCE AND GENERAL INTELLIGENCE SINCE 1908 Does cloud computing compromise clients? I predict that within about two to three years, lawyers in most mit it to its intended location, and also a package of content jurisdictions will communicate and collaborate with clients that the sender presumes will be read only by the intended using some type of an encrypted network. recipient. The privacy interests in these two forms of commu- A number of states, including Massachusetts and Nevada, nication are identical. The contents may deserve Fourth already have passed laws or regulations requiring certain types Amendment protection, but the address and size of the pack- of confidential data to be sent electronically only via encrypted age do not.’).” communications. More laws of that nature most cer- Accordingly, despite the fact the dicta in the Oregon tainly will follow, both at the state and federal level. decision flies in the face of binding precedent, online In my opinion, such laws — most of which apply commentators repeatedly raised concerns regarding primarily to financial institutions — ultimately will the decision, asserting it was further evidence that the incorporate some of the types of client information use of cloud computing in law practices is ill-advised. contained in attorney-client communications, in I would assert to the contrary the Oregon dicta is fur- large part because of rising concerns due to recent ther evidence that the incorporation of encrypted client large-scale data disclosures. communications in cloud computing may well be the In fact, that type of data breach is one of the pri- primary factor that convinces attorneys to accept cloud mary reservations expressed by lawyers when consid- computing services as a legitimate law practice man- ering whether to implement cloud computing plat- agement alternative to traditional software packages. forms in their law practice. A number of well-established cloud computing A recent federal court decision fanned the fire, providers already incorporate encrypted communica- causing many attorneys to decry the use of cloud By NICOLE BLACK tions in their platforms. For example, VLOTech, Clio computing and assert that doing so violated the very and NetDocuments allow for varying types of encrypted basic obligation to protect confidential client com- Daily Record communication with clients. Another online legal plat- Columnist form, NKrypt, is devoted to providing a secure, munications and data. In a decision issued last week by the U.S. District Court for encrypted e-mail network. District of Oregon, in In re U.S., Nos. 08-9131-MC, 08-9147- Cloud computing providers are adapting quickly to and MC, the government argued successfully that it need not notify responding to the concerns raised by lawyers. As a result, the account holder regarding a warrant served on the ISP holder lawyers are becoming increasingly comfortable with the con- of the e-mail account. In reaching its decision, the court gave lip cept of cloud computing. In fact, according to the 2009 Am service to the concept that e-mails are entitled to Fourth Amend- Law Tech Survey, 84 percent of responding law firms already ment protections, but then stated: “Much of the reluctance to use SaaS (Software as a Service), a form of cloud computing, apply traditional notions of third-party disclosure to the e-mail in some capacity. context seems to stem from a fundamental misunderstanding of As cloud computing becomes more prevalent in the legal the lack of privacy we all have in our e-mails. Some people seem field, more lawyers will understand the importance of care- to think that they are as private as letters, phone calls, or journal fully negotiating their contracts with the services providers to entries. The blunt fact is, they are not.” ensure that, for example, they are notified if a warrant relating In comparison, however, see footnote 7 from the October to their data is served. Memorandum and Order issued by the U.S. District Court, Mark my words: Cloud computing is the wave of the future, Eastern District of New York, in U.S. v. Cioffi: “One prelimi- and encrypted communication is one of the keys to putting attor- nary matter is not in question: The government does not dis- ney’s minds at ease re- garding an emerging technology. Astute pute that Tannin has a reasonable expectation of privacy in the providers will incorporate encrypted communication into their contents of his personal e-mail account.” See U.S. v. Zavala, platforms, and smart lawyers will learn about and use the emerg- 541 F3d 562,577 (Fifth Circuit 2008) (‘[C]ell phones contain ing technology in their practice. a wealth of private information, including emails, text mes- sages, call histories, address books, and subscriber numbers. Nicole Black is of counsel to Fiandach and Fiandach and is [The defendant] had a reasonable expectation of privacy the founder of lawtechTalk.com, which offers legal technology regarding this information.’); U.S. v. Forrester, 512 F3d 500, consulting services, and publishes four legal blogs, one of which is 511 (Ninth Circuit 2008) (‘E-mail, like physical mail, has an Practicing Law in the 21st Century (http://21stcenturylaw.word outside address ‘visible’ to the third-party carriers that trans- press.com). She may be reached at nblack@nicoleblackesq.com. Reprinted with permission of The Daily Record ©2009
Descargar ahora