SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
Monday, November 9, 2009



THE DAILY RECORD
         WESTERN NEW YORK’S SOURCE FOR LAW, REAL ESTATE, FINANCE AND GENERAL INTELLIGENCE SINCE 1908



Does cloud computing compromise clients?
   I predict that within about two to three years, lawyers in most mit it to its intended location, and also a package of content
jurisdictions will communicate and collaborate with clients that the sender presumes will be read only by the intended
using some type of an encrypted network.                                recipient. The privacy interests in these two forms of commu-
   A number of states, including Massachusetts and Nevada, nication are identical. The contents may deserve Fourth
already have passed laws or regulations requiring certain types Amendment protection, but the address and size of the pack-
of confidential data to be sent electronically only via encrypted age do not.’).”
communications. More laws of that nature most cer-                                   Accordingly, despite the fact the dicta in the Oregon
tainly will follow, both at the state and federal level.                         decision flies in the face of binding precedent, online
   In my opinion, such laws — most of which apply                                commentators repeatedly raised concerns regarding
primarily to financial institutions — ultimately will                            the decision, asserting it was further evidence that the
incorporate some of the types of client information                              use of cloud computing in law practices is ill-advised.
contained in attorney-client communications, in                                      I would assert to the contrary the Oregon dicta is fur-
large part because of rising concerns due to recent                              ther evidence that the incorporation of encrypted client
large-scale data disclosures.                                                    communications in cloud computing may well be the
   In fact, that type of data breach is one of the pri-                          primary factor that convinces attorneys to accept cloud
mary reservations expressed by lawyers when consid-                              computing services as a legitimate law practice man-
ering whether to implement cloud computing plat-                                 agement alternative to traditional software packages.
forms in their law practice.                                                         A number of well-established cloud computing
   A recent federal court decision fanned the fire,                               providers already incorporate encrypted communica-
causing many attorneys to decry the use of cloud By NICOLE    BLACK
                                                                                  tions in their platforms. For example, VLOTech, Clio
computing and assert that doing so violated the very                              and NetDocuments allow for varying types of encrypted
basic obligation to protect confidential client com- Daily Record                 communication with clients. Another online legal plat-
                                                              Columnist           form, NKrypt, is devoted to providing a secure,
munications and data.
   In a decision issued last week by the U.S. District Court for encrypted e-mail network.
District of Oregon, in In re U.S., Nos. 08-9131-MC, 08-9147-              Cloud computing providers are adapting quickly to and
MC, the government argued successfully that it need not notify responding to the concerns raised by lawyers. As a result,
the account holder regarding a warrant served on the ISP holder lawyers are becoming increasingly comfortable with the con-
of the e-mail account. In reaching its decision, the court gave lip cept of cloud computing. In fact, according to the 2009 Am
service to the concept that e-mails are entitled to Fourth Amend- Law Tech Survey, 84 percent of responding law firms already
ment protections, but then stated: “Much of the reluctance to use SaaS (Software as a Service), a form of cloud computing,
apply traditional notions of third-party disclosure to the e-mail in some capacity.
context seems to stem from a fundamental misunderstanding of              As cloud computing becomes more prevalent in the legal
the lack of privacy we all have in our e-mails. Some people seem field, more lawyers will understand the importance of care-
to think that they are as private as letters, phone calls, or journal fully negotiating their contracts with the services providers to
entries. The blunt fact is, they are not.”                              ensure that, for example, they are notified if a warrant relating
   In comparison, however, see footnote 7 from the October to their data is served.
Memorandum and Order issued by the U.S. District Court,                   Mark my words: Cloud computing is the wave of the future,
Eastern District of New York, in U.S. v. Cioffi: “One prelimi- and encrypted communication is one of the keys to putting attor-
nary matter is not in question: The government does not dis- ney’s minds at ease re- garding an emerging technology. Astute
pute that Tannin has a reasonable expectation of privacy in the providers will incorporate encrypted communication into their
contents of his personal e-mail account.” See U.S. v. Zavala,
                                                                        platforms, and smart lawyers will learn about and use the emerg-
541 F3d 562,577 (Fifth Circuit 2008) (‘[C]ell phones contain
                                                                        ing technology in their practice.
a wealth of private information, including emails, text mes-
sages, call histories, address books, and subscriber numbers.             Nicole Black is of counsel to Fiandach and Fiandach and is
[The defendant] had a reasonable expectation of privacy the founder of lawtechTalk.com, which offers legal technology
regarding this information.’); U.S. v. Forrester, 512 F3d 500, consulting services, and publishes four legal blogs, one of which is
511 (Ninth Circuit 2008) (‘E-mail, like physical mail, has an Practicing Law in the 21st Century (http://21stcenturylaw.word
outside address ‘visible’ to the third-party carriers that trans- press.com). She may be reached at nblack@nicoleblackesq.com.

                                       Reprinted with permission of The Daily Record ©2009

Más contenido relacionado

La actualidad más candente

Visibility and digital art: Blockchain as an ownership layer on the Internet
Visibility and digital art: Blockchain as an ownership layer on the InternetVisibility and digital art: Blockchain as an ownership layer on the Internet
Visibility and digital art: Blockchain as an ownership layer on the Interneteraser Juan José Calderón
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyRitesh Nayak
 
Sarah Jamieson_corrections
Sarah Jamieson_correctionsSarah Jamieson_corrections
Sarah Jamieson_correctionsSarah Jamieson
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction PrimerGraham Smith
 
Norton scientific news
Norton scientific newsNorton scientific news
Norton scientific newssheltonwaltz
 
MongoDB Blockchain
MongoDB BlockchainMongoDB Blockchain
MongoDB BlockchainMark Kershaw
 
WIPO: What are Internet Intermediaries and their various types?
WIPO: What are Internet Intermediaries and their various types?WIPO: What are Internet Intermediaries and their various types?
WIPO: What are Internet Intermediaries and their various types?Shane Coughlan
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law Center
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijingInternet Law Center
 
Access to Electronic Communications of Government Officials in the 50 States
Access to Electronic Communications of Government Officials in the 50 StatesAccess to Electronic Communications of Government Officials in the 50 States
Access to Electronic Communications of Government Officials in the 50 StatesUmesh Heendeniya
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
P14 towards using blockchain technology for e health
P14 towards using blockchain technology for e healthP14 towards using blockchain technology for e health
P14 towards using blockchain technology for e healthdevid8
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsBrian Honan
 
Sookman justice canada_keynote
Sookman justice canada_keynoteSookman justice canada_keynote
Sookman justice canada_keynotebsookman
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
 
Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Matthew MacNabb
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 

La actualidad más candente (20)

Visibility and digital art: Blockchain as an ownership layer on the Internet
Visibility and digital art: Blockchain as an ownership layer on the InternetVisibility and digital art: Blockchain as an ownership layer on the Internet
Visibility and digital art: Blockchain as an ownership layer on the Internet
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
Sarah Jamieson_corrections
Sarah Jamieson_correctionsSarah Jamieson_corrections
Sarah Jamieson_corrections
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction Primer
 
Norton scientific news
Norton scientific newsNorton scientific news
Norton scientific news
 
MongoDB Blockchain
MongoDB BlockchainMongoDB Blockchain
MongoDB Blockchain
 
WIPO: What are Internet Intermediaries and their various types?
WIPO: What are Internet Intermediaries and their various types?WIPO: What are Internet Intermediaries and their various types?
WIPO: What are Internet Intermediaries and their various types?
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
 
Access to Electronic Communications of Government Officials in the 50 States
Access to Electronic Communications of Government Officials in the 50 StatesAccess to Electronic Communications of Government Officials in the 50 States
Access to Electronic Communications of Government Officials in the 50 States
 
Forensic data investigations in China
Forensic data investigations in ChinaForensic data investigations in China
Forensic data investigations in China
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
P14 towards using blockchain technology for e health
P14 towards using blockchain technology for e healthP14 towards using blockchain technology for e health
P14 towards using blockchain technology for e health
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure Laws
 
Sookman justice canada_keynote
Sookman justice canada_keynoteSookman justice canada_keynote
Sookman justice canada_keynote
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 

Destacado

2001 What Affects Reputation
2001 What Affects Reputation2001 What Affects Reputation
2001 What Affects ReputationAna ADI
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersNicole Black
 
Global Marine Renewable Energy Presentation
Global Marine Renewable Energy PresentationGlobal Marine Renewable Energy Presentation
Global Marine Renewable Energy PresentationCarolyn Elefant
 
Cake recipe
Cake recipeCake recipe
Cake recipeSara
 
Cooperative federalism and energy law
Cooperative federalism and energy lawCooperative federalism and energy law
Cooperative federalism and energy lawCarolyn Elefant
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011Nicole Black
 
Jornada Inter universitaria TICs y Data Center 2015
Jornada Inter universitaria TICs y Data Center 2015Jornada Inter universitaria TICs y Data Center 2015
Jornada Inter universitaria TICs y Data Center 2015Gonzalo Espinosa
 

Destacado (10)

2001 What Affects Reputation
2001 What Affects Reputation2001 What Affects Reputation
2001 What Affects Reputation
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
 
Global Marine Renewable Energy Presentation
Global Marine Renewable Energy PresentationGlobal Marine Renewable Energy Presentation
Global Marine Renewable Energy Presentation
 
Cake recipe
Cake recipeCake recipe
Cake recipe
 
Cooperative federalism and energy law
Cooperative federalism and energy lawCooperative federalism and energy law
Cooperative federalism and energy law
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011
 
Los derechos son de todos
Los derechos son de todosLos derechos son de todos
Los derechos son de todos
 
Scratch!1
Scratch!1Scratch!1
Scratch!1
 
Jornada Inter universitaria TICs y Data Center 2015
Jornada Inter universitaria TICs y Data Center 2015Jornada Inter universitaria TICs y Data Center 2015
Jornada Inter universitaria TICs y Data Center 2015
 
Digtial citizenship
Digtial citizenshipDigtial citizenship
Digtial citizenship
 

Similar a Does Cloud Computing Compromise Clients?

Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Tim Hsieh
 
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.iFour Technolab Pvt. Ltd.
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingNicole Black
 
Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017 Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017 Ian Beckett
 
Introduction1 On a warm summer evening in Northeast Ohio, .docx
Introduction1 On a warm summer evening in Northeast Ohio, .docxIntroduction1 On a warm summer evening in Northeast Ohio, .docx
Introduction1 On a warm summer evening in Northeast Ohio, .docxvrickens
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsCloudMask inc.
 
identifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docxidentifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docxmckerliejonelle
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Tom Kulik
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolAfnic
 
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...IJERA Editor
 
Fourth amendment cloud darren chaker
Fourth amendment cloud darren chakerFourth amendment cloud darren chaker
Fourth amendment cloud darren chakerDarren Chaker
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technologyEzraGray1
 
Keynote on Future of Legal Services Delivery
Keynote on Future of Legal Services DeliveryKeynote on Future of Legal Services Delivery
Keynote on Future of Legal Services DeliveryStephanie Kimbro Dolin
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersRobert Ambrogi
 
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Chad Gilles
 

Similar a Does Cloud Computing Compromise Clients? (20)

Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
 
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
 
Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017 Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017
 
Introduction1 On a warm summer evening in Northeast Ohio, .docx
Introduction1 On a warm summer evening in Northeast Ohio, .docxIntroduction1 On a warm summer evening in Northeast Ohio, .docx
Introduction1 On a warm summer evening in Northeast Ohio, .docx
 
Cloud
CloudCloud
Cloud
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
identifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docxidentifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docx
 
INFOGRAPHIC: Legal Technology Timeline
INFOGRAPHIC: Legal Technology TimelineINFOGRAPHIC: Legal Technology Timeline
INFOGRAPHIC: Legal Technology Timeline
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocol
 
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...
 
Fourth amendment cloud darren chaker
Fourth amendment cloud darren chakerFourth amendment cloud darren chaker
Fourth amendment cloud darren chaker
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Keynote on Future of Legal Services Delivery
Keynote on Future of Legal Services DeliveryKeynote on Future of Legal Services Delivery
Keynote on Future of Legal Services Delivery
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)
 

Más de Nicole Black

Women in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessageWomen in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessageNicole Black
 
Social Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersSocial Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersNicole Black
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeNicole Black
 
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersThe ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersNicole Black
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015Nicole Black
 
Florida social media
Florida social mediaFlorida social media
Florida social mediaNicole Black
 
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaiPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaNicole Black
 
Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2Nicole Black
 
Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1Nicole Black
 
Lawyers Collective Milkshake Mistake
Lawyers Collective Milkshake MistakeLawyers Collective Milkshake Mistake
Lawyers Collective Milkshake MistakeNicole Black
 
Technology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast SpeedsTechnology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast SpeedsNicole Black
 
Legal Technology: Change is Good
Legal Technology: Change is GoodLegal Technology: Change is Good
Legal Technology: Change is GoodNicole Black
 
Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers Nicole Black
 
Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!Nicole Black
 
6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social MediaNicole Black
 

Más de Nicole Black (16)

Women in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessageWomen in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessage
 
Social Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersSocial Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for Lawyers
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law Practice
 
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersThe ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyers
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015
 
Florida social media
Florida social mediaFlorida social media
Florida social media
 
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaiPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social media
 
Point1 law
Point1 lawPoint1 law
Point1 law
 
Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2
 
Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1
 
Lawyers Collective Milkshake Mistake
Lawyers Collective Milkshake MistakeLawyers Collective Milkshake Mistake
Lawyers Collective Milkshake Mistake
 
Technology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast SpeedsTechnology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast Speeds
 
Legal Technology: Change is Good
Legal Technology: Change is GoodLegal Technology: Change is Good
Legal Technology: Change is Good
 
Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers
 
Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!
 
6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media
 

Último

Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfASGITConsulting
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressorselgieurope
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAScathy664059
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 

Último (20)

Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 

Does Cloud Computing Compromise Clients?

  • 1. Monday, November 9, 2009 THE DAILY RECORD WESTERN NEW YORK’S SOURCE FOR LAW, REAL ESTATE, FINANCE AND GENERAL INTELLIGENCE SINCE 1908 Does cloud computing compromise clients? I predict that within about two to three years, lawyers in most mit it to its intended location, and also a package of content jurisdictions will communicate and collaborate with clients that the sender presumes will be read only by the intended using some type of an encrypted network. recipient. The privacy interests in these two forms of commu- A number of states, including Massachusetts and Nevada, nication are identical. The contents may deserve Fourth already have passed laws or regulations requiring certain types Amendment protection, but the address and size of the pack- of confidential data to be sent electronically only via encrypted age do not.’).” communications. More laws of that nature most cer- Accordingly, despite the fact the dicta in the Oregon tainly will follow, both at the state and federal level. decision flies in the face of binding precedent, online In my opinion, such laws — most of which apply commentators repeatedly raised concerns regarding primarily to financial institutions — ultimately will the decision, asserting it was further evidence that the incorporate some of the types of client information use of cloud computing in law practices is ill-advised. contained in attorney-client communications, in I would assert to the contrary the Oregon dicta is fur- large part because of rising concerns due to recent ther evidence that the incorporation of encrypted client large-scale data disclosures. communications in cloud computing may well be the In fact, that type of data breach is one of the pri- primary factor that convinces attorneys to accept cloud mary reservations expressed by lawyers when consid- computing services as a legitimate law practice man- ering whether to implement cloud computing plat- agement alternative to traditional software packages. forms in their law practice. A number of well-established cloud computing A recent federal court decision fanned the fire, providers already incorporate encrypted communica- causing many attorneys to decry the use of cloud By NICOLE BLACK tions in their platforms. For example, VLOTech, Clio computing and assert that doing so violated the very and NetDocuments allow for varying types of encrypted basic obligation to protect confidential client com- Daily Record communication with clients. Another online legal plat- Columnist form, NKrypt, is devoted to providing a secure, munications and data. In a decision issued last week by the U.S. District Court for encrypted e-mail network. District of Oregon, in In re U.S., Nos. 08-9131-MC, 08-9147- Cloud computing providers are adapting quickly to and MC, the government argued successfully that it need not notify responding to the concerns raised by lawyers. As a result, the account holder regarding a warrant served on the ISP holder lawyers are becoming increasingly comfortable with the con- of the e-mail account. In reaching its decision, the court gave lip cept of cloud computing. In fact, according to the 2009 Am service to the concept that e-mails are entitled to Fourth Amend- Law Tech Survey, 84 percent of responding law firms already ment protections, but then stated: “Much of the reluctance to use SaaS (Software as a Service), a form of cloud computing, apply traditional notions of third-party disclosure to the e-mail in some capacity. context seems to stem from a fundamental misunderstanding of As cloud computing becomes more prevalent in the legal the lack of privacy we all have in our e-mails. Some people seem field, more lawyers will understand the importance of care- to think that they are as private as letters, phone calls, or journal fully negotiating their contracts with the services providers to entries. The blunt fact is, they are not.” ensure that, for example, they are notified if a warrant relating In comparison, however, see footnote 7 from the October to their data is served. Memorandum and Order issued by the U.S. District Court, Mark my words: Cloud computing is the wave of the future, Eastern District of New York, in U.S. v. Cioffi: “One prelimi- and encrypted communication is one of the keys to putting attor- nary matter is not in question: The government does not dis- ney’s minds at ease re- garding an emerging technology. Astute pute that Tannin has a reasonable expectation of privacy in the providers will incorporate encrypted communication into their contents of his personal e-mail account.” See U.S. v. Zavala, platforms, and smart lawyers will learn about and use the emerg- 541 F3d 562,577 (Fifth Circuit 2008) (‘[C]ell phones contain ing technology in their practice. a wealth of private information, including emails, text mes- sages, call histories, address books, and subscriber numbers. Nicole Black is of counsel to Fiandach and Fiandach and is [The defendant] had a reasonable expectation of privacy the founder of lawtechTalk.com, which offers legal technology regarding this information.’); U.S. v. Forrester, 512 F3d 500, consulting services, and publishes four legal blogs, one of which is 511 (Ninth Circuit 2008) (‘E-mail, like physical mail, has an Practicing Law in the 21st Century (http://21stcenturylaw.word outside address ‘visible’ to the third-party carriers that trans- press.com). She may be reached at nblack@nicoleblackesq.com. Reprinted with permission of The Daily Record ©2009