SlideShare una empresa de Scribd logo
1 de 41
Descargar para leer sin conexión
Legal Technology: Cloud and Mobile
Computing for Lawyers
Presented by:
Nicole Black
Author | Cloud Computing for Lawyers
Co-author | Social Media for Lawyers--The Next Frontier
LegalTechnology Evangelist
MyCase.com | web-based law practice management
“The Internet? Bah!” by Clifford Stoll,1995
E-Commerce?
Bah!
E-books?
Bah!
E-readers?
Bah!
E-business?
Bah!
How did we get here?
June 2006--Google launches first non-email cloud product
July 2006--Twitter launched
August 2006--Amazon EC2 cloud product released in private beta
September 2006--Facebook opened to the public
April 2015 --Apple Watch released
April 2010--iPad released in US
July 2008--Apple launches the App Store
June 2007--iPhone released in US
Lawyers cannot afford to be left out of the loop
3 major technology trends:
• Social Media
• Mobile Computing
• Cloud Computing
Why should you care about cloud
computing?
•Cloud computing
•Software as a service (SaaS)
What is cloud computing?
Do you use Lexis or Westlaw?
Do you or your clients use gmail?
Do you use Wikipedia?
Cloud
• Convenience
• Affordability
• Flexibility
• Mobility
• Back up
SaaS
• Bill on the go
• Instant access
• Client access
• Communicate securely
Benefits
• By the end of 2012, 20% of
businesses owned no IT assets
and conducted business solely
in the Cloud
• In 2013, mobile phones
overtook PCs as the most
common Web access device
worldwide
• By the end of 2014 over 3
billion of the world’s adult
population was able to transact
electronically via mobile or
Internet technology
Source: Gartner’s Top Predictions for IT
Organizations and Users, 2010 and
Beyond:A New Balance
Cloud and Mobile
Computing:
Not a Trend
Are lawyers
using cloud
computing?
•15% of firms with 500 or more
lawyers have used cloud
computing
• 31% of solo attorneys used
cloud computing
• 34% of law firms with 50 or
more lawyers use cloud computing
*ABA 2013 Tech Report,
2013 ILTA/InsideLegal Technology Purchasing Survey,
•83% use the cloud for the simplified
support and maintenance
• 44% use the cloud because it
facilitates less hardware in-house
• 74% use the cloud for its convenience
• 63% use the cloud for 24/7 access
• 56% use the cloud because of its
affordability
*American Lawyer’s 2012 Tech Survey and 2013 ABA Legal Tech Survey
Why should you care about mobile
computing?
“Mobile devices are constrained by
their memory, processing power, and
battery life. But combined with
cloud computing, data processing
and storage can happen outside of
mobile devices.”
*IEEE Computer Society 2014
Tech Trends Report
There are
more mobile
phones on
the planet
than there
are TVs
The growth
of the iPhone
was 10 times
faster than the
growth of
America
Online
There are 6.8
billion people on
the planet. 5.1
billion of them own
a cell phone, but
only 4.2 billion own
a toothbrush
*Source: The Hub Spot Blog/Mobile
Marketing Association Surveys
But are
lawyers using
mobile
technology?
Lawyers’ smartphone use has increased from 89% in 2011 to
91% in 2014
58% of firms purchase tablets for their attorneys
89% of law firms report that their lawyers use tablets on a daily
basis
Sources: International Legal Technology Association and Inside Legal’s
2014 Annual Law Firm Technology Purchasing Survey and ABA’s 2011,
2014 Legal Technology Survey
The iPad is used by 84% of those lawyers who use a tablet
device for work-related tasks
48% of respondents used a tablet to conduct work while
outside of their primary workplace, up from 33% in 2012
In firms of more than 500 attorneys, lawyers using iPads
for work-related reasons outside of work
increased to 26%
Source: ABA’s 2012, 2014 Legal Technology Survey
Sometimes cloud computing ethics will fee like a maze
Sometimes, the journey
will be frustrating
A lot of people will tell
you what you can’t do
Take it step by step
Ethical issues to consider:
A. Attorney client confidentiality
B. Compare/contrast to traditional outsourcing relationships
C. Meeting obligations of “reasonable” security
QUESTION:
Whether an attorney can use an online system to store
confidential client data and, if so, what steps must be
taken to ensure the data are secure?
NewYork State Bar Association’s Committee on Professional Ethics, Opinion 842
(September 2010)
* Source: http://tinyurl.com/abaCloud
Security issues to
consider:
1. Encryption
2. Geo-redundancy
3. Data back ups
4. Extraction of data
5.Transborder data
flow
6. Financial security
For full list of questions see:
http://bit.ly/hyFBxo
Explore and learn
Don’t get left behind
Thanks for listening!
Nicole Black
Legal Technology Evangelist
MyCase.com | web-based law practice
management
www.nicoleblackesq.com
@nikiblack on Twitter
Author and co-author of:

Más contenido relacionado

La actualidad más candente

4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of ThingsW. David Stephenson
 
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)Open Coffee Greece
 
Any Time, Anywhere, Any Device (ISASA)
Any Time, Anywhere, Any Device  (ISASA)Any Time, Anywhere, Any Device  (ISASA)
Any Time, Anywhere, Any Device (ISASA)Cathy Oxley
 
Future of the Internet
Future of the InternetFuture of the Internet
Future of the InternetYogi Schulz
 
Internet of Things for Libraries
Internet of Things for LibrariesInternet of Things for Libraries
Internet of Things for LibrariesNicole Baratta
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Zohaib Hassan
 
The Internet of Things: An Overview
The Internet of Things: An OverviewThe Internet of Things: An Overview
The Internet of Things: An OverviewAli Babaoglan Blog
 
WoT 2016 - Seventh International Workshop on the Web of Things
WoT 2016 - Seventh International Workshop on the Web of ThingsWoT 2016 - Seventh International Workshop on the Web of Things
WoT 2016 - Seventh International Workshop on the Web of ThingsSimon Mayer
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
 
Future & Technology - What's Next?
Future & Technology - What's Next? Future & Technology - What's Next?
Future & Technology - What's Next? Massive Media
 
The Internet of Everything: Tom Lee, Stanford School of Engineering
The Internet of Everything:  Tom Lee, Stanford School of EngineeringThe Internet of Everything:  Tom Lee, Stanford School of Engineering
The Internet of Everything: Tom Lee, Stanford School of EngineeringStanford School of Engineering
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom TrainingsCOEPD HR
 
Technology, Inside the Black Box
Technology, Inside the Black BoxTechnology, Inside the Black Box
Technology, Inside the Black BoxFujitsu UK
 
Startup Junkie Underground - Top 10 Entrepreneurial Trends for 2011
Startup Junkie Underground - Top 10 Entrepreneurial Trends for 2011Startup Junkie Underground - Top 10 Entrepreneurial Trends for 2011
Startup Junkie Underground - Top 10 Entrepreneurial Trends for 2011DaVinci Institute
 
The IoT Suitcase - Pitch Deck
The IoT Suitcase - Pitch DeckThe IoT Suitcase - Pitch Deck
The IoT Suitcase - Pitch DeckThe IoT Suitcase
 

La actualidad más candente (20)

4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
 
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
 
Any Time, Anywhere, Any Device (ISASA)
Any Time, Anywhere, Any Device  (ISASA)Any Time, Anywhere, Any Device  (ISASA)
Any Time, Anywhere, Any Device (ISASA)
 
Timorexpony
TimorexponyTimorexpony
Timorexpony
 
Future of the Internet
Future of the InternetFuture of the Internet
Future of the Internet
 
Internet of Things for Libraries
Internet of Things for LibrariesInternet of Things for Libraries
Internet of Things for Libraries
 
L20 Local
L20 LocalL20 Local
L20 Local
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
The Internet of Things: An Overview
The Internet of Things: An OverviewThe Internet of Things: An Overview
The Internet of Things: An Overview
 
WoT 2016 - Seventh International Workshop on the Web of Things
WoT 2016 - Seventh International Workshop on the Web of ThingsWoT 2016 - Seventh International Workshop on the Web of Things
WoT 2016 - Seventh International Workshop on the Web of Things
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
Future & Technology - What's Next?
Future & Technology - What's Next? Future & Technology - What's Next?
Future & Technology - What's Next?
 
The Internet of Everything: Tom Lee, Stanford School of Engineering
The Internet of Everything:  Tom Lee, Stanford School of EngineeringThe Internet of Everything:  Tom Lee, Stanford School of Engineering
The Internet of Everything: Tom Lee, Stanford School of Engineering
 
5 tech trends to watch in 2011
5 tech  trends to watch in 20115 tech  trends to watch in 2011
5 tech trends to watch in 2011
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom Trainings
 
Technology, Inside the Black Box
Technology, Inside the Black BoxTechnology, Inside the Black Box
Technology, Inside the Black Box
 
Startup Junkie Underground - Top 10 Entrepreneurial Trends for 2011
Startup Junkie Underground - Top 10 Entrepreneurial Trends for 2011Startup Junkie Underground - Top 10 Entrepreneurial Trends for 2011
Startup Junkie Underground - Top 10 Entrepreneurial Trends for 2011
 
Global Mobile Revolution
Global Mobile RevolutionGlobal Mobile Revolution
Global Mobile Revolution
 
The IoT Suitcase - Pitch Deck
The IoT Suitcase - Pitch DeckThe IoT Suitcase - Pitch Deck
The IoT Suitcase - Pitch Deck
 

Similar a The ethics of cloud and mobile computing for lawyers

Intro to Cloud Computing
Intro to Cloud ComputingIntro to Cloud Computing
Intro to Cloud ComputingWyn Douglas
 
From goatskin to clouds - how IT works in Parliament
From goatskin to clouds - how IT works in ParliamentFrom goatskin to clouds - how IT works in Parliament
From goatskin to clouds - how IT works in ParliamentRachel Miller
 
The Cloud, Mobility & Collaboration in the Legal Industry
The Cloud, Mobility & Collaboration in the Legal IndustryThe Cloud, Mobility & Collaboration in the Legal Industry
The Cloud, Mobility & Collaboration in the Legal IndustryRed Rain
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption publicJohn Mathon
 
How to get business ready for Wearables: GDayX Mumbai 2014
How to get business ready for Wearables: GDayX Mumbai 2014How to get business ready for Wearables: GDayX Mumbai 2014
How to get business ready for Wearables: GDayX Mumbai 2014Romin Irani
 
Speaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsSpeaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsJustin Grammens
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
Internet of Things (IoT) Outlook Survey
Internet of Things (IoT) Outlook SurveyInternet of Things (IoT) Outlook Survey
Internet of Things (IoT) Outlook SurveyJohn Clark
 
How Technology is Revolutionizing Property Assessments
How Technology is Revolutionizing Property AssessmentsHow Technology is Revolutionizing Property Assessments
How Technology is Revolutionizing Property AssessmentsEDR
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?Marketing Team
 
2016 iot summit_guy_bieber9
2016 iot summit_guy_bieber92016 iot summit_guy_bieber9
2016 iot summit_guy_bieber9Guy Bieber
 
The IP of Internet of Things (IoT)
The IP of Internet of Things (IoT)The IP of Internet of Things (IoT)
The IP of Internet of Things (IoT)citiusminds_patent
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
When Computers are Everywhere, Will we have superpowers.
When Computers are Everywhere, Will we have superpowers.When Computers are Everywhere, Will we have superpowers.
When Computers are Everywhere, Will we have superpowers.Guy Bieber
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research DirectionsDavide Nardone
 

Similar a The ethics of cloud and mobile computing for lawyers (20)

Intro to Cloud Computing
Intro to Cloud ComputingIntro to Cloud Computing
Intro to Cloud Computing
 
From goatskin to clouds - how IT works in Parliament
From goatskin to clouds - how IT works in ParliamentFrom goatskin to clouds - how IT works in Parliament
From goatskin to clouds - how IT works in Parliament
 
The Cloud, Mobility & Collaboration in the Legal Industry
The Cloud, Mobility & Collaboration in the Legal IndustryThe Cloud, Mobility & Collaboration in the Legal Industry
The Cloud, Mobility & Collaboration in the Legal Industry
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption public
 
How to get business ready for Wearables: GDayX Mumbai 2014
How to get business ready for Wearables: GDayX Mumbai 2014How to get business ready for Wearables: GDayX Mumbai 2014
How to get business ready for Wearables: GDayX Mumbai 2014
 
Speaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsSpeaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of Things
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
Internet of Things (IoT) Outlook Survey
Internet of Things (IoT) Outlook SurveyInternet of Things (IoT) Outlook Survey
Internet of Things (IoT) Outlook Survey
 
How Technology is Revolutionizing Property Assessments
How Technology is Revolutionizing Property AssessmentsHow Technology is Revolutionizing Property Assessments
How Technology is Revolutionizing Property Assessments
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
2016 iot summit_guy_bieber9
2016 iot summit_guy_bieber92016 iot summit_guy_bieber9
2016 iot summit_guy_bieber9
 
The IP of Internet of Things (IoT)
The IP of Internet of Things (IoT)The IP of Internet of Things (IoT)
The IP of Internet of Things (IoT)
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
When Computers are Everywhere, Will we have superpowers.
When Computers are Everywhere, Will we have superpowers.When Computers are Everywhere, Will we have superpowers.
When Computers are Everywhere, Will we have superpowers.
 
IoT -Internet of Things
IoT -Internet of ThingsIoT -Internet of Things
IoT -Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Topic 7
Topic 7Topic 7
Topic 7
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research Directions
 
IoT
IoTIoT
IoT
 

Más de Nicole Black

Women in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessageWomen in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessageNicole Black
 
Social Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersSocial Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersNicole Black
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeNicole Black
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015Nicole Black
 
Florida social media
Florida social mediaFlorida social media
Florida social mediaNicole Black
 
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaiPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaNicole Black
 
Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2Nicole Black
 
Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1Nicole Black
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011Nicole Black
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingNicole Black
 
Lawyers Collective Milkshake Mistake
Lawyers Collective Milkshake MistakeLawyers Collective Milkshake Mistake
Lawyers Collective Milkshake MistakeNicole Black
 
Technology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast SpeedsTechnology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast SpeedsNicole Black
 
Legal Technology: Change is Good
Legal Technology: Change is GoodLegal Technology: Change is Good
Legal Technology: Change is GoodNicole Black
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers Nicole Black
 
Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?Nicole Black
 
Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!Nicole Black
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationNicole Black
 
6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social MediaNicole Black
 

Más de Nicole Black (20)

Women in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessageWomen in Law - #AmplifyYourMessage
Women in Law - #AmplifyYourMessage
 
Social Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for LawyersSocial Media Evidence: Ethics and Best Practices for Lawyers
Social Media Evidence: Ethics and Best Practices for Lawyers
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law Practice
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015
 
Florida social media
Florida social mediaFlorida social media
Florida social media
 
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaiPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social media
 
Point1 law
Point1 lawPoint1 law
Point1 law
 
Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Par 2
 
Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1Google Plus 101 for Lawyers, Part 1
Google Plus 101 for Lawyers, Part 1
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
 
Lawyers Collective Milkshake Mistake
Lawyers Collective Milkshake MistakeLawyers Collective Milkshake Mistake
Lawyers Collective Milkshake Mistake
 
Technology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast SpeedsTechnology Changing at Lightning Fast Speeds
Technology Changing at Lightning Fast Speeds
 
Legal Technology: Change is Good
Legal Technology: Change is GoodLegal Technology: Change is Good
Legal Technology: Change is Good
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers Colorado Bar Association 2010 Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers
 
Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?
 
Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!Still More Social Media for Lawyers: Interact!
Still More Social Media for Lawyers: Interact!
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
 
6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media6 Things Lawyers Should Know About Social Media
6 Things Lawyers Should Know About Social Media
 

Último

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Último (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

The ethics of cloud and mobile computing for lawyers

  • 1. Legal Technology: Cloud and Mobile Computing for Lawyers Presented by: Nicole Black Author | Cloud Computing for Lawyers Co-author | Social Media for Lawyers--The Next Frontier LegalTechnology Evangelist MyCase.com | web-based law practice management
  • 2. “The Internet? Bah!” by Clifford Stoll,1995
  • 7. How did we get here?
  • 8. June 2006--Google launches first non-email cloud product July 2006--Twitter launched August 2006--Amazon EC2 cloud product released in private beta September 2006--Facebook opened to the public April 2015 --Apple Watch released April 2010--iPad released in US July 2008--Apple launches the App Store June 2007--iPhone released in US
  • 9. Lawyers cannot afford to be left out of the loop
  • 10. 3 major technology trends: • Social Media • Mobile Computing • Cloud Computing
  • 11. Why should you care about cloud computing?
  • 12. •Cloud computing •Software as a service (SaaS) What is cloud computing?
  • 13. Do you use Lexis or Westlaw?
  • 14. Do you or your clients use gmail?
  • 15. Do you use Wikipedia?
  • 16. Cloud • Convenience • Affordability • Flexibility • Mobility • Back up SaaS • Bill on the go • Instant access • Client access • Communicate securely Benefits
  • 17. • By the end of 2012, 20% of businesses owned no IT assets and conducted business solely in the Cloud • In 2013, mobile phones overtook PCs as the most common Web access device worldwide • By the end of 2014 over 3 billion of the world’s adult population was able to transact electronically via mobile or Internet technology Source: Gartner’s Top Predictions for IT Organizations and Users, 2010 and Beyond:A New Balance Cloud and Mobile Computing: Not a Trend
  • 19. •15% of firms with 500 or more lawyers have used cloud computing • 31% of solo attorneys used cloud computing • 34% of law firms with 50 or more lawyers use cloud computing *ABA 2013 Tech Report, 2013 ILTA/InsideLegal Technology Purchasing Survey,
  • 20. •83% use the cloud for the simplified support and maintenance • 44% use the cloud because it facilitates less hardware in-house • 74% use the cloud for its convenience • 63% use the cloud for 24/7 access • 56% use the cloud because of its affordability *American Lawyer’s 2012 Tech Survey and 2013 ABA Legal Tech Survey
  • 21. Why should you care about mobile computing?
  • 22. “Mobile devices are constrained by their memory, processing power, and battery life. But combined with cloud computing, data processing and storage can happen outside of mobile devices.” *IEEE Computer Society 2014 Tech Trends Report
  • 23. There are more mobile phones on the planet than there are TVs The growth of the iPhone was 10 times faster than the growth of America Online There are 6.8 billion people on the planet. 5.1 billion of them own a cell phone, but only 4.2 billion own a toothbrush *Source: The Hub Spot Blog/Mobile Marketing Association Surveys
  • 25. Lawyers’ smartphone use has increased from 89% in 2011 to 91% in 2014 58% of firms purchase tablets for their attorneys 89% of law firms report that their lawyers use tablets on a daily basis Sources: International Legal Technology Association and Inside Legal’s 2014 Annual Law Firm Technology Purchasing Survey and ABA’s 2011, 2014 Legal Technology Survey
  • 26. The iPad is used by 84% of those lawyers who use a tablet device for work-related tasks 48% of respondents used a tablet to conduct work while outside of their primary workplace, up from 33% in 2012 In firms of more than 500 attorneys, lawyers using iPads for work-related reasons outside of work increased to 26% Source: ABA’s 2012, 2014 Legal Technology Survey
  • 27. Sometimes cloud computing ethics will fee like a maze
  • 28. Sometimes, the journey will be frustrating
  • 29. A lot of people will tell you what you can’t do
  • 30.
  • 31.
  • 32. Take it step by step
  • 33. Ethical issues to consider: A. Attorney client confidentiality B. Compare/contrast to traditional outsourcing relationships C. Meeting obligations of “reasonable” security
  • 34. QUESTION: Whether an attorney can use an online system to store confidential client data and, if so, what steps must be taken to ensure the data are secure? NewYork State Bar Association’s Committee on Professional Ethics, Opinion 842 (September 2010)
  • 36. Security issues to consider: 1. Encryption 2. Geo-redundancy 3. Data back ups 4. Extraction of data 5.Transborder data flow 6. Financial security For full list of questions see: http://bit.ly/hyFBxo
  • 38.
  • 40.
  • 41. Thanks for listening! Nicole Black Legal Technology Evangelist MyCase.com | web-based law practice management www.nicoleblackesq.com @nikiblack on Twitter Author and co-author of: