SlideShare uma empresa Scribd logo
1 de 73
Baixar para ler offline
Putting Your Practice
on Cloud 9
Web Application

Cloud	
  Compu*ng
ASP
So.ware-­‐as-­‐a-­‐Service
2
3
4
5
tradi*onal	
  compu*ng	
  model

The	
  Internet

Local	
  Area	
  Network
so.ware-­‐as-­‐a-­‐service	
  model

The	
  Internet

Local	
  Area	
  Network
typical	
  small	
  law	
  office
tradi/onal	
  so1ware	
  distribu*on
cloud	
  compu/ng
why
cloud computing?
You need to
deliver
a better
experience to
your clients
We’re screwed.

13
There is a profound message here
for lawyers—when thinking IT and
the Internet, the challenge is not
to automate current working
practices that are not efficient.

The challenge is to
innovate, to practice
law in ways that we
could not have done in
the past.
14
It’s not just
what you sell

47%

53%

It’s how you
sell it
Deliver a
cloud
experience to
your clients
laggards 16%

late majority 34%

early majority 34%

early adopters 13.5%

innovators 2.5%
up	
  and	
  running	
  fast

21
save	
  money

22
cash	
  flow

23
ethics of cloud computing
North	
  Carolina	
  State	
  Bar	
  
Ethics	
  Inquiry
•2011	
  FEO	
  6	
  "Subscribing	
  to	
  So.ware	
  as	
  a	
  Service	
  While	
  Fulfilling	
  
Confiden*ality	
  and	
  Preserva*on	
  of	
  Client	
  Property"
•First	
  ethics	
  opinion	
  in	
  North	
  America	
  specifically	
  focused	
  on	
  use	
  
of	
  cloud	
  compu*ng	
  in	
  a	
  law	
  firm
Inquiry	
  #1
Is	
  it	
  within	
  the	
  Rules	
  of	
  Professional	
  Conduct	
  for	
  an	
  
attorney/law	
  7irm	
  to	
  use	
  online	
  ("cloud	
  computing")	
  
practice	
  management	
  programs	
  (e.g.,	
  the	
  Clio	
  program)	
  
as	
  part	
  of	
  the	
  practice	
  of	
  law?	
  	
  These	
  are	
  instances	
  where	
  
the	
  software	
  program	
  is	
  accessed	
  online	
  with	
  a	
  password	
  
and	
  is	
  not	
  software	
  installed	
  on	
  a	
  computer	
  within	
  the	
  
5irm's	
  of5ice.
North	
  Carolina	
  Proposed	
  Formal	
  Ethics	
  Opinion

Yes,	
  provided	
  steps	
  are	
  taken	
  effectively	
  to	
  minimize	
  the	
  risk	
  of	
  
inadvertent	
  or	
  unauthorized	
  disclosure	
  of	
  con5idential	
  client	
  
information	
  and	
  to	
  protect	
  client	
  property,	
  including	
  5ile	
  information,	
  
from	
  risk	
  of	
  loss.
Other	
  States	
  Following	
  Suit
• Pennsylvania	
  Formal	
  Opinion	
  2011-­‐200
• California	
  Formal	
  Opinion	
  No.	
  2010-­‐179
• Alabama	
  State	
  Bar	
  Ethics	
  Opinion	
  2010-­‐02
• Arizona	
  State	
  Bar	
  Formal	
  Opinion	
  09-­‐04
• Nevada	
  State	
  Bar	
  Formal	
  Opinion	
  No.	
  33
• New	
  York	
  State	
  Bar	
  Associa*on	
  Opinion	
  842	
  of	
  2010
• Iowa	
  Op.	
  11-­‐01
• Oregon	
  Formal	
  Op.	
  2011-­‐188
• Vermont	
  Advisory	
  Ethics	
  Op.	
  2010-­‐6
• Massachuse[s	
  MBA	
  Ethics	
  Opinion	
  12-­‐03	
  

29
ABA	
  20/20	
  Ethics	
  Commission
•Examining	
  how	
  a	
  lawyer’s	
  ethical	
  responsibili*es	
  apply	
  to	
  cloud	
  
compu*ng
•Recommenda*ons	
  adopted	
  in	
  August	
  2012

30
ABA	
  20/20	
  Ethics	
  Commission
•The	
  development	
  of	
  a	
  centralized,	
  user-­‐friendly	
  website	
  that	
  
contains	
  con*nuously	
  updated	
  and	
  detailed	
  informa*on	
  about	
  
confiden*ality-­‐related	
  ethics	
  issues	
  arising	
  from	
  lawyer’s	
  use	
  of	
  
technology,	
  including	
  the	
  latest	
  data	
  security	
  standards.
•Amendments	
  to	
  several	
  Model	
  Rules	
  of	
  Professional	
  Conduct	
  
and	
  their	
  Comments	
  to	
  offer	
  specific	
  guidance	
  and	
  expecta*ons	
  
rela*ng	
  to	
  technology.

31
ABA	
  20/20	
  Ethics	
  Commission
The	
  Commission	
  concluded	
  that	
  competent	
  lawyers	
  must	
  have	
  some	
  
awareness	
  of	
  basic	
  features	
  of	
  technology.	
  To	
  make	
  this	
  point,	
  the	
  
Commission	
  is	
  recommending	
  an	
  amendment	
  to	
  Comment	
  [6]	
  of	
  Model	
  
Rule	
  1.1	
  (Competence)	
  that	
  would	
  emphasize	
  that,	
  in	
  order	
  to	
  stay	
  abreast	
  
of	
  changes	
  in	
  the	
  law	
  and	
  its	
  practice,	
  lawyers	
  need	
  to	
  have	
  a	
  basic	
  
understanding	
  of	
  technology’s	
  bene5its	
  and	
  risks.

32
ABA	
  20/20	
  Ethics	
  Commission
Proposed	
  new	
  Model	
  Rule	
  1.6(c)	
  would	
  make	
  clear	
  that	
  a	
  lawyer	
  has	
  an	
  
ethical	
  duty	
  to	
  take	
  reasonable	
  measures	
  to	
  protect	
  a	
  client’s	
  
con7idential	
  information	
  from	
  inadvertent	
  disclosure	
  and	
  
unauthorized	
  access.	
  This	
  duty	
  is	
  already	
  implicit	
  in	
  Model	
  Rule	
  1.6	
  and	
  is	
  
described	
  in	
  several	
  existing	
  comments,	
  but	
  the	
  Commission	
  concluded	
  that,	
  
in	
  light	
  of	
  the	
  pervasive	
  use	
  of	
  technology	
  to	
  store	
  and	
  transmit	
  con5idential	
  
client	
  information,	
  this	
  obligation	
  should	
  be	
  stated	
  explicitly	
  in	
  the	
  black	
  
letter	
  of	
  Model	
  Rule	
  1.6.

33
ABA	
  Model	
  
Rules	
  of	
  Professional	
  Conduct
“ When transmitting a communication that includes
information relating to the representation of a client, the
lawyer must take reasonable precautions to prevent the
information from coming into the hands of unintended
recipients. This duty, however, does not require that the
lawyer use special security measures if the method of
communication affords a reasonable expectation of
privacy.” (Emphasis added)
Comment 17, Rule 1.6

34
security of
cloud computing
Encryption

Terms of Service

Security

Data Privacy

Data Availability

36
encryption
terminology
•Secure	
  Sockets	
  Layer	
  (SSL)
ØIndustry	
  standard	
  protocol	
  for	
  securing	
  
Internet	
  communica*ons
ØBanks,	
  e-­‐commerce	
  sites	
  (Amazon.com,	
  
etc.)	
  all	
  use	
  SSL	
  for	
  secure	
  communica*ons
without	
  ssl
Informa*on	
  exchanged	
  is	
  insecure
Please	
  give	
  me	
  my	
  bank	
  account	
  balance

$2,031.34
Your	
  Computer

Your	
  Bank’s	
  Server
with	
  ssl
Informa*on	
  exchanged	
  is	
  encrypted	
  for	
  security
01101010001010110101010100101010

11010001110
Your	
  Computer

Your	
  Bank’s	
  Server
verifying	
  ssl	
  connec*ons
A	
  sealed	
  lock	
  icon	
  indicates	
  a	
  secure	
  connec*on
Internet	
  Explorer:
Firefox:
Safari:
server	
  security
Are	
  third-­‐party	
  audits	
  being	
  performed?
server	
  security
server	
  security
endpoint	
  security
HIPAA

47
password	
  security

joe@smithlaw.com
07121954
smithlaw
password
49
50
privacy
privacy
•Does	
  the	
  SaaS	
  provider	
  have	
  a	
  published	
  privacy	
  policy?
•Need	
  to	
  ensure	
  you	
  own	
  your	
  data
•The	
  private	
  client	
  informa*on	
  stored	
  with	
  your	
  SaaS	
  provider	
  
cannot	
  be	
  used	
  for	
  any	
  other	
  purposes
facebook	
  privacy	
  policy
You hereby grant Facebook an irrevocable, perpetual, non-exclusive, transferable, fully paid,
worldwide license (with the right to sublicense) to (a) use, copy, publish, stream, store,
retain,

publicly

perform

or

display,

transmit,

scan,

reformat,

modify,

edit,

frame,

translate, excerpt, adapt, create derivative works and distribute (through multiple tiers),
any User Content you (i) Post on or in connection with the Facebook Service or the promotion
thereof subject only to your privacy settings.

You may remove your User Content from the Site at any time. If you choose to remove your User
Content, the license granted above will automatically expire, however you acknowledge that
the Company may retain archived copies of your User Content.
TRUSTe
How	
  is	
  sensi*ve	
  informa*on	
  being	
  handled?
“TRUSTe’s	
   program	
   requirements	
   are	
   based	
   upon	
   the	
   Fair	
  
Informa*on	
   Principles	
   and	
   OCED	
   Guidelines	
   around	
   no*ce,	
  
choice,	
   access,	
   security,	
   and	
   redress	
   -­‐	
   the	
   core	
   founda*ons	
   of	
  
privacy	
   and	
  building	
  trust.	
   	
  Sealholders	
  are	
  required	
  to	
  undergo	
  a	
  
rigorous	
   review	
   process	
   to	
   assess	
   the	
   accuracy	
   of	
   privacy	
  
disclosures	
   and	
  compliance	
   with	
   TRUSTe’s	
   requirements	
   in	
  order	
  
to	
  obtain	
  cer*fica*on.”
data availability
56
57
58
59
Data	
  Loca/on
•Where	
  is	
  main	
  data	
  center(s)
•Is	
  data	
  backed	
  up	
  to	
  mul*ple	
  offsite	
  loca*ons?
external	
  backup	
  provisions
•Can	
  you	
  perform	
  an	
  export	
  of	
  your	
  data?
Comma	
  Separated	
  Values	
  (CSV)
Extensible	
  Markup	
  Language	
  (XML)

Microso1	
  Excel	
  (XLS)
business	
  con*nuity

What	
  if	
  the	
  SaaS	
  provider	
  goes	
  out	
  of	
  business?
op*on	
  1:	
  data	
  export
Comma	
  Separated	
  Values	
  (CSV)
Extensible	
  Markup	
  Language	
  (XML)

Microso1	
  Excel	
  (XLS)

Cross	
  your	
  fingers	
  and	
  hope	
  you’re	
  up	
  to	
  date…
If	
  it	
  isn’t	
  
automated	
  you’ll	
  
forget	
  to	
  do	
  it
op*on	
  2:	
  data	
  escrow

saas	
  provider

escrow	
  provider

saas	
  user
terms of service /
service level agreement
terms	
  of	
  service
•Easily	
  accessible,	
  published	
  ToS?
•Outlines	
  the	
  condi*ons	
  under	
  which	
  you	
  
agree	
  to	
  use	
  the	
  service	
  
•Ensure	
  you’ve	
  reviewed	
  and	
  accepted	
  
your	
  provider’s	
  terms	
  of	
  service
service	
  level	
  agreement
•SLA
•Outlines	
  guaranteed	
  up*me	
  percentages
•E.g.	
  99.9%
•Usually	
  providers	
  for	
  some	
  kind	
  of	
  compensa*on	
  if	
  
down*me	
  exceeds	
  SLA	
  guarantee
data center security
70
71
72
Thank You

Mais conteúdo relacionado

Mais procurados

Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesLilian Edwards
 
Sampo Kellomäki (Synergetics) @ PIDS seminar
Sampo Kellomäki (Synergetics) @ PIDS seminarSampo Kellomäki (Synergetics) @ PIDS seminar
Sampo Kellomäki (Synergetics) @ PIDS seminarAlmereDataCapital
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 
Developer view on new EU privacy legislation (GDPR)
Developer view on new EU privacy legislation (GDPR)Developer view on new EU privacy legislation (GDPR)
Developer view on new EU privacy legislation (GDPR)Exove
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller SolicitorBrian Miller, Solicitor
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsCloudMask inc.
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Digia Plc
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveJanine Anthony Bowen, Esq.
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
Cloud computing
Cloud computingCloud computing
Cloud computinghundejibat
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetupIshay Tentser
 
How does GDPR affect the design of user experiences?
How does GDPR affect the design of user experiences? How does GDPR affect the design of user experiences?
How does GDPR affect the design of user experiences? Exove
 

Mais procurados (20)

Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
IoT_Implemented
IoT_ImplementedIoT_Implemented
IoT_Implemented
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issues
 
Sampo Kellomäki (Synergetics) @ PIDS seminar
Sampo Kellomäki (Synergetics) @ PIDS seminarSampo Kellomäki (Synergetics) @ PIDS seminar
Sampo Kellomäki (Synergetics) @ PIDS seminar
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Developer view on new EU privacy legislation (GDPR)
Developer view on new EU privacy legislation (GDPR)Developer view on new EU privacy legislation (GDPR)
Developer view on new EU privacy legislation (GDPR)
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016
 
02 05 d_51_cc_efiles
02 05 d_51_cc_efiles02 05 d_51_cc_efiles
02 05 d_51_cc_efiles
 
Velti
Velti Velti
Velti
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
 
How does GDPR affect the design of user experiences?
How does GDPR affect the design of user experiences? How does GDPR affect the design of user experiences?
How does GDPR affect the design of user experiences?
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 

Destaque

Clio Cloud Conference 2015 - Thinking Like an Accountant: Financial Statement...
Clio Cloud Conference 2015 - Thinking Like an Accountant: Financial Statement...Clio Cloud Conference 2015 - Thinking Like an Accountant: Financial Statement...
Clio Cloud Conference 2015 - Thinking Like an Accountant: Financial Statement...Clio - Cloud-Based Legal Technology
 
Shift to Mobile Legal Services: Building Mobile Solutions Into Your Law Practice
Shift to Mobile Legal Services: Building Mobile Solutions Into Your Law PracticeShift to Mobile Legal Services: Building Mobile Solutions Into Your Law Practice
Shift to Mobile Legal Services: Building Mobile Solutions Into Your Law PracticeClio - Cloud-Based Legal Technology
 
Clio Cloud Conference 2015 - Collaboration, Confidentiality and Security
Clio Cloud Conference 2015 - Collaboration, Confidentiality and SecurityClio Cloud Conference 2015 - Collaboration, Confidentiality and Security
Clio Cloud Conference 2015 - Collaboration, Confidentiality and SecurityClio - Cloud-Based Legal Technology
 

Destaque (18)

Disaster preparedness
Disaster preparednessDisaster preparedness
Disaster preparedness
 
From Intake to Invoicing
From Intake to InvoicingFrom Intake to Invoicing
From Intake to Invoicing
 
Alternative Practice Models in the New Normal
Alternative Practice Models in the New NormalAlternative Practice Models in the New Normal
Alternative Practice Models in the New Normal
 
Save Your Data from Disaster
Save Your Data from DisasterSave Your Data from Disaster
Save Your Data from Disaster
 
Flat Fees for Fun and Profit with Lee Rosen
Flat Fees for Fun and Profit with Lee RosenFlat Fees for Fun and Profit with Lee Rosen
Flat Fees for Fun and Profit with Lee Rosen
 
Investigation and discovery tools in law firms
Investigation and discovery tools in law firmsInvestigation and discovery tools in law firms
Investigation and discovery tools in law firms
 
Go With the Workflow
Go With the WorkflowGo With the Workflow
Go With the Workflow
 
Clio for Criminal Law Attorneys
Clio for Criminal Law AttorneysClio for Criminal Law Attorneys
Clio for Criminal Law Attorneys
 
Clio Cloud Conference 2015 - Thinking Like an Accountant: Financial Statement...
Clio Cloud Conference 2015 - Thinking Like an Accountant: Financial Statement...Clio Cloud Conference 2015 - Thinking Like an Accountant: Financial Statement...
Clio Cloud Conference 2015 - Thinking Like an Accountant: Financial Statement...
 
Clio Cloud Conference 2015 - 50 Clio Integrations in 50 Minutes
Clio Cloud Conference 2015 - 50 Clio Integrations in 50 MinutesClio Cloud Conference 2015 - 50 Clio Integrations in 50 Minutes
Clio Cloud Conference 2015 - 50 Clio Integrations in 50 Minutes
 
Trust Accounting Technology for Law Firms
Trust Accounting Technology for Law FirmsTrust Accounting Technology for Law Firms
Trust Accounting Technology for Law Firms
 
Cybersecurity for law firms handouts
Cybersecurity for law firms   handoutsCybersecurity for law firms   handouts
Cybersecurity for law firms handouts
 
Security Basics for Law Firms
Security Basics for Law FirmsSecurity Basics for Law Firms
Security Basics for Law Firms
 
The Client-Centric Law Firm
The Client-Centric Law FirmThe Client-Centric Law Firm
The Client-Centric Law Firm
 
Courtroom Etiquette for Lawyers
Courtroom Etiquette for LawyersCourtroom Etiquette for Lawyers
Courtroom Etiquette for Lawyers
 
Shift to Mobile Legal Services: Building Mobile Solutions Into Your Law Practice
Shift to Mobile Legal Services: Building Mobile Solutions Into Your Law PracticeShift to Mobile Legal Services: Building Mobile Solutions Into Your Law Practice
Shift to Mobile Legal Services: Building Mobile Solutions Into Your Law Practice
 
Clio Cloud Conference 2015 - Collaboration, Confidentiality and Security
Clio Cloud Conference 2015 - Collaboration, Confidentiality and SecurityClio Cloud Conference 2015 - Collaboration, Confidentiality and Security
Clio Cloud Conference 2015 - Collaboration, Confidentiality and Security
 
Metrics and the Modern Law Firm
Metrics and the Modern Law FirmMetrics and the Modern Law Firm
Metrics and the Modern Law Firm
 

Semelhante a Putting your practice on cloud 9

How to Bring Shadow IT to the Light
How to Bring Shadow IT to the LightHow to Bring Shadow IT to the Light
How to Bring Shadow IT to the LightRackspace
 
One network-bridge-to-blockchain-whitepaper
One network-bridge-to-blockchain-whitepaperOne network-bridge-to-blockchain-whitepaper
One network-bridge-to-blockchain-whitepaperGeoff Annesley
 
GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?QualiQuali
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing presentJames Sutter
 
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...Samia Kenley
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewPeter HJ van Eijk
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management Padma Jella
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology EssayPamela Wright
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the CloudRapidScale
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyCloud Standards Customer Council
 

Semelhante a Putting your practice on cloud 9 (20)

Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
How to Bring Shadow IT to the Light
How to Bring Shadow IT to the LightHow to Bring Shadow IT to the Light
How to Bring Shadow IT to the Light
 
One network-bridge-to-blockchain-whitepaper
One network-bridge-to-blockchain-whitepaperOne network-bridge-to-blockchain-whitepaper
One network-bridge-to-blockchain-whitepaper
 
GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overview
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Legal issues in the cloud renzo marchini & gene landy
Legal issues in the cloud   renzo marchini & gene landyLegal issues in the cloud   renzo marchini & gene landy
Legal issues in the cloud renzo marchini & gene landy
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 

Mais de Clio - Cloud-Based Legal Technology

Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...Clio - Cloud-Based Legal Technology
 
How Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client IntakeHow Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client IntakeClio - Cloud-Based Legal Technology
 
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...Clio - Cloud-Based Legal Technology
 

Mais de Clio - Cloud-Based Legal Technology (20)

Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
 
How Automating Client Intake Increases Client Confidence
How Automating Client Intake Increases Client ConfidenceHow Automating Client Intake Increases Client Confidence
How Automating Client Intake Increases Client Confidence
 
How Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client IntakeHow Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
 
2023 Legal Trends for Solo Law Firms
2023 Legal Trends for Solo Law Firms2023 Legal Trends for Solo Law Firms
2023 Legal Trends for Solo Law Firms
 
Increase Your Profits While Reducing Burnout
Increase Your Profits While Reducing BurnoutIncrease Your Profits While Reducing Burnout
Increase Your Profits While Reducing Burnout
 
90-Day Goal Setting for Legal Professionals
90-Day Goal Setting for Legal Professionals90-Day Goal Setting for Legal Professionals
90-Day Goal Setting for Legal Professionals
 
Insights from the 2022 Legal Trends Report - Slides.pdf
Insights from the 2022 Legal Trends Report - Slides.pdfInsights from the 2022 Legal Trends Report - Slides.pdf
Insights from the 2022 Legal Trends Report - Slides.pdf
 
How to Refine Your Law Firm Business Model
How to Refine Your Law Firm Business ModelHow to Refine Your Law Firm Business Model
How to Refine Your Law Firm Business Model
 
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
 
2022 in Review: What's Working for Your Firm and What Isn't
2022 in Review: What's Working for Your Firm and What Isn't2022 in Review: What's Working for Your Firm and What Isn't
2022 in Review: What's Working for Your Firm and What Isn't
 
Watch How Family Lawyers Use Clio
Watch How Family Lawyers Use ClioWatch How Family Lawyers Use Clio
Watch How Family Lawyers Use Clio
 
Reclaim Your Time in 2023 with Clio’s Newest Features
Reclaim Your Time in 2023 with Clio’s Newest FeaturesReclaim Your Time in 2023 with Clio’s Newest Features
Reclaim Your Time in 2023 with Clio’s Newest Features
 
How to Grow a Law Firm_ From Startup to Success
How to Grow a Law Firm_ From Startup to SuccessHow to Grow a Law Firm_ From Startup to Success
How to Grow a Law Firm_ From Startup to Success
 
Customer Research: How to Gauge Client Satisfaction
Customer Research: How to Gauge Client SatisfactionCustomer Research: How to Gauge Client Satisfaction
Customer Research: How to Gauge Client Satisfaction
 
Cloud Software: The Key to Staff Success and Satisfaction
Cloud Software: The Key to Staff Success and SatisfactionCloud Software: The Key to Staff Success and Satisfaction
Cloud Software: The Key to Staff Success and Satisfaction
 
How to Generate New Business With Client Reviews
How to Generate New Business With Client ReviewsHow to Generate New Business With Client Reviews
How to Generate New Business With Client Reviews
 
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
 
Key Insights from the 2022 Legal Trends Report
Key Insights from the 2022 Legal Trends ReportKey Insights from the 2022 Legal Trends Report
Key Insights from the 2022 Legal Trends Report
 
Billing Week Stress to Collections Success Webinar.pdf
Billing Week Stress to Collections Success Webinar.pdfBilling Week Stress to Collections Success Webinar.pdf
Billing Week Stress to Collections Success Webinar.pdf
 
Streamline Your Court Interactions With Technology
Streamline Your Court Interactions With TechnologyStreamline Your Court Interactions With Technology
Streamline Your Court Interactions With Technology
 

Último

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Último (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Putting your practice on cloud 9

  • 3. 3
  • 4. 4
  • 5. 5
  • 6. tradi*onal  compu*ng  model The  Internet Local  Area  Network
  • 12. You need to deliver a better experience to your clients
  • 14. There is a profound message here for lawyers—when thinking IT and the Internet, the challenge is not to automate current working practices that are not efficient. The challenge is to innovate, to practice law in ways that we could not have done in the past. 14
  • 15.
  • 16.
  • 17. It’s not just what you sell 47% 53% It’s how you sell it
  • 19. laggards 16% late majority 34% early majority 34% early adopters 13.5% innovators 2.5%
  • 20.
  • 21. up  and  running  fast 21
  • 24.
  • 25. ethics of cloud computing
  • 26. North  Carolina  State  Bar   Ethics  Inquiry •2011  FEO  6  "Subscribing  to  So.ware  as  a  Service  While  Fulfilling   Confiden*ality  and  Preserva*on  of  Client  Property" •First  ethics  opinion  in  North  America  specifically  focused  on  use   of  cloud  compu*ng  in  a  law  firm
  • 27. Inquiry  #1 Is  it  within  the  Rules  of  Professional  Conduct  for  an   attorney/law  7irm  to  use  online  ("cloud  computing")   practice  management  programs  (e.g.,  the  Clio  program)   as  part  of  the  practice  of  law?    These  are  instances  where   the  software  program  is  accessed  online  with  a  password   and  is  not  software  installed  on  a  computer  within  the   5irm's  of5ice.
  • 28. North  Carolina  Proposed  Formal  Ethics  Opinion Yes,  provided  steps  are  taken  effectively  to  minimize  the  risk  of   inadvertent  or  unauthorized  disclosure  of  con5idential  client   information  and  to  protect  client  property,  including  5ile  information,   from  risk  of  loss.
  • 29. Other  States  Following  Suit • Pennsylvania  Formal  Opinion  2011-­‐200 • California  Formal  Opinion  No.  2010-­‐179 • Alabama  State  Bar  Ethics  Opinion  2010-­‐02 • Arizona  State  Bar  Formal  Opinion  09-­‐04 • Nevada  State  Bar  Formal  Opinion  No.  33 • New  York  State  Bar  Associa*on  Opinion  842  of  2010 • Iowa  Op.  11-­‐01 • Oregon  Formal  Op.  2011-­‐188 • Vermont  Advisory  Ethics  Op.  2010-­‐6 • Massachuse[s  MBA  Ethics  Opinion  12-­‐03   29
  • 30. ABA  20/20  Ethics  Commission •Examining  how  a  lawyer’s  ethical  responsibili*es  apply  to  cloud   compu*ng •Recommenda*ons  adopted  in  August  2012 30
  • 31. ABA  20/20  Ethics  Commission •The  development  of  a  centralized,  user-­‐friendly  website  that   contains  con*nuously  updated  and  detailed  informa*on  about   confiden*ality-­‐related  ethics  issues  arising  from  lawyer’s  use  of   technology,  including  the  latest  data  security  standards. •Amendments  to  several  Model  Rules  of  Professional  Conduct   and  their  Comments  to  offer  specific  guidance  and  expecta*ons   rela*ng  to  technology. 31
  • 32. ABA  20/20  Ethics  Commission The  Commission  concluded  that  competent  lawyers  must  have  some   awareness  of  basic  features  of  technology.  To  make  this  point,  the   Commission  is  recommending  an  amendment  to  Comment  [6]  of  Model   Rule  1.1  (Competence)  that  would  emphasize  that,  in  order  to  stay  abreast   of  changes  in  the  law  and  its  practice,  lawyers  need  to  have  a  basic   understanding  of  technology’s  bene5its  and  risks. 32
  • 33. ABA  20/20  Ethics  Commission Proposed  new  Model  Rule  1.6(c)  would  make  clear  that  a  lawyer  has  an   ethical  duty  to  take  reasonable  measures  to  protect  a  client’s   con7idential  information  from  inadvertent  disclosure  and   unauthorized  access.  This  duty  is  already  implicit  in  Model  Rule  1.6  and  is   described  in  several  existing  comments,  but  the  Commission  concluded  that,   in  light  of  the  pervasive  use  of  technology  to  store  and  transmit  con5idential   client  information,  this  obligation  should  be  stated  explicitly  in  the  black   letter  of  Model  Rule  1.6. 33
  • 34. ABA  Model   Rules  of  Professional  Conduct “ When transmitting a communication that includes information relating to the representation of a client, the lawyer must take reasonable precautions to prevent the information from coming into the hands of unintended recipients. This duty, however, does not require that the lawyer use special security measures if the method of communication affords a reasonable expectation of privacy.” (Emphasis added) Comment 17, Rule 1.6 34
  • 36. Encryption Terms of Service Security Data Privacy Data Availability 36
  • 38. terminology •Secure  Sockets  Layer  (SSL) ØIndustry  standard  protocol  for  securing   Internet  communica*ons ØBanks,  e-­‐commerce  sites  (Amazon.com,   etc.)  all  use  SSL  for  secure  communica*ons
  • 39. without  ssl Informa*on  exchanged  is  insecure Please  give  me  my  bank  account  balance $2,031.34 Your  Computer Your  Bank’s  Server
  • 40. with  ssl Informa*on  exchanged  is  encrypted  for  security 01101010001010110101010100101010 11010001110 Your  Computer Your  Bank’s  Server
  • 41. verifying  ssl  connec*ons A  sealed  lock  icon  indicates  a  secure  connec*on Internet  Explorer: Firefox: Safari:
  • 42.
  • 43. server  security Are  third-­‐party  audits  being  performed?
  • 49. 49
  • 50. 50
  • 52. privacy •Does  the  SaaS  provider  have  a  published  privacy  policy? •Need  to  ensure  you  own  your  data •The  private  client  informa*on  stored  with  your  SaaS  provider   cannot  be  used  for  any  other  purposes
  • 53. facebook  privacy  policy You hereby grant Facebook an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to (a) use, copy, publish, stream, store, retain, publicly perform or display, transmit, scan, reformat, modify, edit, frame, translate, excerpt, adapt, create derivative works and distribute (through multiple tiers), any User Content you (i) Post on or in connection with the Facebook Service or the promotion thereof subject only to your privacy settings. You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.
  • 54. TRUSTe How  is  sensi*ve  informa*on  being  handled? “TRUSTe’s   program   requirements   are   based   upon   the   Fair   Informa*on   Principles   and   OCED   Guidelines   around   no*ce,   choice,   access,   security,   and   redress   -­‐   the   core   founda*ons   of   privacy   and  building  trust.    Sealholders  are  required  to  undergo  a   rigorous   review   process   to   assess   the   accuracy   of   privacy   disclosures   and  compliance   with   TRUSTe’s   requirements   in  order   to  obtain  cer*fica*on.”
  • 56. 56
  • 57. 57
  • 58. 58
  • 59. 59
  • 60. Data  Loca/on •Where  is  main  data  center(s) •Is  data  backed  up  to  mul*ple  offsite  loca*ons?
  • 61. external  backup  provisions •Can  you  perform  an  export  of  your  data? Comma  Separated  Values  (CSV) Extensible  Markup  Language  (XML) Microso1  Excel  (XLS)
  • 62. business  con*nuity What  if  the  SaaS  provider  goes  out  of  business?
  • 63. op*on  1:  data  export Comma  Separated  Values  (CSV) Extensible  Markup  Language  (XML) Microso1  Excel  (XLS) Cross  your  fingers  and  hope  you’re  up  to  date…
  • 64. If  it  isn’t   automated  you’ll   forget  to  do  it
  • 65. op*on  2:  data  escrow saas  provider escrow  provider saas  user
  • 66. terms of service / service level agreement
  • 67. terms  of  service •Easily  accessible,  published  ToS? •Outlines  the  condi*ons  under  which  you   agree  to  use  the  service   •Ensure  you’ve  reviewed  and  accepted   your  provider’s  terms  of  service
  • 68. service  level  agreement •SLA •Outlines  guaranteed  up*me  percentages •E.g.  99.9% •Usually  providers  for  some  kind  of  compensa*on  if   down*me  exceeds  SLA  guarantee
  • 70. 70
  • 71. 71
  • 72. 72