SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
March 29-31, 2012
                                   www.techshow.com




Angel and Devil: Danger of Emerging
 Technologies That Lawyers Love

              Presenters
            Ivan Hemmans
            Antigone Peyton


                PRESENTED BY THE

                                             March 29-31, 2012
                                             www.techshow.com
It’s A Race
• The rate at which new technologies
  are developed, packaged, and
  delivered is increasing.
• Most find it impossible stay atop all
  the new gadgets and cool tools that
  compete for our time, our attention,
  and our dollars.


                               March 29-31, 2012
                               www.techshow.com
We’re Here to Help




                March 29-31, 2012
                www.techshow.com
Standard Concerns
•   Mobile access & storage
•   Security
•   RFID
•   Geo location
•   Social networks
•   Privacy


                              March 29-31, 2012
                              www.techshow.com
Personal, Meet Business
• Loss of the enterprise wall
• Data, data, everywhere . . .
• Mixing of worlds
  – Hardware
  – Software & programs
  – Storage locations



                                 March 29-31, 2012
                                 www.techshow.com
There’s no better teacher than reality . . .




                                      March 29-31, 2012
                                      www.techshow.com
Radio Frequency Identifier (RFID)

• Can track anyone or any product
  anywhere
• Security concerns
• Privacy
• TMI?




                             March 29-31, 2012
                             www.techshow.com
iCloud
• Apple says:
  – “iCloud stores your music, photos, documents, and
    more and wirelessly pushes them to all your devices.
    Automatic, effortless, and seamless — it just works.”




                                             March 29-31, 2012
                                             www.techshow.com
Apps & iCloud
Devil                                               Angel

Lots of 3rd-party app development to make sharing   Each 3rd-party developer has his or her own terms of
easy                                                use and privacy policies


Love the app store!                                 Apps may have their own security vulnerabilities



Easy backup to Apple servers                        Terms and conditions may not mesh with any
                                                    requirements as set forth by clients or jurisdictions in
                                                    which your firm operates



Documents available from multiple devices           Service may terminate with or without notice. Tight
                                                    integration with Apple means that Apple can collect
                                                    lots of usage information

Easy to use                                         Hard to manage without an Mobile Device
                                                    Management server




                                                                                    March 29-31, 2012
                                                                                    www.techshow.com
Android Devices
• Open Source platform
• More choices
• Malware issues




                         March 29-31, 2012
                         www.techshow.com
Android
Devil                                               Angel

Documents available from any web-enabled device     Service may terminate with or without your notice


Low cost                                            Tight integration with Google means that Google can
                                                    collect lots of usage information

Multitasking                                        Potential for poor battery performance
                                                    Increased potential for malware

Lots of 3rd-party app development to make sharing   Each 3rd-party developer has his or her own terms of
easy                                                use and privacy policies

                                                    Apps may have their own security vulnerabilities


Easy backup to Google servers                       Terms and conditions may not mesh with any
                                                    requirements as set forth by clients or jurisdictions
                                                    within with your firm operates

Documents available from multiple devices           Service may terminate with or without your notice


Easy to use                                         Hard to manage without an Mobile Device
                                                    Management server




                                                                                  March 29-31, 2012
                                                                                  www.techshow.com
Dropbox
• Will give data to government or in
  response to subpoena
• Enables third party decryption
• Past password drops/security
  breaches
• Policy changes follow public outcry
  and investigations
• Data on Amazon S3
                              March 29-31, 2012
                              www.techshow.com
Dropbox
Devil                                                  Angel

Apps to integrate all your devices with Dropbox        Makes it very easy to take firm data into and out of
                                                       the firm



Lots of 3rd-party app development to make sharing      Each 3rd-party developer has his or her own terms of
with iOS and Android easy                              use and privacy policies



                                                       Terms and conditions may not mesh with any
                                                       requirements as set forth by clients or jurisdictions
                                                       within with your firm operates




Your files are available from any web-enabled device   Service may terminate with or without your notice.




                                                                                       March 29-31, 2012
                                                                                       www.techshow.com
Social Media
•   What’s private?
•   I know where you are today
•   Location setting confusion
•   Linked accounts




                                 March 29-31, 2012
                                 www.techshow.com
What Can You Do?
• Awareness is the first line of
  defense
  – Read documentation and blogs
• Ways to spread awareness:
  – Live presentations
  – E-mail distributions
  – Intranet postings, blogs
  – Empower thoughtleaders

                               March 29-31, 2012
                               www.techshow.com
Antigone Peyton - CEO & Founder                       Ivan Hemmans
Cloudigy Law, PLLC                                    O’Melveny & Myers
(703) 436-2033                                        Twitter: @ihemmans
antigone.peyton@cloudigylaw.com                       Website: http://www.hemmans.com
Twitter: @antigonepeyton; @cloudigylaw
Facebook: http://www.facebook.com/CloudigyLaw
LinkedIn: http://www.linkedin.com/in/antigonepeyton
Cloudigy blog: http://cloudigylaw.com/news/




                                                                                 March 29-31, 2012
                                                                                 www.techshow.com

Mais conteúdo relacionado

Mais procurados

Comm%20 tech%20final%20project
Comm%20 tech%20final%20projectComm%20 tech%20final%20project
Comm%20 tech%20final%20project
awgalv01
 
New media presentation_1
New media presentation_1New media presentation_1
New media presentation_1
mbucy21
 
Cloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole SiegelCloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole Siegel
nsiegel922
 
Cloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole SiegelCloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole Siegel
nsiegel922
 

Mais procurados (18)

Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
 
Lifted by the Cloud
Lifted by the CloudLifted by the Cloud
Lifted by the Cloud
 
Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
The New Internet: When Everything Becomes Smart
The New Internet: When Everything Becomes SmartThe New Internet: When Everything Becomes Smart
The New Internet: When Everything Becomes Smart
 
Internet of things (IOT) - Advanced Doorbell
Internet of things (IOT)  - Advanced DoorbellInternet of things (IOT)  - Advanced Doorbell
Internet of things (IOT) - Advanced Doorbell
 
Iot chap i
Iot chap iIot chap i
Iot chap i
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
 
Mediamorphosis 2013: Hacking the Body
Mediamorphosis 2013: Hacking the Body Mediamorphosis 2013: Hacking the Body
Mediamorphosis 2013: Hacking the Body
 
Designing chocolate, not aspirin
Designing chocolate, not aspirinDesigning chocolate, not aspirin
Designing chocolate, not aspirin
 
Comm%20 tech%20final%20project
Comm%20 tech%20final%20projectComm%20 tech%20final%20project
Comm%20 tech%20final%20project
 
New media presentation_1
New media presentation_1New media presentation_1
New media presentation_1
 
Internet of Things Webinar
Internet of Things WebinarInternet of Things Webinar
Internet of Things Webinar
 
Internet of Things for Libraries
Internet of Things for LibrariesInternet of Things for Libraries
Internet of Things for Libraries
 
Cloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole SiegelCloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole Siegel
 
Cloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole SiegelCloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole Siegel
 

Semelhante a Angel & Devil: Danger of Emerging Technologies

Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
Arrow ECS UK
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2016
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 

Semelhante a Angel & Devil: Danger of Emerging Technologies (20)

VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Three Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingThree Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content Sharing
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 

Mais de Antigone Peyton

Mais de Antigone Peyton (13)

Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
 
A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)
 
Lawyers in the Cloud
Lawyers in the CloudLawyers in the Cloud
Lawyers in the Cloud
 
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy Implications
 
2013 SBIR Presentation
2013 SBIR Presentation2013 SBIR Presentation
2013 SBIR Presentation
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIA
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for Litigators
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP Fracas
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)
 
Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)
 
Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 

Angel & Devil: Danger of Emerging Technologies

  • 1. March 29-31, 2012 www.techshow.com Angel and Devil: Danger of Emerging Technologies That Lawyers Love Presenters Ivan Hemmans Antigone Peyton PRESENTED BY THE March 29-31, 2012 www.techshow.com
  • 2. It’s A Race • The rate at which new technologies are developed, packaged, and delivered is increasing. • Most find it impossible stay atop all the new gadgets and cool tools that compete for our time, our attention, and our dollars. March 29-31, 2012 www.techshow.com
  • 3. We’re Here to Help March 29-31, 2012 www.techshow.com
  • 4. Standard Concerns • Mobile access & storage • Security • RFID • Geo location • Social networks • Privacy March 29-31, 2012 www.techshow.com
  • 5. Personal, Meet Business • Loss of the enterprise wall • Data, data, everywhere . . . • Mixing of worlds – Hardware – Software & programs – Storage locations March 29-31, 2012 www.techshow.com
  • 6. There’s no better teacher than reality . . . March 29-31, 2012 www.techshow.com
  • 7. Radio Frequency Identifier (RFID) • Can track anyone or any product anywhere • Security concerns • Privacy • TMI? March 29-31, 2012 www.techshow.com
  • 8. iCloud • Apple says: – “iCloud stores your music, photos, documents, and more and wirelessly pushes them to all your devices. Automatic, effortless, and seamless — it just works.” March 29-31, 2012 www.techshow.com
  • 9. Apps & iCloud Devil Angel Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of easy use and privacy policies Love the app store! Apps may have their own security vulnerabilities Easy backup to Apple servers Terms and conditions may not mesh with any requirements as set forth by clients or jurisdictions in which your firm operates Documents available from multiple devices Service may terminate with or without notice. Tight integration with Apple means that Apple can collect lots of usage information Easy to use Hard to manage without an Mobile Device Management server March 29-31, 2012 www.techshow.com
  • 10. Android Devices • Open Source platform • More choices • Malware issues March 29-31, 2012 www.techshow.com
  • 11. Android Devil Angel Documents available from any web-enabled device Service may terminate with or without your notice Low cost Tight integration with Google means that Google can collect lots of usage information Multitasking Potential for poor battery performance Increased potential for malware Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of easy use and privacy policies Apps may have their own security vulnerabilities Easy backup to Google servers Terms and conditions may not mesh with any requirements as set forth by clients or jurisdictions within with your firm operates Documents available from multiple devices Service may terminate with or without your notice Easy to use Hard to manage without an Mobile Device Management server March 29-31, 2012 www.techshow.com
  • 12. Dropbox • Will give data to government or in response to subpoena • Enables third party decryption • Past password drops/security breaches • Policy changes follow public outcry and investigations • Data on Amazon S3 March 29-31, 2012 www.techshow.com
  • 13. Dropbox Devil Angel Apps to integrate all your devices with Dropbox Makes it very easy to take firm data into and out of the firm Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of with iOS and Android easy use and privacy policies Terms and conditions may not mesh with any requirements as set forth by clients or jurisdictions within with your firm operates Your files are available from any web-enabled device Service may terminate with or without your notice. March 29-31, 2012 www.techshow.com
  • 14. Social Media • What’s private? • I know where you are today • Location setting confusion • Linked accounts March 29-31, 2012 www.techshow.com
  • 15. What Can You Do? • Awareness is the first line of defense – Read documentation and blogs • Ways to spread awareness: – Live presentations – E-mail distributions – Intranet postings, blogs – Empower thoughtleaders March 29-31, 2012 www.techshow.com
  • 16. Antigone Peyton - CEO & Founder Ivan Hemmans Cloudigy Law, PLLC O’Melveny & Myers (703) 436-2033 Twitter: @ihemmans antigone.peyton@cloudigylaw.com Website: http://www.hemmans.com Twitter: @antigonepeyton; @cloudigylaw Facebook: http://www.facebook.com/CloudigyLaw LinkedIn: http://www.linkedin.com/in/antigonepeyton Cloudigy blog: http://cloudigylaw.com/news/ March 29-31, 2012 www.techshow.com