SlideShare uma empresa Scribd logo
1 de 29
Baixar para ler offline
April 11-13, 2011
                            www.techshow.com



Taking Your Practice
       Session Title
   Into the Cloud
       Presenters
           Presenters
     Antigone{Name}
              Peyton
       John Simek
             {Name}

         PRESENTED BY THE

                              April 11-13, 2011
                             www.techshow.com
Lawyers in the Cloud:
A Brave New World




                        © Copyright, Museum of Science, Boston, reprinted with permission.

                                                               April 11-13, 2011
                                                              www.techshow.com
Cloud Computing 101
       for Lawyers
• Cloud Computing-NIST Definition
  (Jan. 2011)
  – A computing model for enabling
    convenient, on-demand network
    access to a shared pool of computing
    resources (e.g., networks, servers,
    storage, applications, and services)
  – Resources can be consumed w/
    minimal management effort or service
    provider interaction
                           April 11-13, 2011
                          www.techshow.com
Cloud Computing 101
           for Lawyers
• Cloud Computing-NIST Definition
  (Jan. 2011)
     – This cloud model is composed of five
       essential characteristics, three
       service models, and four
       deployment models
•   NIST Definition of Cloud Computing (Draft), Peter Mell and
    Tim Grance, available at
    http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-800-
    145_cloud-definition.pdf



                                             April 11-13, 2011
                                            www.techshow.com
So What Does This
          Mean?
• You pay for what you use (economic
  model)
  – Per user/per month
  – Amount of space or computing power used
    in a given unit
  – Number of uploads/downloads
• Someone else takes care of the IT
  hardware and software
• Outsourcing computing infrastructure

                             April 11-13, 2011
                            www.techshow.com
5 Essential Characteristics
• On demand self-
  service
• Broad network access
• Resource sharing with
  others (multi-tenancy)
• Rapid elasticity
• Measured service



                            April 11-13, 2011
                           www.techshow.com
Service Models
• SaaS-“Software-as-a-Service”
  – Common service model for lawyers
  – Interact with the software that you
    bought the rights to use to consume
    computing power
  – Clio, Rocket Matter,
    NetDocuments,
    Google Apps


                           April 11-13, 2011
                          www.techshow.com
Deployment Models
• Private-I want my own data island
  that you or I manage
• Community-I will share with
  others of like needs and interests
• Public-I will share the servers,
  applications, and computing
  resources with others
• Hybrid-A little bit of both choices

                      April 11-13, 2011
                     www.techshow.com
Reliability
• Network Technology
• DNS
• Redundancy-data in more than
  one location
• Elasticity-reacts to ebb and flow of
  data usage
• Risk assessment-cyberthreats and
  Internet infrastructure attacks
                          April 11-13, 2011
                         www.techshow.com
Reliability
• Cyberattacks on the rise
  – Symantec annual threat review found
    # of Web attacks rose 93% in 2010
  – Expected increase in attacks on
    social networks
  – Shift to mobile devices




                          April 11-13, 2011
                         www.techshow.com
Internet Access
• Centralized storage and
  accessibility over the Internet gives
  rise to good accessibility
• Good mobility
• Platform indifferent-
  Windows/Mac/Linux
• iPad/Netbooks
• Smartphones
                          April 11-13, 2011
                         www.techshow.com
Client Access
•   Internet
•   Dedicated circuit
•   Browser
•   Client app
    – 2 Factor




                         April 11-13, 2011
                        www.techshow.com
Confidentiality
• Systems built with access security
  measures
• Data structure protects different
  users data from intermingling
• Reasonable measures to protect
  information
• Similar considerations to third
  party vendor situations
                         April 11-13, 2011
                        www.techshow.com
Data Security
• Encryption on servers
• Enterprise style user security
• Lack of local storage can protect
  data (reduced risk of lost laptop
  problem if local data not
  encrypted)



                         April 11-13, 2011
                        www.techshow.com
Data Security
• Security certifications and
  approved security protocols
• Physical security
• Technical/virtual security
• Beware of compromised security
  certificates (e.g., Comodo SSL
  certificates compromised)

                       April 11-13, 2011
                      www.techshow.com
The Ethics of Cloud
            Computing
• More detail on this in later panel
  discussions-hot topic!
• Bottom line of opinions:
  – Understand the technology & how it works
  – Take reasonable steps to protect the
    information
• At this point, not per se violation of ethics
  rules to put client data in the cloud

                               April 11-13, 2011
                              www.techshow.com
Data Privacy
• Encryption
• Export restrictions
• Processing
  restrictions
• Who can look under
  the hood?
• Patchwork of federal
  & state laws
                          April 11-13, 2011
                         www.techshow.com
Cross-Border
         Considerations
• EU Directives and member state
  implementation and enforcement
  mechanisms
• Canadian federal laws (PIPEDA,
  Privacy Act) and province-specific
  restrictions and protections
• Export control
• Always consider server locations &
  application of local laws

                           April 11-13, 2011
                          www.techshow.com
Implementation
• Private vs. public cloud
• Outsourced private cloud
  – Federal Government
  – City of LA “Gov Cloud”
• Hybrid cloud




                              April 11-13, 2011
                             www.techshow.com
Other Considerations
• Financial stability of cloud provider
• Bankruptcy backup plan?
• Data ownership/possession/control
  are divided between the firm and
  the provider(s)
• FRE 34-”Control” read broadly by
  most circuit courts

                          April 11-13, 2011
                         www.techshow.com
Other Considerations
• Data backup
  – Local or remote & encrypted
• Backup includes a fully functional alternative if
  the primary provider encounters issues?
• Who are you contracting with?
• What are the contractual duties regarding data
  access, transfer, guaranteed minimum
  downtime



                                   April 11-13, 2011
                                  www.techshow.com
Read The Contract!
• The contract (TOS, SLA, Privacy
  Policy) governs the parties rights
  and obligations
• Is it updated regularly and applied
  nunc pro tunc to existing
  customers
• What are the cloud provider’s
  obligations?
                          April 11-13, 2011
                         www.techshow.com
Read The Contract!
• A real cloud contract (TOS)
• (1) The Service is provided on an “as is”, “as available” basis
  and CoX expressly disclaims all warranties, including the
  warranties of merchantability and fitness for a particular
  purpose.
  (2) CoX and its …. affiliates does not warrant that:
  (a) the Service will meet any specific requirements;
  (b) the Service will be uninterrupted, timely, secure, or error-
  free;
  (c) the results that may be obtained from the use of the
  Service will be accurate or reliable;
  (d) the quality of any products, services, information, or other
  material purchased or obtained through the Service will meet
  any expectations; and
  (e) any errors in the Service will be corrected.


                                            April 11-13, 2011
                                           www.techshow.com
Upgrades
•   Ability to control?
•   Cost
•   Latest version(s) integrated
•   Customization options vs. provider
    driven software changes




                          April 11-13, 2011
                         www.techshow.com
Exit Strategy
• Data export options
  – Quicken Online
• File formats
• Data conversion or re-creation of
  native environment




                         April 11-13, 2011
                        www.techshow.com
Information Governance /
    Records Management
• Migration of data into/out of the cloud
• Identification and application of data
  retention requirements
• Impose company retention/destruction
  needs on providers



                           April 11-13, 2011
                          www.techshow.com
E-Discovery & Legal
        Compliance
• Subpoenas
• Government investigations
• Ability to provide discovery of
  particular custodians’ data?
  – No such thing?
• What if you are a
  non-party?

                          April 11-13, 2011
                         www.techshow.com
E-Discovery & Legal
        Compliance
• Specific bar association opinions
  on duties (e.g., Arizona opinion)
• HIPAA
• Data breach notification
  – Who is required to notify?
  – Who do they notify?



                            April 11-13, 2011
                           www.techshow.com
Save the Date
ABA TECHSHOW 2012
 March 29-31, 2012
   Hilton Chicago




                    April 11-13, 2011
                   www.techshow.com

Mais conteúdo relacionado

Mais procurados

Application of the internet
Application of the internetApplication of the internet
Application of the internetLayani Malsha
 
00.fnc forensics overview new
00.fnc forensics overview new00.fnc forensics overview new
00.fnc forensics overview newforensicsnation
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issuesMaher Al Beshlawy
 
Internet Applications
Internet ApplicationsInternet Applications
Internet ApplicationsMarlon Jamera
 
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft Shane Tilton
 
Safe and ethical use of technology
Safe and ethical use of technologySafe and ethical use of technology
Safe and ethical use of technologyAllison Loyd
 
Copyrightcrashcc
CopyrightcrashccCopyrightcrashcc
Copyrightcrashcc12claudio
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resourcesb5thom
 
search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense NanubalaDhruvan
 
Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3jpc6760
 
Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2jpc6760
 
Internet basics
Internet basicsInternet basics
Internet basicsosuchin
 
Presentation internet programming report
Presentation internet programming reportPresentation internet programming report
Presentation internet programming reportBilal Maqbool ツ
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 

Mais procurados (20)

Application of the internet
Application of the internetApplication of the internet
Application of the internet
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
FNC Forensics Overview
FNC Forensics OverviewFNC Forensics Overview
FNC Forensics Overview
 
00.fnc forensics overview new
00.fnc forensics overview new00.fnc forensics overview new
00.fnc forensics overview new
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issues
 
The internet
The internetThe internet
The internet
 
Internet Applications
Internet ApplicationsInternet Applications
Internet Applications
 
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
 
Safe and ethical use of technology
Safe and ethical use of technologySafe and ethical use of technology
Safe and ethical use of technology
 
Copyrightcrashcc
CopyrightcrashccCopyrightcrashcc
Copyrightcrashcc
 
Educational Technology
Educational TechnologyEducational Technology
Educational Technology
 
9 Interactive Multimedia
9 Interactive Multimedia9 Interactive Multimedia
9 Interactive Multimedia
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense
 
Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3
 
Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2
 
Internet basics
Internet basicsInternet basics
Internet basics
 
Presentation internet programming report
Presentation internet programming reportPresentation internet programming report
Presentation internet programming report
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Destaque

Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Antigone Peyton
 
Presentation1
Presentation1Presentation1
Presentation123sakshi
 
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceAntigone Peyton
 
Three worlds collide
Three worlds collideThree worlds collide
Three worlds collidegregamarshall
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsAntigone Peyton
 

Destaque (7)

2013 SBIR Presentation
2013 SBIR Presentation2013 SBIR Presentation
2013 SBIR Presentation
 
Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)
 
Scaffolds
ScaffoldsScaffolds
Scaffolds
 
Presentation1
Presentation1Presentation1
Presentation1
 
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
 
Three worlds collide
Three worlds collideThree worlds collide
Three worlds collide
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy Implications
 

Semelhante a Taking Your Practice Into the Cloud (2011)

HDF: Hortonworks DataFlow: Technical Workshop
HDF: Hortonworks DataFlow: Technical WorkshopHDF: Hortonworks DataFlow: Technical Workshop
HDF: Hortonworks DataFlow: Technical WorkshopHortonworks
 
Presentation atmos architecture overview
Presentation   atmos architecture overviewPresentation   atmos architecture overview
Presentation atmos architecture overviewxKinAnx
 
SalesLogix Portals: Take Advantage of the Latest SalesLogix Technology
SalesLogix Portals: Take Advantage of the Latest SalesLogix TechnologySalesLogix Portals: Take Advantage of the Latest SalesLogix Technology
SalesLogix Portals: Take Advantage of the Latest SalesLogix TechnologyInfinity Info Systems
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxSmithaV19
 
web world wide defination introduction.pptx
web world wide defination introduction.pptxweb world wide defination introduction.pptx
web world wide defination introduction.pptxubaidullah75790
 
Unit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internetUnit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internetgabriela-technoteacher
 
Topic1-Business Value of Telecommunication Networks.pptx
Topic1-Business Value of Telecommunication Networks.pptxTopic1-Business Value of Telecommunication Networks.pptx
Topic1-Business Value of Telecommunication Networks.pptxCallplanetsDeveloper
 
Unit 1 - Business Value of Telecommunication Networks.pptx
Unit 1 - Business Value of Telecommunication Networks.pptxUnit 1 - Business Value of Telecommunication Networks.pptx
Unit 1 - Business Value of Telecommunication Networks.pptxCallplanetsDeveloper
 
Using a Service Oriented Architecture to Manage IT Sprawl
Using a Service Oriented Architecture to Manage IT SprawlUsing a Service Oriented Architecture to Manage IT Sprawl
Using a Service Oriented Architecture to Manage IT SprawlJeffrey Hurley
 
Ch08-Architecture Design
Ch08-Architecture DesignCh08-Architecture Design
Ch08-Architecture DesignFajar Baskoro
 
SemTech West 2011 - Digital Provenance
SemTech West 2011 - Digital ProvenanceSemTech West 2011 - Digital Provenance
SemTech West 2011 - Digital Provenancegvj4v
 
BigData Techcon - Beyond Messaging with Apache NiFi
BigData Techcon - Beyond Messaging with Apache NiFiBigData Techcon - Beyond Messaging with Apache NiFi
BigData Techcon - Beyond Messaging with Apache NiFiAldrin Piri
 
Beyond Messaging Enterprise Dataflow powered by Apache NiFi
Beyond Messaging Enterprise Dataflow powered by Apache NiFiBeyond Messaging Enterprise Dataflow powered by Apache NiFi
Beyond Messaging Enterprise Dataflow powered by Apache NiFiIsheeta Sanghi
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Hortonworks DataFlow & Apache Nifi @Oslo Hadoop Big Data
Hortonworks DataFlow & Apache Nifi @Oslo Hadoop Big DataHortonworks DataFlow & Apache Nifi @Oslo Hadoop Big Data
Hortonworks DataFlow & Apache Nifi @Oslo Hadoop Big DataMats Johansson
 
CMPE 297 Lecture: Building Infrastructure Clouds with OpenStack
CMPE 297 Lecture: Building Infrastructure Clouds with OpenStackCMPE 297 Lecture: Building Infrastructure Clouds with OpenStack
CMPE 297 Lecture: Building Infrastructure Clouds with OpenStackJoe Arnold
 
Apache NiFi Toronto Meetup
Apache NiFi Toronto MeetupApache NiFi Toronto Meetup
Apache NiFi Toronto MeetupHortonworks
 
Application integration
Application integrationApplication integration
Application integrationImran Aziz
 

Semelhante a Taking Your Practice Into the Cloud (2011) (20)

HDF: Hortonworks DataFlow: Technical Workshop
HDF: Hortonworks DataFlow: Technical WorkshopHDF: Hortonworks DataFlow: Technical Workshop
HDF: Hortonworks DataFlow: Technical Workshop
 
Presentation atmos architecture overview
Presentation   atmos architecture overviewPresentation   atmos architecture overview
Presentation atmos architecture overview
 
Ch11
Ch11Ch11
Ch11
 
SalesLogix Portals: Take Advantage of the Latest SalesLogix Technology
SalesLogix Portals: Take Advantage of the Latest SalesLogix TechnologySalesLogix Portals: Take Advantage of the Latest SalesLogix Technology
SalesLogix Portals: Take Advantage of the Latest SalesLogix Technology
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
 
web world wide defination introduction.pptx
web world wide defination introduction.pptxweb world wide defination introduction.pptx
web world wide defination introduction.pptx
 
Unit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internetUnit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internet
 
Topic1-Business Value of Telecommunication Networks.pptx
Topic1-Business Value of Telecommunication Networks.pptxTopic1-Business Value of Telecommunication Networks.pptx
Topic1-Business Value of Telecommunication Networks.pptx
 
Unit 1 - Business Value of Telecommunication Networks.pptx
Unit 1 - Business Value of Telecommunication Networks.pptxUnit 1 - Business Value of Telecommunication Networks.pptx
Unit 1 - Business Value of Telecommunication Networks.pptx
 
Using a Service Oriented Architecture to Manage IT Sprawl
Using a Service Oriented Architecture to Manage IT SprawlUsing a Service Oriented Architecture to Manage IT Sprawl
Using a Service Oriented Architecture to Manage IT Sprawl
 
Ch08-Architecture Design
Ch08-Architecture DesignCh08-Architecture Design
Ch08-Architecture Design
 
SemTech West 2011 - Digital Provenance
SemTech West 2011 - Digital ProvenanceSemTech West 2011 - Digital Provenance
SemTech West 2011 - Digital Provenance
 
BigData Techcon - Beyond Messaging with Apache NiFi
BigData Techcon - Beyond Messaging with Apache NiFiBigData Techcon - Beyond Messaging with Apache NiFi
BigData Techcon - Beyond Messaging with Apache NiFi
 
Beyond Messaging Enterprise Dataflow powered by Apache NiFi
Beyond Messaging Enterprise Dataflow powered by Apache NiFiBeyond Messaging Enterprise Dataflow powered by Apache NiFi
Beyond Messaging Enterprise Dataflow powered by Apache NiFi
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Hortonworks DataFlow & Apache Nifi @Oslo Hadoop Big Data
Hortonworks DataFlow & Apache Nifi @Oslo Hadoop Big DataHortonworks DataFlow & Apache Nifi @Oslo Hadoop Big Data
Hortonworks DataFlow & Apache Nifi @Oslo Hadoop Big Data
 
Ch02
Ch02Ch02
Ch02
 
CMPE 297 Lecture: Building Infrastructure Clouds with OpenStack
CMPE 297 Lecture: Building Infrastructure Clouds with OpenStackCMPE 297 Lecture: Building Infrastructure Clouds with OpenStack
CMPE 297 Lecture: Building Infrastructure Clouds with OpenStack
 
Apache NiFi Toronto Meetup
Apache NiFi Toronto MeetupApache NiFi Toronto Meetup
Apache NiFi Toronto Meetup
 
Application integration
Application integrationApplication integration
Application integration
 

Mais de Antigone Peyton

A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)Antigone Peyton
 
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Antigone Peyton
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIAAntigone Peyton
 
Angel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging TechnologiesAngel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging TechnologiesAntigone Peyton
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for LitigatorsAntigone Peyton
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP FracasAntigone Peyton
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)Antigone Peyton
 

Mais de Antigone Peyton (8)

A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)
 
Lawyers in the Cloud
Lawyers in the CloudLawyers in the Cloud
Lawyers in the Cloud
 
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIA
 
Angel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging TechnologiesAngel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging Technologies
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for Litigators
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP Fracas
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)
 

Último

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Taking Your Practice Into the Cloud (2011)

  • 1. April 11-13, 2011 www.techshow.com Taking Your Practice Session Title Into the Cloud Presenters Presenters Antigone{Name} Peyton John Simek {Name} PRESENTED BY THE April 11-13, 2011 www.techshow.com
  • 2. Lawyers in the Cloud: A Brave New World © Copyright, Museum of Science, Boston, reprinted with permission. April 11-13, 2011 www.techshow.com
  • 3. Cloud Computing 101 for Lawyers • Cloud Computing-NIST Definition (Jan. 2011) – A computing model for enabling convenient, on-demand network access to a shared pool of computing resources (e.g., networks, servers, storage, applications, and services) – Resources can be consumed w/ minimal management effort or service provider interaction April 11-13, 2011 www.techshow.com
  • 4. Cloud Computing 101 for Lawyers • Cloud Computing-NIST Definition (Jan. 2011) – This cloud model is composed of five essential characteristics, three service models, and four deployment models • NIST Definition of Cloud Computing (Draft), Peter Mell and Tim Grance, available at http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-800- 145_cloud-definition.pdf April 11-13, 2011 www.techshow.com
  • 5. So What Does This Mean? • You pay for what you use (economic model) – Per user/per month – Amount of space or computing power used in a given unit – Number of uploads/downloads • Someone else takes care of the IT hardware and software • Outsourcing computing infrastructure April 11-13, 2011 www.techshow.com
  • 6. 5 Essential Characteristics • On demand self- service • Broad network access • Resource sharing with others (multi-tenancy) • Rapid elasticity • Measured service April 11-13, 2011 www.techshow.com
  • 7. Service Models • SaaS-“Software-as-a-Service” – Common service model for lawyers – Interact with the software that you bought the rights to use to consume computing power – Clio, Rocket Matter, NetDocuments, Google Apps April 11-13, 2011 www.techshow.com
  • 8. Deployment Models • Private-I want my own data island that you or I manage • Community-I will share with others of like needs and interests • Public-I will share the servers, applications, and computing resources with others • Hybrid-A little bit of both choices April 11-13, 2011 www.techshow.com
  • 9. Reliability • Network Technology • DNS • Redundancy-data in more than one location • Elasticity-reacts to ebb and flow of data usage • Risk assessment-cyberthreats and Internet infrastructure attacks April 11-13, 2011 www.techshow.com
  • 10. Reliability • Cyberattacks on the rise – Symantec annual threat review found # of Web attacks rose 93% in 2010 – Expected increase in attacks on social networks – Shift to mobile devices April 11-13, 2011 www.techshow.com
  • 11. Internet Access • Centralized storage and accessibility over the Internet gives rise to good accessibility • Good mobility • Platform indifferent- Windows/Mac/Linux • iPad/Netbooks • Smartphones April 11-13, 2011 www.techshow.com
  • 12. Client Access • Internet • Dedicated circuit • Browser • Client app – 2 Factor April 11-13, 2011 www.techshow.com
  • 13. Confidentiality • Systems built with access security measures • Data structure protects different users data from intermingling • Reasonable measures to protect information • Similar considerations to third party vendor situations April 11-13, 2011 www.techshow.com
  • 14. Data Security • Encryption on servers • Enterprise style user security • Lack of local storage can protect data (reduced risk of lost laptop problem if local data not encrypted) April 11-13, 2011 www.techshow.com
  • 15. Data Security • Security certifications and approved security protocols • Physical security • Technical/virtual security • Beware of compromised security certificates (e.g., Comodo SSL certificates compromised) April 11-13, 2011 www.techshow.com
  • 16. The Ethics of Cloud Computing • More detail on this in later panel discussions-hot topic! • Bottom line of opinions: – Understand the technology & how it works – Take reasonable steps to protect the information • At this point, not per se violation of ethics rules to put client data in the cloud April 11-13, 2011 www.techshow.com
  • 17. Data Privacy • Encryption • Export restrictions • Processing restrictions • Who can look under the hood? • Patchwork of federal & state laws April 11-13, 2011 www.techshow.com
  • 18. Cross-Border Considerations • EU Directives and member state implementation and enforcement mechanisms • Canadian federal laws (PIPEDA, Privacy Act) and province-specific restrictions and protections • Export control • Always consider server locations & application of local laws April 11-13, 2011 www.techshow.com
  • 19. Implementation • Private vs. public cloud • Outsourced private cloud – Federal Government – City of LA “Gov Cloud” • Hybrid cloud April 11-13, 2011 www.techshow.com
  • 20. Other Considerations • Financial stability of cloud provider • Bankruptcy backup plan? • Data ownership/possession/control are divided between the firm and the provider(s) • FRE 34-”Control” read broadly by most circuit courts April 11-13, 2011 www.techshow.com
  • 21. Other Considerations • Data backup – Local or remote & encrypted • Backup includes a fully functional alternative if the primary provider encounters issues? • Who are you contracting with? • What are the contractual duties regarding data access, transfer, guaranteed minimum downtime April 11-13, 2011 www.techshow.com
  • 22. Read The Contract! • The contract (TOS, SLA, Privacy Policy) governs the parties rights and obligations • Is it updated regularly and applied nunc pro tunc to existing customers • What are the cloud provider’s obligations? April 11-13, 2011 www.techshow.com
  • 23. Read The Contract! • A real cloud contract (TOS) • (1) The Service is provided on an “as is”, “as available” basis and CoX expressly disclaims all warranties, including the warranties of merchantability and fitness for a particular purpose. (2) CoX and its …. affiliates does not warrant that: (a) the Service will meet any specific requirements; (b) the Service will be uninterrupted, timely, secure, or error- free; (c) the results that may be obtained from the use of the Service will be accurate or reliable; (d) the quality of any products, services, information, or other material purchased or obtained through the Service will meet any expectations; and (e) any errors in the Service will be corrected. April 11-13, 2011 www.techshow.com
  • 24. Upgrades • Ability to control? • Cost • Latest version(s) integrated • Customization options vs. provider driven software changes April 11-13, 2011 www.techshow.com
  • 25. Exit Strategy • Data export options – Quicken Online • File formats • Data conversion or re-creation of native environment April 11-13, 2011 www.techshow.com
  • 26. Information Governance / Records Management • Migration of data into/out of the cloud • Identification and application of data retention requirements • Impose company retention/destruction needs on providers April 11-13, 2011 www.techshow.com
  • 27. E-Discovery & Legal Compliance • Subpoenas • Government investigations • Ability to provide discovery of particular custodians’ data? – No such thing? • What if you are a non-party? April 11-13, 2011 www.techshow.com
  • 28. E-Discovery & Legal Compliance • Specific bar association opinions on duties (e.g., Arizona opinion) • HIPAA • Data breach notification – Who is required to notify? – Who do they notify? April 11-13, 2011 www.techshow.com
  • 29. Save the Date ABA TECHSHOW 2012 March 29-31, 2012 Hilton Chicago April 11-13, 2011 www.techshow.com