SlideShare a Scribd company logo
1 of 40
Mobile Practice
Management
#ClioWeb
Agenda
1. Best practices for mobile security
2. Using a mobile device in your law practice

3. Applying best practices to Clio for iPhone
4. Questions
Best Practices for
Mobile Security

Joshua Lenon
Clio

#ClioWeb
Rise of Mobile Computing

• Computers now account for only 20.2% of
computing device sales

• Tablets are 14.6%
• Expected to exceed computer sales in 2015
• Cellphones account for 65% of all device sales

Photo by emma.marie on Flickr under Creative Commons License

Source: Financial Times, “Tablet sales
to overtake PCs,” 09/12/2013
Source: International Data Corporation, “Tablet Shipments Forecast to Top Tota
Shipments in the Fourth Quarter of 2013 and Annually by 2015, According to ID
09/11/2013
Mobile Computing in Law Firms

• 88% of lawyers have access to a smartphone
• 77% of lawyers have used a smartphone for
law-related tasks

• 52% of lawyers have access to a tablet
• 83% of firms allow personal mobile devices to
access firm’s network

• 25% of firms do not know if they have ever
experienced a security breach
Photo by ABC Archive on Flickr under Creative Commons License

Source: 2013 ABA Legal Technology
Survey Report
Risks of Mobile Computing

• Loss of Device
• 1/3 of robberies involves the theft of a mobile
phone

• 142,708 smartphones were reported lost in
2011

• Accidental damage is 10 x more common
than loss or theft

Photo by The Other Dan on Flickr under Creative Commons License

Sources: NBC News, McAfee, &
SquareTrade
Risks of Mobile Computing
• Device Confiscation
• U.S. Border Guards can seize & search devices with
“reasonable suspicion”

- United States v. Cotterman, 709

F.3d 952 (9th Cir., 2013)

• Police can search cell phones that lack password
protection - R. v. Fearon, 2013 ONCA 106 (CanLII)

• Person has a high expectation of privacy in a cell
phone's contents - Smallwood v. State (Fla., 2013)

Photo by Joseph Kranak on Flickr under Creative Commons License
Consequences

• Unauthorized access to client information
• Inability to act with diligence and promptness

Photo by Matt Hurst on Flickr under Creative Commons License
Security Procedures

• Password protect your device
• Back up your device regularly
• Register with device location services
• Store data in Cloud services
Using a mobile
device in your law
practice

Jeff Richardson
iPhoneJD

#ClioWeb
Jeff Richardson
The Law
Taking Notes

GoodNotes
Wacom Bamboo Stylus duo

Adonit Jot Pro
Reviewing MS Office
Documents
Pages
Documents to Go

Office² HD

Quickoffice

Polaris Office
Reading & Annotating PDFs

PDFpen
GoodReader

iAnnotate
Syncing and Confidentiality
ABA Model Rule 1.6(c)
A lawyer shall make reasonable efforts to
prevent the inadvertent or unauthorized
disclosure of, or unauthorized access to,
information relating to the representation of
a client.

Comment 8 to ABA Model Rule 1.1
To maintain the requisite knowledge and
skill, a lawyer should keep abreast of
changes in the law and its practice,
including the benefits and risks associated
with relevant technology, engage in
continuing study and education and comply
with all continuing legal education
requirements to which the lawyer is
subject.
Syncing and Confidentiality
Remote Access

LogMeIn

Citrix

Parallels
TranscriptPad
Applying Best
Practices
to Clio for iPhone

Joshua Lenon
Clio

#ClioWeb
Password Protection
Password Protection
Extra Security
Extra Security
Cloud Stored Client Data
Cloud Stored Client Data
Cloud Stored Client Data
Cloud Stored Client Data
Cloud Stored Client Data
Conclusion

Joshua Lenon
Clio

#ClioWeb
Security Procedures

• Password protect your device
• Back up your device regularly
• Register with device location services
• Store data in Cloud services
Questions?

Joshua Lenon
Clio

#ClioWeb
Thank You
www.goclio.com
@goClio
joshua@goclio.com
@Joshualenon
Smallfirminnovation.com
@SFInnovation

More Related Content

What's hot

IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
Potato
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Blake A. Klinkner
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT Colleges
Potato
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
Malasta Hill
 

What's hot (20)

Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
Cyber crime paper
Cyber crime paperCyber crime paper
Cyber crime paper
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT Colleges
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Internet google
Internet googleInternet google
Internet google
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 

Similar to Mobile Practice Management

AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
Jim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
Jim Romeo
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
lorainedeserre
 
Access Control, Authentication, and Public Key Infrastructure.docx
Access Control, Authentication, and Public Key Infrastructure.docxAccess Control, Authentication, and Public Key Infrastructure.docx
Access Control, Authentication, and Public Key Infrastructure.docx
nettletondevon
 

Similar to Mobile Practice Management (20)

Mobile practice management philly bar 2014 handout
Mobile practice management    philly bar 2014 handoutMobile practice management    philly bar 2014 handout
Mobile practice management philly bar 2014 handout
 
Smartphones are smarter than you thought geo bellas
Smartphones are smarter than you thought   geo bellasSmartphones are smarter than you thought   geo bellas
Smartphones are smarter than you thought geo bellas
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentCybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile Environment
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Cosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of ByodCosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of Byod
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
Access Control, Authentication, and Public Key Infrastructure.docx
Access Control, Authentication, and Public Key Infrastructure.docxAccess Control, Authentication, and Public Key Infrastructure.docx
Access Control, Authentication, and Public Key Infrastructure.docx
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 

More from Clio - Cloud-Based Legal Technology

More from Clio - Cloud-Based Legal Technology (20)

Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
 
How Automating Client Intake Increases Client Confidence
How Automating Client Intake Increases Client ConfidenceHow Automating Client Intake Increases Client Confidence
How Automating Client Intake Increases Client Confidence
 
How Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client IntakeHow Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
 
2023 Legal Trends for Solo Law Firms
2023 Legal Trends for Solo Law Firms2023 Legal Trends for Solo Law Firms
2023 Legal Trends for Solo Law Firms
 
Increase Your Profits While Reducing Burnout
Increase Your Profits While Reducing BurnoutIncrease Your Profits While Reducing Burnout
Increase Your Profits While Reducing Burnout
 
90-Day Goal Setting for Legal Professionals
90-Day Goal Setting for Legal Professionals90-Day Goal Setting for Legal Professionals
90-Day Goal Setting for Legal Professionals
 
Insights from the 2022 Legal Trends Report - Slides.pdf
Insights from the 2022 Legal Trends Report - Slides.pdfInsights from the 2022 Legal Trends Report - Slides.pdf
Insights from the 2022 Legal Trends Report - Slides.pdf
 
How to Refine Your Law Firm Business Model
How to Refine Your Law Firm Business ModelHow to Refine Your Law Firm Business Model
How to Refine Your Law Firm Business Model
 
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
 
2022 in Review: What's Working for Your Firm and What Isn't
2022 in Review: What's Working for Your Firm and What Isn't2022 in Review: What's Working for Your Firm and What Isn't
2022 in Review: What's Working for Your Firm and What Isn't
 
Watch How Family Lawyers Use Clio
Watch How Family Lawyers Use ClioWatch How Family Lawyers Use Clio
Watch How Family Lawyers Use Clio
 
Reclaim Your Time in 2023 with Clio’s Newest Features
Reclaim Your Time in 2023 with Clio’s Newest FeaturesReclaim Your Time in 2023 with Clio’s Newest Features
Reclaim Your Time in 2023 with Clio’s Newest Features
 
How to Grow a Law Firm_ From Startup to Success
How to Grow a Law Firm_ From Startup to SuccessHow to Grow a Law Firm_ From Startup to Success
How to Grow a Law Firm_ From Startup to Success
 
Customer Research: How to Gauge Client Satisfaction
Customer Research: How to Gauge Client SatisfactionCustomer Research: How to Gauge Client Satisfaction
Customer Research: How to Gauge Client Satisfaction
 
Cloud Software: The Key to Staff Success and Satisfaction
Cloud Software: The Key to Staff Success and SatisfactionCloud Software: The Key to Staff Success and Satisfaction
Cloud Software: The Key to Staff Success and Satisfaction
 
How to Generate New Business With Client Reviews
How to Generate New Business With Client ReviewsHow to Generate New Business With Client Reviews
How to Generate New Business With Client Reviews
 
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
 
Key Insights from the 2022 Legal Trends Report
Key Insights from the 2022 Legal Trends ReportKey Insights from the 2022 Legal Trends Report
Key Insights from the 2022 Legal Trends Report
 
Billing Week Stress to Collections Success Webinar.pdf
Billing Week Stress to Collections Success Webinar.pdfBilling Week Stress to Collections Success Webinar.pdf
Billing Week Stress to Collections Success Webinar.pdf
 
Streamline Your Court Interactions With Technology
Streamline Your Court Interactions With TechnologyStreamline Your Court Interactions With Technology
Streamline Your Court Interactions With Technology
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Mobile Practice Management

Editor's Notes

  1. This is GoToWebinar, the product we are using for this webinar, you will notice that there is a Questions box on the bottom right of your panel where you can enter in questions as we go through the webinar. I will go back and answer them at the end. You can raise your hand which looks like a hand icon with an up arrow underneath. If you are having technical difficulties, meaning you cannot see my mouse moving around the screen or you can’t hear me, please click on this and then type into the questions panel exactly the problem you are having so we can address it as quickly as possible.Remember, we will be addresses questions sent at the end of this presentation. So please don’t feel bad if your question isn’t answered immediately.There are three questions that everyone asks during these presentations. I’ll try to address them here.First, this presentation will be about one hour in length.Second, we will be sending you copies of the slides and proof of CLE accreditation for the states that already approved this talk for CLE. These will arrive in your email either later today or tomorrow.Lastly, we will be providing a recording of this presentation to every attendee through email. Don’t feel like you have to copy everything down. We’ll send it to you.There will also be a blog post with every website and tool discussed today linked on goClio.com to help you find everything we talked about.
  2. The last 6 years have seen a rise in mobile computing beyond anyone’s imaginations.We are shifting our information storage and access from large boxes that sit on our desks, to sleek devices in the palms of our hands.We can see this shift when examining sales of computing devices for last year.Cellphones now account for 65% of all computing devices sold.Tablets, after being available for only a few years, now almost tie sales of computers and will soon outpace computers in 2015.
  3. Further research shows more and more drops in sales of computers and a continual rise in mobile devices.By 2017, mobile devices will account for over 85% of all new computing devices.The future of computing will be mobile.
  4. Apple iPhone (73%, compared with 62% in 2012) was cited most often as the phone used by lawyers.Of the firms that allow access to the firm’s information, 49% allow access with restrictions and/or pre-approval and 34% allow access without restrictions.Of those same respondents, 25% do not know if they have ever experienced a security breach, defined as a “lost/stolen computer or smartphone, hacker, break-in, website exploit.” So, what are the risks of mobile computing?
  5. The most common risk associated with mobile computing is the loss of the device.[Read STATS]This means, that at some point, a lawyer’s mobile device will either be stolen, inaccessible, or inoperable. Lawyers should plan on this being the case when it comes to using a mobile device in practice.Sources:NBC News, “New efforts to curb nationwide cellphone theft epidemic,” 05/05/2013McAfee, “The Lost Smartphone Problem,” 10/2011PCMag, “Infographic: Smartphone Damage 101,” 04/20/2013
  6. But lawyers should also be wary of additional risks when it comes to mobile devices. More and more scrutiny is being placed on these devices by legal authorities.For example, security officials and police officers have been going through mobile devices as a part of routine operations. In case you think this only happens in the U.S., the second case listed is from Canada.In all of these searches, no warrant was required.There was a similar ruling by the California Supreme Court in 2011 supporting cell phone searches, but the opposite of Florida Supreme Court ruling in May of 2013.Lower courts relied on a case styled United States v. Robinson. In that case, the U.S. Supreme Court ruled it was legal for officers to search a crumpled up cigarette packet that contained heroin.“In our view, attempting to correlate a crumpled package of cigarettes to the cell phones of today is like comparing a one-cell organism to a human being,” read the opinion. It continues, “…because a person has a high expectation of privacy in a cell phone's contents, police must then obtain a warrant before intruding into the phone's contents.”So, competing legal standards exist on whether authorities, can search cellphones. Lawyers should be aware of these potential risks when using mobile computing.
  7. The first risk is a ethical violation of Rule 1.6 of the Model Rules of Professional Conduct (MPRC). Rule 1.6 states that a lawyer should make “reasonable efforts” to prevent unauthorized access to client data. This does not mean that lawyers cannot use mobile computing, but should take reasonable efforts to secure that data against inadvertent disclosure, whether through loss or confiscation of the device.The second risk is a violation of Rule 1.3 of the MRPC. Rule 1.3 requires diligence on behalf of the attorney towards the client. If you lose all the data associated with your client’s file, you cannot be very diligent on their behalf.So, how do you avoid the risks and consequences that can occur with mobile pracitce?
  8. First, you should always password protect your device. It may be a bit inconvenient to type in a password every time you need to use your phone, but it is the simplest step to securing your device.Second, back up your device regularly. Most devices allow you to back up your data either to a local computer or to Cloud service. Back up often, and be sure to encrypt your backup if that is an option.Next, register your device with location servies. For example, Apple offers Find-My-iPhone as a free service to help track down lost devices.Lastly, do not store sensitive data on your phone. Instead, use the phone as a portal to your data that is stored on the Cloud. That way, even if your device is lost, stole, or confiscated, you always have access to your data through other devices.
  9. Jeff Richardson is a partner in the New Orleans office of Adams and Reese LLP. His practice areas include appellate litigation, complex litigation, and class action litigation. Jeff publishes iPhone J.D., the oldest and largest website for attorneys who use the iPhone and iPad. He received a B.A. with highest honors from Emory University, and a J.D. with high honors from Georgetown University Law Center.
  10. Lastly, we would like to show you some examples of how Clio is including these best practices into the our new Clio for iPhone App.These are some small features that help make your practice more secure.
  11. The first step is something small, but crucial.Clio for iPhone let’s you hide the visibility of your password.Normally, you can see your password, like the Password typed into the home screen here.But, if you are worried about someone looking into over your should when you type in your password, simply click the word, ‘Hide’[NEXT SLIDE]
  12. And your password will appear as a series of dots, hiding the password from prying eyes.
  13. Clio for iPhone also prompts you to set an extra password on your mobile device.This extra password is a PIN, that you can require every time you leave the app.
  14. The pin allows you to stay logged-in to Clio on your mobile device, but keeps your client’s data away from prying eyes that borrow your phone.
  15. Clio also makes it easy to securely access your data without downloading it to you phone.Let’s look at client contact information, for example.
  16. In Clio for iPhone, you can access both contact data stored on your phone and contact data stored in Clio. Both sets allow you to call, text, and email your clients. But, you can choose to leave your client’s information only on Clio, keeping it from mingling with your personal contacts and being stored on the phone itself.
  17. The same holds true for every bit of practice data in Clio. You can access it over the phone without having to download and store it locally.
  18. For example, you can see and review documents in Clio.
  19. Even read the full document through a preview, without having to worry about the data being accessible if you lose or can’t access your phone.
  20. First, you should always password protect your device. It may be a bit inconvenient to type in a password every time you need to use your phone, but it is the simplest step to securing your device.Second, back up your device regularly. Most devices allow you to back up your data either to a local computer or to Cloud service. Back up often, and be sure to encrypt your backup if that is an option.Next, register your device with location servies. For example, Apple offers Find-My-iPhone as a free service to help track down lost devices.Lastly, do not store sensitive data on your phone. Instead, use the phone as a portal to your data that is stored on the Cloud. That way, even if your device is lost, stole, or confiscated, you always have access to your data through other devices.