SlideShare a Scribd company logo
Smart, Ethical Use of Mobile, Tablet, &
          Cloud Computing

                Nicole Black
 Attorney, author and founder of lawtechTalk
          www.nicoleblackesq.com
Cloud and mobile computing for lawyers
What is cloud computing and why
        should you care?
Source:YouTube http://bit.ly/75FAx4
Source:YouTube http://bit.ly/75FAx4
A fundamentalist is a person
who considers whether a fact is
acceptable to their faith before
they explore it. As opposed to
a curious person who explores
first and then considers
whether or not they want to
accept the ramifications.
          --Seth Godin
Cloud and mobile computing for lawyers
Do you or your clients use gmail?
Do you use Lexis or Westlaw?
Do you use Wikipedia?
Do you use flickr or snapfish?
Cloud and Mobile Computing: Not
            a Trend
• Cloud computing is the top technology trend for
                      2010

 • By 2012, 20% of businesses will own no IT assets
    and will conduct business solely in the Cloud

 • By 2013, mobile phones will overtake PCs as the
    most common Web access device worldwide

   • By 2014, over 3 billion of the world’s adult
population will be able to transact electronically via
          mobile or Internet technology

* Gartner’s Top Predictions for IT Organizations and Users, 2010 and
                      Beyond: A New Balance
But what
   about
lawyers and
   cloud
computing?
• Nearly 98% of respondents
   incorporated virtualization
technologies into their law firms.
Some used virtual servers, while
 others brought virtualization to
    their desktop computers.

 • Nearly 84% of responding firms
     reported using SaaS-based
      products as well. Typically,
     however, cloud computing
products were used for secondary
    functions like eDiscovery or
          human resources.
         *Am Law 2009 Tech Survey
• 80% of firms use cloud
computing--mostly for non-critical
  tasks like e-discovery and HR

 • 60% of firms use cloud-based
    services for e-discovery or
 litigation support features, and
many use it for important (but not
   bread-and-butter) tasks like
benefits or expense management

    •5% use cloud services for
     document management

     • 6% use it for storage

         *Am Law 2010 Tech Survey
“14% of law firms plan to invest in
 some type of cloud computing or
   software-as-a-service solution.
   However, it must be noted that
    lack of familiarity with cloud
  computing and related emerging
   technologies may be inhibiting
 adoption. Among attorneys, only
  30% rate themselves as familiar
      with the concept of cloud
 computing, while only 45% claim
     knowledge of the concept of
         managed services.”
* Comp TIA 2010 survey (a non-profit trade association for
                   the IT industry)
Cloud and mobile computing for lawyers
Cloud computing is a “type of computing that is comparable to grid
computing, relies on sharing computing resources rather than having local
servers or personal devices to handle applications. The goal of cloud
computing is to apply traditional supercomputing power (normally used by
military and research facilities) to perform tens of trillions of computations per
second.”
Cloud computing is a “type of computing that is comparable to grid
computing, relies on sharing computing resources rather than having local
servers or personal devices to handle applications. The goal of cloud
computing is to apply traditional supercomputing power (normally used by
military and research facilities) to perform tens of trillions of computations per
second.”

         Software as a service —or SaaS —is “[a] software delivery
         model in which a software firm provides daily technical
         operation, maintenance, and support for the software
         provided to their client.”
For summaries of a few ethics
 decisons: http://bit.ly/81K2jZ
Ethical issues to consider:


 A. Attorney client confidentiality


 B.
Compare/contrast to traditional outsourcing relationships


 C.
Transborder data flow


 D.
Meeting obligations of “reasonable” security


 E.
Electronic evidence/e-discovery
QUESTION:

  What are the ethical obligations of
lawyers in regard to data stored on the
    hard drives of “storage media”.
   Florida Bar Ethics Opinion 10-12 (September 2010)
ANSWER:
Lawyers who use devices that contain storage media such as
computers, printers, copiers, scanners, cellular phones, personal
digital assistants, flash drives, memory sticks, facsimile machines and
other electronic or digital devices must take reasonable steps to
ensure that client confidentiality is maintained and that the device
is sanitized before disposition, including: (1) identification of the
potential threat to confidentiality along with the development and
implementation of policies to address the potential threat to
confidentiality; (2) inventory of the Devices that contain Hard
Drives or other Storage Media; (3) supervision of nonlawyers to
obtain adequate assurances that confidentiality will be maintained;
and (4) responsibility for sanitization of the Device by requiring
meaningful assurances from the vendor at the intake of the Device
and confirmation or certification of the sanitization at the
disposition of the Device.
Lawyers using these devices must familiarize themselves with new technologies and
“have a duty to keep abreast of changes in technology to the extent that the lawyer
            can identify potential threats to maintaining confidentiality.”

  Also, lawyers must take reasonable steps to ensure that client confidentiality is
 maintained. One important part of this duty includes the obligation to identify any
       “potential threat(s) to confidentiality along with the development and
   implementation of policies to address the potential threat to confidentiality.”

The Committee noted that lawyers who use mobile devices also have a supervisory
   responsibility that extends to not only to the lawyer’s own employees but to
 “entities outside the lawyer’s firm with whom the lawyer contracts to assist in the
 care and maintenance of the Devices in the lawyer’s control.” Part of the lawyer’s
 supervisory duty requires that the lawyer obtain assurances from any nonlawyers
     who will have access to confidential information that confidentiality of the
                           information will be maintained.
QUESTION:

Whether an attorney can use an online system to store
 confidential client data and, if so, what steps must be
        taken to ensure the data are secure?
   New York State Bar Association’s Committee on Professional Ethics, Opinion 842
                                 (September 2010)
ANSWER:
It is permissible for attorneys to store confidential client data in the
cloud, but only if reasonable steps are taken to ensure the data would be
adequately protected from unauthorized disclosure: “A lawyer may use
an online data storage system to store and back up client confidential
information provided that the lawyer takes reasonable care to ensure
that confidentiality will be maintained in a manner consistent with the
lawyer’s obligations under Rule 1.6. In addition, the lawyer should stay
abreast of technological advances to ensure that the storage system
remains sufficiently advanced to protect the client’s information, and
should monitor the changing law of privilege to ensure that storing the
information online will not cause loss or waiver of any privilege.”

Importantly, the committee noted that “exercising ‘reasonable care’ under Rule
1.6 does not mean that a lawyer guarantees that the information is secure
from any unauthorized access.”
QUESTION:

“May a lawyer use an e-mail service provider that scans
e-mails by computer for keywords and then sends or
displays instantaneously (to the side of the e-mails in
question) computer-generated advertisements to users
of the service based on the e-mail communications?”

     The New York State Bar Association Committee on Professional Ethics, Opinion
                                    820-2/08/08
ANSWER:
“Unless the lawyer learns information suggesting that
the provider is materially departing from conventional
privacy policies or is using the information it obtains by
computer-scanning of e-mails for a purpose that, unlike
computer-generated advertising, puts confidentiality at
risk, the use of such e-mail services comports with DR
4-101…A lawyer may use an e-mail service provider
that conducts computer scans of e-mails to generate
computer advertising, where the e-mails are not
reviewed by or provided to other individuals.”
QUESTION:
The question addressed in this opinion is whether a lawyer violates
SCR 156 by storing confidential client information and/or
communications, without client consent, in an electronic format on
a server or other device that is not exclusively in the lawyer’s
control.

State Bar of Nevada Standing Committee on Ethics and Professional Responsibility,
Formal Opinion No. 33
ANSWER:

In order to comply with the rule, the lawyer must act competently and
reasonably to safeguard confidential client information and communications
from inadvertent and unauthorized disclosure. This may be accomplished
while storing client information electronically with a third party to the same
extent and subject to the same standards as with storing confidential paper
files in a third party warehouse. If the lawyer acts competently and
reasonably to ensure the confidentiality of the information, then he or she
does not violate SCR 156 simply by contracting with a third party to store the
information, even if an unauthorized or inadvertent disclosure should occur...

The ABA Committee addressed an issue much closer to that discussed here
in Formal Opinion number 95-398, and concluded that a lawyer may give a
computer maintenance company access to confidential information in client
files, but that in order to comply with the obligation of client confidentiality, he
or she “must make reasonable efforts to ensure that the company has in
place, or will establish, reasonable procedures to protect the confidentiality
of client information.”
4th Amendment issues

In a decision issued by the United States District Court, District of Oregon
Opinion and Order in In re: US, Nos. 08-9131-MC, 08-9147-MC, (2009), the
government successfully argued that it need not notify the account holder regarding
a warrant that is served upon the ISP holder of the email account (gmail). In
reaching its decision, the court gave lip service to the concept that emails are
entitled to Fourth Amendment protection, but then stated:

“Much of the reluctance to apply traditional notions of third party disclosure to the
e-mail context seems to stem from a fundamental misunderstanding of the lack of
privacy we all have in our e-mails. Some people seem to think that they are as
private as letters, phone calls, or journal entries. The blunt fact is, they are not.”
In comparison, however, see footnote 7 from the October 2009 Memorandum and
Order issued by the United States District Court, Eastern District of New York, in
US v. Cioffi, Case No. 08-CR-415 (FB):

One preliminary matter is not in question: The government does not dispute that
Tannin has a reasonable expectation of privacy in the contents of his personal email
account. See United States v. Zavala, 541 F.3d 562,577 (5th Cir. 2008) ("[C]ell
phones contain a wealth of private information, including emails, text messages, call
histories, address books, and subscriber numbers. [The defendant] had a reasonable
expectation of privacy regarding this information."); United States v. Forrester, 512
F.3d 500, 511 (9th Cir. 2008) ("E-mail, like physical mail, has an outside address
'visible' to the third-party carriers that transmit it to its intended location, and also
a package of content that the sender presumes will be read only by the intended
recipient. The privacy interests in these two forms of communication are identical.
The contents may deserve Fourth Amendment protection, but the address and size
of the package do not.").
Security issues to
      consider:

1. Encryption
2. Geo-redundancy
3. Data back ups
4. Extraction of data
What questions should you ask cloud providers?
• What type of facility will host the data?

  • Who else has access to the cloud facility, the servers and the data and what
 mechanisms are in place to ensure that only authorized personnel will be able to
  access your data? How does the vendor screen its employees? If the vendor
  doesn’t own the data center, how does the data center screen its employees?

• Does the contract include terms that limit data access by the vendor’s employees
             to only those situations where you request assistance?


                        For full list see: http://bit.ly/hyFBxo
• Does the contract address confidentiality? If not, is the vendor willing to sign a
                           confidentiality agreement?

• How frequently are back-ups performed? How are you able to verify that backups
                        are being performed as promised?

  • Is data backed up to more than one server? Where are the respective servers
     located? Will your data, and any back up copies of it, always stay within the
                          boundaries of the United States?

        • How secure are the data centers where the servers are housed?

 • What types of encryption methods are used and how are passwords stored? Is
          your data encrypted while in transit or only when in storage?

                        For full list see: http://bit.ly/hyFBxo
• Has a third party, such as McAfee, evaluated or tested the vendor’s security
   measures to assess the strength of, among other things, firewalls, encryption
techniques, and intrusion detection systems? Are the audits of the security system
                              available for your review?

             • Are there redundant power supplies for the servers?

  • Does the contract include a guarantee of uptime? How much uptime? What
happens in the event that the servers are down? Will you be compensated if there
 is an unexpected period of downtime that exceeds the amount set forth in the
                                   agreement?

 • If a natural disaster strikes one geographic region, would all data be lost? Are
                            there geo-redundant back ups?

                       For full list see: http://bit.ly/hyFBxo
• What remedies does the contract provide? Are consequential damages included? Are total
                      damages capped or are specific remedies limited?

   • Does the agreement contain a forum selection clause? How about a mandatory arbitration
                                            clause?

• If there is a data breach, will you be notified? How are costs for remedying the breach allocated?

 • What rights do you have upon termination? Does the contract contain terms that require the
               vendor to assist you in transitioning from their system to another?

• What rights do you have in the event of a billing or similar dispute with the vendor? Do you have
  the option of having your data held in escrow by a third party, so that it is fully accessible in the
  event of a dispute? Alternatively can you back up your data locally so that it is accessible to you
                                         should you need it?

   • Does the provider carry cyber insurance? If so, what does it cover? What are the coverage
                                             limits?

                                 For full list see: http://bit.ly/hyFBxo
Additional cloud computing
resources: http://bit.ly/86ILNI
Cloud and mobile computing for lawyers
Thanks for listening!

             Nicole Black
     Of Counsel, Fiandach & Fiandach
         Founder of lawtechTalk
        www.nicoleblackesq.com

Social Media for Lawyers: the Next Frontier
     published by the ABA in July 2010
    (http://bit.ly/socmed4lawyersbook)

   Cloud Computing for Lawyers to be
    published by the ABA in May 2011

More Related Content

PDF
The Weakest Point of Security in IoT
PPTX
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
PDF
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
PDF
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
PDF
Cybersecurity and Data Privacy
PPTX
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
PPT
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
PDF
Insecure magazine - 51
The Weakest Point of Security in IoT
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Cybersecurity and Data Privacy
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Insecure magazine - 51

What's hot (17)

PDF
170105 d link-complaint_and_exhibits
PPTX
Protecting Data Privacy in Analytics and Machine Learning
PPTX
BYOD - Bringing Technology to work | Sending Data Everywhere
PDF
PPT
Ch12
PDF
Law Practice Management in the Cloud
PDF
8MAN-Public_Sector_Data_and_Information_Security_Survey 2016
PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
PPTX
What I learned at the Infosecurity ISACA North America Conference 2019
PDF
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
PDF
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
PDF
Protecting Personal Data in a IoT Network with UMA
PPTX
Cloud computing
PPTX
ISACA Houston - Practical data privacy and de-identification techniques
PDF
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
PDF
FTC- Internet of Things (January, 2015)
PDF
Defining a Legal Strategy ... The Value in Early Case Assessment
170105 d link-complaint_and_exhibits
Protecting Data Privacy in Analytics and Machine Learning
BYOD - Bringing Technology to work | Sending Data Everywhere
Ch12
Law Practice Management in the Cloud
8MAN-Public_Sector_Data_and_Information_Security_Survey 2016
Proven Practices to Protect Critical Data - DarkReading VTS Deck
What I learned at the Infosecurity ISACA North America Conference 2019
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Protecting Personal Data in a IoT Network with UMA
Cloud computing
ISACA Houston - Practical data privacy and de-identification techniques
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
FTC- Internet of Things (January, 2015)
Defining a Legal Strategy ... The Value in Early Case Assessment
Ad

Viewers also liked (8)

PPT
Beyond LinkedIn: Advanced Social Media for Lawyers
KEY
Colorado Bar Association 2010 Social Media for Lawyers
KEY
Social Media for Lawyers & Law Firms : Chicago Bar Association
PPTX
AHLA Annual Meeting 2011 Social Media for Lawyers by David Harlow
PPT
Social Media for Lawyers
PDF
Florida social media
PDF
Social media for lawyers
PDF
The ethics of cloud and mobile computing for lawyers
Beyond LinkedIn: Advanced Social Media for Lawyers
Colorado Bar Association 2010 Social Media for Lawyers
Social Media for Lawyers & Law Firms : Chicago Bar Association
AHLA Annual Meeting 2011 Social Media for Lawyers by David Harlow
Social Media for Lawyers
Florida social media
Social media for lawyers
The ethics of cloud and mobile computing for lawyers
Ad

Similar to Cloud and mobile computing for lawyers (20)

PDF
Cloud Computing for Lawyers- Chicago Bar Association Presentation
PDF
Pennsylvania Rules on Lawyers Using Cloud Computing
PPT
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
PDF
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
PPTX
Ethics and Security of Cloud Computing for Lawyers
PPT
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
PDF
Putting your practice on cloud 9
PDF
Cloud security - Publication
PPTX
BYOD: Advice for Employers and Employees
PDF
Oregon Approves Ethics Opinion on Cloud Computing
PDF
Does cloud technology belong at your law firm?
PPT
Risks and Benefits of Cloud Computing
PPTX
Cloud
PDF
The Complexities of Cloud Computing - The Rules are New, But is the Game
KEY
Rimon - CLE on Cloud Lawyering for PAABA
PDF
Legal ethics & cloud computing
PPTX
Virtual & Remote Practice: Reach from the Beach & Manage from the Mountains
KEY
Rimon yaacov silberman - ethics of cloud lawyering
PDF
Taking Your Practice Into the Cloud (2011)
PPTX
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Pennsylvania Rules on Lawyers Using Cloud Computing
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Ethics and Security of Cloud Computing for Lawyers
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Putting your practice on cloud 9
Cloud security - Publication
BYOD: Advice for Employers and Employees
Oregon Approves Ethics Opinion on Cloud Computing
Does cloud technology belong at your law firm?
Risks and Benefits of Cloud Computing
Cloud
The Complexities of Cloud Computing - The Rules are New, But is the Game
Rimon - CLE on Cloud Lawyering for PAABA
Legal ethics & cloud computing
Virtual & Remote Practice: Reach from the Beach & Manage from the Mountains
Rimon yaacov silberman - ethics of cloud lawyering
Taking Your Practice Into the Cloud (2011)
Data Confidentiality, Security and Recent Changes to the ABA Model Rules

More from Nicole Black (15)

PPTX
Women in Law - #AmplifyYourMessage
PDF
Social Media Evidence: Ethics and Best Practices for Lawyers
PDF
Top Technology Tools To Streamline Your Law Practice
PDF
Social media marketing 2015
PDF
iPractice for Lawyers: Cloud and mobile computing and social media
PDF
Point1 law
PDF
Google Plus 101 for Lawyers, Par 2
PDF
Google Plus 101 for Lawyers, Part 1
PDF
A Look at Lawyers' Use of Technology in 2011
PDF
Lawyers Collective Milkshake Mistake
PDF
Technology Changing at Lightning Fast Speeds
KEY
Legal Technology: Change is Good
PDF
Does Cloud Computing Compromise Clients?
PDF
Still More Social Media for Lawyers: Interact!
KEY
6 Things Lawyers Should Know About Social Media
Women in Law - #AmplifyYourMessage
Social Media Evidence: Ethics and Best Practices for Lawyers
Top Technology Tools To Streamline Your Law Practice
Social media marketing 2015
iPractice for Lawyers: Cloud and mobile computing and social media
Point1 law
Google Plus 101 for Lawyers, Par 2
Google Plus 101 for Lawyers, Part 1
A Look at Lawyers' Use of Technology in 2011
Lawyers Collective Milkshake Mistake
Technology Changing at Lightning Fast Speeds
Legal Technology: Change is Good
Does Cloud Computing Compromise Clients?
Still More Social Media for Lawyers: Interact!
6 Things Lawyers Should Know About Social Media

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
cuic standard and advanced reporting.pdf
PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
KodekX | Application Modernization Development
PDF
Electronic commerce courselecture one. Pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
cuic standard and advanced reporting.pdf
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KodekX | Application Modernization Development
Electronic commerce courselecture one. Pdf
A Presentation on Artificial Intelligence
Network Security Unit 5.pdf for BCA BBA.
Unlocking AI with Model Context Protocol (MCP)
20250228 LYD VKU AI Blended-Learning.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”

Cloud and mobile computing for lawyers

  • 1. Smart, Ethical Use of Mobile, Tablet, & Cloud Computing Nicole Black Attorney, author and founder of lawtechTalk www.nicoleblackesq.com
  • 3. What is cloud computing and why should you care?
  • 6. A fundamentalist is a person who considers whether a fact is acceptable to their faith before they explore it. As opposed to a curious person who explores first and then considers whether or not they want to accept the ramifications. --Seth Godin
  • 8. Do you or your clients use gmail?
  • 9. Do you use Lexis or Westlaw?
  • 10. Do you use Wikipedia?
  • 11. Do you use flickr or snapfish?
  • 12. Cloud and Mobile Computing: Not a Trend • Cloud computing is the top technology trend for 2010 • By 2012, 20% of businesses will own no IT assets and will conduct business solely in the Cloud • By 2013, mobile phones will overtake PCs as the most common Web access device worldwide • By 2014, over 3 billion of the world’s adult population will be able to transact electronically via mobile or Internet technology * Gartner’s Top Predictions for IT Organizations and Users, 2010 and Beyond: A New Balance
  • 13. But what about lawyers and cloud computing?
  • 14. • Nearly 98% of respondents incorporated virtualization technologies into their law firms. Some used virtual servers, while others brought virtualization to their desktop computers. • Nearly 84% of responding firms reported using SaaS-based products as well. Typically, however, cloud computing products were used for secondary functions like eDiscovery or human resources. *Am Law 2009 Tech Survey
  • 15. • 80% of firms use cloud computing--mostly for non-critical tasks like e-discovery and HR • 60% of firms use cloud-based services for e-discovery or litigation support features, and many use it for important (but not bread-and-butter) tasks like benefits or expense management •5% use cloud services for document management • 6% use it for storage *Am Law 2010 Tech Survey
  • 16. “14% of law firms plan to invest in some type of cloud computing or software-as-a-service solution. However, it must be noted that lack of familiarity with cloud computing and related emerging technologies may be inhibiting adoption. Among attorneys, only 30% rate themselves as familiar with the concept of cloud computing, while only 45% claim knowledge of the concept of managed services.” * Comp TIA 2010 survey (a non-profit trade association for the IT industry)
  • 18. Cloud computing is a “type of computing that is comparable to grid computing, relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of cloud computing is to apply traditional supercomputing power (normally used by military and research facilities) to perform tens of trillions of computations per second.”
  • 19. Cloud computing is a “type of computing that is comparable to grid computing, relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of cloud computing is to apply traditional supercomputing power (normally used by military and research facilities) to perform tens of trillions of computations per second.” Software as a service —or SaaS —is “[a] software delivery model in which a software firm provides daily technical operation, maintenance, and support for the software provided to their client.”
  • 20. For summaries of a few ethics decisons: http://bit.ly/81K2jZ
  • 21. Ethical issues to consider: A. Attorney client confidentiality B. Compare/contrast to traditional outsourcing relationships C. Transborder data flow D. Meeting obligations of “reasonable” security E. Electronic evidence/e-discovery
  • 22. QUESTION: What are the ethical obligations of lawyers in regard to data stored on the hard drives of “storage media”. Florida Bar Ethics Opinion 10-12 (September 2010)
  • 23. ANSWER: Lawyers who use devices that contain storage media such as computers, printers, copiers, scanners, cellular phones, personal digital assistants, flash drives, memory sticks, facsimile machines and other electronic or digital devices must take reasonable steps to ensure that client confidentiality is maintained and that the device is sanitized before disposition, including: (1) identification of the potential threat to confidentiality along with the development and implementation of policies to address the potential threat to confidentiality; (2) inventory of the Devices that contain Hard Drives or other Storage Media; (3) supervision of nonlawyers to obtain adequate assurances that confidentiality will be maintained; and (4) responsibility for sanitization of the Device by requiring meaningful assurances from the vendor at the intake of the Device and confirmation or certification of the sanitization at the disposition of the Device.
  • 24. Lawyers using these devices must familiarize themselves with new technologies and “have a duty to keep abreast of changes in technology to the extent that the lawyer can identify potential threats to maintaining confidentiality.” Also, lawyers must take reasonable steps to ensure that client confidentiality is maintained. One important part of this duty includes the obligation to identify any “potential threat(s) to confidentiality along with the development and implementation of policies to address the potential threat to confidentiality.” The Committee noted that lawyers who use mobile devices also have a supervisory responsibility that extends to not only to the lawyer’s own employees but to “entities outside the lawyer’s firm with whom the lawyer contracts to assist in the care and maintenance of the Devices in the lawyer’s control.” Part of the lawyer’s supervisory duty requires that the lawyer obtain assurances from any nonlawyers who will have access to confidential information that confidentiality of the information will be maintained.
  • 25. QUESTION: Whether an attorney can use an online system to store confidential client data and, if so, what steps must be taken to ensure the data are secure? New York State Bar Association’s Committee on Professional Ethics, Opinion 842 (September 2010)
  • 26. ANSWER: It is permissible for attorneys to store confidential client data in the cloud, but only if reasonable steps are taken to ensure the data would be adequately protected from unauthorized disclosure: “A lawyer may use an online data storage system to store and back up client confidential information provided that the lawyer takes reasonable care to ensure that confidentiality will be maintained in a manner consistent with the lawyer’s obligations under Rule 1.6. In addition, the lawyer should stay abreast of technological advances to ensure that the storage system remains sufficiently advanced to protect the client’s information, and should monitor the changing law of privilege to ensure that storing the information online will not cause loss or waiver of any privilege.” Importantly, the committee noted that “exercising ‘reasonable care’ under Rule 1.6 does not mean that a lawyer guarantees that the information is secure from any unauthorized access.”
  • 27. QUESTION: “May a lawyer use an e-mail service provider that scans e-mails by computer for keywords and then sends or displays instantaneously (to the side of the e-mails in question) computer-generated advertisements to users of the service based on the e-mail communications?” The New York State Bar Association Committee on Professional Ethics, Opinion 820-2/08/08
  • 28. ANSWER: “Unless the lawyer learns information suggesting that the provider is materially departing from conventional privacy policies or is using the information it obtains by computer-scanning of e-mails for a purpose that, unlike computer-generated advertising, puts confidentiality at risk, the use of such e-mail services comports with DR 4-101…A lawyer may use an e-mail service provider that conducts computer scans of e-mails to generate computer advertising, where the e-mails are not reviewed by or provided to other individuals.”
  • 29. QUESTION: The question addressed in this opinion is whether a lawyer violates SCR 156 by storing confidential client information and/or communications, without client consent, in an electronic format on a server or other device that is not exclusively in the lawyer’s control. State Bar of Nevada Standing Committee on Ethics and Professional Responsibility, Formal Opinion No. 33
  • 30. ANSWER: In order to comply with the rule, the lawyer must act competently and reasonably to safeguard confidential client information and communications from inadvertent and unauthorized disclosure. This may be accomplished while storing client information electronically with a third party to the same extent and subject to the same standards as with storing confidential paper files in a third party warehouse. If the lawyer acts competently and reasonably to ensure the confidentiality of the information, then he or she does not violate SCR 156 simply by contracting with a third party to store the information, even if an unauthorized or inadvertent disclosure should occur... The ABA Committee addressed an issue much closer to that discussed here in Formal Opinion number 95-398, and concluded that a lawyer may give a computer maintenance company access to confidential information in client files, but that in order to comply with the obligation of client confidentiality, he or she “must make reasonable efforts to ensure that the company has in place, or will establish, reasonable procedures to protect the confidentiality of client information.”
  • 31. 4th Amendment issues In a decision issued by the United States District Court, District of Oregon Opinion and Order in In re: US, Nos. 08-9131-MC, 08-9147-MC, (2009), the government successfully argued that it need not notify the account holder regarding a warrant that is served upon the ISP holder of the email account (gmail). In reaching its decision, the court gave lip service to the concept that emails are entitled to Fourth Amendment protection, but then stated: “Much of the reluctance to apply traditional notions of third party disclosure to the e-mail context seems to stem from a fundamental misunderstanding of the lack of privacy we all have in our e-mails. Some people seem to think that they are as private as letters, phone calls, or journal entries. The blunt fact is, they are not.”
  • 32. In comparison, however, see footnote 7 from the October 2009 Memorandum and Order issued by the United States District Court, Eastern District of New York, in US v. Cioffi, Case No. 08-CR-415 (FB): One preliminary matter is not in question: The government does not dispute that Tannin has a reasonable expectation of privacy in the contents of his personal email account. See United States v. Zavala, 541 F.3d 562,577 (5th Cir. 2008) ("[C]ell phones contain a wealth of private information, including emails, text messages, call histories, address books, and subscriber numbers. [The defendant] had a reasonable expectation of privacy regarding this information."); United States v. Forrester, 512 F.3d 500, 511 (9th Cir. 2008) ("E-mail, like physical mail, has an outside address 'visible' to the third-party carriers that transmit it to its intended location, and also a package of content that the sender presumes will be read only by the intended recipient. The privacy interests in these two forms of communication are identical. The contents may deserve Fourth Amendment protection, but the address and size of the package do not.").
  • 33. Security issues to consider: 1. Encryption 2. Geo-redundancy 3. Data back ups 4. Extraction of data
  • 34. What questions should you ask cloud providers?
  • 35. • What type of facility will host the data? • Who else has access to the cloud facility, the servers and the data and what mechanisms are in place to ensure that only authorized personnel will be able to access your data? How does the vendor screen its employees? If the vendor doesn’t own the data center, how does the data center screen its employees? • Does the contract include terms that limit data access by the vendor’s employees to only those situations where you request assistance? For full list see: http://bit.ly/hyFBxo
  • 36. • Does the contract address confidentiality? If not, is the vendor willing to sign a confidentiality agreement? • How frequently are back-ups performed? How are you able to verify that backups are being performed as promised? • Is data backed up to more than one server? Where are the respective servers located? Will your data, and any back up copies of it, always stay within the boundaries of the United States? • How secure are the data centers where the servers are housed? • What types of encryption methods are used and how are passwords stored? Is your data encrypted while in transit or only when in storage? For full list see: http://bit.ly/hyFBxo
  • 37. • Has a third party, such as McAfee, evaluated or tested the vendor’s security measures to assess the strength of, among other things, firewalls, encryption techniques, and intrusion detection systems? Are the audits of the security system available for your review? • Are there redundant power supplies for the servers? • Does the contract include a guarantee of uptime? How much uptime? What happens in the event that the servers are down? Will you be compensated if there is an unexpected period of downtime that exceeds the amount set forth in the agreement? • If a natural disaster strikes one geographic region, would all data be lost? Are there geo-redundant back ups? For full list see: http://bit.ly/hyFBxo
  • 38. • What remedies does the contract provide? Are consequential damages included? Are total damages capped or are specific remedies limited? • Does the agreement contain a forum selection clause? How about a mandatory arbitration clause? • If there is a data breach, will you be notified? How are costs for remedying the breach allocated? • What rights do you have upon termination? Does the contract contain terms that require the vendor to assist you in transitioning from their system to another? • What rights do you have in the event of a billing or similar dispute with the vendor? Do you have the option of having your data held in escrow by a third party, so that it is fully accessible in the event of a dispute? Alternatively can you back up your data locally so that it is accessible to you should you need it? • Does the provider carry cyber insurance? If so, what does it cover? What are the coverage limits? For full list see: http://bit.ly/hyFBxo
  • 39. Additional cloud computing resources: http://bit.ly/86ILNI
  • 41. Thanks for listening! Nicole Black Of Counsel, Fiandach & Fiandach Founder of lawtechTalk www.nicoleblackesq.com Social Media for Lawyers: the Next Frontier published by the ABA in July 2010 (http://bit.ly/socmed4lawyersbook) Cloud Computing for Lawyers to be published by the ABA in May 2011

Editor's Notes

  • #2: \n
  • #3: Today: 1) why CC and mobile tech matters 2) what CC is 3) ethical and security issues.\n\nBottom line--CC is the future. For some firms, the current tech and security may be insufficient, but that will change quickly. Learn about it, understand it and position your firm for the future. \n
  • #4: Information is changing--we must rethink “information”--be curious\n
  • #5: Explore the benefits. Balance the risks. Be curious.\n\n
  • #6: \n
  • #7: \n
  • #8: \n
  • #9: \nSimple definition of CC: data/software stored on someone else’s server.\n
  • #10: \n
  • #11: Mobile tech in the legal field is a given--after all lawyers were crackberry addicts before anyone else. So let’s talk about cloud computing.\n
  • #12: \n
  • #13: \n
  • #14: \n
  • #15: Legal specific apps (prac man, billing, doc management) and general apps (google apps, dropbox).\n
  • #16: Legal specific apps (prac man, billing, doc management) and general apps (google apps, dropbox).\n
  • #17: Ethics and security seems to be a thorny maze of issues.\n
  • #18: \n
  • #19: \n
  • #20: \n
  • #21: ABA Ethics 20/20--my take--can’t be tasked with supervising them re: their tech skills.\n
  • #22: \n
  • #23: \n
  • #24: \n
  • #25: Note: Gmail language re: free email. Option is to use Google Apps--$50 per user per month.\n
  • #26: \n
  • #27: \n
  • #28: Electronic Communications Privacy Act (ECPA)--no significant revisions since 1986\n
  • #29: \n
  • #30: \n
  • #31: \n
  • #32: \n
  • #33: \n
  • #34: \n
  • #35: \n
  • #36: \n
  • #37: \n
  • #38: \n