SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
March 29-31, 2012
                                   www.techshow.com




Angel and Devil: Danger of Emerging
 Technologies That Lawyers Love

              Presenters
            Ivan Hemmans
            Antigone Peyton


                PRESENTED BY THE

                                             March 29-31, 2012
                                             www.techshow.com
It’s A Race
• The rate at which new technologies
  are developed, packaged, and
  delivered is increasing.
• Most find it impossible stay atop all
  the new gadgets and cool tools that
  compete for our time, our attention,
  and our dollars.


                               March 29-31, 2012
                               www.techshow.com
We’re Here to Help




                March 29-31, 2012
                www.techshow.com
Standard Concerns
•   Mobile access & storage
•   Security
•   RFID
•   Geo location
•   Social networks
•   Privacy


                              March 29-31, 2012
                              www.techshow.com
Personal, Meet Business
• Loss of the enterprise wall
• Data, data, everywhere . . .
• Mixing of worlds
  – Hardware
  – Software & programs
  – Storage locations



                                 March 29-31, 2012
                                 www.techshow.com
There’s no better teacher than reality . . .




                                      March 29-31, 2012
                                      www.techshow.com
Radio Frequency Identifier (RFID)

• Can track anyone or any product
  anywhere
• Security concerns
• Privacy
• TMI?




                             March 29-31, 2012
                             www.techshow.com
iCloud
• Apple says:
  – “iCloud stores your music, photos, documents, and
    more and wirelessly pushes them to all your devices.
    Automatic, effortless, and seamless — it just works.”




                                             March 29-31, 2012
                                             www.techshow.com
Apps & iCloud
Devil                                               Angel

Lots of 3rd-party app development to make sharing   Each 3rd-party developer has his or her own terms of
easy                                                use and privacy policies


Love the app store!                                 Apps may have their own security vulnerabilities



Easy backup to Apple servers                        Terms and conditions may not mesh with any
                                                    requirements as set forth by clients or jurisdictions in
                                                    which your firm operates



Documents available from multiple devices           Service may terminate with or without notice. Tight
                                                    integration with Apple means that Apple can collect
                                                    lots of usage information

Easy to use                                         Hard to manage without an Mobile Device
                                                    Management server




                                                                                    March 29-31, 2012
                                                                                    www.techshow.com
Android Devices
• Open Source platform
• More choices
• Malware issues




                         March 29-31, 2012
                         www.techshow.com
Android
Devil                                               Angel

Documents available from any web-enabled device     Service may terminate with or without your notice


Low cost                                            Tight integration with Google means that Google can
                                                    collect lots of usage information

Multitasking                                        Potential for poor battery performance
                                                    Increased potential for malware

Lots of 3rd-party app development to make sharing   Each 3rd-party developer has his or her own terms of
easy                                                use and privacy policies

                                                    Apps may have their own security vulnerabilities


Easy backup to Google servers                       Terms and conditions may not mesh with any
                                                    requirements as set forth by clients or jurisdictions
                                                    within with your firm operates

Documents available from multiple devices           Service may terminate with or without your notice


Easy to use                                         Hard to manage without an Mobile Device
                                                    Management server




                                                                                  March 29-31, 2012
                                                                                  www.techshow.com
Dropbox
• Will give data to government or in
  response to subpoena
• Enables third party decryption
• Past password drops/security
  breaches
• Policy changes follow public outcry
  and investigations
• Data on Amazon S3
                              March 29-31, 2012
                              www.techshow.com
Dropbox
Devil                                                  Angel

Apps to integrate all your devices with Dropbox        Makes it very easy to take firm data into and out of
                                                       the firm



Lots of 3rd-party app development to make sharing      Each 3rd-party developer has his or her own terms of
with iOS and Android easy                              use and privacy policies



                                                       Terms and conditions may not mesh with any
                                                       requirements as set forth by clients or jurisdictions
                                                       within with your firm operates




Your files are available from any web-enabled device   Service may terminate with or without your notice.




                                                                                       March 29-31, 2012
                                                                                       www.techshow.com
Social Media
•   What’s private?
•   I know where you are today
•   Location setting confusion
•   Linked accounts




                                 March 29-31, 2012
                                 www.techshow.com
What Can You Do?
• Awareness is the first line of
  defense
  – Read documentation and blogs
• Ways to spread awareness:
  – Live presentations
  – E-mail distributions
  – Intranet postings, blogs
  – Empower thoughtleaders

                               March 29-31, 2012
                               www.techshow.com
Antigone Peyton - CEO & Founder                       Ivan Hemmans
Cloudigy Law, PLLC                                    O’Melveny & Myers
(703) 436-2033                                        Twitter: @ihemmans
antigone.peyton@cloudigylaw.com                       Website: http://www.hemmans.com
Twitter: @antigonepeyton; @cloudigylaw
Facebook: http://www.facebook.com/CloudigyLaw
LinkedIn: http://www.linkedin.com/in/antigonepeyton
Cloudigy blog: http://cloudigylaw.com/news/




                                                                                 March 29-31, 2012
                                                                                 www.techshow.com

Más contenido relacionado

La actualidad más candente

Comm%20 tech%20final%20project
Comm%20 tech%20final%20projectComm%20 tech%20final%20project
Comm%20 tech%20final%20project
awgalv01
 
New media presentation_1
New media presentation_1New media presentation_1
New media presentation_1
mbucy21
 
Cloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole SiegelCloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole Siegel
nsiegel922
 
Cloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole SiegelCloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole Siegel
nsiegel922
 

La actualidad más candente (18)

Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
 
Lifted by the Cloud
Lifted by the CloudLifted by the Cloud
Lifted by the Cloud
 
Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
The New Internet: When Everything Becomes Smart
The New Internet: When Everything Becomes SmartThe New Internet: When Everything Becomes Smart
The New Internet: When Everything Becomes Smart
 
Internet of things (IOT) - Advanced Doorbell
Internet of things (IOT)  - Advanced DoorbellInternet of things (IOT)  - Advanced Doorbell
Internet of things (IOT) - Advanced Doorbell
 
Iot chap i
Iot chap iIot chap i
Iot chap i
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
 
Mediamorphosis 2013: Hacking the Body
Mediamorphosis 2013: Hacking the Body Mediamorphosis 2013: Hacking the Body
Mediamorphosis 2013: Hacking the Body
 
Designing chocolate, not aspirin
Designing chocolate, not aspirinDesigning chocolate, not aspirin
Designing chocolate, not aspirin
 
Comm%20 tech%20final%20project
Comm%20 tech%20final%20projectComm%20 tech%20final%20project
Comm%20 tech%20final%20project
 
New media presentation_1
New media presentation_1New media presentation_1
New media presentation_1
 
Internet of Things Webinar
Internet of Things WebinarInternet of Things Webinar
Internet of Things Webinar
 
Internet of Things for Libraries
Internet of Things for LibrariesInternet of Things for Libraries
Internet of Things for Libraries
 
Cloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole SiegelCloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole Siegel
 
Cloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole SiegelCloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole Siegel
 

Similar a Angel & Devil: Danger of Emerging Technologies

Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
Arrow ECS UK
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2016
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 

Similar a Angel & Devil: Danger of Emerging Technologies (20)

VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Three Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingThree Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content Sharing
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 

Más de Antigone Peyton

Más de Antigone Peyton (13)

Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
 
A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)
 
Lawyers in the Cloud
Lawyers in the CloudLawyers in the Cloud
Lawyers in the Cloud
 
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy Implications
 
2013 SBIR Presentation
2013 SBIR Presentation2013 SBIR Presentation
2013 SBIR Presentation
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIA
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for Litigators
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP Fracas
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)
 
Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)
 
Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Angel & Devil: Danger of Emerging Technologies

  • 1. March 29-31, 2012 www.techshow.com Angel and Devil: Danger of Emerging Technologies That Lawyers Love Presenters Ivan Hemmans Antigone Peyton PRESENTED BY THE March 29-31, 2012 www.techshow.com
  • 2. It’s A Race • The rate at which new technologies are developed, packaged, and delivered is increasing. • Most find it impossible stay atop all the new gadgets and cool tools that compete for our time, our attention, and our dollars. March 29-31, 2012 www.techshow.com
  • 3. We’re Here to Help March 29-31, 2012 www.techshow.com
  • 4. Standard Concerns • Mobile access & storage • Security • RFID • Geo location • Social networks • Privacy March 29-31, 2012 www.techshow.com
  • 5. Personal, Meet Business • Loss of the enterprise wall • Data, data, everywhere . . . • Mixing of worlds – Hardware – Software & programs – Storage locations March 29-31, 2012 www.techshow.com
  • 6. There’s no better teacher than reality . . . March 29-31, 2012 www.techshow.com
  • 7. Radio Frequency Identifier (RFID) • Can track anyone or any product anywhere • Security concerns • Privacy • TMI? March 29-31, 2012 www.techshow.com
  • 8. iCloud • Apple says: – “iCloud stores your music, photos, documents, and more and wirelessly pushes them to all your devices. Automatic, effortless, and seamless — it just works.” March 29-31, 2012 www.techshow.com
  • 9. Apps & iCloud Devil Angel Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of easy use and privacy policies Love the app store! Apps may have their own security vulnerabilities Easy backup to Apple servers Terms and conditions may not mesh with any requirements as set forth by clients or jurisdictions in which your firm operates Documents available from multiple devices Service may terminate with or without notice. Tight integration with Apple means that Apple can collect lots of usage information Easy to use Hard to manage without an Mobile Device Management server March 29-31, 2012 www.techshow.com
  • 10. Android Devices • Open Source platform • More choices • Malware issues March 29-31, 2012 www.techshow.com
  • 11. Android Devil Angel Documents available from any web-enabled device Service may terminate with or without your notice Low cost Tight integration with Google means that Google can collect lots of usage information Multitasking Potential for poor battery performance Increased potential for malware Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of easy use and privacy policies Apps may have their own security vulnerabilities Easy backup to Google servers Terms and conditions may not mesh with any requirements as set forth by clients or jurisdictions within with your firm operates Documents available from multiple devices Service may terminate with or without your notice Easy to use Hard to manage without an Mobile Device Management server March 29-31, 2012 www.techshow.com
  • 12. Dropbox • Will give data to government or in response to subpoena • Enables third party decryption • Past password drops/security breaches • Policy changes follow public outcry and investigations • Data on Amazon S3 March 29-31, 2012 www.techshow.com
  • 13. Dropbox Devil Angel Apps to integrate all your devices with Dropbox Makes it very easy to take firm data into and out of the firm Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of with iOS and Android easy use and privacy policies Terms and conditions may not mesh with any requirements as set forth by clients or jurisdictions within with your firm operates Your files are available from any web-enabled device Service may terminate with or without your notice. March 29-31, 2012 www.techshow.com
  • 14. Social Media • What’s private? • I know where you are today • Location setting confusion • Linked accounts March 29-31, 2012 www.techshow.com
  • 15. What Can You Do? • Awareness is the first line of defense – Read documentation and blogs • Ways to spread awareness: – Live presentations – E-mail distributions – Intranet postings, blogs – Empower thoughtleaders March 29-31, 2012 www.techshow.com
  • 16. Antigone Peyton - CEO & Founder Ivan Hemmans Cloudigy Law, PLLC O’Melveny & Myers (703) 436-2033 Twitter: @ihemmans antigone.peyton@cloudigylaw.com Website: http://www.hemmans.com Twitter: @antigonepeyton; @cloudigylaw Facebook: http://www.facebook.com/CloudigyLaw LinkedIn: http://www.linkedin.com/in/antigonepeyton Cloudigy blog: http://cloudigylaw.com/news/ March 29-31, 2012 www.techshow.com