SlideShare a Scribd company logo
1 of 37
Ethics and Security of
Cloud Computing for Lawyers
Clio Cloud Conference
September 23, 2013
Robert J. Ambrogi, Esq.
17 ethics
panels ...
The ethical issues at stake
Lawyers have duty to
safeguard confidential
client information.
Lawyers have duty to
protect client
property, including client
files, from loss.
Lawyers have a duty to be
competent in technology.
Every ethics panel agrees on two points ...
1. Lawyers may use the
cloud.
2. Must take reasonable
steps to minimize risk to
confidential information
and client files.
Alabama State Bar
Ethics Opinion
2010-02
Arizona State Bar
Formal Opinion 09-
04
California Formal
Opinion No. 2010-
179
Connecticut Bar
Association Informal
Opinion 2013-07
Florida Bar Opinion
12-3
Iowa State Bar
Ethics Opinion 11-
01
Maine Professional
Ethics Commission
Opinion 194
Massachusetts Bar
Association Opinion
12-03
New Hampshire Bar
Association Opinion
2012-13/4
New Jersey
Advisory Committee
on Professional
Ethics Opinion 701
Nevada State Bar
Formal Opinion No.
33
New York State Bar
Association Opinion
842 of 2010
North Carolina 2011
Formal Ethics
Opinion 6
Oregon Formal
Opinion No. 2011-
188
Pennsylvania
Formal Opinion
2011-200
Vermont Bar
Association Opinion
2010-6
Virginia Legal Ethics
Opinion 1872
North Carolina 2011
“A law firm may use SaaS if reasonable care is
taken to minimize the risks of inadvertent
disclosure of confidential information and to
protect the security of client information and client
files.”
“A lawyer must fulfill the duties to protect
confidential client information and to safeguard
client files by applying the same diligence and
competency to manage the risks of SaaS that the
lawyer is required to apply when representing
clients.”
“The degree of protection to be afforded client
information varies with the client, matter and
information involved. But it places on the lawyer the
obligation to perform due diligence to assess the
degree of protection that will be needed and to act
accordingly.”
“Whatever form of SaaS is used, the lawyer must
ensure that there is unfettered access to the data
when it is needed. Likewise the lawyer must be able
to determine the nature and degree of protection that
will be afforded the data while residing elsewhere.”
Iowa State Bar Ethics Opinion 11-01
“A competent lawyer using cloud computing must
understand and guard against the risks inherent in it.”
“There is no hard and fast rule as to what a lawyer must do
with respect to each client when using cloud computing.
The facts and circumstances of each case, including the
type and sensitivity of client information, will dictate what
reasonable protective measures a lawyer must take when
using cloud computing.”
“Competent lawyers must have a basic understanding of
the technologies they use. Furthermore, as technology, the
regulatory framework, and privacy laws keep
changing, lawyers should keep abreast of these changes.”
New Hampshire 2012-13/4
Florida Bar Opinion 12-3
Lawyers have an obligation to remain current not
only in developments in the law, but also
developments in technology that affect the
practice of law.
Lawyers who use cloud computing … have an
ethical obligation to understand the technology
they are using and how it potentially impacts
confidentiality of information relating to client
matters, so that the lawyers may take appropriate
steps to comply with their ethical obligations.
Massachusetts Bar Ethics Opinion 12-03
“Lawyer remains bound to follow an
express instruction from his client that the
client's confidential information not be
stored or transmitted by means of the
Internet.”
“He should refrain from storing or
transmitting particularly sensitive client
information by means of the Internet without
first seeking and obtaining the client's
express consent.”
1. Company Due Diligence
Is this a solid company with a good operating record?
Do others recommend the company?
What is in the TOS and privacy policy?
2. Unrestricted access to data
Can I get my data whenever I want?
Is the data stored elsewhere in the event I'm denied
access?
“Optionally, upon request by the Subscriber, all Content
associated with the subscription will be replicated at a
regular interval, to an offsite storage server accessible
only to a reputable data escrow agent (“Escrow Agent”).
The replicated Content (“Escrowed Data”) will be held
under the terms of a separate agreement among
Themis, the Subscriber, and the Escrow Agent (“Escrow
Agreement”).”
3. Termination of relationship
If I terminate the service, can I retrieve my
data?
If the service is terminated due to my non-
payment, what happens to my data?
If the company shuts down, can I get my data?
Will the data be available in a non-proprietary
format?
“At LexisNexis we believe strongly that the data you
place in LexisNexis Firm Manager belongs to you! To
provide you with the comfort that you retain control of
your critical client-privileged information and work
product:
• “Your administrator can export your data at any time.
• “If you cancel your subscription, we maintain your data
online for 6 months. … At any time you can decide to
purge your data, removing it from LexisNexis systems.
• “If you purge your data, your client privileged work
product is removed from our systems … [and] from
our backup tapes as well.”
4. Password Protection
Passwords required?
Is two-step verification available?
Automatic log-out?
Account monitoring for suspicious activity?
5. Protection of confidentiality
Lawyer must ensure “that the online
data storage provider has an
enforceable obligation to preserve
confidentiality and security, and that
the provider will notify the lawyer if
served with process requiring the
production of client information.”
-NYSBA Ethics Opinion 842
6. Data Encryption
SSL = encryption in transit
Encryption at rest
Data backed up at least daily.
Back-ups to multiple locations.
7. Data back-up
Firewalls.
Intrusion detection.
Virus detection.
Network usage.
Application usage.
Port scanning.
8. Network security
Building access and security
24x7 on-site
security.
Multi-level access
verification.
Video monitoring
of entrances and
internal.
Uninterruptible, redundant
power
At least two
power grid
connections.
Battery banks.
N+1 on-site
generators.
Cooling system
HVAC systems
with N+1
redundancy to
keep climate at
the optimum
temperature and
humidity levels.
Fire detection and
suppression
Automatic, multi-
zoned detection
and suppression.
Off-site alarm
monitoring and
dispatch.
System monitoring
Real-time
monitoring of all
systems.
9. Physical security of data centers
• Auditing standards verifying that controls are in place to protect financial
information.
• Can apply to:
• Data centers and colocation facilities.
• SaaS providers.
• Payroll processing companies.
• Loan servicing companies.
• Medical claims processors.
SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II).
• Reporting option specifically designed for data centers, SaaS vendors, and
cloud-based businesses.
• Evaluates:
• System security.
• System availability.
• System processing integrity.
• Confidentiality of information.
• Privacy of personal information.
SOC 2
Data Center Seals of Approval
10. Get Extra Security
• Client-side encryption for Mac, Windows, iOS and
Android.
• Works with Dropbox, Box, Google Drive and Skydrive.
• Can share with others, but they must also install Viivo.
Viivo, www.viivo.com
• Free, geeky disk encryption software for Windows, Mac
and Linux.
• Can be used to encrypt files before sending to Dropbox.
TrueCrypt, www.truecrypt.org
• Client-side encryption for Dropbox and other systems.
Safebox, www.safeboxapp.com
• Easy email encryption, works with webmail services
such as Gmail as well as with Outlook.
Enlocked, www.enlocked.com
You need
only Be
reasonable
… not
paranoid
www.lawsitesblog.com
@bobambrogi
ambrogi@legaline.com

More Related Content

What's hot

The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryDan Michaluk
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2Dan Michaluk
 
How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsBMDS3416
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallJ. David Morris
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLEguestaaab94
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011J. David Morris
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetupIshay Tentser
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacyhimanshu jain
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalJohn Weiler
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentHipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentParshant Tyagi
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Khaled El Emam
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and HealthcareNetIQ
 

What's hot (20)

The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2
 
Legal Case Management Software For Lawyers and Law Firms - Legodesk
Legal Case Management Software For Lawyers and Law Firms - LegodeskLegal Case Management Software For Lawyers and Law Firms - Legodesk
Legal Case Management Software For Lawyers and Law Firms - Legodesk
 
How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic Documents
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Data Security
Data SecurityData Security
Data Security
 
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the Firewall
 
Putting your practice on cloud 9
Putting your practice on cloud 9Putting your practice on cloud 9
Putting your practice on cloud 9
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Steal This Data - Email Security and DLP
Steal This Data - Email Security and DLPSteal This Data - Email Security and DLP
Steal This Data - Email Security and DLP
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_final
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentHipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviroment
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
Ethics for lawyers in the cloud
Ethics for lawyers in the cloudEthics for lawyers in the cloud
Ethics for lawyers in the cloud
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and Healthcare
 

Similar to Ethics and Security of Cloud Computing for Lawyers

Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
Ethics and our Electronic Toys
Ethics and our Electronic Toys Ethics and our Electronic Toys
Ethics and our Electronic Toys Kevin O'Shea
 
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the CloudCloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the CloudRobert Ambrogi
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsNehal Madhani
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingNicole Black
 
Jelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientJelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientErin Olson
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersNicole Black
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesCassie McGarvey, JD
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeRobert Ambrogi
 
Dcg cba legal ethics and the cloud final 06.20.17
Dcg cba legal ethics and the cloud final 06.20.17Dcg cba legal ethics and the cloud final 06.20.17
Dcg cba legal ethics and the cloud final 06.20.17DENNIS GARCIA ☁
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowShawn Tuma
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Chad Gilles
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydneyanthonywong
 

Similar to Ethics and Security of Cloud Computing for Lawyers (20)

Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Ethics and our Electronic Toys
Ethics and our Electronic Toys Ethics and our Electronic Toys
Ethics and our Electronic Toys
 
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the CloudCloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerations
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
 
Jelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientJelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with Axcient
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and Employees
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
 
Dcg cba legal ethics and the cloud final 06.20.17
Dcg cba legal ethics and the cloud final 06.20.17Dcg cba legal ethics and the cloud final 06.20.17
Dcg cba legal ethics and the cloud final 06.20.17
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 
Informed consent and cloud computing
Informed consent and cloud computingInformed consent and cloud computing
Informed consent and cloud computing
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
 

More from Robert Ambrogi

The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...Robert Ambrogi
 
The Postcards of Charles Cleaves: Images of Rockport from 1907-1937
The Postcards of Charles Cleaves: Images of Rockport from 1907-1937The Postcards of Charles Cleaves: Images of Rockport from 1907-1937
The Postcards of Charles Cleaves: Images of Rockport from 1907-1937Robert Ambrogi
 
Choosing a Law Practice Management System
Choosing a Law Practice Management SystemChoosing a Law Practice Management System
Choosing a Law Practice Management SystemRobert Ambrogi
 
Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...
Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...
Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...Robert Ambrogi
 
Doing More with Less: How Technology is Helping Deliver Legal Services
Doing More with Less: How Technology is Helping Deliver Legal ServicesDoing More with Less: How Technology is Helping Deliver Legal Services
Doing More with Less: How Technology is Helping Deliver Legal ServicesRobert Ambrogi
 
Communicating Amid Clamor and Calamity: How Technology Has Rewired Lawyers' P...
Communicating Amid Clamor and Calamity: How Technology Has Rewired Lawyers' P...Communicating Amid Clamor and Calamity: How Technology Has Rewired Lawyers' P...
Communicating Amid Clamor and Calamity: How Technology Has Rewired Lawyers' P...Robert Ambrogi
 
The Building of a Breakwater, October 1894
The Building of a Breakwater, October 1894The Building of a Breakwater, October 1894
The Building of a Breakwater, October 1894Robert Ambrogi
 
10 Ways Technology is Rewiring Law Practice
10 Ways Technology is Rewiring Law Practice10 Ways Technology is Rewiring Law Practice
10 Ways Technology is Rewiring Law PracticeRobert Ambrogi
 
20 Tips for Seizing the Power of Social Media
20 Tips for Seizing the Power of Social Media20 Tips for Seizing the Power of Social Media
20 Tips for Seizing the Power of Social MediaRobert Ambrogi
 

More from Robert Ambrogi (11)

The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
 
The Postcards of Charles Cleaves: Images of Rockport from 1907-1937
The Postcards of Charles Cleaves: Images of Rockport from 1907-1937The Postcards of Charles Cleaves: Images of Rockport from 1907-1937
The Postcards of Charles Cleaves: Images of Rockport from 1907-1937
 
Choosing a Law Practice Management System
Choosing a Law Practice Management SystemChoosing a Law Practice Management System
Choosing a Law Practice Management System
 
Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...
Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...
Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...
 
Doing More with Less: How Technology is Helping Deliver Legal Services
Doing More with Less: How Technology is Helping Deliver Legal ServicesDoing More with Less: How Technology is Helping Deliver Legal Services
Doing More with Less: How Technology is Helping Deliver Legal Services
 
Communicating Amid Clamor and Calamity: How Technology Has Rewired Lawyers' P...
Communicating Amid Clamor and Calamity: How Technology Has Rewired Lawyers' P...Communicating Amid Clamor and Calamity: How Technology Has Rewired Lawyers' P...
Communicating Amid Clamor and Calamity: How Technology Has Rewired Lawyers' P...
 
Commonwealth v Fujita
Commonwealth v FujitaCommonwealth v Fujita
Commonwealth v Fujita
 
Websites 201
Websites 201Websites 201
Websites 201
 
The Building of a Breakwater, October 1894
The Building of a Breakwater, October 1894The Building of a Breakwater, October 1894
The Building of a Breakwater, October 1894
 
10 Ways Technology is Rewiring Law Practice
10 Ways Technology is Rewiring Law Practice10 Ways Technology is Rewiring Law Practice
10 Ways Technology is Rewiring Law Practice
 
20 Tips for Seizing the Power of Social Media
20 Tips for Seizing the Power of Social Media20 Tips for Seizing the Power of Social Media
20 Tips for Seizing the Power of Social Media
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Ethics and Security of Cloud Computing for Lawyers

  • 1. Ethics and Security of Cloud Computing for Lawyers Clio Cloud Conference September 23, 2013 Robert J. Ambrogi, Esq.
  • 2.
  • 3.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. The ethical issues at stake Lawyers have duty to safeguard confidential client information. Lawyers have duty to protect client property, including client files, from loss. Lawyers have a duty to be competent in technology.
  • 11. Every ethics panel agrees on two points ... 1. Lawyers may use the cloud. 2. Must take reasonable steps to minimize risk to confidential information and client files.
  • 12. Alabama State Bar Ethics Opinion 2010-02 Arizona State Bar Formal Opinion 09- 04 California Formal Opinion No. 2010- 179 Connecticut Bar Association Informal Opinion 2013-07 Florida Bar Opinion 12-3 Iowa State Bar Ethics Opinion 11- 01 Maine Professional Ethics Commission Opinion 194 Massachusetts Bar Association Opinion 12-03 New Hampshire Bar Association Opinion 2012-13/4 New Jersey Advisory Committee on Professional Ethics Opinion 701 Nevada State Bar Formal Opinion No. 33 New York State Bar Association Opinion 842 of 2010 North Carolina 2011 Formal Ethics Opinion 6 Oregon Formal Opinion No. 2011- 188 Pennsylvania Formal Opinion 2011-200 Vermont Bar Association Opinion 2010-6 Virginia Legal Ethics Opinion 1872
  • 13.
  • 14. North Carolina 2011 “A law firm may use SaaS if reasonable care is taken to minimize the risks of inadvertent disclosure of confidential information and to protect the security of client information and client files.” “A lawyer must fulfill the duties to protect confidential client information and to safeguard client files by applying the same diligence and competency to manage the risks of SaaS that the lawyer is required to apply when representing clients.”
  • 15. “The degree of protection to be afforded client information varies with the client, matter and information involved. But it places on the lawyer the obligation to perform due diligence to assess the degree of protection that will be needed and to act accordingly.” “Whatever form of SaaS is used, the lawyer must ensure that there is unfettered access to the data when it is needed. Likewise the lawyer must be able to determine the nature and degree of protection that will be afforded the data while residing elsewhere.” Iowa State Bar Ethics Opinion 11-01
  • 16. “A competent lawyer using cloud computing must understand and guard against the risks inherent in it.” “There is no hard and fast rule as to what a lawyer must do with respect to each client when using cloud computing. The facts and circumstances of each case, including the type and sensitivity of client information, will dictate what reasonable protective measures a lawyer must take when using cloud computing.” “Competent lawyers must have a basic understanding of the technologies they use. Furthermore, as technology, the regulatory framework, and privacy laws keep changing, lawyers should keep abreast of these changes.” New Hampshire 2012-13/4
  • 17. Florida Bar Opinion 12-3 Lawyers have an obligation to remain current not only in developments in the law, but also developments in technology that affect the practice of law. Lawyers who use cloud computing … have an ethical obligation to understand the technology they are using and how it potentially impacts confidentiality of information relating to client matters, so that the lawyers may take appropriate steps to comply with their ethical obligations.
  • 18. Massachusetts Bar Ethics Opinion 12-03 “Lawyer remains bound to follow an express instruction from his client that the client's confidential information not be stored or transmitted by means of the Internet.” “He should refrain from storing or transmitting particularly sensitive client information by means of the Internet without first seeking and obtaining the client's express consent.”
  • 19.
  • 20. 1. Company Due Diligence Is this a solid company with a good operating record? Do others recommend the company? What is in the TOS and privacy policy?
  • 21. 2. Unrestricted access to data Can I get my data whenever I want? Is the data stored elsewhere in the event I'm denied access? “Optionally, upon request by the Subscriber, all Content associated with the subscription will be replicated at a regular interval, to an offsite storage server accessible only to a reputable data escrow agent (“Escrow Agent”). The replicated Content (“Escrowed Data”) will be held under the terms of a separate agreement among Themis, the Subscriber, and the Escrow Agent (“Escrow Agreement”).”
  • 22. 3. Termination of relationship If I terminate the service, can I retrieve my data? If the service is terminated due to my non- payment, what happens to my data? If the company shuts down, can I get my data? Will the data be available in a non-proprietary format?
  • 23. “At LexisNexis we believe strongly that the data you place in LexisNexis Firm Manager belongs to you! To provide you with the comfort that you retain control of your critical client-privileged information and work product: • “Your administrator can export your data at any time. • “If you cancel your subscription, we maintain your data online for 6 months. … At any time you can decide to purge your data, removing it from LexisNexis systems. • “If you purge your data, your client privileged work product is removed from our systems … [and] from our backup tapes as well.”
  • 24. 4. Password Protection Passwords required? Is two-step verification available? Automatic log-out? Account monitoring for suspicious activity?
  • 25. 5. Protection of confidentiality Lawyer must ensure “that the online data storage provider has an enforceable obligation to preserve confidentiality and security, and that the provider will notify the lawyer if served with process requiring the production of client information.” -NYSBA Ethics Opinion 842
  • 27. SSL = encryption in transit
  • 29. Data backed up at least daily. Back-ups to multiple locations. 7. Data back-up
  • 30. Firewalls. Intrusion detection. Virus detection. Network usage. Application usage. Port scanning. 8. Network security
  • 31. Building access and security 24x7 on-site security. Multi-level access verification. Video monitoring of entrances and internal. Uninterruptible, redundant power At least two power grid connections. Battery banks. N+1 on-site generators. Cooling system HVAC systems with N+1 redundancy to keep climate at the optimum temperature and humidity levels. Fire detection and suppression Automatic, multi- zoned detection and suppression. Off-site alarm monitoring and dispatch. System monitoring Real-time monitoring of all systems. 9. Physical security of data centers
  • 32. • Auditing standards verifying that controls are in place to protect financial information. • Can apply to: • Data centers and colocation facilities. • SaaS providers. • Payroll processing companies. • Loan servicing companies. • Medical claims processors. SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II). • Reporting option specifically designed for data centers, SaaS vendors, and cloud-based businesses. • Evaluates: • System security. • System availability. • System processing integrity. • Confidentiality of information. • Privacy of personal information. SOC 2 Data Center Seals of Approval
  • 33.
  • 34.
  • 35. 10. Get Extra Security • Client-side encryption for Mac, Windows, iOS and Android. • Works with Dropbox, Box, Google Drive and Skydrive. • Can share with others, but they must also install Viivo. Viivo, www.viivo.com • Free, geeky disk encryption software for Windows, Mac and Linux. • Can be used to encrypt files before sending to Dropbox. TrueCrypt, www.truecrypt.org • Client-side encryption for Dropbox and other systems. Safebox, www.safeboxapp.com • Easy email encryption, works with webmail services such as Gmail as well as with Outlook. Enlocked, www.enlocked.com