SlideShare una empresa de Scribd logo
1 de 25
MEDIATING WITH
TECHNOLOGY:
OPPORTUNITIES AND
RISKS

NICOLE GARTON-JONES, , B.A., LL.B., CERT.CFM.
LAWYER & MEDIATOR, HERITAGE LAW
OVERVIEW
•Technology can significantly enhance your mediation
practice in terms of facilitating autonomy, accessing remote
clients and increasing the efficiency of your practice.
•That said, proper risk management procedures must be put
in place to ensure the security of your practice and to protect
confidential client information.
•This presentation will outline the various technology options
available to mediators as well as the risks and pitfalls to be
aware of.
TOPICS TO BE
COVERED
1. Why does a
   mediator need to
   be concerned with
   technology?
2. What technology is
   out there that I
   should know
   about?
3. What are the
   opportunities and
   risks of the new
   technologies?
WHY FOCUS ON TECHNOLOGY?
•Mediators, in addition to keeping current with mediation
theory and practice, must also keep up to date with new
developments in business and technology in order to
effectively compete in an evolving and competitive
marketplace
•Risk management in the context of new technology is often
discussed in reactive terms, for example ensuring the
preservation of confidential and client information
• There is also a pro-active professional responsibility in
regards to technology, specifically a duty to keep abreast of
innovation to ensure that you are delivering the most cost
effective, timely and high quality mediation services possible
WHERE DOES INNOVATION
COME FROM?
•An idea is not a single thing. Rather, new idea
is a network on the most elemental level – a
new network of neurons firing in synch with
each other inside your brain. A new
configuration that has never formed before.
•How do you get your brain in these
environments where these new networks will
form? Specifically, what is the space of
creativity?
•Slow hunch, important ideas take a long time
to evolve
•Borrow other people’s hunches, combine
them with our hunches and create something
new
•Chance favours the connected mind
•In the pursuit of excellence and new
ideas, consider trying new technologies and
tools that expose you to lots of different
ideas, perspectives and backgrounds
THE MEDIUM IS THE MESSAGE
•Independent of concerns of profitability and
effective business management, it is also
important to note that innovations in
technology are not peripheral to individual
thought and practice
• Rather, commentators have harkened back to
Marshal McLuhan’s aphorism that “the
medium is the message” and noted that
changes in the structure and delivery of
information are also changing the human mind
•We are drowning in information, leaving a
permanent digital imprint, more digitally inter-
connected, but possibly more personally alone
than ever before
•Consider the impact of new technology upon
you as a mediator and also upon your clients
BASICS: HIRE AN IT
PROFESSIONAL & GET IT RIGHT
•Computers (desktop, laptops, netbooks)
•Computer Operating Systems (Windows & Mac)
•Monitors
•Computer Peripherals (mouse, keyboard, external storage)
•Printers (stand alone, networked, multifunctional)
•Scanners (low & high volume)
•Servers (solo, small firm, virtual, peer-to-peer)
•Server Operating Systems (Windows & Mac)
•Networking Hardware (switchers, routers, firewalls, wireless)
•Smartphones
SOFTWARE
•Productivity (Microsoft Office, Acrobat, OCR, voice
recognition)
•Security software (stand alone & enterprise versions)
•Case management (Amicus Attorney, Clio, Rocket Matter)
•Time & billing software (PCLaw, Tab3)
•Litigation programs (Casemap, Timemap)
•Document management (Worldox, DocuShare, Plain folders)
•Document assembly (HotDocs)
CLOUD COMPUTING
•Cloud computing is subject to considerable hype, and many
authors have commented as to its scope and meaning. It
includes a wide range of applications people use in daily life.
•Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared pool of
configurable computing resources (e.g., networks, servers,
storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or
service provider interaction.
TYPES OF CLOUD COMPUTING
•Cloud Software as a Service (SaaS): software that is deployed
over the Internet, available to the end user as and when wanted.
Hence, it’s also known as “software on demand”. Payment can
either be as per usage, on a subscription model or even free if
advertisement is part of the equation.
(Gmail, Clio, RocketMatter, Dropbox, Evernote)
•Cloud Platform as a Service (PaaS): is a combination of a
development platform and a solution stack, delivered as a
service on demand. (for software developers)
•Cloud Infrastructure as a Service (IaaS): delivers computer
infrastructure – typically a platform virtualization environment –
as a service. This includes servers, software, data-center space
and network equipment, available in a single bundle and billed
as per usage in a utility computing model. (Rackspace, i-Worx)
COLLABORATION TOOLS
•Google Docs
•Acrobat
•SharePoint
•Office 365
REMOTE ACCESS TOOLS
•Virtual Private Networking
•GoToMyPC
•LogMeIn
•TeamViewer
UNIFIED MESSAGING &
TELECOMMUNICATIONS
•Google Voice
•Voice over Internet Protocol (VoIP)
ONLINE ODR
•Online Dispute Resolution (ODR) taps into technology (principally the
communication abilities of the Internet) to help resolve disputes between
parties.


•ODR was born by the combination of ADR and Information and
Communication Technologies. In ADR, there are three parties: the plaintiff,
the defendant and the third neutral party (a mediator or arbitrator for
example). ODR differs from this three party system by introducing
computers and software – an independent fourth party that can help manage
the dispute. At the highest and most sophisticated levels of ODR, the
technology applies mathematical models and algorithms based on group
theory to resolve the dispute.


•There are many other implementations of ODR systems, that range from
simple blind-bidding systems (one variable, two parties) where the system
does not reveal what each person is willing to accept unless a settlement is
reached (the software compares each party’s position and declares a
settlement once the positions become sufficiently close), to assisted
negotiation, to adjudicative methods and others.
E-PROVIDERS OF ODR
•Modria (Modular Online Dispute Resolution Implementation
Assistance)
•the mediation room
•JURIPAX
WHAT’S HAPPENING IN BC
•Distance Mediation project sponsored by MediateBC for
family law cases (Cisco WebEx)
•BC Ministry of Attorney General and Mediate BC for low
value civil disputes
  • Brings people together with technologies that bridge a
    distance in order to help solve real problems
INTERNET SECURITY
•mediators need to understand basic Internet security in order to
responsibly communicate with clients and collaborate with others
online (for e.g., how a hacker accesses unsecured data from a public
hotspot and how to safely work on a wireless network)
•Know best practices for securing hardware and mobile devices as
well as safe practices for using web-based or cloud computing
applications to protect clients’ confidential information
•Things to know: encryption, secure socket layer (SSL) and
https, wireless networks, remote access to firm computers, mobile
device security, security of cloud-based services, VPNs, security
risks on public computers and networks, the most common online
security breaches and computer vulnerabilities, enabling encryption
hardware and software firewalls, password protections and disposing
of hardware when upgrading
INTERNET SECURITY
FURTHER READING
Legal Technology Resource Centre. Resources on Wireless
Networking and Security. American Bar Association, Web.
Securing Your Clients’ Data While on the Road, David Ries and
Reid Trautz
http://apps.americanbar.org/lpm/lpt/articles/tch10081.shtml
Cyberspace Under Siege: Law firms are likely targets for attacks
seeking to steal information off computer systems, Ed Finkel
http://www.abajournal.com/magazine/article/cyberspace_under_si
ege/
SAAS: PROTECTING
CLIENT DATA ONLINE
•mediators must ensure that client information is protected in the
hands of the technology provider or hosting company the firm
chooses
•Companies providing practice management technology will host
application data either in their own servers or will have a
relationship (usually a lease) with a third party provider that owns
the data centre where it houses the data on its servers
•If the provider offers geo-redundancy, then the data will be
housed in two different data centres in different geographic
locations
SAAS: PROTECTING
CLIENT DATA ONLINE
CONT
•Research the technology provider and understand the terms of
service agreement
•Understand the relationship and review any agreement covering
data access and confidentiality that may exist between the service
provider and the hosting company
•Understand: data return and retention policies, transferring data and
compatibility issues for restoring data, backups, export features and
offline versions of the software, third party hosting, server locations
and geo-redundancy, international laws that may apply if the services
are located in another country, response time of the provider and
tech support, confidentiality of law office data (including who has
access, procedures for government and civil search and seizure
actions, procedures for potential breach of confidentiality) and the
provider’s industry reputation and infrastructure to support growth
SAAS: PROTECTING
CLIENT DATA ONLINE
FURTHER READING
•Black, Nicole, Cloud Computing for Lawyers, ABA/LPM, January
2012
•Law Society of British Columbia, Report of the Cloud Computing
Working Group, July 15, 2011
SOCIAL NETWORKING
•Microblogging - Twitter
•Social Networking - Facebook, LinkedIn, Legal OnRamp,
Martindate Hubbell Connected
•Videos – YouTube, Vimeo
•Slides & document sharing: SlideShare, Docstoc, JD-Supra
• Location sharing – FourSquare
•Review & rating sites: Avvo, Yelp
SOCIAL NETWORKING
RISKS
•Drawing the line between personal and professional networking in
online social environments is difficult because the applications were
created with the purpose of sharing with as many people as possible
•User error: imprudent posts, breaching client confidentiality,
“friending” a judge
•At each step, the user must consider who has access to and control
of the account info he or she is providing to the social media
application
•Applications change privacy and account options and the user will
need to monitor his or her settings regularly, as well as the content
posted
•Be wary of third party applications; may be third party applications
running on social networking websites that request access to user
information and contact databases
SOCIAL NETWORING
FURTHER READING
Nicole Black and Carolyn Elefant, Social Media for Lawyers: The
Next Frontier, American Bar Association, 2010
Steve Bennett, Ethics of Lawyer Social Networking, 73 Alb. L.
Rev. 113 (2009)
Adrian Dayton, Social Media for mediators: Twitter Edition, Ark
Group, 2009
QUESTIONS
Nicole Garton-Jones, B.A., LL.B., Cert.CFM.
• Heritage Law
• nicole@bcheritagelaw.com
• www.bcheritagelaw.com
• http://twitter.com/NGartonJones

Más contenido relacionado

La actualidad más candente

Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreuschJohan Klerk
 
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...AIIM International
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data miningharithavijay94
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...FIA2010
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenyaTonny Omwansa
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014kevintsmith
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Miningwanani181
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsAndris Soroka
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Uni Systems S.M.S.A.
 
Introduction to STIX 101
Introduction to STIX 101Introduction to STIX 101
Introduction to STIX 101stixproject
 
OASIS PMRM overview and tools #EIC2014: Sabo and Janssen
OASIS PMRM overview and tools #EIC2014: Sabo and JanssenOASIS PMRM overview and tools #EIC2014: Sabo and Janssen
OASIS PMRM overview and tools #EIC2014: Sabo and JanssenJames Bryce Clark
 

La actualidad más candente (20)

Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreusch
 
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
 
Information Security
Information SecurityInformation Security
Information Security
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
DLP customer presentation
DLP customer presentationDLP customer presentation
DLP customer presentation
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenya
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
 
Introduction to STIX 101
Introduction to STIX 101Introduction to STIX 101
Introduction to STIX 101
 
OASIS PMRM overview and tools #EIC2014: Sabo and Janssen
OASIS PMRM overview and tools #EIC2014: Sabo and JanssenOASIS PMRM overview and tools #EIC2014: Sabo and Janssen
OASIS PMRM overview and tools #EIC2014: Sabo and Janssen
 

Similar a Mediating with Technology.: Opportunities and Risks

Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksNicole Garton
 
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of TradeSecuring Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of TradeLisa Abe-Oldenburg, B.Comm., JD.
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think Uni Systems S.M.S.A.
 
Cloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On OrganizationCloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On OrganizationRomana Sharmin
 
Introduction to Cloud Computing, Overview
Introduction to Cloud Computing, OverviewIntroduction to Cloud Computing, Overview
Introduction to Cloud Computing, OverviewSudiptaDas684406
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud ComputingNishant Munjal
 
Bni cloud presentation
Bni cloud presentationBni cloud presentation
Bni cloud presentationrichszy
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
Week 5 Building Digital Capabilites in Workforce and Organization.pptx
Week 5 Building Digital Capabilites in Workforce and Organization.pptxWeek 5 Building Digital Capabilites in Workforce and Organization.pptx
Week 5 Building Digital Capabilites in Workforce and Organization.pptxDibyesh1
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and factsArun Ganesh
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
BBIM510 Lecture (2014)
BBIM510 Lecture (2014)BBIM510 Lecture (2014)
BBIM510 Lecture (2014)Arjun Shivraj
 
Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1Francesco Rago
 
Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)Megatris Comp
 

Similar a Mediating with Technology.: Opportunities and Risks (20)

Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the Risks
 
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of TradeSecuring Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 
Cloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On OrganizationCloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On Organization
 
Introduction to Cloud Computing, Overview
Introduction to Cloud Computing, OverviewIntroduction to Cloud Computing, Overview
Introduction to Cloud Computing, Overview
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014
 
Bni cloud presentation
Bni cloud presentationBni cloud presentation
Bni cloud presentation
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Week 5 Building Digital Capabilites in Workforce and Organization.pptx
Week 5 Building Digital Capabilites in Workforce and Organization.pptxWeek 5 Building Digital Capabilites in Workforce and Organization.pptx
Week 5 Building Digital Capabilites in Workforce and Organization.pptx
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Introduction au Cloud computing
Introduction au Cloud computingIntroduction au Cloud computing
Introduction au Cloud computing
 
BBIM510 Lecture (2014)
BBIM510 Lecture (2014)BBIM510 Lecture (2014)
BBIM510 Lecture (2014)
 
INTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTERINTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTER
 
Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1
 
Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 

Más de Nicole Garton

Family Offices in Canada: Current Trends and Applications for Transgeneratio...
Family Offices in Canada:  Current Trends and Applications for Transgeneratio...Family Offices in Canada:  Current Trends and Applications for Transgeneratio...
Family Offices in Canada: Current Trends and Applications for Transgeneratio...Nicole Garton
 
Effective Blended Family Planning
Effective Blended Family PlanningEffective Blended Family Planning
Effective Blended Family PlanningNicole Garton
 
Estate Planning Basics
Estate Planning BasicsEstate Planning Basics
Estate Planning BasicsNicole Garton
 
Conflict analysis and intervention selection for the parenting coordinator
Conflict analysis and intervention selection for the parenting coordinatorConflict analysis and intervention selection for the parenting coordinator
Conflict analysis and intervention selection for the parenting coordinatorNicole Garton
 
Family Business Succession: What You Need to Know to Effectively Advise Busin...
Family Business Succession: What You Need to Know to Effectively Advise Busin...Family Business Succession: What You Need to Know to Effectively Advise Busin...
Family Business Succession: What You Need to Know to Effectively Advise Busin...Nicole Garton
 
Methodologies for Elder Mediation
Methodologies for Elder MediationMethodologies for Elder Mediation
Methodologies for Elder MediationNicole Garton
 
Elder & Guardianship Mediation in BC
Elder & Guardianship Mediation in BCElder & Guardianship Mediation in BC
Elder & Guardianship Mediation in BCNicole Garton
 

Más de Nicole Garton (7)

Family Offices in Canada: Current Trends and Applications for Transgeneratio...
Family Offices in Canada:  Current Trends and Applications for Transgeneratio...Family Offices in Canada:  Current Trends and Applications for Transgeneratio...
Family Offices in Canada: Current Trends and Applications for Transgeneratio...
 
Effective Blended Family Planning
Effective Blended Family PlanningEffective Blended Family Planning
Effective Blended Family Planning
 
Estate Planning Basics
Estate Planning BasicsEstate Planning Basics
Estate Planning Basics
 
Conflict analysis and intervention selection for the parenting coordinator
Conflict analysis and intervention selection for the parenting coordinatorConflict analysis and intervention selection for the parenting coordinator
Conflict analysis and intervention selection for the parenting coordinator
 
Family Business Succession: What You Need to Know to Effectively Advise Busin...
Family Business Succession: What You Need to Know to Effectively Advise Busin...Family Business Succession: What You Need to Know to Effectively Advise Busin...
Family Business Succession: What You Need to Know to Effectively Advise Busin...
 
Methodologies for Elder Mediation
Methodologies for Elder MediationMethodologies for Elder Mediation
Methodologies for Elder Mediation
 
Elder & Guardianship Mediation in BC
Elder & Guardianship Mediation in BCElder & Guardianship Mediation in BC
Elder & Guardianship Mediation in BC
 

Último

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Último (20)

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

Mediating with Technology.: Opportunities and Risks

  • 1. MEDIATING WITH TECHNOLOGY: OPPORTUNITIES AND RISKS NICOLE GARTON-JONES, , B.A., LL.B., CERT.CFM. LAWYER & MEDIATOR, HERITAGE LAW
  • 2. OVERVIEW •Technology can significantly enhance your mediation practice in terms of facilitating autonomy, accessing remote clients and increasing the efficiency of your practice. •That said, proper risk management procedures must be put in place to ensure the security of your practice and to protect confidential client information. •This presentation will outline the various technology options available to mediators as well as the risks and pitfalls to be aware of.
  • 3. TOPICS TO BE COVERED 1. Why does a mediator need to be concerned with technology? 2. What technology is out there that I should know about? 3. What are the opportunities and risks of the new technologies?
  • 4. WHY FOCUS ON TECHNOLOGY? •Mediators, in addition to keeping current with mediation theory and practice, must also keep up to date with new developments in business and technology in order to effectively compete in an evolving and competitive marketplace •Risk management in the context of new technology is often discussed in reactive terms, for example ensuring the preservation of confidential and client information • There is also a pro-active professional responsibility in regards to technology, specifically a duty to keep abreast of innovation to ensure that you are delivering the most cost effective, timely and high quality mediation services possible
  • 5. WHERE DOES INNOVATION COME FROM? •An idea is not a single thing. Rather, new idea is a network on the most elemental level – a new network of neurons firing in synch with each other inside your brain. A new configuration that has never formed before. •How do you get your brain in these environments where these new networks will form? Specifically, what is the space of creativity? •Slow hunch, important ideas take a long time to evolve •Borrow other people’s hunches, combine them with our hunches and create something new •Chance favours the connected mind •In the pursuit of excellence and new ideas, consider trying new technologies and tools that expose you to lots of different ideas, perspectives and backgrounds
  • 6. THE MEDIUM IS THE MESSAGE •Independent of concerns of profitability and effective business management, it is also important to note that innovations in technology are not peripheral to individual thought and practice • Rather, commentators have harkened back to Marshal McLuhan’s aphorism that “the medium is the message” and noted that changes in the structure and delivery of information are also changing the human mind •We are drowning in information, leaving a permanent digital imprint, more digitally inter- connected, but possibly more personally alone than ever before •Consider the impact of new technology upon you as a mediator and also upon your clients
  • 7. BASICS: HIRE AN IT PROFESSIONAL & GET IT RIGHT •Computers (desktop, laptops, netbooks) •Computer Operating Systems (Windows & Mac) •Monitors •Computer Peripherals (mouse, keyboard, external storage) •Printers (stand alone, networked, multifunctional) •Scanners (low & high volume) •Servers (solo, small firm, virtual, peer-to-peer) •Server Operating Systems (Windows & Mac) •Networking Hardware (switchers, routers, firewalls, wireless) •Smartphones
  • 8. SOFTWARE •Productivity (Microsoft Office, Acrobat, OCR, voice recognition) •Security software (stand alone & enterprise versions) •Case management (Amicus Attorney, Clio, Rocket Matter) •Time & billing software (PCLaw, Tab3) •Litigation programs (Casemap, Timemap) •Document management (Worldox, DocuShare, Plain folders) •Document assembly (HotDocs)
  • 9. CLOUD COMPUTING •Cloud computing is subject to considerable hype, and many authors have commented as to its scope and meaning. It includes a wide range of applications people use in daily life. •Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
  • 10. TYPES OF CLOUD COMPUTING •Cloud Software as a Service (SaaS): software that is deployed over the Internet, available to the end user as and when wanted. Hence, it’s also known as “software on demand”. Payment can either be as per usage, on a subscription model or even free if advertisement is part of the equation. (Gmail, Clio, RocketMatter, Dropbox, Evernote) •Cloud Platform as a Service (PaaS): is a combination of a development platform and a solution stack, delivered as a service on demand. (for software developers) •Cloud Infrastructure as a Service (IaaS): delivers computer infrastructure – typically a platform virtualization environment – as a service. This includes servers, software, data-center space and network equipment, available in a single bundle and billed as per usage in a utility computing model. (Rackspace, i-Worx)
  • 12. REMOTE ACCESS TOOLS •Virtual Private Networking •GoToMyPC •LogMeIn •TeamViewer
  • 13. UNIFIED MESSAGING & TELECOMMUNICATIONS •Google Voice •Voice over Internet Protocol (VoIP)
  • 14. ONLINE ODR •Online Dispute Resolution (ODR) taps into technology (principally the communication abilities of the Internet) to help resolve disputes between parties. •ODR was born by the combination of ADR and Information and Communication Technologies. In ADR, there are three parties: the plaintiff, the defendant and the third neutral party (a mediator or arbitrator for example). ODR differs from this three party system by introducing computers and software – an independent fourth party that can help manage the dispute. At the highest and most sophisticated levels of ODR, the technology applies mathematical models and algorithms based on group theory to resolve the dispute. •There are many other implementations of ODR systems, that range from simple blind-bidding systems (one variable, two parties) where the system does not reveal what each person is willing to accept unless a settlement is reached (the software compares each party’s position and declares a settlement once the positions become sufficiently close), to assisted negotiation, to adjudicative methods and others.
  • 15. E-PROVIDERS OF ODR •Modria (Modular Online Dispute Resolution Implementation Assistance) •the mediation room •JURIPAX
  • 16. WHAT’S HAPPENING IN BC •Distance Mediation project sponsored by MediateBC for family law cases (Cisco WebEx) •BC Ministry of Attorney General and Mediate BC for low value civil disputes • Brings people together with technologies that bridge a distance in order to help solve real problems
  • 17. INTERNET SECURITY •mediators need to understand basic Internet security in order to responsibly communicate with clients and collaborate with others online (for e.g., how a hacker accesses unsecured data from a public hotspot and how to safely work on a wireless network) •Know best practices for securing hardware and mobile devices as well as safe practices for using web-based or cloud computing applications to protect clients’ confidential information •Things to know: encryption, secure socket layer (SSL) and https, wireless networks, remote access to firm computers, mobile device security, security of cloud-based services, VPNs, security risks on public computers and networks, the most common online security breaches and computer vulnerabilities, enabling encryption hardware and software firewalls, password protections and disposing of hardware when upgrading
  • 18. INTERNET SECURITY FURTHER READING Legal Technology Resource Centre. Resources on Wireless Networking and Security. American Bar Association, Web. Securing Your Clients’ Data While on the Road, David Ries and Reid Trautz http://apps.americanbar.org/lpm/lpt/articles/tch10081.shtml Cyberspace Under Siege: Law firms are likely targets for attacks seeking to steal information off computer systems, Ed Finkel http://www.abajournal.com/magazine/article/cyberspace_under_si ege/
  • 19. SAAS: PROTECTING CLIENT DATA ONLINE •mediators must ensure that client information is protected in the hands of the technology provider or hosting company the firm chooses •Companies providing practice management technology will host application data either in their own servers or will have a relationship (usually a lease) with a third party provider that owns the data centre where it houses the data on its servers •If the provider offers geo-redundancy, then the data will be housed in two different data centres in different geographic locations
  • 20. SAAS: PROTECTING CLIENT DATA ONLINE CONT •Research the technology provider and understand the terms of service agreement •Understand the relationship and review any agreement covering data access and confidentiality that may exist between the service provider and the hosting company •Understand: data return and retention policies, transferring data and compatibility issues for restoring data, backups, export features and offline versions of the software, third party hosting, server locations and geo-redundancy, international laws that may apply if the services are located in another country, response time of the provider and tech support, confidentiality of law office data (including who has access, procedures for government and civil search and seizure actions, procedures for potential breach of confidentiality) and the provider’s industry reputation and infrastructure to support growth
  • 21. SAAS: PROTECTING CLIENT DATA ONLINE FURTHER READING •Black, Nicole, Cloud Computing for Lawyers, ABA/LPM, January 2012 •Law Society of British Columbia, Report of the Cloud Computing Working Group, July 15, 2011
  • 22. SOCIAL NETWORKING •Microblogging - Twitter •Social Networking - Facebook, LinkedIn, Legal OnRamp, Martindate Hubbell Connected •Videos – YouTube, Vimeo •Slides & document sharing: SlideShare, Docstoc, JD-Supra • Location sharing – FourSquare •Review & rating sites: Avvo, Yelp
  • 23. SOCIAL NETWORKING RISKS •Drawing the line between personal and professional networking in online social environments is difficult because the applications were created with the purpose of sharing with as many people as possible •User error: imprudent posts, breaching client confidentiality, “friending” a judge •At each step, the user must consider who has access to and control of the account info he or she is providing to the social media application •Applications change privacy and account options and the user will need to monitor his or her settings regularly, as well as the content posted •Be wary of third party applications; may be third party applications running on social networking websites that request access to user information and contact databases
  • 24. SOCIAL NETWORING FURTHER READING Nicole Black and Carolyn Elefant, Social Media for Lawyers: The Next Frontier, American Bar Association, 2010 Steve Bennett, Ethics of Lawyer Social Networking, 73 Alb. L. Rev. 113 (2009) Adrian Dayton, Social Media for mediators: Twitter Edition, Ark Group, 2009
  • 25. QUESTIONS Nicole Garton-Jones, B.A., LL.B., Cert.CFM. • Heritage Law • nicole@bcheritagelaw.com • www.bcheritagelaw.com • http://twitter.com/NGartonJones