SlideShare una empresa de Scribd logo
1 de 38
Technology 101 and
the Practice of Law:
Keeping Your Firm Safe
Powered by
© Corporation Service Company®. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
The Presenters
Jennifer K. Mailander
Associate General Counsel
Corporation Service Company
Scott Plichta
Chief Information Security Officer
Corporation Service Company
© Corporation Service Company. All Rights Reserved.
“We have a long history of innovation
and using leading edge technology to
provide customer solutions.”
What Company?
Caterpillar Inc.
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
How knowledgeable are you
about technology?
Not at all
Somewhat
Very knowledgeable
I am an expert
Describe Yourself
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
ABA Model Rules
1.1 “A lawyer shall provide competent representation to a
client. Competent representation requires the legal
knowledge, skill, thoroughness and preparation reasonably
necessary for the representation.”
Comment 8 “A lawyer should keep abreast of changes in
the law and its practice, including the benefits and risks
associated with relevant technology.”
5.3(d) “A lawyer having direct supervisory authority over
the non-lawyer shall make reasonable efforts to ensure
that the person's conduct is compatible with the
professional obligations of the lawyer.”
Ethical Duty
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Model Rule 1.6(c)
“A lawyer shall make reasonable efforts to prevent the
inadvertent disclosure of, or unauthorized access to,
information relating to the representation of a client.”
Ethics: Client Confidences
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
According to the FBI, law firms and law departments are
among the most vulnerable targets for cyber attacks.
Lawyers are reported to:
Have limited resources to dedicate
to computer security
Lack a sophisticated appreciation
of technology risks
Lack an instinct for cyber security
The ABA Cyber Security Handbook
Cyber Security and Lawyers
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Individual IT Empowerment
Part of a Larger Phenomenon
© Corporation Service Company. All Rights Reserved.
Key Terms and Definitions*
© Corporation Service Company. All Rights Reserved.
Hosting (Website hosting, Web hosting, and Webhosting): the business of housing, serving, and
maintaining files for one or more websites.
The Cloud (Cloud Computing): a type of Internet-based computing where different services such as
servers, storage, and applications are delivered to an organization's computers and devices through the
Internet. Examples of Cloud Computing include:
Infrastructure as a Service (IaaS): a service model that delivers computer infrastructure on
an outsourced basis to support enterprise operations. Typically, IaaS provides hardware,
storage, servers and data center space or network components; it may also include software.
Platform as a Service (PaaS): a category of cloud computing services that provides a
platform allowing customers to develop, run, and manage web applications without the
complexity of building and maintaining the infrastructure typically associated with developing
and launching an application.
Software as a Service (SaaS): a software distribution model in which applications are hosted
by a vendor or service provider and made available to customers over a network.
*Technology terminology sources include: Wikipedia, Technopedia, Internationals Association of Privacy Professionals (IAPP),
ABA, ACC, The Shared Assessments Program, Merriam-Webster, and Ponemon Institute.
© Corporation Service Company. All Rights Reserved.
A Tasty Example: Pizza as a Service
Traditional
On-Premises
(On Prem)
Made at Home
Dining
Table
Soda
Electric /
Gas
Oven
Fire
Pizza
Dough
Tomato
Sauce
Toppings
Cheese
Take and Bake Pizza Delivered Dining Out
www.linkedin.com/pulse/20140730172610-9679881-pizza-as-a-service
You Manage Vendor Manages
Infrastructure
as a Service
(IaaS)
Dining
Table
Soda
Electric /
Gas
Oven
Fire
Pizza
Dough
Tomato
Sauce
Toppings
Cheese
Platform
as a Service
(PaaS)
Dining
Table
Soda
Electric /
Gas
Oven
Fire
Pizza
Dough
Tomato
Sauce
Toppings
Cheese
Software
as a Service
(SaaS)
Dining
Table
Soda
Electric /
Gas
Oven
Fire
Pizza
Dough
Tomato
Sauce
Toppings
Cheese
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Shadow IT: Where a user/department finds a cloud provider to do work because IT is too busy, and
usually without knowledge/oversight controls of IT/IT security/legal.
Single Sign-On (SSO): A session/user authentication process that permits a user to enter one name
and password in order to access multiple applications. May be used interchangeably with “federation”
or “federated login.”
Security Assertion Markup Language (SAML): A data format for exchanging authentication and
authorization data between parties, in particular, between an identity provider and a service provider.
Federation: Refers to different computing entities adhering to certain standards of operations in a
collective manner to facilitate communication.
Encryption: The conversion of electronic data into another form, ciphertext, so that it cannot be
easily understood by anyone except authorized parties with the key. Types of encrypted data include:
Data in Use, Data at Rest, Data in Motion.
Payment Card Industry Data Security Standard (PCI DSS): Industry created policies and
procedures intended to optimize the security of credit, debit, and cash card transactions to protect
cardholders against misuse of personal information and financial loss.
Key Terms and Definitions (cont.)
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Data Types
Data in Use:
Active data under constant
change stored physically in
databases, data warehouses,
spreadsheets, etc.
Data in Motion:
Data that is traversing a
network or temporarily residing
in computer memory to be
read or updated.
Data at Rest:
Inactive data physically stored in databases,
data warehouses, spreadsheets, archives,
tapes, off-site backups, etc.
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Big Data:
Data sets so large or complex that traditional data processing applications are
inadequate. Challenges include analysis, capture, search, sharing, storage,
transfer, visualization, and privacy.
High-volume, high-velocity, and high-variety information assets that demand
cost-effective, innovative forms of information processing for enhanced insight
and decision making.
Internet of Things (IoT): Network of physical objects embedded with electronics,
software, and sensors enabling connectivity (remote data exchange) between
manufacturer, operator, and other devices. Resulting in improved efficiency, accuracy,
and economic benefits.
Phishing: Broad scattered email fraud where user is duped into revealing personal or
confidential information for illicit use.
Spear Phishing: Phishing that targets a specific organization; messages appear to come
from trusted source.
Key Terms and Definitions (cont.)
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Information Security: Protecting information and information systems from unauthorized
access, use, disclosure, disruption, modification, or destruction to provide:
Integrity – guarding against improper information modification or destruction;
includes ensuring information non-repudiation and authenticity.
Confidentiality – preserving authorized restrictions on access and disclosure.
Availability – ensuring timely and reliable access to and use of information.
Information Security Program:
Identify threats, vulnerabilities, and requirements
Implement security controls, monitor
Cyber Security: Measures taken to protect a computer or computer system against
unauthorized access or attacks.
Information Security
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Not a technology concept, yet inescapably tied to it.
Privacy is not security.
“[Privacy is] the appropriate use of personal information under the circumstances.
What is appropriate will depend on context, law, and the individual's expectations;
also, [privacy is] the right of an individual to control the collection, use, and
disclosure of personal information.”
IAPP Information Privacy Certification: Glossary of Common Privacy Terminology, 2011
Notable privacy events:
Safe Harbor and Privacy Shield
Establishment of Federal Privacy Council
• Cybersecurity National Action Plan
New FTC rules for Internet service providers
General Data Protection Regulation
Information Privacy
© Corporation Service Company. All Rights Reserved.
Top 10 Tips:
Working with Technology
© Corporation Service Company. All Rights Reserved.
Tip #10:
Understand Your Company’s Technology
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Understand your company’s business and the
technology your company uses daily
Understand your company’s technology strategy:
Cloud first to cloud never
Bring your own technology
Understand who has responsibility for buying and
maintaining technology:
What is legal’ s role in this?
What is your process for buying technology?
Make sure it includes a process to identify when shadow
IT is being bought or used.
Tip #10: Understand Your Company’s Technology
© Corporation Service Company. All Rights Reserved.
Tip #9:
Know Your Vendors and Vendors’ Vendors
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Know who your vendors are and what services/products
they provide.
Connect and work with your security team:
You both need to know when you find new places to store data
Put a process in place to identify new technology
being used:
It’s happening; you just may not know about it
Tip #9: Know Your Vendors and Vendors’ Vendors
© Corporation Service Company. All Rights Reserved.
Tip #8:
Know Your Law Firms’ Security Practices
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Tip #8: Know Your Law Firms’ Security Practices
© Corporation Service Company. All Rights Reserved.
Understand your obligations as in-house counsel when
working with your law firms.
Join the ACC Litigation Committee Subcommittee on Cyber
Security and Law Firms:
Evan Slavitt, evan.slavitt@avx.com
Join the ACC Working Group Data Security for
Law Firms:
Amar Sarwal, sarwal@acc.com
Join Legal Services Information Sharing and Analysis
Organization (LS-ISAO) Services for law firms.
Tip #7:
Be a Partner to the Business
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Find a way to help your business partners
understand and mitigate technology risks; help
them achieve success.
Host a series of lunch and learns with your business
and technology counterparts:
Present on areas of respective expertise
• Contract and licensing 101
• Technology 101
• Sales 101, Operations 101, etc.
Meet regularly to discuss issues, trends, etc.
Tip #7: Be a Partner to the Business
Tip #6:
Conduct a Data Audit
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Form a cross-functional team to identify data practices
Understand what and how data is managed:
What is the data?
Who has (and should have) access?
Where does it go?
How long is it stored?
Do you have a disaster recovery (DR)/business
continuity plan (BCP)?
Conduct a DR/BCP exercise annually
Tip #6: Conduct a Data Audit
© Corporation Service Company. All Rights Reserved.
Tip #5:
Assess Your Individual Data Practices
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Where do you keep your personal data?
At home?
At work?
Use a password manager:
Don’t store a copy of your passwords online
Use two-factor authentication everywhere
Tip #5: Assess Your Individual Data Practices
© Corporation Service Company. All Rights Reserved.
Tip #4:
Know Your Company’s Breach and
Incident Response Plan and Practice It
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
If you don’t have a plan – create one!
Know the plan.
Know who has what roles in the plan.
Practice, practice, practice!
Tip #4: Know Your Company’s Breach and
Incident Response Plan and Practice It
© Corporation Service Company. All Rights Reserved.
Tip #3:
Train Employees on Technology,
Security, and Privacy
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Tip #3: Train Employees on Technology,
Security, and Privacy
© Corporation Service Company. All Rights Reserved.
Tip #2:
Get Comfortable with Technology
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Tip #2: Get Comfortable with Technology
© Corporation Service Company. All Rights Reserved.
ACC.com, ACC committees, and chapters
ACC Litigation Committee and Cyber Security Working Group
LegalTechNews - legaltechnews.com
ABA’s Law Technology Today - lawtechnologytoday.org
PinHawk - pinhawk.com
Pocket - getpocket.com
Two Factor Authentication - twofactorauth.org
Password storage
LastPass - lastpass.com
Dashlane - dashlane.com
Roboform – roboform.com
Take a class
Read
Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, by Marc
Goodman
The Tech Contracts Handbook: Cloud Computing Agreements, Software Licenses, and Other IT
Contracts for Lawyers and Business People, by David W. Tollen
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win, by Gene Kim,
Kevin Behr, George Spafford
Tip #1:
Network Inside and Outside
Your Organization
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Develop a core team of company contacts to assist on
technology issues:
Use your contacts in other parts of the organization
(e.g., IT, security) to help you keep up-to-date on
technology developments affecting your business.
Talk to your peers outside the company regarding best
practices and stay current on new developments.
Tip #1: Network Inside and Outside Your Organization
© Corporation Service Company. All Rights Reserved.
Question and Answer
© Corporation Service Company. All Rights Reserved.
© Corporation Service Company. All Rights Reserved.
Contact Us
Jennifer K. Mailander
Associate General Counsel
Corporation Service Company
jennifer.mailander@cscglobal.com
Scott Plichta
Chief Information Security Officer
Corporation Service Company
scott.plichta@cscglobal.com
© Corporation Service Company. All Rights Reserved.

Más contenido relacionado

La actualidad más candente

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
Cloud Computing for SMBs
Cloud Computing for SMBsCloud Computing for SMBs
Cloud Computing for SMBs
white paper
 
o-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WPo-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WP
Eric Opp
 

La actualidad más candente (20)

IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 Panel
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
The CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be crypticThe CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be cryptic
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talk
 
Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out
 
Cloud Computing for SMBs
Cloud Computing for SMBsCloud Computing for SMBs
Cloud Computing for SMBs
 
o-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WPo-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WP
 
A simple approach to a successful cloud implementation
A simple approach to a successful cloud implementationA simple approach to a successful cloud implementation
A simple approach to a successful cloud implementation
 
On Demand Cloud Services Coury
On Demand Cloud Services   CouryOn Demand Cloud Services   Coury
On Demand Cloud Services Coury
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and Healthcare
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company Presentation
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Cloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing CapabilitiesCloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing Capabilities
 
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
 

Similar a TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE

Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
scobycakau
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
lorainedeserre
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
jesusamckone
 
PowerPoint Presentation
PowerPoint Presentation PowerPoint Presentation
PowerPoint Presentation
christina0310
 

Similar a TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE (20)

Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_t
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
What Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdfWhat Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdf
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the Hour
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
PowerPoint Presentation
PowerPoint Presentation PowerPoint Presentation
PowerPoint Presentation
 
Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
 

Último

Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Sana Rajpoot
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞
Ifra Zohaib
 

Último (20)

Mysore ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Mysore ESCORT SERVICE❤CALL GIRL
Mysore ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Mysore ESCORT SERVICE❤CALL GIRLMysore ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Mysore ESCORT SERVICE❤CALL GIRL
Mysore ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Mysore ESCORT SERVICE❤CALL GIRL
 
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book nowPatna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
 
Hyderabad ❣️ Call Girl 9748763073 Call Girls in Hyderabad Escort service boo...
Hyderabad ❣️  Call Girl 9748763073 Call Girls in Hyderabad Escort service boo...Hyderabad ❣️  Call Girl 9748763073 Call Girls in Hyderabad Escort service boo...
Hyderabad ❣️ Call Girl 9748763073 Call Girls in Hyderabad Escort service boo...
 
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
 
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book nowGuwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
 
Night Service in Karachi | 03274100048 | Sex Girls Karachi
Night Service in Karachi | 03274100048 | Sex Girls KarachiNight Service in Karachi | 03274100048 | Sex Girls Karachi
Night Service in Karachi | 03274100048 | Sex Girls Karachi
 
Udupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort serviceUdupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort service
 
Digha Call Girl Service 97487*63073 Call Girls in Digha Escort service book...
Digha  Call Girl Service 97487*63073 Call Girls in Digha  Escort service book...Digha  Call Girl Service 97487*63073 Call Girls in Digha  Escort service book...
Digha Call Girl Service 97487*63073 Call Girls in Digha Escort service book...
 
Bhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort serviceBhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort service
 
Jodhpur Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
Jodhpur  Call Girl 97487*63073 Call Girls in Jodhpur Escort service book nowJodhpur  Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
Jodhpur Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
 
Shimla 💋 Call Girl 9748763073 Call Girls in Shimla Escort service book now
Shimla 💋  Call Girl 9748763073 Call Girls in Shimla Escort service book nowShimla 💋  Call Girl 9748763073 Call Girls in Shimla Escort service book now
Shimla 💋 Call Girl 9748763073 Call Girls in Shimla Escort service book now
 
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
 
Mysore Call girl service 6289102337 Mysore escort service
Mysore Call girl service 6289102337 Mysore escort serviceMysore Call girl service 6289102337 Mysore escort service
Mysore Call girl service 6289102337 Mysore escort service
 
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
 
Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...
Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...
Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...
 
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
 
Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞
 
Dehradun ❣️ Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
Dehradun ❣️  Call Girl 97487*63073 Call Girls in Dehradun Escort service book...Dehradun ❣️  Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
Dehradun ❣️ Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
 
FARIDABAD CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
FARIDABAD CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICEFARIDABAD CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
FARIDABAD CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 

TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE

  • 1. Technology 101 and the Practice of Law: Keeping Your Firm Safe Powered by © Corporation Service Company®. All Rights Reserved.
  • 2. © Corporation Service Company. All Rights Reserved. The Presenters Jennifer K. Mailander Associate General Counsel Corporation Service Company Scott Plichta Chief Information Security Officer Corporation Service Company
  • 3. © Corporation Service Company. All Rights Reserved. “We have a long history of innovation and using leading edge technology to provide customer solutions.” What Company? Caterpillar Inc. © Corporation Service Company. All Rights Reserved.
  • 4. © Corporation Service Company. All Rights Reserved. How knowledgeable are you about technology? Not at all Somewhat Very knowledgeable I am an expert Describe Yourself © Corporation Service Company. All Rights Reserved.
  • 5. © Corporation Service Company. All Rights Reserved. ABA Model Rules 1.1 “A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.” Comment 8 “A lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology.” 5.3(d) “A lawyer having direct supervisory authority over the non-lawyer shall make reasonable efforts to ensure that the person's conduct is compatible with the professional obligations of the lawyer.” Ethical Duty © Corporation Service Company. All Rights Reserved.
  • 6. © Corporation Service Company. All Rights Reserved. Model Rule 1.6(c) “A lawyer shall make reasonable efforts to prevent the inadvertent disclosure of, or unauthorized access to, information relating to the representation of a client.” Ethics: Client Confidences © Corporation Service Company. All Rights Reserved.
  • 7. © Corporation Service Company. All Rights Reserved. According to the FBI, law firms and law departments are among the most vulnerable targets for cyber attacks. Lawyers are reported to: Have limited resources to dedicate to computer security Lack a sophisticated appreciation of technology risks Lack an instinct for cyber security The ABA Cyber Security Handbook Cyber Security and Lawyers © Corporation Service Company. All Rights Reserved.
  • 8. © Corporation Service Company. All Rights Reserved. Individual IT Empowerment Part of a Larger Phenomenon
  • 9. © Corporation Service Company. All Rights Reserved. Key Terms and Definitions* © Corporation Service Company. All Rights Reserved. Hosting (Website hosting, Web hosting, and Webhosting): the business of housing, serving, and maintaining files for one or more websites. The Cloud (Cloud Computing): a type of Internet-based computing where different services such as servers, storage, and applications are delivered to an organization's computers and devices through the Internet. Examples of Cloud Computing include: Infrastructure as a Service (IaaS): a service model that delivers computer infrastructure on an outsourced basis to support enterprise operations. Typically, IaaS provides hardware, storage, servers and data center space or network components; it may also include software. Platform as a Service (PaaS): a category of cloud computing services that provides a platform allowing customers to develop, run, and manage web applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an application. Software as a Service (SaaS): a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network. *Technology terminology sources include: Wikipedia, Technopedia, Internationals Association of Privacy Professionals (IAPP), ABA, ACC, The Shared Assessments Program, Merriam-Webster, and Ponemon Institute.
  • 10. © Corporation Service Company. All Rights Reserved. A Tasty Example: Pizza as a Service Traditional On-Premises (On Prem) Made at Home Dining Table Soda Electric / Gas Oven Fire Pizza Dough Tomato Sauce Toppings Cheese Take and Bake Pizza Delivered Dining Out www.linkedin.com/pulse/20140730172610-9679881-pizza-as-a-service You Manage Vendor Manages Infrastructure as a Service (IaaS) Dining Table Soda Electric / Gas Oven Fire Pizza Dough Tomato Sauce Toppings Cheese Platform as a Service (PaaS) Dining Table Soda Electric / Gas Oven Fire Pizza Dough Tomato Sauce Toppings Cheese Software as a Service (SaaS) Dining Table Soda Electric / Gas Oven Fire Pizza Dough Tomato Sauce Toppings Cheese © Corporation Service Company. All Rights Reserved.
  • 11. © Corporation Service Company. All Rights Reserved. Shadow IT: Where a user/department finds a cloud provider to do work because IT is too busy, and usually without knowledge/oversight controls of IT/IT security/legal. Single Sign-On (SSO): A session/user authentication process that permits a user to enter one name and password in order to access multiple applications. May be used interchangeably with “federation” or “federated login.” Security Assertion Markup Language (SAML): A data format for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. Federation: Refers to different computing entities adhering to certain standards of operations in a collective manner to facilitate communication. Encryption: The conversion of electronic data into another form, ciphertext, so that it cannot be easily understood by anyone except authorized parties with the key. Types of encrypted data include: Data in Use, Data at Rest, Data in Motion. Payment Card Industry Data Security Standard (PCI DSS): Industry created policies and procedures intended to optimize the security of credit, debit, and cash card transactions to protect cardholders against misuse of personal information and financial loss. Key Terms and Definitions (cont.) © Corporation Service Company. All Rights Reserved.
  • 12. © Corporation Service Company. All Rights Reserved. Data Types Data in Use: Active data under constant change stored physically in databases, data warehouses, spreadsheets, etc. Data in Motion: Data that is traversing a network or temporarily residing in computer memory to be read or updated. Data at Rest: Inactive data physically stored in databases, data warehouses, spreadsheets, archives, tapes, off-site backups, etc. © Corporation Service Company. All Rights Reserved.
  • 13. © Corporation Service Company. All Rights Reserved. Big Data: Data sets so large or complex that traditional data processing applications are inadequate. Challenges include analysis, capture, search, sharing, storage, transfer, visualization, and privacy. High-volume, high-velocity, and high-variety information assets that demand cost-effective, innovative forms of information processing for enhanced insight and decision making. Internet of Things (IoT): Network of physical objects embedded with electronics, software, and sensors enabling connectivity (remote data exchange) between manufacturer, operator, and other devices. Resulting in improved efficiency, accuracy, and economic benefits. Phishing: Broad scattered email fraud where user is duped into revealing personal or confidential information for illicit use. Spear Phishing: Phishing that targets a specific organization; messages appear to come from trusted source. Key Terms and Definitions (cont.) © Corporation Service Company. All Rights Reserved.
  • 14. © Corporation Service Company. All Rights Reserved. Information Security: Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction to provide: Integrity – guarding against improper information modification or destruction; includes ensuring information non-repudiation and authenticity. Confidentiality – preserving authorized restrictions on access and disclosure. Availability – ensuring timely and reliable access to and use of information. Information Security Program: Identify threats, vulnerabilities, and requirements Implement security controls, monitor Cyber Security: Measures taken to protect a computer or computer system against unauthorized access or attacks. Information Security © Corporation Service Company. All Rights Reserved.
  • 15. © Corporation Service Company. All Rights Reserved. Not a technology concept, yet inescapably tied to it. Privacy is not security. “[Privacy is] the appropriate use of personal information under the circumstances. What is appropriate will depend on context, law, and the individual's expectations; also, [privacy is] the right of an individual to control the collection, use, and disclosure of personal information.” IAPP Information Privacy Certification: Glossary of Common Privacy Terminology, 2011 Notable privacy events: Safe Harbor and Privacy Shield Establishment of Federal Privacy Council • Cybersecurity National Action Plan New FTC rules for Internet service providers General Data Protection Regulation Information Privacy © Corporation Service Company. All Rights Reserved.
  • 16. Top 10 Tips: Working with Technology © Corporation Service Company. All Rights Reserved.
  • 17. Tip #10: Understand Your Company’s Technology © Corporation Service Company. All Rights Reserved.
  • 18. © Corporation Service Company. All Rights Reserved. Understand your company’s business and the technology your company uses daily Understand your company’s technology strategy: Cloud first to cloud never Bring your own technology Understand who has responsibility for buying and maintaining technology: What is legal’ s role in this? What is your process for buying technology? Make sure it includes a process to identify when shadow IT is being bought or used. Tip #10: Understand Your Company’s Technology © Corporation Service Company. All Rights Reserved.
  • 19. Tip #9: Know Your Vendors and Vendors’ Vendors © Corporation Service Company. All Rights Reserved.
  • 20. © Corporation Service Company. All Rights Reserved. Know who your vendors are and what services/products they provide. Connect and work with your security team: You both need to know when you find new places to store data Put a process in place to identify new technology being used: It’s happening; you just may not know about it Tip #9: Know Your Vendors and Vendors’ Vendors © Corporation Service Company. All Rights Reserved.
  • 21. Tip #8: Know Your Law Firms’ Security Practices © Corporation Service Company. All Rights Reserved.
  • 22. © Corporation Service Company. All Rights Reserved. Tip #8: Know Your Law Firms’ Security Practices © Corporation Service Company. All Rights Reserved. Understand your obligations as in-house counsel when working with your law firms. Join the ACC Litigation Committee Subcommittee on Cyber Security and Law Firms: Evan Slavitt, evan.slavitt@avx.com Join the ACC Working Group Data Security for Law Firms: Amar Sarwal, sarwal@acc.com Join Legal Services Information Sharing and Analysis Organization (LS-ISAO) Services for law firms.
  • 23. Tip #7: Be a Partner to the Business © Corporation Service Company. All Rights Reserved.
  • 24. © Corporation Service Company. All Rights Reserved. Find a way to help your business partners understand and mitigate technology risks; help them achieve success. Host a series of lunch and learns with your business and technology counterparts: Present on areas of respective expertise • Contract and licensing 101 • Technology 101 • Sales 101, Operations 101, etc. Meet regularly to discuss issues, trends, etc. Tip #7: Be a Partner to the Business
  • 25. Tip #6: Conduct a Data Audit © Corporation Service Company. All Rights Reserved.
  • 26. © Corporation Service Company. All Rights Reserved. Form a cross-functional team to identify data practices Understand what and how data is managed: What is the data? Who has (and should have) access? Where does it go? How long is it stored? Do you have a disaster recovery (DR)/business continuity plan (BCP)? Conduct a DR/BCP exercise annually Tip #6: Conduct a Data Audit © Corporation Service Company. All Rights Reserved.
  • 27. Tip #5: Assess Your Individual Data Practices © Corporation Service Company. All Rights Reserved.
  • 28. © Corporation Service Company. All Rights Reserved. Where do you keep your personal data? At home? At work? Use a password manager: Don’t store a copy of your passwords online Use two-factor authentication everywhere Tip #5: Assess Your Individual Data Practices © Corporation Service Company. All Rights Reserved.
  • 29. Tip #4: Know Your Company’s Breach and Incident Response Plan and Practice It © Corporation Service Company. All Rights Reserved.
  • 30. © Corporation Service Company. All Rights Reserved. If you don’t have a plan – create one! Know the plan. Know who has what roles in the plan. Practice, practice, practice! Tip #4: Know Your Company’s Breach and Incident Response Plan and Practice It © Corporation Service Company. All Rights Reserved.
  • 31. Tip #3: Train Employees on Technology, Security, and Privacy © Corporation Service Company. All Rights Reserved.
  • 32. © Corporation Service Company. All Rights Reserved. Tip #3: Train Employees on Technology, Security, and Privacy © Corporation Service Company. All Rights Reserved.
  • 33. Tip #2: Get Comfortable with Technology © Corporation Service Company. All Rights Reserved.
  • 34. © Corporation Service Company. All Rights Reserved. Tip #2: Get Comfortable with Technology © Corporation Service Company. All Rights Reserved. ACC.com, ACC committees, and chapters ACC Litigation Committee and Cyber Security Working Group LegalTechNews - legaltechnews.com ABA’s Law Technology Today - lawtechnologytoday.org PinHawk - pinhawk.com Pocket - getpocket.com Two Factor Authentication - twofactorauth.org Password storage LastPass - lastpass.com Dashlane - dashlane.com Roboform – roboform.com Take a class Read Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, by Marc Goodman The Tech Contracts Handbook: Cloud Computing Agreements, Software Licenses, and Other IT Contracts for Lawyers and Business People, by David W. Tollen The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win, by Gene Kim, Kevin Behr, George Spafford
  • 35. Tip #1: Network Inside and Outside Your Organization © Corporation Service Company. All Rights Reserved.
  • 36. © Corporation Service Company. All Rights Reserved. Develop a core team of company contacts to assist on technology issues: Use your contacts in other parts of the organization (e.g., IT, security) to help you keep up-to-date on technology developments affecting your business. Talk to your peers outside the company regarding best practices and stay current on new developments. Tip #1: Network Inside and Outside Your Organization © Corporation Service Company. All Rights Reserved.
  • 37. Question and Answer © Corporation Service Company. All Rights Reserved.
  • 38. © Corporation Service Company. All Rights Reserved. Contact Us Jennifer K. Mailander Associate General Counsel Corporation Service Company jennifer.mailander@cscglobal.com Scott Plichta Chief Information Security Officer Corporation Service Company scott.plichta@cscglobal.com © Corporation Service Company. All Rights Reserved.

Notas del editor

  1. Jen