SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
March 29-31, 2012
                                   www.techshow.com




Angel and Devil: Danger of Emerging
 Technologies That Lawyers Love

              Presenters
            Ivan Hemmans
            Antigone Peyton


                PRESENTED BY THE

                                             March 29-31, 2012
                                             www.techshow.com
It’s A Race
• The rate at which new technologies
  are developed, packaged, and
  delivered is increasing.
• Most find it impossible stay atop all
  the new gadgets and cool tools that
  compete for our time, our attention,
  and our dollars.


                               March 29-31, 2012
                               www.techshow.com
We’re Here to Help




                March 29-31, 2012
                www.techshow.com
Standard Concerns
•   Mobile access & storage
•   Security
•   RFID
•   Geo location
•   Social networks
•   Privacy


                              March 29-31, 2012
                              www.techshow.com
Personal, Meet Business
• Loss of the enterprise wall
• Data, data, everywhere . . .
• Mixing of worlds
  – Hardware
  – Software & programs
  – Storage locations



                                 March 29-31, 2012
                                 www.techshow.com
There’s no better teacher than reality . . .




                                      March 29-31, 2012
                                      www.techshow.com
Radio Frequency Identifier (RFID)

• Can track anyone or any product
  anywhere
• Security concerns
• Privacy
• TMI?




                             March 29-31, 2012
                             www.techshow.com
iCloud
• Apple says:
  – “iCloud stores your music, photos, documents, and
    more and wirelessly pushes them to all your devices.
    Automatic, effortless, and seamless — it just works.”




                                             March 29-31, 2012
                                             www.techshow.com
Apps & iCloud
Devil                                               Angel

Lots of 3rd-party app development to make sharing   Each 3rd-party developer has his or her own terms of
easy                                                use and privacy policies


Love the app store!                                 Apps may have their own security vulnerabilities



Easy backup to Apple servers                        Terms and conditions may not mesh with any
                                                    requirements as set forth by clients or jurisdictions in
                                                    which your firm operates



Documents available from multiple devices           Service may terminate with or without notice. Tight
                                                    integration with Apple means that Apple can collect
                                                    lots of usage information

Easy to use                                         Hard to manage without an Mobile Device
                                                    Management server




                                                                                    March 29-31, 2012
                                                                                    www.techshow.com
Android Devices
• Open Source platform
• More choices
• Malware issues




                         March 29-31, 2012
                         www.techshow.com
Android
Devil                                               Angel

Documents available from any web-enabled device     Service may terminate with or without your notice


Low cost                                            Tight integration with Google means that Google can
                                                    collect lots of usage information

Multitasking                                        Potential for poor battery performance
                                                    Increased potential for malware

Lots of 3rd-party app development to make sharing   Each 3rd-party developer has his or her own terms of
easy                                                use and privacy policies

                                                    Apps may have their own security vulnerabilities


Easy backup to Google servers                       Terms and conditions may not mesh with any
                                                    requirements as set forth by clients or jurisdictions
                                                    within with your firm operates

Documents available from multiple devices           Service may terminate with or without your notice


Easy to use                                         Hard to manage without an Mobile Device
                                                    Management server




                                                                                  March 29-31, 2012
                                                                                  www.techshow.com
Dropbox
• Will give data to government or in
  response to subpoena
• Enables third party decryption
• Past password drops/security
  breaches
• Policy changes follow public outcry
  and investigations
• Data on Amazon S3
                              March 29-31, 2012
                              www.techshow.com
Dropbox
Devil                                                  Angel

Apps to integrate all your devices with Dropbox        Makes it very easy to take firm data into and out of
                                                       the firm



Lots of 3rd-party app development to make sharing      Each 3rd-party developer has his or her own terms of
with iOS and Android easy                              use and privacy policies



                                                       Terms and conditions may not mesh with any
                                                       requirements as set forth by clients or jurisdictions
                                                       within with your firm operates




Your files are available from any web-enabled device   Service may terminate with or without your notice.




                                                                                       March 29-31, 2012
                                                                                       www.techshow.com
Social Media
•   What’s private?
•   I know where you are today
•   Location setting confusion
•   Linked accounts




                                 March 29-31, 2012
                                 www.techshow.com
What Can You Do?
• Awareness is the first line of
  defense
  – Read documentation and blogs
• Ways to spread awareness:
  – Live presentations
  – E-mail distributions
  – Intranet postings, blogs
  – Empower thoughtleaders

                               March 29-31, 2012
                               www.techshow.com
Antigone Peyton - CEO & Founder                       Ivan Hemmans
Cloudigy Law, PLLC                                    O’Melveny & Myers
(703) 436-2033                                        Twitter: @ihemmans
antigone.peyton@cloudigylaw.com                       Website: http://www.hemmans.com
Twitter: @antigonepeyton; @cloudigylaw
Facebook: http://www.facebook.com/CloudigyLaw
LinkedIn: http://www.linkedin.com/in/antigonepeyton
Cloudigy blog: http://cloudigylaw.com/news/




                                                                                 March 29-31, 2012
                                                                                 www.techshow.com

Weitere ähnliche Inhalte

Was ist angesagt?

Modern Technology
Modern TechnologyModern Technology
Modern TechnologyMd Saylab
 
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...WithTheBest
 
Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010Claire Rowland
 
The New Internet: When Everything Becomes Smart
The New Internet: When Everything Becomes SmartThe New Internet: When Everything Becomes Smart
The New Internet: When Everything Becomes SmartJeeni
 
Internet of things (IOT) - Advanced Doorbell
Internet of things (IOT)  - Advanced DoorbellInternet of things (IOT)  - Advanced Doorbell
Internet of things (IOT) - Advanced DoorbellIndrason Ngangbam
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...OWASP Turkiye
 
Mediamorphosis 2013: Hacking the Body
Mediamorphosis 2013: Hacking the Body Mediamorphosis 2013: Hacking the Body
Mediamorphosis 2013: Hacking the Body Camille Baker, PhD
 
Comm%20 tech%20final%20project
Comm%20 tech%20final%20projectComm%20 tech%20final%20project
Comm%20 tech%20final%20projectawgalv01
 
New media presentation_1
New media presentation_1New media presentation_1
New media presentation_1mbucy21
 
Internet of Things for Libraries
Internet of Things for LibrariesInternet of Things for Libraries
Internet of Things for LibrariesNicole Baratta
 
Cloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole SiegelCloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole Siegelnsiegel922
 
Cloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole SiegelCloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole Siegelnsiegel922
 

Was ist angesagt? (18)

Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
 
Lifted by the Cloud
Lifted by the CloudLifted by the Cloud
Lifted by the Cloud
 
Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
The New Internet: When Everything Becomes Smart
The New Internet: When Everything Becomes SmartThe New Internet: When Everything Becomes Smart
The New Internet: When Everything Becomes Smart
 
Internet of things (IOT) - Advanced Doorbell
Internet of things (IOT)  - Advanced DoorbellInternet of things (IOT)  - Advanced Doorbell
Internet of things (IOT) - Advanced Doorbell
 
Iot chap i
Iot chap iIot chap i
Iot chap i
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
 
Mediamorphosis 2013: Hacking the Body
Mediamorphosis 2013: Hacking the Body Mediamorphosis 2013: Hacking the Body
Mediamorphosis 2013: Hacking the Body
 
Designing chocolate, not aspirin
Designing chocolate, not aspirinDesigning chocolate, not aspirin
Designing chocolate, not aspirin
 
Comm%20 tech%20final%20project
Comm%20 tech%20final%20projectComm%20 tech%20final%20project
Comm%20 tech%20final%20project
 
New media presentation_1
New media presentation_1New media presentation_1
New media presentation_1
 
Internet of Things Webinar
Internet of Things WebinarInternet of Things Webinar
Internet of Things Webinar
 
Internet of Things for Libraries
Internet of Things for LibrariesInternet of Things for Libraries
Internet of Things for Libraries
 
Cloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole SiegelCloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole Siegel
 
Cloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole SiegelCloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole Siegel
 

Ähnlich wie Angel & Devil: Danger of Emerging Technologies

VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013 Troy C. Fulton
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)Lacoon Mobile Security
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013Mike Brannon
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Three Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingThree Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingContent Raven
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2016
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 

Ähnlich wie Angel & Devil: Danger of Emerging Technologies (20)

VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Three Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingThree Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content Sharing
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 

Mehr von Antigone Peyton

Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceAntigone Peyton
 
A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)Antigone Peyton
 
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Antigone Peyton
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsAntigone Peyton
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIAAntigone Peyton
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for LitigatorsAntigone Peyton
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP FracasAntigone Peyton
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Antigone Peyton
 
Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Antigone Peyton
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)Antigone Peyton
 
Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Antigone Peyton
 

Mehr von Antigone Peyton (13)

Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
 
A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)
 
Lawyers in the Cloud
Lawyers in the CloudLawyers in the Cloud
Lawyers in the Cloud
 
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy Implications
 
2013 SBIR Presentation
2013 SBIR Presentation2013 SBIR Presentation
2013 SBIR Presentation
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIA
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for Litigators
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP Fracas
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)
 
Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)
 
Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)
 

Kürzlich hochgeladen

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Kürzlich hochgeladen (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Angel & Devil: Danger of Emerging Technologies

  • 1. March 29-31, 2012 www.techshow.com Angel and Devil: Danger of Emerging Technologies That Lawyers Love Presenters Ivan Hemmans Antigone Peyton PRESENTED BY THE March 29-31, 2012 www.techshow.com
  • 2. It’s A Race • The rate at which new technologies are developed, packaged, and delivered is increasing. • Most find it impossible stay atop all the new gadgets and cool tools that compete for our time, our attention, and our dollars. March 29-31, 2012 www.techshow.com
  • 3. We’re Here to Help March 29-31, 2012 www.techshow.com
  • 4. Standard Concerns • Mobile access & storage • Security • RFID • Geo location • Social networks • Privacy March 29-31, 2012 www.techshow.com
  • 5. Personal, Meet Business • Loss of the enterprise wall • Data, data, everywhere . . . • Mixing of worlds – Hardware – Software & programs – Storage locations March 29-31, 2012 www.techshow.com
  • 6. There’s no better teacher than reality . . . March 29-31, 2012 www.techshow.com
  • 7. Radio Frequency Identifier (RFID) • Can track anyone or any product anywhere • Security concerns • Privacy • TMI? March 29-31, 2012 www.techshow.com
  • 8. iCloud • Apple says: – “iCloud stores your music, photos, documents, and more and wirelessly pushes them to all your devices. Automatic, effortless, and seamless — it just works.” March 29-31, 2012 www.techshow.com
  • 9. Apps & iCloud Devil Angel Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of easy use and privacy policies Love the app store! Apps may have their own security vulnerabilities Easy backup to Apple servers Terms and conditions may not mesh with any requirements as set forth by clients or jurisdictions in which your firm operates Documents available from multiple devices Service may terminate with or without notice. Tight integration with Apple means that Apple can collect lots of usage information Easy to use Hard to manage without an Mobile Device Management server March 29-31, 2012 www.techshow.com
  • 10. Android Devices • Open Source platform • More choices • Malware issues March 29-31, 2012 www.techshow.com
  • 11. Android Devil Angel Documents available from any web-enabled device Service may terminate with or without your notice Low cost Tight integration with Google means that Google can collect lots of usage information Multitasking Potential for poor battery performance Increased potential for malware Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of easy use and privacy policies Apps may have their own security vulnerabilities Easy backup to Google servers Terms and conditions may not mesh with any requirements as set forth by clients or jurisdictions within with your firm operates Documents available from multiple devices Service may terminate with or without your notice Easy to use Hard to manage without an Mobile Device Management server March 29-31, 2012 www.techshow.com
  • 12. Dropbox • Will give data to government or in response to subpoena • Enables third party decryption • Past password drops/security breaches • Policy changes follow public outcry and investigations • Data on Amazon S3 March 29-31, 2012 www.techshow.com
  • 13. Dropbox Devil Angel Apps to integrate all your devices with Dropbox Makes it very easy to take firm data into and out of the firm Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of with iOS and Android easy use and privacy policies Terms and conditions may not mesh with any requirements as set forth by clients or jurisdictions within with your firm operates Your files are available from any web-enabled device Service may terminate with or without your notice. March 29-31, 2012 www.techshow.com
  • 14. Social Media • What’s private? • I know where you are today • Location setting confusion • Linked accounts March 29-31, 2012 www.techshow.com
  • 15. What Can You Do? • Awareness is the first line of defense – Read documentation and blogs • Ways to spread awareness: – Live presentations – E-mail distributions – Intranet postings, blogs – Empower thoughtleaders March 29-31, 2012 www.techshow.com
  • 16. Antigone Peyton - CEO & Founder Ivan Hemmans Cloudigy Law, PLLC O’Melveny & Myers (703) 436-2033 Twitter: @ihemmans antigone.peyton@cloudigylaw.com Website: http://www.hemmans.com Twitter: @antigonepeyton; @cloudigylaw Facebook: http://www.facebook.com/CloudigyLaw LinkedIn: http://www.linkedin.com/in/antigonepeyton Cloudigy blog: http://cloudigylaw.com/news/ March 29-31, 2012 www.techshow.com