New technologies are a concern for all lawyers. This presentation by Antigone Peyton and Ivan Hemmans presented this on March 30, 2012 at the ABA Tech Show.
WordPress Websites for Engineers: Elevate Your Brand
Angel & Devil: Danger of Emerging Technologies
1. March 29-31, 2012
www.techshow.com
Angel and Devil: Danger of Emerging
Technologies That Lawyers Love
Presenters
Ivan Hemmans
Antigone Peyton
PRESENTED BY THE
March 29-31, 2012
www.techshow.com
2. It’s A Race
• The rate at which new technologies
are developed, packaged, and
delivered is increasing.
• Most find it impossible stay atop all
the new gadgets and cool tools that
compete for our time, our attention,
and our dollars.
March 29-31, 2012
www.techshow.com
3. We’re Here to Help
March 29-31, 2012
www.techshow.com
4. Standard Concerns
• Mobile access & storage
• Security
• RFID
• Geo location
• Social networks
• Privacy
March 29-31, 2012
www.techshow.com
5. Personal, Meet Business
• Loss of the enterprise wall
• Data, data, everywhere . . .
• Mixing of worlds
– Hardware
– Software & programs
– Storage locations
March 29-31, 2012
www.techshow.com
6. There’s no better teacher than reality . . .
March 29-31, 2012
www.techshow.com
7. Radio Frequency Identifier (RFID)
• Can track anyone or any product
anywhere
• Security concerns
• Privacy
• TMI?
March 29-31, 2012
www.techshow.com
8. iCloud
• Apple says:
– “iCloud stores your music, photos, documents, and
more and wirelessly pushes them to all your devices.
Automatic, effortless, and seamless — it just works.”
March 29-31, 2012
www.techshow.com
9. Apps & iCloud
Devil Angel
Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of
easy use and privacy policies
Love the app store! Apps may have their own security vulnerabilities
Easy backup to Apple servers Terms and conditions may not mesh with any
requirements as set forth by clients or jurisdictions in
which your firm operates
Documents available from multiple devices Service may terminate with or without notice. Tight
integration with Apple means that Apple can collect
lots of usage information
Easy to use Hard to manage without an Mobile Device
Management server
March 29-31, 2012
www.techshow.com
10. Android Devices
• Open Source platform
• More choices
• Malware issues
March 29-31, 2012
www.techshow.com
11. Android
Devil Angel
Documents available from any web-enabled device Service may terminate with or without your notice
Low cost Tight integration with Google means that Google can
collect lots of usage information
Multitasking Potential for poor battery performance
Increased potential for malware
Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of
easy use and privacy policies
Apps may have their own security vulnerabilities
Easy backup to Google servers Terms and conditions may not mesh with any
requirements as set forth by clients or jurisdictions
within with your firm operates
Documents available from multiple devices Service may terminate with or without your notice
Easy to use Hard to manage without an Mobile Device
Management server
March 29-31, 2012
www.techshow.com
12. Dropbox
• Will give data to government or in
response to subpoena
• Enables third party decryption
• Past password drops/security
breaches
• Policy changes follow public outcry
and investigations
• Data on Amazon S3
March 29-31, 2012
www.techshow.com
13. Dropbox
Devil Angel
Apps to integrate all your devices with Dropbox Makes it very easy to take firm data into and out of
the firm
Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of
with iOS and Android easy use and privacy policies
Terms and conditions may not mesh with any
requirements as set forth by clients or jurisdictions
within with your firm operates
Your files are available from any web-enabled device Service may terminate with or without your notice.
March 29-31, 2012
www.techshow.com
14. Social Media
• What’s private?
• I know where you are today
• Location setting confusion
• Linked accounts
March 29-31, 2012
www.techshow.com
15. What Can You Do?
• Awareness is the first line of
defense
– Read documentation and blogs
• Ways to spread awareness:
– Live presentations
– E-mail distributions
– Intranet postings, blogs
– Empower thoughtleaders
March 29-31, 2012
www.techshow.com