SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Cloud Computing for Lawyers
Practical and Ethical Uses of the Cloud




           Rhode Island Bar Association
           June 15, 2012
           Robert J. Ambrogi, Esq.
What we’ll cover


  What is cloud computing?
  What advantages does it offer?
  How can lawyers use the cloud?
  Is it ethical for you to use the cloud?
  What precautions should you take?
  What’s ahead for lawyers in the cloud?
What is cloud computing?


     A method of
      harnessing
   computer power
   over the Internet.

    Access files or
      applications
   online rather than
   on a local device.
Like turning on a tap



              • Once, everyone
                had to find and
     Cloud      maintain their own
  computing     supply of water.
  is like the
     public   • Now, we simply
     water      turn on a tap when
    supply:     we need water
                and turn it off
                when we’re done.




                       —Vivek Kundra, former CTO of the United States
Three types of cloud computing



                       Platform as a
                          Service      Infrastructure
      Software as a                     as a Service
         Service
                         Customer
                        deploys its      Customer
        Customer            own             rents
      uses the cloud    applications     processing
        provider’s     using a cloud       power,
       applications      provider’s    storage space
          via the        operating           and
         network.       system and       networking
                         computing        capacity.
                          platform.
Advantages of cloud computing

Lower costs. No up-front outlays or ongoing
maintenance and upgrades.

On-demand self-service. Services available whenever
you need them.

Universal access. Access from any device and from
anywhere in the world.

Scalable computing power. As much or as little
processing power and storage as you need.

Better reliability and security. Systems always up to
date and have high degree of security and redundancy.

Pay only for what you use. Costs are clear and
transparent, licensing is simplified.
Disadvantages of cloud computing



                   Network dependence. Use
                   depends on reliable and
                   continuously available network.
                   Lack of data portability. It may
                   not always be easy to export and
                   import data.
                   Browser vulnerability. If your
                   browser becomes compromised,
                   it could compromise your data.
How lawyers use cloud computing

Law practice management.

Document management and collaboration.

Time and billing.

Accounting.

Project management.

Office suites (email, calendar, documents)

Electronic discovery.

Virtual lawyering.

Back-up and storage.
Practice management example: Clio


Client and matter management.
Calendar and reminders.
Time tracking.
Billing.
Trust accounting.
Document management.
Document assembly.
Client collaboration.
$49/month per lawyer.
Virtual lawyering: DirectLaw
Time management: Time59
Note management: Evernote
Document storage: Box

Store, manage and synchronize documents
and files.
Share large files securely.

Sync files with desktop.

Mobile access.

Online workspaces.

Administrative controls.

Free for personal use; $15 per user per month
for businesses.
Get Extra Security


                  SecretSync,        TrueCrypt,            SugarSync,
               getsecretsync.com   www.truecrypt.org    www.sugarsync.com



                   Client-side                            A cross between
                   encryption.                             Evernote and
                                                          Mozy – back up
                                                             and sync.
                 Works with any
                     online         Free, open-source
                 synchronization     disk encryption.
                      site.

                                                           Encrypted file
                   From $0 to                               transfers.
                    $60/year.
Office suite example: Google Apps
Office suite example: Office 365
Document management example: NetDocuments


  Organize, store and search
  all company documents.


  Features include:

  •   Concurrency control.
  •   Version control.
  •   Document history.
  •   Full-text searching.
  •   Document collaboration.
  •   Mobile access.
  •   Office integration

  Starts at $20/month per user.
E-Discovery example: Catalyst




  One of the
                 • Early case assessment.
  first cloud-   • Analytics and data reduction.
   based e-      • Multi-language search &
   discovery       review.
  providers.     • Production and trial support.
                 • Unified corporate
   Features        repositories.
    include:
Covers Right Side of the EDRM
                                    Electronic Discovery Reference Model

                 Partners/Clients                                     CATALYST

                                                         Processing

                                        Preservation
 Records
                   Identification                         Analysis         Production          Trial/Hearing
Management
                                         Collection

                                                          Review



Data Volume (Actual)                                                                    Relevance (% of Total)




    Forrester: “Seventy percent of e-discovery costs are spent on
            processing, analysis, review, and production.”
Benefits for E-discovery


          Secure cloud delivery for rapid deploy
          at lower cost
          Central platform allows teams to work
          together anytime, from anywhere
          Automation for speed, control and
          fewer mistakes
          Grid-based speed and scalability to
          handle any matter
Ethics and cloud computing


 The ethical issues at stake:

• Lawyers have duty to
  safeguard confidential
  client information.
• Lawyers have duty to
  protect client property,
  including client files, from
  loss.
Rulings by state ethics panels



      The seven state ethics
        panels that have
     considered the ethics of
       cloud computing all
             agree.


     1. Lawyers may use the
              cloud.
     2. Must take reasonable
     steps to minimize risk to
     confidential information
          and client files.
Seven state ethics panels agree it is ethical


    North Carolina
                      Pennsylvania       California,
     2011 Formal
                     Formal Opinion    Formal Opinion
    Ethics Opinion
                       2011-200.       No. 2010-179.
          6.

    Alabama State
                     Arizona State      Nevada State
      Bar, Ethics
                      Bar Formal         Bar Formal
    Opinion 2010-
                     Opinion 09-04.    Opinion No. 33.
          02.

                     New York State
                     Bar Association
                     Opinion 842 of
                          2010.
North Carolina 2011


  “A law firm may use SaaS if reasonable care is taken
  to minimize the risks of inadvertent disclosure of
  confidential information and to protect the security of
  client information and client files.


  “A lawyer must fulfill the duties to protect confidential
  client information and to safeguard client files by
  applying the same diligence and competency to
  manage the risks of SaaS that the lawyer is required
  to apply when representing clients.”
North Carolina Recommends


 Agreement on how the vendor will handle confidential client information in keeping
 with the lawyer’s professional responsibilities.

 In the event the lawyer terminates use of the product or the vendor goes out of
 business, the law firm should have a method for retrieving the data.

 The data should be available in a non-proprietary format that the law firm can
 access, or the firm should have access to the vendor’s software or source code.

 Carefully review of the terms of the law firm’s user or license agreement with the
 vendor including the security policy.

 Evaluate the vendor’s measures for safeguarding the security and confidentiality of
 stored data, including firewalls, encryption, socket security features, and intrusion-
 detection systems.
 Evaluate the extent to which the vendor backs up hosted data.
Protect your clients—and yourself

Work with a reputable provider, one with a history of dealing with
confidential information.
Have an express NDA with the cloud provider.

Understand the physical and electronic security procedures followed by the
provider.
Understand the provider’s practices for backup and disaster recovery.

Spell out in writing data ownership so that others cannot claim it in the
event of financial adversity.
Know where the data is housed and who has access.

Make sure the provider offers the functionality and services you need with
respect to your data.
LexisNexis Firm Manager: Data Ownership


 “At LexisNexis we
believe strongly that   • Your application administrator can export all your
                          firm data at any time.
 the data you place     • If for any reason you decide to cancel your
 in LexisNexis Firm       LexisNexis Firm Manager subscription, we
Manager belongs to        maintain your data online for 6 months in case
you! To provide you       you decide to return to the service. At any time
                          you can decide to purge your data, removing it
   with the comfort       from LexisNexis systems.
    that you retain     • If you decide to purge your data – an option
    control of your       available to application administrator – your client
     critical client-     privileged work product is removed from our
                          systems. We manage a process to remove that
       privileged         data from our backup tapes as well, which can
   information and        take up to 45 days.”
     work product:
LexisNexis Firm Manager: Data Protection


“We know the     • Providing easy to use and sophisticated controls of who in
  privacy of       your firm has access to specific privileged information. Restrict
                   access to sensitive information such as key documents to only
      your         those attorneys and staff members working on specific
                   matters. Keep personal appointments private. Restrict access
   attorney-       to “need-to-know” information for temporary employees or
                   contractors.
                 • Encrypting all the communication between us using 128-bit
     client        SSL encryption
                 • 24×7 monitoring of the security infrastructure protecting
  privileged       LexisNexis Firm Manager
                 • Confirmation to application administrator of account changes
information is     to help prevent unauthorized account hijacking
                 • Automatic account log-outs after 1 hour of inactivity to prevent
   critical to     users from leaving accounts open on public access devices
                 • Monitoring of account usage for indications of
   you. We         suspicious activity
                 • Regular third party security audits to identify possible security
 protect that      issues and allow for aggressive mitigation and correction
                   activities”
  privacy by:
The future for lawyers in the cloud


Increasingly, data will become
dissociated from a particular device,
platform or operating system.
Our digital hub will move from our
desktops to the cloud.

We will access and work with our data
from multiple devices.

Our data will be synchronized across all
our devices.

Our data will be available to us anytime,
anywhere.
Further reading …


     Cloud Computing Synopsis and Recommendations, National
   Institute of Standards and Technology, Published May 29, 2012,
   www.nist.gov/manuscript-publication-search.cfm?pub_id=911075
www.lawsitesblog.com
@bobambrogi
ambrogi@legaline.com

Weitere ähnliche Inhalte

Was ist angesagt?

Open source and standards - unleashing the potential for innovation of cloud ...
Open source and standards - unleashing the potential for innovation of cloud ...Open source and standards - unleashing the potential for innovation of cloud ...
Open source and standards - unleashing the potential for innovation of cloud ...
Ignacio M. Llorente
 
AWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS Corp
AWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS CorpAWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS Corp
AWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS Corp
Amazon Web Services
 

Was ist angesagt? (20)

Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Introduction to Cloud Computing and Security
Introduction to Cloud Computing and SecurityIntroduction to Cloud Computing and Security
Introduction to Cloud Computing and Security
 
Cloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop SampleCloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop Sample
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 
Cc unit 2 ppt
Cc unit 2 pptCc unit 2 ppt
Cc unit 2 ppt
 
Microsoft Cloud Computing E-Book
Microsoft Cloud Computing E-BookMicrosoft Cloud Computing E-Book
Microsoft Cloud Computing E-Book
 
Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Chap 5 software as a service (saass)
Chap 5 software as a service (saass)
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Sunil
SunilSunil
Sunil
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
The Total Cost of Ownership (TCO) of Web Applications in the AWS Cloud - Jine...
The Total Cost of Ownership (TCO) of Web Applications in the AWS Cloud - Jine...The Total Cost of Ownership (TCO) of Web Applications in the AWS Cloud - Jine...
The Total Cost of Ownership (TCO) of Web Applications in the AWS Cloud - Jine...
 
Introduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh DuggalIntroduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh Duggal
 
Open source and standards - unleashing the potential for innovation of cloud ...
Open source and standards - unleashing the potential for innovation of cloud ...Open source and standards - unleashing the potential for innovation of cloud ...
Open source and standards - unleashing the potential for innovation of cloud ...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Mvpskill Saturday EP_27 11 April 2563 - Azure Products Update + DEMO
Mvpskill Saturday EP_27 11 April 2563 - Azure Products Update + DEMOMvpskill Saturday EP_27 11 April 2563 - Azure Products Update + DEMO
Mvpskill Saturday EP_27 11 April 2563 - Azure Products Update + DEMO
 
AWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS Corp
AWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS CorpAWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS Corp
AWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS Corp
 
15 Benefits and Advantages of Cloud Computing
15 Benefits and Advantages of Cloud Computing15 Benefits and Advantages of Cloud Computing
15 Benefits and Advantages of Cloud Computing
 
Sla in cloud
Sla in cloudSla in cloud
Sla in cloud
 
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsCloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
 

Andere mochten auch

Vivek Gupta Resume
Vivek Gupta ResumeVivek Gupta Resume
Vivek Gupta Resume
Vivek Gupta
 
A match analysis step by step
A match analysis step by stepA match analysis step by step
A match analysis step by step
fontas
 
Los gatitos
Los gatitosLos gatitos
Los gatitos
Erika
 
Abc Para Telefono[1]
Abc Para Telefono[1]Abc Para Telefono[1]
Abc Para Telefono[1]
0984254733
 
Piratas que operan como empresa
Piratas que operan como empresaPiratas que operan como empresa
Piratas que operan como empresa
derechouna
 
Cuadro comparativo tipos de comunicación en internet
Cuadro comparativo tipos de comunicación en internetCuadro comparativo tipos de comunicación en internet
Cuadro comparativo tipos de comunicación en internet
Mou Hrdz
 
Greenhouse control by arman
Greenhouse control by armanGreenhouse control by arman
Greenhouse control by arman
Muhammad AR
 

Andere mochten auch (20)

Curso online edicion de sonido digital
Curso online edicion de sonido digitalCurso online edicion de sonido digital
Curso online edicion de sonido digital
 
Vivek Gupta Resume
Vivek Gupta ResumeVivek Gupta Resume
Vivek Gupta Resume
 
A match analysis step by step
A match analysis step by stepA match analysis step by step
A match analysis step by step
 
Los gatitos
Los gatitosLos gatitos
Los gatitos
 
Abc Para Telefono[1]
Abc Para Telefono[1]Abc Para Telefono[1]
Abc Para Telefono[1]
 
Practica 1
Practica 1Practica 1
Practica 1
 
Piratas que operan como empresa
Piratas que operan como empresaPiratas que operan como empresa
Piratas que operan como empresa
 
Cuadro comparativo tipos de comunicación en internet
Cuadro comparativo tipos de comunicación en internetCuadro comparativo tipos de comunicación en internet
Cuadro comparativo tipos de comunicación en internet
 
Revolução Industrial - Argentina e México
Revolução Industrial - Argentina e MéxicoRevolução Industrial - Argentina e México
Revolução Industrial - Argentina e México
 
Instalacion de Telegram en Chrome
Instalacion de Telegram en ChromeInstalacion de Telegram en Chrome
Instalacion de Telegram en Chrome
 
Clase 3 iccs 2016
Clase 3   iccs 2016Clase 3   iccs 2016
Clase 3 iccs 2016
 
Greenhouse control by arman
Greenhouse control by armanGreenhouse control by arman
Greenhouse control by arman
 
Cost for production including breaking analysis
Cost for production including breaking  analysisCost for production including breaking  analysis
Cost for production including breaking analysis
 
Design considerations of electrical installations
Design considerations of electrical installationsDesign considerations of electrical installations
Design considerations of electrical installations
 
Konsep dasar pembiayaan sekolah (zelvyana c (5 e)
Konsep dasar pembiayaan sekolah (zelvyana c (5 e)Konsep dasar pembiayaan sekolah (zelvyana c (5 e)
Konsep dasar pembiayaan sekolah (zelvyana c (5 e)
 
Ppt risk n return (financial management)
Ppt risk n return (financial management)Ppt risk n return (financial management)
Ppt risk n return (financial management)
 
Museu de cera
Museu de ceraMuseu de cera
Museu de cera
 
5G network energy efficiency
5G network energy efficiency 5G network energy efficiency
5G network energy efficiency
 
Dinamarca
DinamarcaDinamarca
Dinamarca
 
Presen. liverpool
Presen. liverpoolPresen. liverpool
Presen. liverpool
 

Ähnlich wie Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud

Capture Discovery
Capture DiscoveryCapture Discovery
Capture Discovery
wlucina
 
Miwp magage share-docs-2012
Miwp magage share-docs-2012Miwp magage share-docs-2012
Miwp magage share-docs-2012
Liberteks
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
dcampbellelite
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
Darrin Campbell
 

Ähnlich wie Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud (20)

Virtual & Remote Practice: Reach from the Beach & Manage from the Mountains
Virtual & Remote Practice: Reach from the Beach & Manage from the MountainsVirtual & Remote Practice: Reach from the Beach & Manage from the Mountains
Virtual & Remote Practice: Reach from the Beach & Manage from the Mountains
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Capture Discovery
Capture DiscoveryCapture Discovery
Capture Discovery
 
North Devon Farms - Getting to know the Cloud 14th Oct 2015
North Devon Farms - Getting to know the Cloud 14th Oct 2015North Devon Farms - Getting to know the Cloud 14th Oct 2015
North Devon Farms - Getting to know the Cloud 14th Oct 2015
 
Miwp magage share-docs-2012
Miwp magage share-docs-2012Miwp magage share-docs-2012
Miwp magage share-docs-2012
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
A Litigator's Guide to Cloud-Based eDiscovery and Document Review
A Litigator's Guide to Cloud-Based eDiscovery and Document ReviewA Litigator's Guide to Cloud-Based eDiscovery and Document Review
A Litigator's Guide to Cloud-Based eDiscovery and Document Review
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
ITGulfCoast: Technology Trends In The Legal Industry by Garrett LaBorde
ITGulfCoast: Technology Trends In The Legal Industry by Garrett LaBordeITGulfCoast: Technology Trends In The Legal Industry by Garrett LaBorde
ITGulfCoast: Technology Trends In The Legal Industry by Garrett LaBorde
 
Back to Front Vision for Mithi's Collaboration Environment
Back to Front Vision for Mithi's Collaboration Environment Back to Front Vision for Mithi's Collaboration Environment
Back to Front Vision for Mithi's Collaboration Environment
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Intuitive Real-Time Analytics with Search
Intuitive Real-Time Analytics with SearchIntuitive Real-Time Analytics with Search
Intuitive Real-Time Analytics with Search
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
Automate your business processes with docuvita document management
Automate your business processes with docuvita document managementAutomate your business processes with docuvita document management
Automate your business processes with docuvita document management
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium Businesses
 
E-Discovery in the Cloud! What's the Positive Outcomes?
E-Discovery in the Cloud! What's the Positive Outcomes?E-Discovery in the Cloud! What's the Positive Outcomes?
E-Discovery in the Cloud! What's the Positive Outcomes?
 
6 Effective Ways to Evaluate Your On-Premise Law Software
6 Effective Ways to Evaluate Your On-Premise Law Software6 Effective Ways to Evaluate Your On-Premise Law Software
6 Effective Ways to Evaluate Your On-Premise Law Software
 
ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708
 

Mehr von Robert Ambrogi

Mehr von Robert Ambrogi (12)

The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
 
The Postcards of Charles Cleaves: Images of Rockport from 1907-1937
The Postcards of Charles Cleaves: Images of Rockport from 1907-1937The Postcards of Charles Cleaves: Images of Rockport from 1907-1937
The Postcards of Charles Cleaves: Images of Rockport from 1907-1937
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
 
Choosing a Law Practice Management System
Choosing a Law Practice Management SystemChoosing a Law Practice Management System
Choosing a Law Practice Management System
 
Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...
Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...
Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...
 
Doing More with Less: How Technology is Helping Deliver Legal Services
Doing More with Less: How Technology is Helping Deliver Legal ServicesDoing More with Less: How Technology is Helping Deliver Legal Services
Doing More with Less: How Technology is Helping Deliver Legal Services
 
Communicating Amid Clamor and Calamity: How Technology Has Rewired Lawyers' P...
Communicating Amid Clamor and Calamity: How Technology Has Rewired Lawyers' P...Communicating Amid Clamor and Calamity: How Technology Has Rewired Lawyers' P...
Communicating Amid Clamor and Calamity: How Technology Has Rewired Lawyers' P...
 
Commonwealth v Fujita
Commonwealth v FujitaCommonwealth v Fujita
Commonwealth v Fujita
 
Websites 201
Websites 201Websites 201
Websites 201
 
The Building of a Breakwater, October 1894
The Building of a Breakwater, October 1894The Building of a Breakwater, October 1894
The Building of a Breakwater, October 1894
 
10 Ways Technology is Rewiring Law Practice
10 Ways Technology is Rewiring Law Practice10 Ways Technology is Rewiring Law Practice
10 Ways Technology is Rewiring Law Practice
 
20 Tips for Seizing the Power of Social Media
20 Tips for Seizing the Power of Social Media20 Tips for Seizing the Power of Social Media
20 Tips for Seizing the Power of Social Media
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud

  • 1. Cloud Computing for Lawyers Practical and Ethical Uses of the Cloud Rhode Island Bar Association June 15, 2012 Robert J. Ambrogi, Esq.
  • 2. What we’ll cover What is cloud computing? What advantages does it offer? How can lawyers use the cloud? Is it ethical for you to use the cloud? What precautions should you take? What’s ahead for lawyers in the cloud?
  • 3. What is cloud computing? A method of harnessing computer power over the Internet. Access files or applications online rather than on a local device.
  • 4. Like turning on a tap • Once, everyone had to find and Cloud maintain their own computing supply of water. is like the public • Now, we simply water turn on a tap when supply: we need water and turn it off when we’re done. —Vivek Kundra, former CTO of the United States
  • 5. Three types of cloud computing Platform as a Service Infrastructure Software as a as a Service Service Customer deploys its Customer Customer own rents uses the cloud applications processing provider’s using a cloud power, applications provider’s storage space via the operating and network. system and networking computing capacity. platform.
  • 6. Advantages of cloud computing Lower costs. No up-front outlays or ongoing maintenance and upgrades. On-demand self-service. Services available whenever you need them. Universal access. Access from any device and from anywhere in the world. Scalable computing power. As much or as little processing power and storage as you need. Better reliability and security. Systems always up to date and have high degree of security and redundancy. Pay only for what you use. Costs are clear and transparent, licensing is simplified.
  • 7. Disadvantages of cloud computing Network dependence. Use depends on reliable and continuously available network. Lack of data portability. It may not always be easy to export and import data. Browser vulnerability. If your browser becomes compromised, it could compromise your data.
  • 8. How lawyers use cloud computing Law practice management. Document management and collaboration. Time and billing. Accounting. Project management. Office suites (email, calendar, documents) Electronic discovery. Virtual lawyering. Back-up and storage.
  • 9. Practice management example: Clio Client and matter management. Calendar and reminders. Time tracking. Billing. Trust accounting. Document management. Document assembly. Client collaboration. $49/month per lawyer.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 16.
  • 18.
  • 20. Document storage: Box Store, manage and synchronize documents and files. Share large files securely. Sync files with desktop. Mobile access. Online workspaces. Administrative controls. Free for personal use; $15 per user per month for businesses.
  • 21. Get Extra Security SecretSync, TrueCrypt, SugarSync, getsecretsync.com www.truecrypt.org www.sugarsync.com Client-side A cross between encryption. Evernote and Mozy – back up and sync. Works with any online Free, open-source synchronization disk encryption. site. Encrypted file From $0 to transfers. $60/year.
  • 22. Office suite example: Google Apps
  • 23. Office suite example: Office 365
  • 24. Document management example: NetDocuments Organize, store and search all company documents. Features include: • Concurrency control. • Version control. • Document history. • Full-text searching. • Document collaboration. • Mobile access. • Office integration Starts at $20/month per user.
  • 25.
  • 26. E-Discovery example: Catalyst One of the • Early case assessment. first cloud- • Analytics and data reduction. based e- • Multi-language search & discovery review. providers. • Production and trial support. • Unified corporate Features repositories. include:
  • 27. Covers Right Side of the EDRM Electronic Discovery Reference Model Partners/Clients CATALYST Processing Preservation Records Identification Analysis Production Trial/Hearing Management Collection Review Data Volume (Actual) Relevance (% of Total) Forrester: “Seventy percent of e-discovery costs are spent on processing, analysis, review, and production.”
  • 28.
  • 29.
  • 30. Benefits for E-discovery Secure cloud delivery for rapid deploy at lower cost Central platform allows teams to work together anytime, from anywhere Automation for speed, control and fewer mistakes Grid-based speed and scalability to handle any matter
  • 31. Ethics and cloud computing The ethical issues at stake: • Lawyers have duty to safeguard confidential client information. • Lawyers have duty to protect client property, including client files, from loss.
  • 32. Rulings by state ethics panels The seven state ethics panels that have considered the ethics of cloud computing all agree. 1. Lawyers may use the cloud. 2. Must take reasonable steps to minimize risk to confidential information and client files.
  • 33. Seven state ethics panels agree it is ethical North Carolina Pennsylvania California, 2011 Formal Formal Opinion Formal Opinion Ethics Opinion 2011-200. No. 2010-179. 6. Alabama State Arizona State Nevada State Bar, Ethics Bar Formal Bar Formal Opinion 2010- Opinion 09-04. Opinion No. 33. 02. New York State Bar Association Opinion 842 of 2010.
  • 34. North Carolina 2011 “A law firm may use SaaS if reasonable care is taken to minimize the risks of inadvertent disclosure of confidential information and to protect the security of client information and client files. “A lawyer must fulfill the duties to protect confidential client information and to safeguard client files by applying the same diligence and competency to manage the risks of SaaS that the lawyer is required to apply when representing clients.”
  • 35. North Carolina Recommends Agreement on how the vendor will handle confidential client information in keeping with the lawyer’s professional responsibilities. In the event the lawyer terminates use of the product or the vendor goes out of business, the law firm should have a method for retrieving the data. The data should be available in a non-proprietary format that the law firm can access, or the firm should have access to the vendor’s software or source code. Carefully review of the terms of the law firm’s user or license agreement with the vendor including the security policy. Evaluate the vendor’s measures for safeguarding the security and confidentiality of stored data, including firewalls, encryption, socket security features, and intrusion- detection systems. Evaluate the extent to which the vendor backs up hosted data.
  • 36. Protect your clients—and yourself Work with a reputable provider, one with a history of dealing with confidential information. Have an express NDA with the cloud provider. Understand the physical and electronic security procedures followed by the provider. Understand the provider’s practices for backup and disaster recovery. Spell out in writing data ownership so that others cannot claim it in the event of financial adversity. Know where the data is housed and who has access. Make sure the provider offers the functionality and services you need with respect to your data.
  • 37. LexisNexis Firm Manager: Data Ownership “At LexisNexis we believe strongly that • Your application administrator can export all your firm data at any time. the data you place • If for any reason you decide to cancel your in LexisNexis Firm LexisNexis Firm Manager subscription, we Manager belongs to maintain your data online for 6 months in case you! To provide you you decide to return to the service. At any time you can decide to purge your data, removing it with the comfort from LexisNexis systems. that you retain • If you decide to purge your data – an option control of your available to application administrator – your client critical client- privileged work product is removed from our systems. We manage a process to remove that privileged data from our backup tapes as well, which can information and take up to 45 days.” work product:
  • 38. LexisNexis Firm Manager: Data Protection “We know the • Providing easy to use and sophisticated controls of who in privacy of your firm has access to specific privileged information. Restrict access to sensitive information such as key documents to only your those attorneys and staff members working on specific matters. Keep personal appointments private. Restrict access attorney- to “need-to-know” information for temporary employees or contractors. • Encrypting all the communication between us using 128-bit client SSL encryption • 24×7 monitoring of the security infrastructure protecting privileged LexisNexis Firm Manager • Confirmation to application administrator of account changes information is to help prevent unauthorized account hijacking • Automatic account log-outs after 1 hour of inactivity to prevent critical to users from leaving accounts open on public access devices • Monitoring of account usage for indications of you. We suspicious activity • Regular third party security audits to identify possible security protect that issues and allow for aggressive mitigation and correction activities” privacy by:
  • 39. The future for lawyers in the cloud Increasingly, data will become dissociated from a particular device, platform or operating system. Our digital hub will move from our desktops to the cloud. We will access and work with our data from multiple devices. Our data will be synchronized across all our devices. Our data will be available to us anytime, anywhere.
  • 40. Further reading … Cloud Computing Synopsis and Recommendations, National Institute of Standards and Technology, Published May 29, 2012, www.nist.gov/manuscript-publication-search.cfm?pub_id=911075