SlideShare a Scribd company logo
1 of 47
Download to read offline
#ClioWeb
Security Basics
for Law Firms
Joshua	Lenon	– Clio
Chris	Wiesinger - CloudMask
#ClioWeb
Instructors
Joshua Lenon
• Lawyer in Residence at Clio
• Attorney Admitted in New York
• @JoshuaLenon
Chris Wiesinger
• Business Development at
CloudMask
#ClioWeb
Agenda
• Confidentiality vs. privacy for law firms
• Privacy regulations impacting law firms
• Practical challenges
• Improve your security posture
• Questions
#ClioWeb
At least 80 of the 100 biggest firms in the country, by
revenue, have been hacked since 2011.
#ClioWeb
CONFIDENTIALITY VS. PRIVACY
#ClioWeb
Confidentiality
• Attorney-Client Privilege (Evidentiary Rule)
• Work Product Doctrine (Civil Procedure Rule)
• MPRC Rule 1.6 (Ethical Duty)
#ClioWeb
Attorney-Client Privilege
“encourage[s] full and frank communication between
attorneys and their clients.” Upjohn Co. v. United
States, 449 U.S. 383 (1981).
#ClioWeb
Attorney-Client Privilege
• Limited to communications between the client and attorney
• Privilege rests with the client; even beyond the grave, Swidler & Berlin v.
United States, 524 U.S. 399 (1998)
• Waiver possible
• Inadvertent disclosures is not necessarily waiver, if:
– the disclosure is inadvertent;
– the holder of the privilege or protection took reasonable steps to prevent
disclosure; and
– the holder promptly took reasonable steps to rectify the error
#ClioWeb
Work Product Doctrine
Federal Rules of Civil Procedure Rule 26(b)(3)
• “Ordinarily, a party may not discover documents and tangible things
that are prepared in anticipation of litigation...“
• Materials may be discovered if the party shows that it has substantial
need for the materials to prepare its case and cannot, without undue
hardship, obtain their substantial equivalent by other means.
#ClioWeb
MPRC Rule 1.6
(a) A lawyer shall not reveal information relating to the
representation of a client unless the client gives informed
consent, the disclosure is impliedly authorized in order to
carry out the representation or the disclosure is permitted by
paragraph (b).
#ClioWeb
MPRC Rule 1.6(b)
• prevent reasonably certain death
or substantial bodily harm
• prevent the client from
committing a crime or fraud
• prevent, mitigate or rectify
substantial injury to the financial
interests or property of another
• secure legal advice about the
lawyer's compliance with these
Rules
• establish a claim or defense on
behalf of the lawyer
• comply with other law or a court
order
• detect and resolve conflicts of
interest
#ClioWeb
MRPC 1.6
(c) A lawyer shall make reasonable efforts to prevent the inadvertent or
unauthorized disclosure of, or unauthorized access to, information
relating to the representation of a client.
#ClioWeb
Confidentiality vs Privacy
Confidentiality Privacy
Prescriptive
Client	focused
Derived	from	Common	Law
Well-documented exceptions
Legal specifc
#ClioWeb
Privacy
• Personally Identifiable information (PII)
1. Information that can be used to distinguish or trace an individual‘s
identity
• Name, social security number, date and place of birth, mother‘s maiden
name, or biometric record
2. Other information that is linked or linkable to an individual
• Medical, educational, financial, and employment information.
#ClioWeb
Privacy Safeguards
• 3 types of safeguards must be considered
and implemented
1. Administrative
2. Physical
3. Technical
#ClioWeb
Privacy
• Notification duties in the event of a breach
–Must notify all affected parties
• Reporting duties to regulators
• Right of action for impacted individuals
#ClioWeb
Confidentiality vs Privacy
Confidentiality Privacy
Prescriptive Descriptive
Client	focused Everyone
Derived	from	Common	Law Statutorily created
Well-documented exceptions Enforced	liability
Legal	practice	specific Outside the	courtroom
#ClioWeb
PRIVACY REGULATIONS IMPACTING LAW FIRMS
#ClioWeb
Law firms need to weigh privacy regulations by
geography and subject matter.
#ClioWeb
Privacy Laws Affecting Law Firms
State	Privacy	
Laws
Client	
Business	
Area	Privacy	
Laws
Federal	
Regulations
#ClioWeb
State Privacy Laws
Think broadly, it’s not just
your location, but the
location of all of your clients
and contacts
#ClioWeb
Client Business Areas
• Financial information – under the
Gramm Leach Bliley Act (GLBA), Fair
Credit Reporting Act (FCRA), Fair and
Accurate Credit Transaction Act
(FACTA), Red Flags Rules
• Healthcare information – under the
Health Insurance Portability and
Accountability Act (HIPAA) and the
HITECH Act
• Children information – as required
under the Children Online Privacy
Protection Act (COPPA) and Family
Educational Rights and Privacy Act
(FERPA)
• Mortgage lending – under Consumer
Finance Protection Board, Bulletin
2012-03
• Criminal Justice - Criminal Justice
Information Services Division (CJIS)
#ClioWeb
#ClioWeb
Federal Regulations
FTC’s Standard of Care
Take “reasonable and
necessary measures” to
protect consumer data
#ClioWeb
Privacy for Law Firms
State	Privacy	Laws
Client	
Business	
Area	
Privacy	
Laws
Industry	Regulation
Federal	
Regulations
#ClioWeb
Privacy rules varies
between jurisdictions,
with new regional
requirements emerging
frequently.
• Europe
– EU-U.S. Safe Harbor / EU-U.S.
Privacy Shield
– General Data Privacy Regulation
(GDPR) (2018)
• Canada
– Personal Information Protection
and Electronic Documents Act
(PIPEDA)
– Freedom of Information and
Protection of Privacy Act (FOIPPA)
(BC)
• South Africa
– Protection of Personal Information
Bill.
#ClioWeb
THE PRACTICAL CHALLENGES
#ClioWeb
Key Concerns
• Business
– Which cases compromised if opposing forces saw all your data?
– Client reaction and response to breaches affecting their cases?
– Regulatory implications of data breaches?
• Technical
– Landscape of security issues
– Tools to effect consistent application of data protection policy
#ClioWeb
Connection and Vulnerability
http://www.informationisbeautiful.net/visualiz
ations/worlds-biggest-data-breaches-hacks/
#ClioWeb
Who is the Threat?
• Insiders
– Have legitimate, authorized access to
premises and systems
• Outsiders
– Hackers, governments
– Legal adversaries?
– Hacktivists?
• Key Concern
– Outsiders always target insider
credentials first
55%	Insiders
https://securityintelligence.com/the-threat-is-coming-
from-inside-the-network/
#ClioWeb
Protecting (and failing to protect) Credentials
• Most breaches begin with password
compromise
• Hard to remember unique passwords
so…
– Failure to change default passwords
– Easy to remember = Easy to Guess
– Same password for multiple services
• Your email password
– The magic key for “I forgot my password”
August	30	2016
#ClioWeb
What Third Parties Can and Can’t See
• Cloud means third parties handle your data
– Consumer Gmail (example)
• Google encrypts in transit to servers
• Google scans and analyzes content
– Google for Work (example)
• Encrypts data in transit and at rest…. BUT
– Google staff have access to master keys
– Who determines “legitimate business purpose”?
– National Security Letters?
– What if Google employee compromised?
– Challenge for Lawyers: Due Diligence
• Who are you really trusting your data to?
• Remember the insider concern
“Google	authorizes	only	trusted	individuals	to	have	
legitimate	access	to	systems	and	data	repositories	
containing	customer	data,	including	the	KMS.	This	strict	
authorization	extends	to	job	duties	including	debugging	
and	maintenance	activities	that	might	expose	decrypted
customer	data	to	a	trusted	employee.	Access	to	these	
systems	is	under	the	umbrella	of	strict	policies	that	are	
clearly	displayed	for	employees	to	read	and	also	in	the	
tools	they	use.	Access	to	customer	data	is	only	allowed	
for	a	legitimate	business	purpose.”
#ClioWeb
The Design of Encryption Solutions
• Common Encryption
Implementation
– Transaction Layer Security (TLS): e.g.,
between browser and app server
• Need to trust the people controlling
encryption keys (app server end)
– Pretty Good Privacy
• Each end-point (Bob, Alice) has a unique
public and private key
• No middlemen with keys
• The Trust Trade-off is about
Convenience and Usability
#ClioWeb
HOW TO IMPROVE YOUR SECURITY POSTURE
#ClioWeb
The Upshot
• Protect your credentials with Password Managers
• Take control of encrypting your data in key applications like Clio and
Google
– YOU must control the encryption key
• This is no longer rocket science
• CloudMask: define and automate data protection policy
• These constitute “reasonable steps”
– To improve client confidentiality and privacy
– To limit your exposure to financial, brand and regulatory risk
#ClioWeb
Password Managers
• Rules and remembering is
what software is good for
• Fast Identity Online (FIDO) is
the no password future
(fidoalliance.org)
• In the meantime, select and
use a password manager
• Still: Discipline required
NEAR	FUTURE
TODAY
#ClioWeb
Privacy By Design: Zero Knowledge Applications
• Zero Knowledge
– Encryption key remains under user control (private key)
– End-to-End encryption: Data encrypted at time of creation to time of viewing on
authorized device by authorized viewer in control of their own key
– No third party facilitating the communication of encrypted data has the capacity to see
that data in the clear
• E.g.: ISP, Cloud Infrastructure Provider, Software as a Service Provider, Encryption Engine
Provider, etc.
• Zero Trust
– No need to trust middlemen with view of sensitive data in the clear
– Breaches of masked data yield… meaningless information
– Encrypted and Tokenized PII becomes meaningless data (no longer PII), so less likely to
trigger breach notification expense and embarassment
#ClioWeb
Making Zero Trust Easy with Clio and CloudMask
• CloudMask and Clio
– An easy to activate zero trust security enhancer
• The CloudMask Engine
– Selective, Intelligent Masking
• Selective: choose sensitive standard fields, and any custom field
• Intelligent: ensures that masked data is accepted by database
• Masking: first encrypt the data, then tokenize and format
• Works beyond Clio
– Google for Work (Gmail, Drive)
#ClioWeb
Activating CloudMask from Within Clio
#ClioWeb
Configuring Data Protection Policies
#ClioWeb
CloudMask Capabilities Summary
üMask critical Standard fields
üContacts, Matters, Tasks, Billing
üMask any Custom field
üMask any attachment
üSearch both clear and masked data
üDocument automation
üCollaborate with outside counsel and clients
üPer record control of masking (turn OFF if necessary)
üSupports Chrome and Firefox browsers
üComing soon… Android and iOS mobile
#ClioWeb
Automatic Execution of Policy (Authorized View)
#ClioWeb
Automatic Execution of Policy (Unauthorized View)
#ClioWeb
Summary
1. Zero trust, end-to-end encryption solutions like CloudMask make
Cloud safer than ever before.
2. With CloudMask, even “insiders” need both your credentials AND
your authorized physical device to see data in the clear
• Outsiders who compromise credentials to log in from external machines see only
masked data
3. Password Managers are critical to better credential governance
4. No need to compromise encryption design for ease of use
5. CloudMask: easy to use, automated data masking, with keys under
your control
#ClioWeb
One More Thing: Due Diligence
• How do you know that “the security magic” in the black box works?
– Has the security vendor obtained independent validation of functionality and
system integrity, according to an internationally agreed standard?
• CloudMask and Common Criteria Certification
– Common Criteria for Information Technology Security Evaluation
– www.commoncriteria.org
– International Standards Organization – ISO/IEC Standard 15408
– “does the software actually perform the functional claims?”
– Recognized and often required by federal government security authorities
#ClioWeb
QUESTIONS?
#ClioWeb
Thank You
Joshua Lenon
joshua@clio.com
@JoshuaLenon
Linkedin.com/in/joshualenon
1-888-858-2546
Colin McMahon
Linkedin.com/in/colinmcmahonclio
Support@clio.com
Support.goclio.com
www.youtube.com/user/ClioVideo

More Related Content

What's hot

Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsShawn Tuma
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...Shawn Tuma
 
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua LenonUnderstanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua LenonClio - Cloud-Based Legal Technology
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
Catelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarCatelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarRob Levey
 
Website Compliance 2009
Website Compliance 2009Website Compliance 2009
Website Compliance 2009scottsicle
 
Sakitha hall slideshare
Sakitha hall slideshareSakitha hall slideshare
Sakitha hall slideshareSAKITHA HALL
 
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Nicole Fucile-Borsian
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...Shawn Tuma
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowShawn Tuma
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 

What's hot (12)

Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
 
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua LenonUnderstanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Catelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarCatelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinar
 
Website Compliance 2009
Website Compliance 2009Website Compliance 2009
Website Compliance 2009
 
Sakitha hall slideshare
Sakitha hall slideshareSakitha hall slideshare
Sakitha hall slideshare
 
(Webinar Slides) Running an Efficient Law Firm
(Webinar Slides) Running an Efficient Law Firm(Webinar Slides) Running an Efficient Law Firm
(Webinar Slides) Running an Efficient Law Firm
 
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 

Viewers also liked

The Whole Lawyer: Professional Communications - How To Bridge The Communicati...
The Whole Lawyer: Professional Communications - How To Bridge The Communicati...The Whole Lawyer: Professional Communications - How To Bridge The Communicati...
The Whole Lawyer: Professional Communications - How To Bridge The Communicati...Clio - Cloud-Based Legal Technology
 
UX, ethnography and possibilities: for Libraries, Museums and Archives
UX, ethnography and possibilities: for Libraries, Museums and ArchivesUX, ethnography and possibilities: for Libraries, Museums and Archives
UX, ethnography and possibilities: for Libraries, Museums and ArchivesNed Potter
 
Designing Teams for Emerging Challenges
Designing Teams for Emerging ChallengesDesigning Teams for Emerging Challenges
Designing Teams for Emerging ChallengesAaron Irizarry
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with DataSeth Familian
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 

Viewers also liked (11)

Clio for Criminal Law Attorneys
Clio for Criminal Law AttorneysClio for Criminal Law Attorneys
Clio for Criminal Law Attorneys
 
Business Development Strategies for Law Firms
Business Development Strategies for Law FirmsBusiness Development Strategies for Law Firms
Business Development Strategies for Law Firms
 
Niche lawyering
Niche lawyeringNiche lawyering
Niche lawyering
 
Clio for civil litigators
Clio for civil litigatorsClio for civil litigators
Clio for civil litigators
 
The Whole Lawyer: Professional Communications - How To Bridge The Communicati...
The Whole Lawyer: Professional Communications - How To Bridge The Communicati...The Whole Lawyer: Professional Communications - How To Bridge The Communicati...
The Whole Lawyer: Professional Communications - How To Bridge The Communicati...
 
ABA TECHSHOW 2017: 60 tips in 60 minutes
ABA TECHSHOW 2017: 60 tips in 60 minutesABA TECHSHOW 2017: 60 tips in 60 minutes
ABA TECHSHOW 2017: 60 tips in 60 minutes
 
UX, ethnography and possibilities: for Libraries, Museums and Archives
UX, ethnography and possibilities: for Libraries, Museums and ArchivesUX, ethnography and possibilities: for Libraries, Museums and Archives
UX, ethnography and possibilities: for Libraries, Museums and Archives
 
Designing Teams for Emerging Challenges
Designing Teams for Emerging ChallengesDesigning Teams for Emerging Challenges
Designing Teams for Emerging Challenges
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar to Security Basics for Law Firms

Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Jim Brashear
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinWhitmeyerTuffin
 
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021:  Database Auditing - on-Premises and in the Cloud by Craig M...Idera live 2021:  Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...IDERA Software
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgeAgile Financial Technologies
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE Sarah Stogner
 
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightKeeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightCBIZ, Inc.
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Shawn Tuma
 

Similar to Security Basics for Law Firms (20)

Investigation and discovery tools in law firms
Investigation and discovery tools in law firmsInvestigation and discovery tools in law firms
Investigation and discovery tools in law firms
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
example
exampleexample
example
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021:  Database Auditing - on-Premises and in the Cloud by Craig M...Idera live 2021:  Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
 
Evaluating Legal Technology for Your Law Firm
Evaluating Legal Technology for Your Law FirmEvaluating Legal Technology for Your Law Firm
Evaluating Legal Technology for Your Law Firm
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE
 
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightKeeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
 

More from Clio - Cloud-Based Legal Technology

Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...Clio - Cloud-Based Legal Technology
 
How Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client IntakeHow Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client IntakeClio - Cloud-Based Legal Technology
 
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...Clio - Cloud-Based Legal Technology
 

More from Clio - Cloud-Based Legal Technology (20)

Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
 
How Automating Client Intake Increases Client Confidence
How Automating Client Intake Increases Client ConfidenceHow Automating Client Intake Increases Client Confidence
How Automating Client Intake Increases Client Confidence
 
How Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client IntakeHow Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
 
2023 Legal Trends for Solo Law Firms
2023 Legal Trends for Solo Law Firms2023 Legal Trends for Solo Law Firms
2023 Legal Trends for Solo Law Firms
 
Increase Your Profits While Reducing Burnout
Increase Your Profits While Reducing BurnoutIncrease Your Profits While Reducing Burnout
Increase Your Profits While Reducing Burnout
 
90-Day Goal Setting for Legal Professionals
90-Day Goal Setting for Legal Professionals90-Day Goal Setting for Legal Professionals
90-Day Goal Setting for Legal Professionals
 
Insights from the 2022 Legal Trends Report - Slides.pdf
Insights from the 2022 Legal Trends Report - Slides.pdfInsights from the 2022 Legal Trends Report - Slides.pdf
Insights from the 2022 Legal Trends Report - Slides.pdf
 
How to Refine Your Law Firm Business Model
How to Refine Your Law Firm Business ModelHow to Refine Your Law Firm Business Model
How to Refine Your Law Firm Business Model
 
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
 
2022 in Review: What's Working for Your Firm and What Isn't
2022 in Review: What's Working for Your Firm and What Isn't2022 in Review: What's Working for Your Firm and What Isn't
2022 in Review: What's Working for Your Firm and What Isn't
 
Watch How Family Lawyers Use Clio
Watch How Family Lawyers Use ClioWatch How Family Lawyers Use Clio
Watch How Family Lawyers Use Clio
 
Reclaim Your Time in 2023 with Clio’s Newest Features
Reclaim Your Time in 2023 with Clio’s Newest FeaturesReclaim Your Time in 2023 with Clio’s Newest Features
Reclaim Your Time in 2023 with Clio’s Newest Features
 
How to Grow a Law Firm_ From Startup to Success
How to Grow a Law Firm_ From Startup to SuccessHow to Grow a Law Firm_ From Startup to Success
How to Grow a Law Firm_ From Startup to Success
 
Customer Research: How to Gauge Client Satisfaction
Customer Research: How to Gauge Client SatisfactionCustomer Research: How to Gauge Client Satisfaction
Customer Research: How to Gauge Client Satisfaction
 
Cloud Software: The Key to Staff Success and Satisfaction
Cloud Software: The Key to Staff Success and SatisfactionCloud Software: The Key to Staff Success and Satisfaction
Cloud Software: The Key to Staff Success and Satisfaction
 
How to Generate New Business With Client Reviews
How to Generate New Business With Client ReviewsHow to Generate New Business With Client Reviews
How to Generate New Business With Client Reviews
 
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
 
Key Insights from the 2022 Legal Trends Report
Key Insights from the 2022 Legal Trends ReportKey Insights from the 2022 Legal Trends Report
Key Insights from the 2022 Legal Trends Report
 
Billing Week Stress to Collections Success Webinar.pdf
Billing Week Stress to Collections Success Webinar.pdfBilling Week Stress to Collections Success Webinar.pdf
Billing Week Stress to Collections Success Webinar.pdf
 
Streamline Your Court Interactions With Technology
Streamline Your Court Interactions With TechnologyStreamline Your Court Interactions With Technology
Streamline Your Court Interactions With Technology
 

Recently uploaded

如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 

Recently uploaded (20)

如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 

Security Basics for Law Firms

  • 1. #ClioWeb Security Basics for Law Firms Joshua Lenon – Clio Chris Wiesinger - CloudMask
  • 2. #ClioWeb Instructors Joshua Lenon • Lawyer in Residence at Clio • Attorney Admitted in New York • @JoshuaLenon Chris Wiesinger • Business Development at CloudMask
  • 3. #ClioWeb Agenda • Confidentiality vs. privacy for law firms • Privacy regulations impacting law firms • Practical challenges • Improve your security posture • Questions
  • 4. #ClioWeb At least 80 of the 100 biggest firms in the country, by revenue, have been hacked since 2011.
  • 6. #ClioWeb Confidentiality • Attorney-Client Privilege (Evidentiary Rule) • Work Product Doctrine (Civil Procedure Rule) • MPRC Rule 1.6 (Ethical Duty)
  • 7. #ClioWeb Attorney-Client Privilege “encourage[s] full and frank communication between attorneys and their clients.” Upjohn Co. v. United States, 449 U.S. 383 (1981).
  • 8. #ClioWeb Attorney-Client Privilege • Limited to communications between the client and attorney • Privilege rests with the client; even beyond the grave, Swidler & Berlin v. United States, 524 U.S. 399 (1998) • Waiver possible • Inadvertent disclosures is not necessarily waiver, if: – the disclosure is inadvertent; – the holder of the privilege or protection took reasonable steps to prevent disclosure; and – the holder promptly took reasonable steps to rectify the error
  • 9. #ClioWeb Work Product Doctrine Federal Rules of Civil Procedure Rule 26(b)(3) • “Ordinarily, a party may not discover documents and tangible things that are prepared in anticipation of litigation...“ • Materials may be discovered if the party shows that it has substantial need for the materials to prepare its case and cannot, without undue hardship, obtain their substantial equivalent by other means.
  • 10. #ClioWeb MPRC Rule 1.6 (a) A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent, the disclosure is impliedly authorized in order to carry out the representation or the disclosure is permitted by paragraph (b).
  • 11. #ClioWeb MPRC Rule 1.6(b) • prevent reasonably certain death or substantial bodily harm • prevent the client from committing a crime or fraud • prevent, mitigate or rectify substantial injury to the financial interests or property of another • secure legal advice about the lawyer's compliance with these Rules • establish a claim or defense on behalf of the lawyer • comply with other law or a court order • detect and resolve conflicts of interest
  • 12. #ClioWeb MRPC 1.6 (c) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.
  • 13. #ClioWeb Confidentiality vs Privacy Confidentiality Privacy Prescriptive Client focused Derived from Common Law Well-documented exceptions Legal specifc
  • 14. #ClioWeb Privacy • Personally Identifiable information (PII) 1. Information that can be used to distinguish or trace an individual‘s identity • Name, social security number, date and place of birth, mother‘s maiden name, or biometric record 2. Other information that is linked or linkable to an individual • Medical, educational, financial, and employment information.
  • 15. #ClioWeb Privacy Safeguards • 3 types of safeguards must be considered and implemented 1. Administrative 2. Physical 3. Technical
  • 16. #ClioWeb Privacy • Notification duties in the event of a breach –Must notify all affected parties • Reporting duties to regulators • Right of action for impacted individuals
  • 17. #ClioWeb Confidentiality vs Privacy Confidentiality Privacy Prescriptive Descriptive Client focused Everyone Derived from Common Law Statutorily created Well-documented exceptions Enforced liability Legal practice specific Outside the courtroom
  • 19. #ClioWeb Law firms need to weigh privacy regulations by geography and subject matter.
  • 20. #ClioWeb Privacy Laws Affecting Law Firms State Privacy Laws Client Business Area Privacy Laws Federal Regulations
  • 21. #ClioWeb State Privacy Laws Think broadly, it’s not just your location, but the location of all of your clients and contacts
  • 22. #ClioWeb Client Business Areas • Financial information – under the Gramm Leach Bliley Act (GLBA), Fair Credit Reporting Act (FCRA), Fair and Accurate Credit Transaction Act (FACTA), Red Flags Rules • Healthcare information – under the Health Insurance Portability and Accountability Act (HIPAA) and the HITECH Act • Children information – as required under the Children Online Privacy Protection Act (COPPA) and Family Educational Rights and Privacy Act (FERPA) • Mortgage lending – under Consumer Finance Protection Board, Bulletin 2012-03 • Criminal Justice - Criminal Justice Information Services Division (CJIS)
  • 24. #ClioWeb Federal Regulations FTC’s Standard of Care Take “reasonable and necessary measures” to protect consumer data
  • 25. #ClioWeb Privacy for Law Firms State Privacy Laws Client Business Area Privacy Laws Industry Regulation Federal Regulations
  • 26. #ClioWeb Privacy rules varies between jurisdictions, with new regional requirements emerging frequently. • Europe – EU-U.S. Safe Harbor / EU-U.S. Privacy Shield – General Data Privacy Regulation (GDPR) (2018) • Canada – Personal Information Protection and Electronic Documents Act (PIPEDA) – Freedom of Information and Protection of Privacy Act (FOIPPA) (BC) • South Africa – Protection of Personal Information Bill.
  • 28. #ClioWeb Key Concerns • Business – Which cases compromised if opposing forces saw all your data? – Client reaction and response to breaches affecting their cases? – Regulatory implications of data breaches? • Technical – Landscape of security issues – Tools to effect consistent application of data protection policy
  • 30. #ClioWeb Who is the Threat? • Insiders – Have legitimate, authorized access to premises and systems • Outsiders – Hackers, governments – Legal adversaries? – Hacktivists? • Key Concern – Outsiders always target insider credentials first 55% Insiders https://securityintelligence.com/the-threat-is-coming- from-inside-the-network/
  • 31. #ClioWeb Protecting (and failing to protect) Credentials • Most breaches begin with password compromise • Hard to remember unique passwords so… – Failure to change default passwords – Easy to remember = Easy to Guess – Same password for multiple services • Your email password – The magic key for “I forgot my password” August 30 2016
  • 32. #ClioWeb What Third Parties Can and Can’t See • Cloud means third parties handle your data – Consumer Gmail (example) • Google encrypts in transit to servers • Google scans and analyzes content – Google for Work (example) • Encrypts data in transit and at rest…. BUT – Google staff have access to master keys – Who determines “legitimate business purpose”? – National Security Letters? – What if Google employee compromised? – Challenge for Lawyers: Due Diligence • Who are you really trusting your data to? • Remember the insider concern “Google authorizes only trusted individuals to have legitimate access to systems and data repositories containing customer data, including the KMS. This strict authorization extends to job duties including debugging and maintenance activities that might expose decrypted customer data to a trusted employee. Access to these systems is under the umbrella of strict policies that are clearly displayed for employees to read and also in the tools they use. Access to customer data is only allowed for a legitimate business purpose.”
  • 33. #ClioWeb The Design of Encryption Solutions • Common Encryption Implementation – Transaction Layer Security (TLS): e.g., between browser and app server • Need to trust the people controlling encryption keys (app server end) – Pretty Good Privacy • Each end-point (Bob, Alice) has a unique public and private key • No middlemen with keys • The Trust Trade-off is about Convenience and Usability
  • 34. #ClioWeb HOW TO IMPROVE YOUR SECURITY POSTURE
  • 35. #ClioWeb The Upshot • Protect your credentials with Password Managers • Take control of encrypting your data in key applications like Clio and Google – YOU must control the encryption key • This is no longer rocket science • CloudMask: define and automate data protection policy • These constitute “reasonable steps” – To improve client confidentiality and privacy – To limit your exposure to financial, brand and regulatory risk
  • 36. #ClioWeb Password Managers • Rules and remembering is what software is good for • Fast Identity Online (FIDO) is the no password future (fidoalliance.org) • In the meantime, select and use a password manager • Still: Discipline required NEAR FUTURE TODAY
  • 37. #ClioWeb Privacy By Design: Zero Knowledge Applications • Zero Knowledge – Encryption key remains under user control (private key) – End-to-End encryption: Data encrypted at time of creation to time of viewing on authorized device by authorized viewer in control of their own key – No third party facilitating the communication of encrypted data has the capacity to see that data in the clear • E.g.: ISP, Cloud Infrastructure Provider, Software as a Service Provider, Encryption Engine Provider, etc. • Zero Trust – No need to trust middlemen with view of sensitive data in the clear – Breaches of masked data yield… meaningless information – Encrypted and Tokenized PII becomes meaningless data (no longer PII), so less likely to trigger breach notification expense and embarassment
  • 38. #ClioWeb Making Zero Trust Easy with Clio and CloudMask • CloudMask and Clio – An easy to activate zero trust security enhancer • The CloudMask Engine – Selective, Intelligent Masking • Selective: choose sensitive standard fields, and any custom field • Intelligent: ensures that masked data is accepted by database • Masking: first encrypt the data, then tokenize and format • Works beyond Clio – Google for Work (Gmail, Drive)
  • 41. #ClioWeb CloudMask Capabilities Summary üMask critical Standard fields üContacts, Matters, Tasks, Billing üMask any Custom field üMask any attachment üSearch both clear and masked data üDocument automation üCollaborate with outside counsel and clients üPer record control of masking (turn OFF if necessary) üSupports Chrome and Firefox browsers üComing soon… Android and iOS mobile
  • 42. #ClioWeb Automatic Execution of Policy (Authorized View)
  • 43. #ClioWeb Automatic Execution of Policy (Unauthorized View)
  • 44. #ClioWeb Summary 1. Zero trust, end-to-end encryption solutions like CloudMask make Cloud safer than ever before. 2. With CloudMask, even “insiders” need both your credentials AND your authorized physical device to see data in the clear • Outsiders who compromise credentials to log in from external machines see only masked data 3. Password Managers are critical to better credential governance 4. No need to compromise encryption design for ease of use 5. CloudMask: easy to use, automated data masking, with keys under your control
  • 45. #ClioWeb One More Thing: Due Diligence • How do you know that “the security magic” in the black box works? – Has the security vendor obtained independent validation of functionality and system integrity, according to an internationally agreed standard? • CloudMask and Common Criteria Certification – Common Criteria for Information Technology Security Evaluation – www.commoncriteria.org – International Standards Organization – ISO/IEC Standard 15408 – “does the software actually perform the functional claims?” – Recognized and often required by federal government security authorities
  • 47. #ClioWeb Thank You Joshua Lenon joshua@clio.com @JoshuaLenon Linkedin.com/in/joshualenon 1-888-858-2546 Colin McMahon Linkedin.com/in/colinmcmahonclio Support@clio.com Support.goclio.com www.youtube.com/user/ClioVideo