SlideShare ist ein Scribd-Unternehmen logo
1 von 8
What the Model Rules are saying about
           practices in Cyberspace

     Donna Seyle
Lawyer/Writer/Founder
LawPracticeStrategy.com
Lawyers’ use of cloud computing is growing as the technology becomes safer, the
cost-effectiveness becomes more evident, internal productivity increases, and the
need to provide a variety of legal services delivery becomes a market imperative.
The questions have arisen: the use of technology raises ethical questions related to
how lawyers go about choosing cloud vendors, and how they are using cloud
products chose.
In 2009, the ABA formed a new commission, Ethics 20/20, to investigate just that.
As a result, although very few changes have been made to the Model Rules, draft
opinions, issue papers seeking comments and their replies have emerged from
both the ABA and various state bar associations that address how the rules apply
to cloud computing as they are currently written.
The Model Rules that have come under scrutiny and will be discussed are:

   Confidentiality: Rules 1.6(a) and 1.15
   Competence and Diligence: Rules 1.1 and 1.3
   Duties to Prospective Clients: Rules 1.18 and 1.2
   Unauthorized Practice of Law: Rule 5.5
   Duty to Supervise: Rule 5.3
   Confidentiality and Safeguarding Property
   When client information is transferred and/or stored in a cloud system
   Use of 3rd-party cloud applications in communicating
   Relinquish control of data
   Rule 1.6 standard: lawyers must take “reasonable precautions” to
    safeguard client information and prevent it from going to unintended
    recipients during the transmission.
   Requires due diligence in vetting your choice of vendor
   Includes hiring a technology advisor if lawyer doesn’t feel capable of
    making effective choices
   States have not attempted to define “reasonable care”; technology
    changes too quickly
   Be sure to stay current on any changes in regulation in your state
   Requires that the lawyer is thoroughly prepared to provide
    representation to the client
   When applied to cloud computing, requires lawyers to understand the
    technology and security issues when selecting a cloud service provider
    and devices
   To do so, lawyers must do their due diligence in vetting their chosen
    vendor
   Lawyers must also diligently follow best practices in the use of the
    technology to insure confidentiality
   Lawyers’ best practices include using cloud computing to conduct factual
    research in representing their client
   Must also inform client of their use of cloud software in the act of
    representation
It is reasonable to expect the lawyer to vet the vendor to determine its
security protocols. Here is a list of questions lawyers can use:

   What kind of facility will host the data and how are they secured?
   Who else has access to the facility, servers and data and how is authorization for access
    determined? How do they screen employees?
   Does the contract address confidentiality? If not, is the vendor willing to sign a
    confidentiality agreement?
   How frequently are back-ups performed?
   Is data backed up to more than one server? Are they georedundant?
   Are all servers located in the United States?
   What types of encryption are used, and how are passwords stored? Is data encrypted
    both in transit and at rest?
   Has the vendor been certified by a 3rd party service? Are audits available for review?
   Are there redundant power supplies for the servers?
   Is there guaranteed uptime?
   What remedies are provided for in the event of breach?
   What are the data breach notification procedures?
   What are your rights upon termination?
   Does the vendor carry cyberinsurance?
   Be sure to review Service Level Agreement (SLA) and Terms of Service (TOS)
   Issue arises in multijurisdictional virtual practice and when providing
    clients with self-help software solutions
   5.5 (a) and (b) restrict a lawyer from practicing in a jurisdiction where she
    is unlicensed, or establish “systematic and continuous presence” in this
    jurisdiction
   Lawyer’s online presence must make clear where she is authorized to
    practice
   Should have a jurisdiction check built into the cloud system to ensure
    client’s residency
   A virtual lawyer practicing in the state where he is licensed, but resides
    elsewhere, may establish “systematic and continuous presence”
   However, some states have residency requirements and “bona fide office”
    rules (e.g., New Jersey)
   Lawyers offering self-help software: in Texas, they rewrote their rule that
    self-help using computer software does not substitute for legal services
   Managing lawyers must make reasonable efforts to ensure a non-lawyers
    conduct is compatible with professional obligations of the lawyer
   This includes non-lawyer employees, independent contractors such as
    paralegals, virtual assistants, and any legal process outsourcing company
    retained by the firm
   Use a permissions-based technology system
   Conduct an extensive conflicts check or have confidentiality agreements
    signed
   Be certain outsourced contractors are given a copy of the firm’s policy for
    use of cloud software and social media
   International Legal Technology Standards
   Virtual Law Practice – by Stephanie Kimbro
   Cloud Computing for Lawyers – Nicole Black
   Law Practice Management Section – American Bar
    Association

Weitere ähnliche Inhalte

Was ist angesagt?

CLE on Virtual Law Practice for the NCBA
CLE on Virtual Law Practice for the NCBACLE on Virtual Law Practice for the NCBA
CLE on Virtual Law Practice for the NCBAStephanie Kimbro Dolin
 
Keynote on Future of Legal Services Delivery
Keynote on Future of Legal Services DeliveryKeynote on Future of Legal Services Delivery
Keynote on Future of Legal Services DeliveryStephanie Kimbro Dolin
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller SolicitorBrian Miller, Solicitor
 
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1David Spinks
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeRobert Ambrogi
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Adv Prashant Mali
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computingmovinghats
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualWilliam Tanenbaum
 
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...Accellis Technology Group
 
Don't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You UpDon't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You UpEAI Information Systems
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)Financial Poise
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortzitnewsafrica
 
The ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutionsThe ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutionsDan Michaluk
 
How Does the ePrivacy Regulation and General Data Protection
How Does the ePrivacy Regulation and General Data ProtectionHow Does the ePrivacy Regulation and General Data Protection
How Does the ePrivacy Regulation and General Data ProtectionShield
 

Was ist angesagt? (20)

CLE on Virtual Law Practice for the NCBA
CLE on Virtual Law Practice for the NCBACLE on Virtual Law Practice for the NCBA
CLE on Virtual Law Practice for the NCBA
 
Keynote on Future of Legal Services Delivery
Keynote on Future of Legal Services DeliveryKeynote on Future of Legal Services Delivery
Keynote on Future of Legal Services Delivery
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
 
Engagement and Consumer Law
Engagement and Consumer LawEngagement and Consumer Law
Engagement and Consumer Law
 
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 
Technology in Law Practice
Technology in Law PracticeTechnology in Law Practice
Technology in Law Practice
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...
 
Avoid the Audit Trap
Avoid the Audit TrapAvoid the Audit Trap
Avoid the Audit Trap
 
DOL Fiduciary Rule Infographic
DOL Fiduciary Rule InfographicDOL Fiduciary Rule Infographic
DOL Fiduciary Rule Infographic
 
Don't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You UpDon't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You Up
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
 
The ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutionsThe ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutions
 
How Does the ePrivacy Regulation and General Data Protection
How Does the ePrivacy Regulation and General Data ProtectionHow Does the ePrivacy Regulation and General Data Protection
How Does the ePrivacy Regulation and General Data Protection
 

Andere mochten auch

Marketing your virtual law office
Marketing your virtual law officeMarketing your virtual law office
Marketing your virtual law officeLaw Practice Strategy
 
Solos and small firms, thrive in the new legal marketplace
Solos and small firms, thrive in the new legal marketplaceSolos and small firms, thrive in the new legal marketplace
Solos and small firms, thrive in the new legal marketplaceLaw Practice Strategy
 
Alternative Fee Arrangements: Pricing for a Win-Win Relationship
Alternative Fee Arrangements: Pricing for a Win-Win RelationshipAlternative Fee Arrangements: Pricing for a Win-Win Relationship
Alternative Fee Arrangements: Pricing for a Win-Win RelationshipLaw Practice Strategy
 
Account Analysis Presentation Final
Account Analysis Presentation FinalAccount Analysis Presentation Final
Account Analysis Presentation FinalLaurelEK
 
Data breaches at home and abroad
Data breaches at home and abroad Data breaches at home and abroad
Data breaches at home and abroad Law Practice Strategy
 
Accounting analysis
Accounting analysisAccounting analysis
Accounting analysisAyesha Hamid
 

Andere mochten auch (7)

Marketing your virtual law office
Marketing your virtual law officeMarketing your virtual law office
Marketing your virtual law office
 
Going Solo - Virtually
Going Solo - VirtuallyGoing Solo - Virtually
Going Solo - Virtually
 
Solos and small firms, thrive in the new legal marketplace
Solos and small firms, thrive in the new legal marketplaceSolos and small firms, thrive in the new legal marketplace
Solos and small firms, thrive in the new legal marketplace
 
Alternative Fee Arrangements: Pricing for a Win-Win Relationship
Alternative Fee Arrangements: Pricing for a Win-Win RelationshipAlternative Fee Arrangements: Pricing for a Win-Win Relationship
Alternative Fee Arrangements: Pricing for a Win-Win Relationship
 
Account Analysis Presentation Final
Account Analysis Presentation FinalAccount Analysis Presentation Final
Account Analysis Presentation Final
 
Data breaches at home and abroad
Data breaches at home and abroad Data breaches at home and abroad
Data breaches at home and abroad
 
Accounting analysis
Accounting analysisAccounting analysis
Accounting analysis
 

Ă„hnlich wie Ethics for lawyers in the cloud

Practicing Law Online: Creating a Virtual Law Office ebook
Practicing Law Online: Creating a Virtual Law Office ebookPracticing Law Online: Creating a Virtual Law Office ebook
Practicing Law Online: Creating a Virtual Law Office ebookStephanie Kimbro Dolin
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersRobert Ambrogi
 
Cloud
CloudCloud
Cloudalberto0
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersNicole Black
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contractsMeera Kaul
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotatedwdsnead
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydneyanthonywong
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsNehal Madhani
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docxoswald1horne84988
 
Introduction to Virtual Law Practice
Introduction to Virtual Law PracticeIntroduction to Virtual Law Practice
Introduction to Virtual Law PracticeStephanie Kimbro Dolin
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveJanine Anthony Bowen, Esq.
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peteritnewsafrica
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the CloudCourtney Fisk
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110guestd7fc9c
 
10 07-14 hosting con europe 2014 presentation unannotated
10 07-14 hosting con europe 2014 presentation unannotated10 07-14 hosting con europe 2014 presentation unannotated
10 07-14 hosting con europe 2014 presentation unannotatedwdsnead
 
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New TerritoryBy Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territoryassure360
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 

Ă„hnlich wie Ethics for lawyers in the cloud (20)

Practicing Law Online: Creating a Virtual Law Office ebook
Practicing Law Online: Creating a Virtual Law Office ebookPracticing Law Online: Creating a Virtual Law Office ebook
Practicing Law Online: Creating a Virtual Law Office ebook
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
Cloud
CloudCloud
Cloud
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contracts
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerations
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docx
 
Introduction to Virtual Law Practice
Introduction to Virtual Law PracticeIntroduction to Virtual Law Practice
Introduction to Virtual Law Practice
 
Informed consent and cloud computing
Informed consent and cloud computingInformed consent and cloud computing
Informed consent and cloud computing
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the Cloud
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
 
10 07-14 hosting con europe 2014 presentation unannotated
10 07-14 hosting con europe 2014 presentation unannotated10 07-14 hosting con europe 2014 presentation unannotated
10 07-14 hosting con europe 2014 presentation unannotated
 
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New TerritoryBy Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 

KĂĽrzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 

KĂĽrzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Ethics for lawyers in the cloud

  • 1. What the Model Rules are saying about practices in Cyberspace Donna Seyle Lawyer/Writer/Founder LawPracticeStrategy.com
  • 2. Lawyers’ use of cloud computing is growing as the technology becomes safer, the cost-effectiveness becomes more evident, internal productivity increases, and the need to provide a variety of legal services delivery becomes a market imperative. The questions have arisen: the use of technology raises ethical questions related to how lawyers go about choosing cloud vendors, and how they are using cloud products chose. In 2009, the ABA formed a new commission, Ethics 20/20, to investigate just that. As a result, although very few changes have been made to the Model Rules, draft opinions, issue papers seeking comments and their replies have emerged from both the ABA and various state bar associations that address how the rules apply to cloud computing as they are currently written. The Model Rules that have come under scrutiny and will be discussed are:  Confidentiality: Rules 1.6(a) and 1.15  Competence and Diligence: Rules 1.1 and 1.3  Duties to Prospective Clients: Rules 1.18 and 1.2  Unauthorized Practice of Law: Rule 5.5  Duty to Supervise: Rule 5.3
  • 3.  Confidentiality and Safeguarding Property  When client information is transferred and/or stored in a cloud system  Use of 3rd-party cloud applications in communicating  Relinquish control of data  Rule 1.6 standard: lawyers must take “reasonable precautions” to safeguard client information and prevent it from going to unintended recipients during the transmission.  Requires due diligence in vetting your choice of vendor  Includes hiring a technology advisor if lawyer doesn’t feel capable of making effective choices  States have not attempted to define “reasonable care”; technology changes too quickly  Be sure to stay current on any changes in regulation in your state
  • 4.  Requires that the lawyer is thoroughly prepared to provide representation to the client  When applied to cloud computing, requires lawyers to understand the technology and security issues when selecting a cloud service provider and devices  To do so, lawyers must do their due diligence in vetting their chosen vendor  Lawyers must also diligently follow best practices in the use of the technology to insure confidentiality  Lawyers’ best practices include using cloud computing to conduct factual research in representing their client  Must also inform client of their use of cloud software in the act of representation
  • 5. It is reasonable to expect the lawyer to vet the vendor to determine its security protocols. Here is a list of questions lawyers can use:  What kind of facility will host the data and how are they secured?  Who else has access to the facility, servers and data and how is authorization for access determined? How do they screen employees?  Does the contract address confidentiality? If not, is the vendor willing to sign a confidentiality agreement?  How frequently are back-ups performed?  Is data backed up to more than one server? Are they georedundant?  Are all servers located in the United States?  What types of encryption are used, and how are passwords stored? Is data encrypted both in transit and at rest?  Has the vendor been certified by a 3rd party service? Are audits available for review?  Are there redundant power supplies for the servers?  Is there guaranteed uptime?  What remedies are provided for in the event of breach?  What are the data breach notification procedures?  What are your rights upon termination?  Does the vendor carry cyberinsurance?  Be sure to review Service Level Agreement (SLA) and Terms of Service (TOS)
  • 6.  Issue arises in multijurisdictional virtual practice and when providing clients with self-help software solutions  5.5 (a) and (b) restrict a lawyer from practicing in a jurisdiction where she is unlicensed, or establish “systematic and continuous presence” in this jurisdiction  Lawyer’s online presence must make clear where she is authorized to practice  Should have a jurisdiction check built into the cloud system to ensure client’s residency  A virtual lawyer practicing in the state where he is licensed, but resides elsewhere, may establish “systematic and continuous presence”  However, some states have residency requirements and “bona fide office” rules (e.g., New Jersey)  Lawyers offering self-help software: in Texas, they rewrote their rule that self-help using computer software does not substitute for legal services
  • 7.  Managing lawyers must make reasonable efforts to ensure a non-lawyers conduct is compatible with professional obligations of the lawyer  This includes non-lawyer employees, independent contractors such as paralegals, virtual assistants, and any legal process outsourcing company retained by the firm  Use a permissions-based technology system  Conduct an extensive conflicts check or have confidentiality agreements signed  Be certain outsourced contractors are given a copy of the firm’s policy for use of cloud software and social media
  • 8.  International Legal Technology Standards  Virtual Law Practice – by Stephanie Kimbro  Cloud Computing for Lawyers – Nicole Black  Law Practice Management Section – American Bar Association