SlideShare a Scribd company logo
1 of 38
Dennis Garcia, Assistant General Counsel, Microsoft Corporation
, 2017
Legal Ethics
&
The Cloud
@DennisCGarcia
@DennisCGarcia
@DennisCGarcia
• Web Hosted Email
• Rise of “Smartphones”
• Social Media Usage
@DennisCGarcia
http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
@DennisCGarcia
“a fancy way of saying stuff’s not on your computer.” *
*Quinn Norton, “Byte Rights,” Maximum PC, September 2010, at 12.
@DennisCGarcia
@DennisCGarcia
@DennisCGarcia
• Software as a Service (“SaaS”)
• Infrastructure as a Service (“IaaS”)
• Platform as a Service (“PaaS”)
@DennisCGarcia
• Cost Savings
• Scalability
• Improves Productivity
• Focuses on Your Core Business
• Enhanced Security
@DennisCGarcia
• Security
• Bigger Target for Hackers
• Hidden Costs
• Migration of Data
• “Locked In” to Cloud Provider
@DennisCGarcia
• Traditional IT Providers
• “Born in the Cloud” IT Providers
• Small & Newer IT Providers
• Providers from Other Markets
@DennisCGarcia
@DennisCGarcia
@DennisCGarcia
• Long Effort from 2009 – 2012
August 2012 Report
• Long Time for Change – Last
Change was in 2002
• ABA Website = Good
Resources
@DennisCGarcia
Duty of Confidentiality: Rule 1.6
• “Cornerstone” fiduciary duty
• Rule 1.6(a): Protect information “relating to the
representation”
• New Rule 1.6(c): make “reasonable efforts” to
prevent inadvertent/unauthorized disclosure or
unauthorized access to client's info
• New Rule 1.6 Comments [18] and [19]
describe factors in determining “reasonableness”
@DennisCGarcia
Duty of Confidentiality: Rule 1.6
“Reasonableness factors” from new Comment 18:
• the sensitivity of the information
• the likelihood of disclosure if additional safeguards are not employed
• the cost of employing additional safeguards
• the difficulty of implementing the safeguards
• the extent to which the safeguards adversely affect the lawyer’s ability to
represent clients (e.g., by making a device or important piece of software
excessively difficult to use)
A client may require the lawyer to implement special security measures not
required by this Rule or may give informed consent to forgo security measures
that would otherwise be required by this Rule. @DennisCGarcia
Duty of Competence: Rule 1.1
• Rule 1.1: Provide competent representation to client, which
requires the “legal knowledge, skill, thoroughness and
preparation reasonably necessary for any representation”
• New Rule 1.1 Comment [8] to maintain competence: “a lawyer
should keep abreast of the changes in the law and its practice,
including the benefits and risk associated with relevant
technology…..“
@DennisCGarcia
Duty to Communicate with Clients: Rule 1.4
• A lawyer shall promptly inform client of any decision for which
the client's consent is required.
• A lawyer shall reasonably consult with client about means by
which client’s objectives are to be accomplished.
• Questions may arise as to which a client needs to be notified
of a lawyer’s use of cloud computing, whether approval is
required from client, whether client should be involved in cloud
provider’s selection, etc…. @DennisCGarcia
Duty to Supervise: Rule 5.3
• A lawyer who associates with a non-lawyer must make
“reasonable” efforts to ensure that the third party’s conduct is
compatible with the lawyer’s professional obligations.
• New Comment [3] specifically mentions “an internet-based
service to store client information” as an example of a non-
lawyer.”
@DennisCGarcia
Duty to Safekeeping Property: Rule 1.15
• Lawyers need to keep client property appropriately
safeguarded.
• Client property can include files, information and
documents, included those electronically stored.
@DennisCGarcia
• Not Binding
• Good Source of Thought
Leadership
• More Fluid than the Model
Rules
@DennisCGarcia
• 20+ States
• Some States address 3rd
party vendor
storage of client information and not
Cloud
• All said that Cloud can be used by lawyers
so long as reasonable care to protect
client confidential information is embraced
• Few opinions provide specific examples of
reasonable care to protect client
confidential information
@DennisCGarcia
ISBA Opinion No. 16-06
October 2016
@DennisCGarciahttps://www.isba.org/sites/default/files/ethicsopinions/16-06.pdf
@DennisCGarcia
@DennisCGarcia
Get Cloud Technology
Expertise Help!
@DennisCGarcia
Conduct Extensive Due
Diligence on a Cloud Provider
& Document It!
@DennisCGarcia
Select a Highly Reliable &
Trusted Cloud Provider!
@DennisCGarcia
Control
Maintain control of
your data in
provider’s cloud
services
Protect
Committed to the
protection of your data
in provider’s cloud
services
Comply
Meet your compliance
needs when using
provider’s cloud
services
Transparency
Understand what happens with your data in provider’s cloud
Cloud Provider Needs to Inspire Trust
@DennisCGarcia
Sign a Smart Cloud
Contract with a Cloud
Provider!
@DennisCGarcia
#1: Data ownership & usage #6: Security incident notification
#2: Data Protection Agreement #7: Independent verification
#3: Data location specificity #8: Subcontractor commitments
#4: Third party access to data #9: Terms of use/service changes
#5: Comply with applicable laws #10: Service level agreements
@DennisCGarcia
Manage & Monitor Your
Cloud Contract
@DennisCGarcia
Notify Client of Cloud
Usage or Obtain Written
Client Consent!
@DennisCGarcia
Develop a Thoughtful
Written Information
Security Policy (WISP) &
Educate Employees!
@DennisCGarcia
You Don’t Have to
Go “All-In” into the Cloud
Consider Hybrid!
@DennisCGarcia
Questions?
@DennisCGarcia

More Related Content

What's hot

Information governance and blockchain
Information governance and blockchainInformation governance and blockchain
Information governance and blockchainMetataxis
 
An Introduction to Blockchain in Healthcare
An Introduction to Blockchain in HealthcareAn Introduction to Blockchain in Healthcare
An Introduction to Blockchain in HealthcareMelek Somai MD MPH
 
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Edward Bukstel
 
Dv decision makers presentation 310518[1]
Dv decision makers presentation 310518[1]Dv decision makers presentation 310518[1]
Dv decision makers presentation 310518[1]Certus Solutions
 
Mieterstrom, IoT & Blockchain (EN)
Mieterstrom, IoT & Blockchain (EN)Mieterstrom, IoT & Blockchain (EN)
Mieterstrom, IoT & Blockchain (EN)Next Big Thing AG
 
Information lifecycles: a tool for GDPR
Information lifecycles: a tool for GDPRInformation lifecycles: a tool for GDPR
Information lifecycles: a tool for GDPRJisc
 
Big Data Analytics 2017 - Worldpay - Empowering Payments
Big Data Analytics 2017  - Worldpay - Empowering PaymentsBig Data Analytics 2017  - Worldpay - Empowering Payments
Big Data Analytics 2017 - Worldpay - Empowering PaymentsDavid Walker
 
Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summitadministrator_confidis
 
Ibm blockchain summit tokyo sep 11 2019 industrial solutions
Ibm blockchain summit tokyo sep 11 2019 industrial solutionsIbm blockchain summit tokyo sep 11 2019 industrial solutions
Ibm blockchain summit tokyo sep 11 2019 industrial solutionsChristophe Begue
 
Trends of blockchain in 2019
Trends of blockchain in 2019Trends of blockchain in 2019
Trends of blockchain in 2019Pixel Crayons
 
Cybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrencyCybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrencyTony Martin-Vegue
 
Towards a Post-Modern Hash Chain Future
Towards a Post-Modern Hash Chain FutureTowards a Post-Modern Hash Chain Future
Towards a Post-Modern Hash Chain FutureCasey Kuhlman
 
CWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibmCWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibmCapgemini
 
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare:  A Strategy GuideA.Schumacher (2017) Blockchain & Healthcare:  A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare: A Strategy GuideGalen Growth
 
Blockchain & Pharma
Blockchain & PharmaBlockchain & Pharma
Blockchain & PharmaCraig Ford
 

What's hot (20)

Information governance and blockchain
Information governance and blockchainInformation governance and blockchain
Information governance and blockchain
 
An Introduction to Blockchain in Healthcare
An Introduction to Blockchain in HealthcareAn Introduction to Blockchain in Healthcare
An Introduction to Blockchain in Healthcare
 
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
 
Dv decision makers presentation 310518[1]
Dv decision makers presentation 310518[1]Dv decision makers presentation 310518[1]
Dv decision makers presentation 310518[1]
 
Mieterstrom, IoT & Blockchain (EN)
Mieterstrom, IoT & Blockchain (EN)Mieterstrom, IoT & Blockchain (EN)
Mieterstrom, IoT & Blockchain (EN)
 
Information lifecycles: a tool for GDPR
Information lifecycles: a tool for GDPRInformation lifecycles: a tool for GDPR
Information lifecycles: a tool for GDPR
 
Big Data Analytics 2017 - Worldpay - Empowering Payments
Big Data Analytics 2017  - Worldpay - Empowering PaymentsBig Data Analytics 2017  - Worldpay - Empowering Payments
Big Data Analytics 2017 - Worldpay - Empowering Payments
 
Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
 
Legal Engineering
Legal EngineeringLegal Engineering
Legal Engineering
 
Ibm blockchain summit tokyo sep 11 2019 industrial solutions
Ibm blockchain summit tokyo sep 11 2019 industrial solutionsIbm blockchain summit tokyo sep 11 2019 industrial solutions
Ibm blockchain summit tokyo sep 11 2019 industrial solutions
 
Trends of blockchain in 2019
Trends of blockchain in 2019Trends of blockchain in 2019
Trends of blockchain in 2019
 
Legal Services
Legal ServicesLegal Services
Legal Services
 
Cybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrencyCybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrency
 
Towards a Post-Modern Hash Chain Future
Towards a Post-Modern Hash Chain FutureTowards a Post-Modern Hash Chain Future
Towards a Post-Modern Hash Chain Future
 
CWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibmCWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibm
 
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare:  A Strategy GuideA.Schumacher (2017) Blockchain & Healthcare:  A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Blockchain & Pharma
Blockchain & PharmaBlockchain & Pharma
Blockchain & Pharma
 

Similar to Dcg cba legal ethics and the cloud final 06.20.17

3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputationNikec Solutions
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersRobert Ambrogi
 
Moving to the Cloud: Client Communication Best Practices for Law Firms
Moving to the Cloud: Client Communication Best Practices for Law FirmsMoving to the Cloud: Client Communication Best Practices for Law Firms
Moving to the Cloud: Client Communication Best Practices for Law FirmsClio - Cloud-Based Legal Technology
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThis account is closed
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
In-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain TechnologiesIn-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain Technologiesdsapps
 
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...Jeff Kelly
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksNicole Garton
 
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30This account is closed
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...Prasanna Hegde
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011Donald E. Hester
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersNicole Black
 
7 reasons why law firms digitise their client matter
7 reasons why law firms digitise their client matter7 reasons why law firms digitise their client matter
7 reasons why law firms digitise their client matterNikec Solutions
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think Uni Systems S.M.S.A.
 

Similar to Dcg cba legal ethics and the cloud final 06.20.17 (20)

Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
Moving to the Cloud: Client Communication Best Practices for Law Firms
Moving to the Cloud: Client Communication Best Practices for Law FirmsMoving to the Cloud: Client Communication Best Practices for Law Firms
Moving to the Cloud: Client Communication Best Practices for Law Firms
 
Cloud Technology & Law Firms
Cloud Technology & Law FirmsCloud Technology & Law Firms
Cloud Technology & Law Firms
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud Services
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
In-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain TechnologiesIn-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain Technologies
 
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the Risks
 
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
 
7 reasons why law firms digitise their client matter
7 reasons why law firms digitise their client matter7 reasons why law firms digitise their client matter
7 reasons why law firms digitise their client matter
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 

Recently uploaded

SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Companyaneesashraf6
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 

Recently uploaded (20)

SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Company
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 

Dcg cba legal ethics and the cloud final 06.20.17

  • 1. Dennis Garcia, Assistant General Counsel, Microsoft Corporation , 2017 Legal Ethics & The Cloud @DennisCGarcia
  • 4. • Web Hosted Email • Rise of “Smartphones” • Social Media Usage @DennisCGarcia
  • 6. “a fancy way of saying stuff’s not on your computer.” * *Quinn Norton, “Byte Rights,” Maximum PC, September 2010, at 12. @DennisCGarcia
  • 9. • Software as a Service (“SaaS”) • Infrastructure as a Service (“IaaS”) • Platform as a Service (“PaaS”) @DennisCGarcia
  • 10. • Cost Savings • Scalability • Improves Productivity • Focuses on Your Core Business • Enhanced Security @DennisCGarcia
  • 11. • Security • Bigger Target for Hackers • Hidden Costs • Migration of Data • “Locked In” to Cloud Provider @DennisCGarcia
  • 12.
  • 13. • Traditional IT Providers • “Born in the Cloud” IT Providers • Small & Newer IT Providers • Providers from Other Markets @DennisCGarcia
  • 16. • Long Effort from 2009 – 2012 August 2012 Report • Long Time for Change – Last Change was in 2002 • ABA Website = Good Resources @DennisCGarcia
  • 17. Duty of Confidentiality: Rule 1.6 • “Cornerstone” fiduciary duty • Rule 1.6(a): Protect information “relating to the representation” • New Rule 1.6(c): make “reasonable efforts” to prevent inadvertent/unauthorized disclosure or unauthorized access to client's info • New Rule 1.6 Comments [18] and [19] describe factors in determining “reasonableness” @DennisCGarcia
  • 18. Duty of Confidentiality: Rule 1.6 “Reasonableness factors” from new Comment 18: • the sensitivity of the information • the likelihood of disclosure if additional safeguards are not employed • the cost of employing additional safeguards • the difficulty of implementing the safeguards • the extent to which the safeguards adversely affect the lawyer’s ability to represent clients (e.g., by making a device or important piece of software excessively difficult to use) A client may require the lawyer to implement special security measures not required by this Rule or may give informed consent to forgo security measures that would otherwise be required by this Rule. @DennisCGarcia
  • 19. Duty of Competence: Rule 1.1 • Rule 1.1: Provide competent representation to client, which requires the “legal knowledge, skill, thoroughness and preparation reasonably necessary for any representation” • New Rule 1.1 Comment [8] to maintain competence: “a lawyer should keep abreast of the changes in the law and its practice, including the benefits and risk associated with relevant technology…..“ @DennisCGarcia
  • 20. Duty to Communicate with Clients: Rule 1.4 • A lawyer shall promptly inform client of any decision for which the client's consent is required. • A lawyer shall reasonably consult with client about means by which client’s objectives are to be accomplished. • Questions may arise as to which a client needs to be notified of a lawyer’s use of cloud computing, whether approval is required from client, whether client should be involved in cloud provider’s selection, etc…. @DennisCGarcia
  • 21. Duty to Supervise: Rule 5.3 • A lawyer who associates with a non-lawyer must make “reasonable” efforts to ensure that the third party’s conduct is compatible with the lawyer’s professional obligations. • New Comment [3] specifically mentions “an internet-based service to store client information” as an example of a non- lawyer.” @DennisCGarcia
  • 22. Duty to Safekeeping Property: Rule 1.15 • Lawyers need to keep client property appropriately safeguarded. • Client property can include files, information and documents, included those electronically stored. @DennisCGarcia
  • 23. • Not Binding • Good Source of Thought Leadership • More Fluid than the Model Rules @DennisCGarcia
  • 24. • 20+ States • Some States address 3rd party vendor storage of client information and not Cloud • All said that Cloud can be used by lawyers so long as reasonable care to protect client confidential information is embraced • Few opinions provide specific examples of reasonable care to protect client confidential information @DennisCGarcia
  • 25. ISBA Opinion No. 16-06 October 2016 @DennisCGarciahttps://www.isba.org/sites/default/files/ethicsopinions/16-06.pdf
  • 28. Get Cloud Technology Expertise Help! @DennisCGarcia
  • 29. Conduct Extensive Due Diligence on a Cloud Provider & Document It! @DennisCGarcia
  • 30. Select a Highly Reliable & Trusted Cloud Provider! @DennisCGarcia
  • 31. Control Maintain control of your data in provider’s cloud services Protect Committed to the protection of your data in provider’s cloud services Comply Meet your compliance needs when using provider’s cloud services Transparency Understand what happens with your data in provider’s cloud Cloud Provider Needs to Inspire Trust @DennisCGarcia
  • 32. Sign a Smart Cloud Contract with a Cloud Provider! @DennisCGarcia
  • 33. #1: Data ownership & usage #6: Security incident notification #2: Data Protection Agreement #7: Independent verification #3: Data location specificity #8: Subcontractor commitments #4: Third party access to data #9: Terms of use/service changes #5: Comply with applicable laws #10: Service level agreements @DennisCGarcia
  • 34. Manage & Monitor Your Cloud Contract @DennisCGarcia
  • 35. Notify Client of Cloud Usage or Obtain Written Client Consent! @DennisCGarcia
  • 36. Develop a Thoughtful Written Information Security Policy (WISP) & Educate Employees! @DennisCGarcia
  • 37. You Don’t Have to Go “All-In” into the Cloud Consider Hybrid! @DennisCGarcia