As online practice management solutions and cloud technology become increasingly prevalent, lawyers face the challenge of assuaging client concerns around the security and confidentiality of hosted online data. They also face the task of gaining informed consent from clients when using such tools for engagement and information management.
How can lawyers implement and use secure communication tools, online client portals, and online practice management solutions while protecting themselves from the confidentiality rules that govern such technologies?
Register now for this webinar with legal technology expert Chad Burton, who will go over salient facts that lawyers need to know when engaging with clients in the cloud, including:
• State ethics opinions on using cloud computing vendors
• Obtaining informed client consent
• Common client concerns related to cloud computing
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
Continuing legal education (CLE) presentation regarding data confidentiality, information security, computer forensics and legal ethics in light of technology-related changes made to the American Bar Association's Model Rules of Professional Conduct.
Cyber Liability Coverage in the Marketplace with Dan CotterButlerRubin
Butler Rubin partner Daniel A. Cotter discussed the Model Rules of Professional Conduct (RPCs) as they relate to lawyers’ technology obligations at the National Association of Bar Related Insurance Companies (NABRICO) 2017 Annual Conference hosted by ISBA Mutual in Chicago, IL. Dan joined a panel of experts including Michael Hannigan (Konicek & Dillon), Alex Ricardo (Beazley Group), and Daniel Zureich (Lawyers Mutual Insurance Company of North Carolina) to discuss, “Cyber Liability Coverage in the Marketplace.” Dan emphasized the need for the insurers to consider what the reasonable standard is for lawyers and to help frame the answer. Dan also addressed some recent cyber-related decisions and cases pending.
For more information on developments in the cyber insurance and privacy areas, contact Dan Cotter (dcotter@butlerrubin.com).
The internet as a corporate security resourceDan Michaluk
One hour presentation to in house lawyers at a federally regulated employer. Analysis is based on Canadian federal privacy legislation (PIPEDA) and Ontario Rules of Professoinal Conduct.
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
Continuing legal education (CLE) presentation regarding data confidentiality, information security, computer forensics and legal ethics in light of technology-related changes made to the American Bar Association's Model Rules of Professional Conduct.
Cyber Liability Coverage in the Marketplace with Dan CotterButlerRubin
Butler Rubin partner Daniel A. Cotter discussed the Model Rules of Professional Conduct (RPCs) as they relate to lawyers’ technology obligations at the National Association of Bar Related Insurance Companies (NABRICO) 2017 Annual Conference hosted by ISBA Mutual in Chicago, IL. Dan joined a panel of experts including Michael Hannigan (Konicek & Dillon), Alex Ricardo (Beazley Group), and Daniel Zureich (Lawyers Mutual Insurance Company of North Carolina) to discuss, “Cyber Liability Coverage in the Marketplace.” Dan emphasized the need for the insurers to consider what the reasonable standard is for lawyers and to help frame the answer. Dan also addressed some recent cyber-related decisions and cases pending.
For more information on developments in the cyber insurance and privacy areas, contact Dan Cotter (dcotter@butlerrubin.com).
The internet as a corporate security resourceDan Michaluk
One hour presentation to in house lawyers at a federally regulated employer. Analysis is based on Canadian federal privacy legislation (PIPEDA) and Ontario Rules of Professoinal Conduct.
Cloud computing in Australia - Separating hype from realityRussell_Kennedy
The growth of cloud computing in Australia has been exponential and analysts forecast that cloud computing will dominate the Australian IT landscape within the next decade.
It has a reputation for delivering economies of scale, reducing overheads and driving increased efficiencies within organisations. However, the reality is that, like any IT procurement, implementing a cloud computing solution for your business still requires careful planning, effective project management, robust contracts and sound oversight.
Russell Kennedy Lawyers delve into the risks and rewards of adopting Cloud Computing in Australia.
One thing's for sure, there are many choices when it comes to hardware, software and everything in between. How can you know if you have the right infrastructure for moving forward? Many organizations have an IT Assessment done as their organizations grow to determine the best strategic plan for moving forward.
The cloud provides freedom to innovate, cost reduction and ramp-up speed but introduces new threats that must be analyzed and balanced in order to take the most of it in a secure manner.
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
Butler Rubin Partner, Dan Cotter discusses in detail the changes to the Model Rules of Professional Conduct that impact lawyers and their obligations to understand technology and safeguard against inadvertent data breaches.
Managing Data Breach Communication on The Social WebBoyd Neil
This is an update on a presentation I made a year ago on data breaches. It includes a couple of slides on social web comment on the Heartbleed bug, in particular the role of Twitter as the key platform for comment.
ControlCase discusses the following: - What is GDPR? - How will it impact me? - How can I become compliant? - What is the timeline? - What are consequences if not met?
Cloud Computing Legal Risks And Best Practiceslisaabe
Cloud Computing: Legal Risks and Best Practices
1. Security and Data Privacy.
2. Recent OPC Guidelines.
3. Compliance Issues.
4. Negotiating Contracts with Cloud Providers.
5. New Trends and Challenges.
6. Practical Tips
Cloud computing in Australia - Separating hype from realityRussell_Kennedy
The growth of cloud computing in Australia has been exponential and analysts forecast that cloud computing will dominate the Australian IT landscape within the next decade.
It has a reputation for delivering economies of scale, reducing overheads and driving increased efficiencies within organisations. However, the reality is that, like any IT procurement, implementing a cloud computing solution for your business still requires careful planning, effective project management, robust contracts and sound oversight.
Russell Kennedy Lawyers delve into the risks and rewards of adopting Cloud Computing in Australia.
One thing's for sure, there are many choices when it comes to hardware, software and everything in between. How can you know if you have the right infrastructure for moving forward? Many organizations have an IT Assessment done as their organizations grow to determine the best strategic plan for moving forward.
The cloud provides freedom to innovate, cost reduction and ramp-up speed but introduces new threats that must be analyzed and balanced in order to take the most of it in a secure manner.
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
Butler Rubin Partner, Dan Cotter discusses in detail the changes to the Model Rules of Professional Conduct that impact lawyers and their obligations to understand technology and safeguard against inadvertent data breaches.
Managing Data Breach Communication on The Social WebBoyd Neil
This is an update on a presentation I made a year ago on data breaches. It includes a couple of slides on social web comment on the Heartbleed bug, in particular the role of Twitter as the key platform for comment.
ControlCase discusses the following: - What is GDPR? - How will it impact me? - How can I become compliant? - What is the timeline? - What are consequences if not met?
Cloud Computing Legal Risks And Best Practiceslisaabe
Cloud Computing: Legal Risks and Best Practices
1. Security and Data Privacy.
2. Recent OPC Guidelines.
3. Compliance Issues.
4. Negotiating Contracts with Cloud Providers.
5. New Trends and Challenges.
6. Practical Tips
Presentation to the Texas Bar CLE program on Contract Drafting, Review and Negotiation on December 5, 2017 in Austin, Texas, by Cybersecurity & Data Privacy Attorney Shawn Tuma, on October 19, 2017. For more information visit www.businesscyberrisk.com
Law firm cybersecurity in the cloud
According to the 2017 ABA Legal Technology Survey, 22% of law firms faced a cyberattack or data breach—and you don’t want your firm to be one of them.
That’s why staying up to date with the latest legal technology is key to managing your firm’s cybersecurity and keeping your clients’ data as secure as possible.
Learn how law firms can utilize cloud technology to create greater cybersecurity than what they have now.
In this CLE-eligible webinar, you’ll learn:
Top cybersecurity risks for law firms
How to eliminate high cyber-risk vectors
How to recover from a cyber incident
Duration: 60 minutes
https://landing.clio.com/law-firm-cybersecurity.html
With cloud technology, lawyers have greater power to control their work/life balance, cut costs, and deliver better services to their clients.
The catch is that lawyers must now extend their traditional duties of competency and confidentiality into these new tools. But how can they do so in a safe and ethical way?
In this CLE-eligible webinar, you’ll learn:
What is the cloud?
The benefits and risks of cloud technology
Cloud concerns specific to legal professionals
How to select a cloud vendor
Recording: https://landing.clio.com/does-cloud-technology-belong-at-your-law-firm-recording.html
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016centralohioissa
Key legal data security concerns for 2016; Privacy and security preparation; Vendor management; When and how to engage outside counsel & advisors; EU Privacy update; Sample enforcement actions.
MyComplianceOffice presents our Oct 26th webinar, “ Prepare Your Firm for GDPR", co-hosted by MCO and Emily Mahoney a Technology Lawyer at Mason Hayes & Curran
OCBA Cloud 9: Cloud Computing and Ethics for Florida AttorneysDaniel Whitehouse
Presentation given to Orange County Bar Association members in February 2014. Discusses Florida Ethics Opinion 12-3, real-world examples of ethical pitfalls Florida attorneys could face, and how to avoid those pitfalls.
Lessons learned from experience
Given the rapid development of legal technology in recent years, it can be difficult to keep up with what's available and what's suitable for use within the legal profession.
Balancing different services—and ensuring minimal overlap—is also crucial to ensuring your purchasing decisions give the most value to your business.
Date: Tuesday, March 20, 2018
Time: 11 a.m. PT | 2 p.m. ET
Join Joshua Lenon, Clio’s Lawyer in Residence, as he shares how to evaluate and plan a comprehensive legal technology approach for your practice. In this 1-hour session, you'll learn about:
- Ethical and business considerations to take into account.
- Resources for vetting legal technology services.
- Lessons learned from Clio's experience working with law firms, bar associations, and courts over the last 10 years.
Don't be a robot: You can't automate your ethical considerationsNehal Madhani
Technology--especially given its exponential growth--allows attorneys to streamline their practices and automate previously manual aspects of their legal work. While technology can save attorneys time and allow them to focus their attention on more substantive tasks, attorneys are often leary of its ethical pitfalls.
This presentation addresses attorneys’ technological options and obligations and explains how to successfully incorporate technology into your legal practice.
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
Cybersecurity & Data Privacy Attorney Shawn Tuma delivered the presentation Legal Issues Associated with Third-Party Risk at the ISACA CSX 2017 North America conference in Washington, DC.
Similar to Informed consent and cloud computing (20)
With more than 50% of clients turning to search engines to find a lawyer, Google’s Local Services Ads in Clio are a simple, cost-effective way to appear when and where clients are searching.
Join Elyse Goldman from Google and Joe Runkle from Runkle Law at our upcoming webinar to see how you can start attracting the right clients today, without having to be a marketing expert.
You’ll learn:
What Google’s Local Services Ads are and how they work
How to appear at the top of Google search results to attract high-intent leads in your area easily, and at the right price
How this firm used Google Local Service Ads in Clio to get a return-on-investment of 10x on his marketing dollars
Are you looking to enhance the client intake processes at your firm?
By automating repetitive tasks and streamlining communication channels, you can efficiently manage client inquiries, provide timely responses, and create a smooth experience for potential clients.
Join us for a live product walkthrough with Clio's product experts, Aamnah Izhar and Alice Wang, as they showcase how to:
Leverage text messaging and automated emails for seamless communication
Streamline and log communications for efficient tracking
Integrate Clio Grow with MailChimp to optimize client engagement
Plus, you'll learn how to unlock the full power of Clio, and achieve seamless firm management, by syncing Clio Grow and Clio Manage.
See how Natasha Nazareth (Founder of Nazareth Bonifacino Law) and Mechelle Woznicki (Founder of Woznicki Law) use Clio Grow with Manage to:
Prepare for time off and get work done ahead of time
Automate tasks to be completed while their out
Set their firm up for success with a coverage plan
Say goodbye to summer-work stress and embrace a worry-free vacation with the power of Clio Grow.
Owning and operating a solo practice comes with its own unique challenges. Since client experiences are still fast-evolving, solos need to find new ways to distinguish themselves from larger firms—and to stay at the forefront of innovation.
This report looks at what distinguishes solos across multiple perspectives—including financial performance, personal and professional well-being, and client relationships.
What is your law firm doing to stand out and stay ahead of the latest legal trends in 2023? This free webinar can help you to decide.
Join our experts for a deep-dive into the 2022 Legal Trends Report, where they discuss how to use the report’s findings to set your law firm and employees up for success.
Learn the biggest takeaways from Clio’s research, including:
How law firms are navigating an increasingly competitive landscape
Employment trends and what today’s legal professionals have to say about their workplace
What clients look for when hiring a lawyer
See how Clio’s cloud-based legal software helps family lawyers like you streamline work so you can focus on what matters the most—being there for your clients.
The latest product releases and updates across Clio Manage, Clio Grow, and Lawyaw.
Clio strives to transform the legal experience for all, including saving you time so that you can have a work-life balance. 2023 is just around the corner so why not gear up for the new year by optimizing your firm to reclaim your time back!
In this session, you’ll learn about the top features and releases across Clio Manage, Clio Grow, and Lawyaw this year. You’ll hear from Clio product experts who will go over how you can reduce the top time wastes modern law firms face.
This webinar will cover the following areas and more:
Clio Manage: Texting messaging, tasks, user permissions, calendars, billing, account reconciliation, court rules and reports
Clio Grow: Pipeline, automated reminders and website builder
Lawyaw: Court forms, reusable templates and e-signatures
Your law firm has been operating for one year: now what? Join Clio and four intrepid founders as they discuss how to go from start-up to established success story.
You know your firm provides exceptional legal services—do your prospective clients know that? Learn about driving great experiences that lead to 5-star reviews and help your firm stand out from the competition.
Your law firm is unique and your practice management software should enable you to work the way you want to work. A lot of legal software makes you work in a prescriptive way, but Clio has the tools and integrations to give you the choice to do things your way.
It’s why Clio and Klyant are coming together for our next webinar Clio App Spotlight: How Clio and Kylant integrate to provide a compliant and remote law firm solution.
Join this 1-hour deep-dive into the 2022 Legal Trends Report to discuss what the data means and how to use it to set your law firm and employees up for success.
See how firms like yours are turning stress into collection’s success by using these features already in your account that handle time-consuming billing tasks for you.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
6. Lawyers’Duties
• Communication
• Respond to or acknowledge client communications
• Diligence
6
• On behalf of your client
• Competence
• Awareness of changes in the law & practice
• Benefits and of relevant technology
• Continuity
• Records retention
• Confidentiality
6
7. R. 1.6 - Confidentiality
• Lawyers must make reasonable efforts to prevent the
inadvertent or unauthorized disclosure of, or unauthorized
access to, information relating to the representation of a
client.
• Exemptions exist
• Disclosure is impliedly authorized in order to carry out
representation of the client’s interests
• Duty extends to the use of nonlawyers assisting the lawyer
• R. 5.3
8. Rules specifically allow lawyers to
disclose confidential client
information with informed consent.
9. Informed Consent
• “The agreement by a person to a proposed course of conduct
after the lawyer has communicated adequate information and
explanation about the material risks of and reasonably
available alternatives to the proposed course of conduct.”
• Affirmative Response is Required
• Written Affirmation NOT Required on Disclosing Confidential
Information
10. Informed Consent
• Requirements
• Lawyer must make reasonable efforts to inform
• Client possesses information reasonably adequate to make an
informed decision
• Reasonable Standard
• Reasonably prudent and competent lawyer
• R. 1.0(H)
11. Reasonable and Cloud Computing
• Basic understanding of electronic protections afforded by
technology
• Consultation with experts
• Use providers that have
• Reasonable security procedures
• Understanding of lawyers’ professional obligations
12. Security Procedures
• explicitly agrees that it has no ownership or security interest in the data;
• has an enforceable obligation to preserve security;
• will notify the lawyer if requested to produce data to a third party, and provide the lawyer
with the ability to respond to the request before the provider produces the requested
information;
• has technology built to withstand a reasonably foreseeable attempt to infiltrate data,
including penetration testing;
• includes in its “Terms of Service” or “Service Level Agreement” an agreement about how
confidential client information will be handled;
• provides the firm with right to audit the provider’s security procedures and to obtain copies
of any security audits performed;
• will host the firm’s data only within a specified geographic area. If by agreement, the data
are hosted outside of the United States, the law firm must determine that the hosting
jurisdiction has privacy laws, data security laws, and protections against unlawful search
and seizure that are as rigorous as those of the United States and Pennsylvania;
• provides a method of retrieving data if the lawyer terminates use of the SaaS product, the
SaaS vendor goes out of business, or the service otherwise has a break in continuity; and,
• provides the ability for the law firm to get data “off” of the vendor’s or third party data
hosting company’s servers for the firm’s own use or in-house backup offline.
14. TRUSTe – Privacy Policy
• How is sensitive information being handled?
“ TRUSTe ’ s program requirements are based
upon the Fair Information Principles and OCED
Guidelines around notice, choice, access,
security, and redress - the core foundations of
privacy and building trust.
Sealholders are
required to undergo a rigorous review process
to assess the accuracy of privacy disclosures and
compliance with TRUSTe’s requirements in order
to obtain certification.”
16. Conclusion
• Lawyers’ duty of confidentiality can be a
mine field
• Reasonable efforts on the part of the
lawyer are required to use any tool that
may risk disclosure – including cloud
computing
• Informed consent protect lawyers from
misconduct claims
Editor's Notes
First drafted in 1983 and adopted by 52 jurisdictions, the MRPC has guided the responsibilities and actions of lawyers for decades. These rules are designed to promote competence and diligence by lawyers in representing the interests of clients. Several duties are imposed on lawyers as part of these rules, including those of confidentiality.
In the official comments associated with the rules creating the duty of confidentiality, the MRPC discusses some factors that can govern the reasonable efforts a lawyer must take to maintain confidentiality. These factors can include:the sensitivity of the information, the likelihood of disclosure if additional safeguards are not employed, the cost of employing additional safeguards, the difficulty of implementing the safeguards, and the extent to which the safeguards adversely affect the lawyer’s ability to represent clients.
In order to consider a client informed, a lawyer must make reasonable efforts to ensure that the client or other person possesses information reasonably adequate to make an informed decision. Clients should be made aware of the material advantages and disadvantages of the proposed course of conduct and a discussion of the client's or other person's options and alternatives as part of informing the client. Lawyers must also promptly inform the client of any decision or circumstance with respect to which the client's informed consent.Model Rules of Prof'l Conduct R. 1.0 cmt. 6.Id.Model Rules of Prof'l Conduct R. 1.4(a)(1).Competency includes keeping abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology. In determining whether the information and explanation provided are reasonably adequate, relevant factors include whether the client or other person is experienced in legal matters generally and in making decisions of the type involved, and whether the client or other person is independently represented by other counsel in giving the consent.Model Rules of Prof'l Conduct R. 1.1 cmt. 8.Model Rules of Prof'l Conduct R. 1.0 cmt. 6.
Pennsylvania Bar Association Committee On Legal Ethics And Professional Responsibility, “Ethical Obligations For Attorneys Using Cloud Computing/ Software As A Service While Fulfilling The Duties Of Confidentiality And Preservation Of Client Property.” (Formal Opinion 2011-200).