Mobile Practice Management 
Joshua Lenon 
Lawyer-in-Residence 
Clio
Agenda 
1. Mobile Overview 
2. Applying best practices to mobile in your law 
practice 
3. Questions
MOBILE OVERVIEW
Rise of Mobile Computing 
• Computers now account for only 20.2% of 
computing device sales 
• Tablets are 14.6% 
– Expected to exceed computer sales in 2015 
• Cellphones account for 65% of all device sales 
Photo%by%emma.marie%on%Flickr%under%Crea6ve%Commons%License% 
Source:%Financial%Times,%“Tablet%sales%set%% 
to%overtake%PCs,”%09/12/2013%
Source:%Interna6onal%Data%Corpora6on,%“Tablet%Shipments%Forecast%to%Top%Total%PC%% 
Shipments%in%the%Fourth%Quarter%of%2013%and%Annually%by%2015,%According%to%IDC”%% 
09/11/2013%
Mobile Computing in Law Firms 
• 88% of lawyers have access to a smartphone 
– 77% of lawyers have used a smartphone for law-related 
tasks 
• 52% of lawyers have access to a tablet 
• 83% of firms allow personal mobile devices to 
access firm’s network 
• 25% of firms do not know if they have ever 
experienced a security breach 
Photo%by%ABC%Archive%on%Flickr%under%Crea6ve%Commons%License% 
Source:%2013%ABA%Legal%Technology% 
Survey%Report%
Risks of Mobile Computing 
• Loss of Device 
– 1/3 of robberies involves the theft of a mobile 
phone 
– 142,708 smartphones were reported lost in 
2011 
– Accidental damage is 10 x more common than 
loss or theft 
Photo%by%The%Other%Dan%on%Flickr%under%Crea6ve%Commons%License% 
Sources:%NBC%News,%McAfee,%&% 
SquareTrade%
Risks of Mobile Computing 
• Device Confiscation 
– U.S. Border Guards can seize & search devices 
with “reasonable suspicion” - United States v. 
Cotterman, 709 F.3d 952 (9th Cir., 2013) 
– Police can search cell phones that lack password 
protection - R. v. Fearon, 2013 ONCA 106 
(CanLII) 
– Person has a high expectation of privacy in a cell 
phone's contents - Smallwood v. State (Fla., 
2013) 
Photo%by%Joseph%Kranak%on%Flickr%under%Crea6ve%Commons%License%
Risks of Mobile Computing 
• Device Confiscation 
– Riley v. California 
• Search Incident to Arrest in 
California 
– United States v. Wurie 
• 1st District Requires Search Warrant 
Photo%by%Joseph%Kranak%on%Flickr%under%Crea6ve%Commons%License%
Risks of Mobile Computing 
• Big Data collection 
– One in four law-enforcement agencies have 
used a tactic known as a "tower dump” 
– Stingray devices used by FBI & at least 25 law 
enforcement agencies in 33 states 
Photo%by%Jason%Ahrns%on%Flickr%under%Crea6ve%Commons%License% 
Sources:%USA%Today,%“Cellphone%data%spying:%It's%not% 
just%the%NSA,”%%August%12,%2013%
Consequences 
• Unauthorized access to client 
information 
• Inability to act with diligence and 
promptness 
Photo%by%Ma[%Hurst%on%Flickr%under%Crea6ve%Commons%License%
Mobile Security Procedures 
• Password protect your device 
• Back up your device regularly 
• Register with device location services 
• Store data in Cloud services
APPLYING BEST PRACTICES 
TO MOBILE PHONES
Passwords
Backup Regularly
Backup Regularly
Location Services
Location Services
Password Protection
Password Protection
Extra Security
Extra Security
Cloud Stored Client Data
Cloud Stored Client Data
Cloud Stored Client Data
Cloud Stored Client Data
Cloud Stored Client Data
Cloud Stored Client Data
Cloud Stored Client Data
Security for Other Devices
CONCLUSION
Mobile Security Procedures 
• Password protect your device 
• Back up your device regularly 
• Register with device location services 
• Store data in Cloud services
QUESTIONS?
Thank You 
Joshua Lenon 
joshua@goclio.com 
@JoshuaLenon 
Linkedin.com/in/joshualenon

Mobile practice management philly bar 2014 handout