The Ethics of Cloud Lawyering
Yaacov Silberman, Rimon, P.C.

Date: August 10, 2011
Yaacov Silberman
•Director of Operations at Rimon
•Debt Finance Group at Ropes &
Gray, LLP

•Assistant Director (Web Content)
at TheLaw.com

•University of Pennsylvania Law
School (J.D.)

•Yeshiva University (B.A.)
•Casual Geek
What is “Cloud
Computing”?

What are the ethical
concerns?
 ✤Rules of Professional
  Conduct
 ✤State Bar Opinions


How do I evaluate a
vendor?
e Cl oud?
   hat is th
1.W
Cloud Computing Pyramid
Infrastructure




Cloud Computing Pyramid
Platform




Cloud Computing Pyramid
Application




Cloud Computing Pyramid
2. Ethical Concerns
COMPETENCE
COMPETENCE
 MRPC 1.1: A lawyer shall provide
 competent representation to a client.
 Competent representation requires the
 legal knowledge, skill, thoroughness
 and preparation reasonably necessary
 for the representation.
COMPETENCE
 MRPC 1.1: A lawyer shall provide
 competent representation to a client.
 Competent representation requires the
 legal knowledge, skill, thoroughness
 and preparation reasonably necessary
 for the representation.



         CA Rule 3-110. Failing to
         Act Competently.
         (A) A member shall not
         intentionally, recklessly, or
         repeatedly fail to perform
         legal services with
         competence.
Confidentiality
Confidentiality
MRPC 1.6 (a): A lawyer shall
not reveal information relating to
the representation of a client unless
the client gives informed consent,
[or] the disclosure is impliedly
authorized in order to carry out the
representation . . . .
Confidentiality
MRPC 1.6 (a): A lawyer shall
not reveal information relating to
the representation of a client unless
the client gives informed consent,
[or] the disclosure is impliedly
authorized in order to carry out the
representation . . . .

             CA Rule 3-100.
             Confidential Information of
             a Client.

             (A) A member shall not
             reveal information protected
             from disclosure by Business
             and Professions Code section
             6068, subdivision (e)(1)
             without the informed
             consent of the client . . . .
THE STATE BAR OF CALIFORNIA
STANDING COMMITTEE ON
PROFESSIONAL RESPONSIBILITY AND
CONDUCT
FORMAL OPINION NO. 2010-179




Does an attorney violate the duties of
confidentiality and competence he or she owes to
a client by using technology to transmit or store
confidential client information when the
technology may be susceptible to unauthorized
access by third parties?
THE STATE BAR OF CALIFORNIA
STANDING COMMITTEE ON




                                      s
PROFESSIONAL RESPONSIBILITY AND




                                    d
CONDUCT




                                  n
FORMAL OPINION NO. 2010-179




              e p e
Does an attorney violate the duties of


             D
confidentiality and competence he or she owes to


         I t
a client by using technology to transmit or store
confidential client information when the
technology may be susceptible to unauthorized
access by third parties?
Exercise Caution
Credit: Mike Johnson -
 TheBusyBrain.com
Credit: Mike Johnson -
 TheBusyBrain.com
Credit: Mike Johnson -
 TheBusyBrain.com
What
precautions
can I take?




    Who can
   access my
     data?
Credit: BFIShadow
Ask for Help
Date
An Urgent Situation
3. Evaluating Cloud
     Vendors
VENDOR
VENDOR




Security
VENDOR




Security
                    Privacy
VENDOR




           Security
                                       Privacy




Physical              Application
Security               Security
VENDOR




           Security
                                       Privacy




Physical              Application
Security               Security
https://
VENDOR




           Security
                                        Privacy




Physical              Application
Security               Security

                        https://
VENDOR




           Security
                                        Privacy




Physical              Application
Security               Security

                        https://
I n t he e v e n t T h e mis Solution s In c.
goes t h r ou g h a bus in es s tr a n s ition ,
s uc h as a me r ge r , acq uisition b y
an ot h e r c omp an y, or sa le of a ll or a
po r t io n o f it s as s e ts , y our p e r s on a lly
id ent i fi ab l e in f o r mation will like ly
be am o n g t h e a s s e ts tra nsferred. You
w il l be n ot if i e d v i a e mail a n d a
           no t ie         ia ma il
pr o mi ne n t n o t ic e on our We b s ite for
30 da ys o f an y s uc h ch a n ge in
ow n er s hi p o r c o n t rol of y our
pe r s o n al in f o r mat ion .
                  - Cl io P ra ctice M an a gemen t
Free/Low Cost   Paid/Enterprise


Storage
/Sharing




Backup
Free/Low Cost                     Paid/Enterprise


Storage
/Sharing


             “Dropbox cooperates with government and law enforcement
             officials and private parties to enforce and comply with the
             law. We will disclose any information about you to
Backup       government or law enforcement officials or private parties as
             we, in our sole discretion, believe necessary or appropriate to
             respond to claims and legal process (including but not limited
             to subpoenas)”
Free/Low Cost                  Paid/Enterprise

              “Decho does not disclose Personal Data,
Storage       including the data you back up with the Service,
              unless disclosure is necessary to comply with an
/Sharing      enforceable government request such as a
              warrant.”




Backup
Free/Low Cost                        Paid/Enterprise


Storage
/Sharing


           “. . . the receiving party will (a) use such Confidential Information
           solely for the purposes for which it is provided; (b) not disclose such
           Confidential Information to any third party; . . . The foregoing will

Backup     not apply to any use or disclosure that is (i) required by applicable
           law, legal process or governmental authority, provided that the
           receiving party uses reasonable efforts to notify the disclosing party
           of the required disclosure and cooperates in obtaining a protective
           order to limit such disclosure . . . .
Free/Low Cost                  Paid/Enterprise


Storage       “SOS cannot access data stored with UltraSafe
              even under a Court order; the data is encrypted
/Sharing      and the correct password must be supplied to
              access the data.”




Backup
Free/Low Cost   Paid/Enterprise
Free/Low Cost                        Paid/Enterprise




     If you have a Free Account, Mozy may terminate your
     account and these Terms immediately and without
     notice if your computer fails to access the Services to
     perform a backup for more than thirty (30) days or
     you fail to comply with these Terms.
Free/Low Cost                       Paid/Enterprise




    The Licensor may cancel the Subscriber’s Service with
    or without cause upon thirty (30) day’s prior written
    notice given by the Licensor by at least two emails sent
    to the Subscriber at the Subscriber’s address as shown
    in the Subscriber’s account details.
Let’s Recap
Let’s Recap

     =
Let’s Recap

     =
Let’s Recap

     =
Let’s Recap

     =
Let’s Recap

     =
Yaacov Silberman, Rimon Law Group   Www.rimonlaw.com   Info@rimonlaw.com

Rimon - CLE on Cloud Lawyering for PAABA

  • 1.
    The Ethics ofCloud Lawyering Yaacov Silberman, Rimon, P.C. Date: August 10, 2011
  • 2.
    Yaacov Silberman •Director ofOperations at Rimon •Debt Finance Group at Ropes & Gray, LLP •Assistant Director (Web Content) at TheLaw.com •University of Pennsylvania Law School (J.D.) •Yeshiva University (B.A.) •Casual Geek
  • 3.
    What is “Cloud Computing”? Whatare the ethical concerns? ✤Rules of Professional Conduct ✤State Bar Opinions How do I evaluate a vendor?
  • 4.
    e Cl oud? hat is th 1.W
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
    COMPETENCE MRPC 1.1:A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.
  • 12.
    COMPETENCE MRPC 1.1:A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation. CA Rule 3-110. Failing to Act Competently. (A) A member shall not intentionally, recklessly, or repeatedly fail to perform legal services with competence.
  • 13.
  • 14.
    Confidentiality MRPC 1.6 (a):A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent, [or] the disclosure is impliedly authorized in order to carry out the representation . . . .
  • 15.
    Confidentiality MRPC 1.6 (a):A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent, [or] the disclosure is impliedly authorized in order to carry out the representation . . . . CA Rule 3-100. Confidential Information of a Client. (A) A member shall not reveal information protected from disclosure by Business and Professions Code section 6068, subdivision (e)(1) without the informed consent of the client . . . .
  • 17.
    THE STATE BAROF CALIFORNIA STANDING COMMITTEE ON PROFESSIONAL RESPONSIBILITY AND CONDUCT FORMAL OPINION NO. 2010-179 Does an attorney violate the duties of confidentiality and competence he or she owes to a client by using technology to transmit or store confidential client information when the technology may be susceptible to unauthorized access by third parties?
  • 18.
    THE STATE BAROF CALIFORNIA STANDING COMMITTEE ON s PROFESSIONAL RESPONSIBILITY AND d CONDUCT n FORMAL OPINION NO. 2010-179 e p e Does an attorney violate the duties of D confidentiality and competence he or she owes to I t a client by using technology to transmit or store confidential client information when the technology may be susceptible to unauthorized access by third parties?
  • 19.
  • 20.
    Credit: Mike Johnson- TheBusyBrain.com
  • 21.
    Credit: Mike Johnson- TheBusyBrain.com
  • 22.
    Credit: Mike Johnson- TheBusyBrain.com
  • 23.
    What precautions can I take? Who can access my data?
  • 24.
  • 25.
  • 27.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
    VENDOR Security Privacy Physical Application Security Security
  • 36.
    VENDOR Security Privacy Physical Application Security Security
  • 37.
  • 38.
    VENDOR Security Privacy Physical Application Security Security https://
  • 39.
    VENDOR Security Privacy Physical Application Security Security https://
  • 41.
    I n the e v e n t T h e mis Solution s In c. goes t h r ou g h a bus in es s tr a n s ition , s uc h as a me r ge r , acq uisition b y an ot h e r c omp an y, or sa le of a ll or a po r t io n o f it s as s e ts , y our p e r s on a lly id ent i fi ab l e in f o r mation will like ly be am o n g t h e a s s e ts tra nsferred. You w il l be n ot if i e d v i a e mail a n d a no t ie ia ma il pr o mi ne n t n o t ic e on our We b s ite for 30 da ys o f an y s uc h ch a n ge in ow n er s hi p o r c o n t rol of y our pe r s o n al in f o r mat ion . - Cl io P ra ctice M an a gemen t
  • 42.
    Free/Low Cost Paid/Enterprise Storage /Sharing Backup
  • 43.
    Free/Low Cost Paid/Enterprise Storage /Sharing “Dropbox cooperates with government and law enforcement officials and private parties to enforce and comply with the law. We will disclose any information about you to Backup government or law enforcement officials or private parties as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including but not limited to subpoenas)”
  • 44.
    Free/Low Cost Paid/Enterprise “Decho does not disclose Personal Data, Storage including the data you back up with the Service, unless disclosure is necessary to comply with an /Sharing enforceable government request such as a warrant.” Backup
  • 45.
    Free/Low Cost Paid/Enterprise Storage /Sharing “. . . the receiving party will (a) use such Confidential Information solely for the purposes for which it is provided; (b) not disclose such Confidential Information to any third party; . . . The foregoing will Backup not apply to any use or disclosure that is (i) required by applicable law, legal process or governmental authority, provided that the receiving party uses reasonable efforts to notify the disclosing party of the required disclosure and cooperates in obtaining a protective order to limit such disclosure . . . .
  • 46.
    Free/Low Cost Paid/Enterprise Storage “SOS cannot access data stored with UltraSafe even under a Court order; the data is encrypted /Sharing and the correct password must be supplied to access the data.” Backup
  • 47.
    Free/Low Cost Paid/Enterprise
  • 48.
    Free/Low Cost Paid/Enterprise If you have a Free Account, Mozy may terminate your account and these Terms immediately and without notice if your computer fails to access the Services to perform a backup for more than thirty (30) days or you fail to comply with these Terms.
  • 49.
    Free/Low Cost Paid/Enterprise The Licensor may cancel the Subscriber’s Service with or without cause upon thirty (30) day’s prior written notice given by the Licensor by at least two emails sent to the Subscriber at the Subscriber’s address as shown in the Subscriber’s account details.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
    Yaacov Silberman, RimonLaw Group Www.rimonlaw.com Info@rimonlaw.com

Editor's Notes

  • #2 \n
  • #3 \n
  • #4 \n
  • #5 \n
  • #6 \n
  • #7 \n
  • #8 \n
  • #9 \n
  • #10 \n
  • #11 \n
  • #12 \n
  • #13 \n
  • #14 \n
  • #15 \n
  • #16 \n
  • #17 \n
  • #18 \n
  • #19 \n
  • #20 \n
  • #21 \n
  • #22 \n
  • #23 \n
  • #24 \n
  • #25 \n
  • #26 \n
  • #27 \n
  • #28 \n
  • #29 \n
  • #30 \n
  • #31 \n
  • #32 \n
  • #33 \n
  • #34 \n
  • #35 \n
  • #36 \n
  • #37 \n
  • #38 \n
  • #39 \n
  • #40 \n
  • #41 \n
  • #42 \n
  • #43 \n
  • #44 \n
  • #45 \n
  • #46 \n
  • #47 \n
  • #48 \n
  • #49 \n
  • #50 \n
  • #51 \n
  • #52 \n
  • #53 \n
  • #54 \n
  • #55 \n
  • #56 \n
  • #57 \n
  • #58 \n
  • #59 \n
  • #60 \n
  • #61 \n
  • #62 \n
  • #63 \n
  • #64 \n
  • #65 \n\n
  • #66 \n\n
  • #67 \n\n
  • #68 \n\n
  • #69 \n\n
  • #70 \n\n
  • #71 \n\n
  • #72 \n\n
  • #73 \n\n
  • #74 \n\n
  • #75 \n\n
  • #76 \n\n
  • #77 \n\n
  • #78 \n\n
  • #79 \n\n
  • #80 \n\n
  • #81 \n\n
  • #82 \n\n
  • #83 \n\n
  • #84 \n\n
  • #85 \n\n
  • #86 \n\n
  • #87 \n\n
  • #88 \n\n
  • #89 \n\n
  • #90 \n\n
  • #91 \n\n
  • #92 \n\n
  • #93 \n\n
  • #94 \n\n
  • #95 \n\n
  • #96 \n\n
  • #97 \n\n
  • #98 \n\n
  • #99 \n\n
  • #100 \n\n
  • #101 \n\n
  • #102 \n\n
  • #103 \n\n
  • #104 ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  • #105 ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  • #106 ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  • #107 ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  • #108 ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  • #109 ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  • #110 ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  • #111 ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  • #112 ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  • #113 \n
  • #114 \n
  • #115 \n
  • #116 \n
  • #117 \n
  • #118 \n
  • #119 \n
  • #120 \n