SlideShare a Scribd company logo
1 of 59
The Ethics of Cloud Lawyering
Yaacov Silberman, Rimon, P.C.

Date: June 24, 2011
Yaacov Silberman

•Director of Operations at Rimon
•Debt Finance Group at Ropes &
Gray, LLP

•Assistant Director (Web Content)
at TheLaw.com

•University of Pennsylvania Law
School (J.D.)

•Yeshiva University (B.A.)
What is “Cloud
Computing”?

What are the ethical
concerns?
 ✤Rules of Professional
  Conduct
 ✤State Bar Opinions


How do I evaluate a
vendor?
e Cl oud?
   hat is th
1.W
Cloud Computing Pyramid
Infrastructure




Cloud Computing Pyramid
Platform




Cloud Computing Pyramid
Application




Cloud Computing Pyramid
2. Ethical Concerns
COMPETENCE
COMPETENCE
 MRPC 1.1: A lawyer shall provide
 competent representation to a client.
 Competent representation requires the
 legal knowledge, skill, thoroughness
 and preparation reasonably necessary
 for the representation.
COMPETENCE
 MRPC 1.1: A lawyer shall provide
 competent representation to a client.
 Competent representation requires the
 legal knowledge, skill, thoroughness
 and preparation reasonably necessary
 for the representation.



         CA Rule 3-110. Failing to
         Act Competently.
         (A) A member shall not
         intentionally, recklessly, or
         repeatedly fail to perform
         legal services with
         competence.
Confidentiality
Confidentiality
MRPC 1.6 (a): A lawyer shall
not reveal information relating to
the representation of a client unless
the client gives informed consent,
[or] the disclosure is impliedly
authorized in order to carry out the
representation . . . .
Confidentiality
MRPC 1.6 (a): A lawyer shall
not reveal information relating to
the representation of a client unless
the client gives informed consent,
[or] the disclosure is impliedly
authorized in order to carry out the
representation . . . .

             CA Rule 3-100.
             Confidential Information of
             a Client.

             (A) A member shall not
             reveal information protected
             from disclosure by Business
             and Professions Code section
             6068, subdivision (e)(1)
             without the informed
             consent of the client . . . .
THE STATE BAR OF CALIFORNIA
STANDING COMMITTEE ON
PROFESSIONAL RESPONSIBILITY AND
CONDUCT
FORMAL OPINION NO. 2010-179




Does an attorney violate the duties of
confidentiality and competence he or she owes to
a client by using technology to transmit or store
confidential client information when the
technology may be susceptible to unauthorized
access by third parties?
THE STATE BAR OF CALIFORNIA
STANDING COMMITTEE ON




                                      s
PROFESSIONAL RESPONSIBILITY AND




                                    d
CONDUCT




                                  n
FORMAL OPINION NO. 2010-179




              e p e
Does an attorney violate the duties of


             D
confidentiality and competence he or she owes to


         I t
a client by using technology to transmit or store
confidential client information when the
technology may be susceptible to unauthorized
access by third parties?
Exercise Caution
Credit: Mike Johnson -
 TheBusyBrain.com
Credit: Mike Johnson -
 TheBusyBrain.com
Credit: Mike Johnson -
 TheBusyBrain.com
Exercise Caution
Credit: BFIShadow
Ask for Help
Date
000111
Date
An Urgent Situation
3. Evaluating Cloud
     Vendors
VENDOR
VENDOR




Security
VENDOR




Security
                    Privacy
VENDOR




           Security
                                       Privacy




Physical              Application
Security               Security
VENDOR




           Security
                                       Privacy




Physical              Application
Security               Security
VENDOR




           Security
                                       Privacy




Physical              Application
Security               Security
https://
VENDOR




           Security
                                        Privacy




Physical              Application
Security               Security

                        https://
VENDOR




           Security
                                        Privacy




Physical              Application
Security               Security

                        https://
VENDOR




           Security
                                        Privacy




Physical              Application
Security               Security

                        https://
I n t he e v e n t T h e mis Solution s In c.
goes t h r ou g h a bus in es s tr a n s ition ,
s uc h as a me r ge r , acq uisition b y
an ot h e r c omp an y, or sa le of a ll or a
po r t io n o f it s as s e ts , y our p e r s on a lly
id ent i fi ab l e in f o r mation will like ly
be am o n g t h e a s s e ts tra nsferred. You
w il l be n ot if i e d v i a e mail a n d a
           no t ie         ia ma il
pr o mi ne n t n o t ic e on our We b s ite for
30 da ys o f an y s uc h ch a n ge in
ow n er s hi p o r c o n t rol of y our
pe r s o n al in f o r mat ion .
                  - Cl io P ra ctice M an a gemen t
Free/Low Cost   Paid/Enterprise


Storage
/Sharing




Backup
Free/Low Cost                     Paid/Enterprise


Storage
/Sharing


             “Dropbox cooperates with government and law enforcement
             officials and private parties to enforce and comply with the
             law. We will disclose any information about you to
Backup       government or law enforcement officials or private parties as
             we, in our sole discretion, believe necessary or appropriate to
             respond to claims and legal process (including but not limited
             to subpoenas)”
Free/Low Cost                  Paid/Enterprise

              “Decho does not disclose Personal Data,
Storage       including the data you back up with the Service,
              unless disclosure is necessary to comply with an
/Sharing      enforceable government request such as a
              warrant.”




Backup
Free/Low Cost                        Paid/Enterprise


Storage
/Sharing


           “. . . the receiving party will (a) use such Confidential Information
           solely for the purposes for which it is provided; (b) not disclose such
           Confidential Information to any third party; . . . The foregoing will

Backup     not apply to any use or disclosure that is (i) required by applicable
           law, legal process or governmental authority, provided that the
           receiving party uses reasonable efforts to notify the disclosing party
           of the required disclosure and cooperates in obtaining a protective
           order to limit such disclosure . . . .
Free/Low Cost                  Paid/Enterprise


Storage       “SOS cannot access data stored with UltraSafe
              even under a Court order; the data is encrypted
/Sharing      and the correct password must be supplied to
              access the data.”




Backup
Free/Low Cost   Paid/Enterprise
Free/Low Cost                        Paid/Enterprise




     If you have a Free Account, Mozy may terminate your
     account and these Terms immediately and without
     notice if your computer fails to access the Services to
     perform a backup for more than thirty (30) days or
     you fail to comply with these Terms.
Free/Low Cost                       Paid/Enterprise




    The Licensor may cancel the Subscriber’s Service with
    or without cause upon thirty (30) day’s prior written
    notice given by the Licensor by at least two emails sent
    to the Subscriber at the Subscriber’s address as shown
    in the Subscriber’s account details.
Let’s Recap
Let’s Recap

     =
Let’s Recap

     =
Let’s Recap

     =
Let’s Recap

     =
Let’s Recap

     =
Yaacov Silberman, Rimon Law Group   Www.rimonlaw.com   Info@rimonlaw.com

More Related Content

Similar to Rimon yaacov silberman - ethics of cloud lawyering

Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryHNI Risk Services
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Website Compliance 2009
Website Compliance 2009Website Compliance 2009
Website Compliance 2009scottsicle
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachShawn Tuma
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentationashishjoshi
 
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...Niche Konsult Ltd
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Shawn Tuma
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudSource Conference
 
Sec af pa slides
Sec af pa slidesSec af pa slides
Sec af pa slideswrightjr02
 
Legal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersLegal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersMMMTechLaw
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 
Ethics and our Electronic Toys
Ethics and our Electronic Toys Ethics and our Electronic Toys
Ethics and our Electronic Toys Kevin O'Shea
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Shawn Tuma
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 

Similar to Rimon yaacov silberman - ethics of cloud lawyering (20)

Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation Industry
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Website Compliance 2009
Website Compliance 2009Website Compliance 2009
Website Compliance 2009
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Sec af pa slides
Sec af pa slidesSec af pa slides
Sec af pa slides
 
Legal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersLegal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and Users
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
Ethics and our Electronic Toys
Ethics and our Electronic Toys Ethics and our Electronic Toys
Ethics and our Electronic Toys
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Compliance Deck
Compliance DeckCompliance Deck
Compliance Deck
 
How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 

Rimon yaacov silberman - ethics of cloud lawyering

  • 1. The Ethics of Cloud Lawyering Yaacov Silberman, Rimon, P.C. Date: June 24, 2011
  • 2. Yaacov Silberman •Director of Operations at Rimon •Debt Finance Group at Ropes & Gray, LLP •Assistant Director (Web Content) at TheLaw.com •University of Pennsylvania Law School (J.D.) •Yeshiva University (B.A.)
  • 3. What is “Cloud Computing”? What are the ethical concerns? ✤Rules of Professional Conduct ✤State Bar Opinions How do I evaluate a vendor?
  • 4. e Cl oud? hat is th 1.W
  • 11. COMPETENCE MRPC 1.1: A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.
  • 12. COMPETENCE MRPC 1.1: A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation. CA Rule 3-110. Failing to Act Competently. (A) A member shall not intentionally, recklessly, or repeatedly fail to perform legal services with competence.
  • 14. Confidentiality MRPC 1.6 (a): A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent, [or] the disclosure is impliedly authorized in order to carry out the representation . . . .
  • 15. Confidentiality MRPC 1.6 (a): A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent, [or] the disclosure is impliedly authorized in order to carry out the representation . . . . CA Rule 3-100. Confidential Information of a Client. (A) A member shall not reveal information protected from disclosure by Business and Professions Code section 6068, subdivision (e)(1) without the informed consent of the client . . . .
  • 16.
  • 17. THE STATE BAR OF CALIFORNIA STANDING COMMITTEE ON PROFESSIONAL RESPONSIBILITY AND CONDUCT FORMAL OPINION NO. 2010-179 Does an attorney violate the duties of confidentiality and competence he or she owes to a client by using technology to transmit or store confidential client information when the technology may be susceptible to unauthorized access by third parties?
  • 18. THE STATE BAR OF CALIFORNIA STANDING COMMITTEE ON s PROFESSIONAL RESPONSIBILITY AND d CONDUCT n FORMAL OPINION NO. 2010-179 e p e Does an attorney violate the duties of D confidentiality and competence he or she owes to I t a client by using technology to transmit or store confidential client information when the technology may be susceptible to unauthorized access by third parties?
  • 20. Credit: Mike Johnson - TheBusyBrain.com
  • 21. Credit: Mike Johnson - TheBusyBrain.com
  • 22. Credit: Mike Johnson - TheBusyBrain.com
  • 26.
  • 27. Date
  • 29.
  • 34. VENDOR Security Privacy
  • 35. VENDOR Security Privacy Physical Application Security Security
  • 36.
  • 37. VENDOR Security Privacy Physical Application Security Security
  • 38. VENDOR Security Privacy Physical Application Security Security
  • 40. VENDOR Security Privacy Physical Application Security Security https://
  • 41. VENDOR Security Privacy Physical Application Security Security https://
  • 42. VENDOR Security Privacy Physical Application Security Security https://
  • 43.
  • 44. I n t he e v e n t T h e mis Solution s In c. goes t h r ou g h a bus in es s tr a n s ition , s uc h as a me r ge r , acq uisition b y an ot h e r c omp an y, or sa le of a ll or a po r t io n o f it s as s e ts , y our p e r s on a lly id ent i fi ab l e in f o r mation will like ly be am o n g t h e a s s e ts tra nsferred. You w il l be n ot if i e d v i a e mail a n d a no t ie ia ma il pr o mi ne n t n o t ic e on our We b s ite for 30 da ys o f an y s uc h ch a n ge in ow n er s hi p o r c o n t rol of y our pe r s o n al in f o r mat ion . - Cl io P ra ctice M an a gemen t
  • 45. Free/Low Cost Paid/Enterprise Storage /Sharing Backup
  • 46. Free/Low Cost Paid/Enterprise Storage /Sharing “Dropbox cooperates with government and law enforcement officials and private parties to enforce and comply with the law. We will disclose any information about you to Backup government or law enforcement officials or private parties as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including but not limited to subpoenas)”
  • 47. Free/Low Cost Paid/Enterprise “Decho does not disclose Personal Data, Storage including the data you back up with the Service, unless disclosure is necessary to comply with an /Sharing enforceable government request such as a warrant.” Backup
  • 48. Free/Low Cost Paid/Enterprise Storage /Sharing “. . . the receiving party will (a) use such Confidential Information solely for the purposes for which it is provided; (b) not disclose such Confidential Information to any third party; . . . The foregoing will Backup not apply to any use or disclosure that is (i) required by applicable law, legal process or governmental authority, provided that the receiving party uses reasonable efforts to notify the disclosing party of the required disclosure and cooperates in obtaining a protective order to limit such disclosure . . . .
  • 49. Free/Low Cost Paid/Enterprise Storage “SOS cannot access data stored with UltraSafe even under a Court order; the data is encrypted /Sharing and the correct password must be supplied to access the data.” Backup
  • 50. Free/Low Cost Paid/Enterprise
  • 51. Free/Low Cost Paid/Enterprise If you have a Free Account, Mozy may terminate your account and these Terms immediately and without notice if your computer fails to access the Services to perform a backup for more than thirty (30) days or you fail to comply with these Terms.
  • 52. Free/Low Cost Paid/Enterprise The Licensor may cancel the Subscriber’s Service with or without cause upon thirty (30) day’s prior written notice given by the Licensor by at least two emails sent to the Subscriber at the Subscriber’s address as shown in the Subscriber’s account details.
  • 59. Yaacov Silberman, Rimon Law Group Www.rimonlaw.com Info@rimonlaw.com

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. \n
  50. \n
  51. \n
  52. \n
  53. \n
  54. \n
  55. \n
  56. \n
  57. \n
  58. \n
  59. \n
  60. \n
  61. \n
  62. \n
  63. \n
  64. \n
  65. \n\n
  66. \n\n
  67. \n\n
  68. \n\n
  69. \n\n
  70. \n\n
  71. \n\n
  72. \n\n
  73. \n\n
  74. \n\n
  75. \n\n
  76. \n\n
  77. \n\n
  78. \n\n
  79. \n\n
  80. \n\n
  81. \n\n
  82. \n\n
  83. \n\n
  84. \n\n
  85. \n\n
  86. \n\n
  87. \n\n
  88. \n\n
  89. \n\n
  90. \n\n
  91. \n\n
  92. \n\n
  93. \n\n
  94. \n\n
  95. \n\n
  96. \n\n
  97. \n\n
  98. \n\n
  99. \n\n
  100. \n\n
  101. \n\n
  102. \n\n
  103. \n\n
  104. ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  105. ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  106. ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  107. ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  108. ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  109. ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  110. ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  111. ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  112. ● policies regarding the retrieval of data upon the termination of services \n\nEveryone bars acess to data after termination, \n\nbut you need to be able to access it in a readable format before termination and need to ensure that they will destroy the documents after you terminate (highlighted in the NC opinion)\n
  113. \n
  114. \n
  115. \n
  116. \n
  117. \n
  118. \n
  119. \n
  120. \n