1 CLOUDY WITH A CHANCE OF ETHICS Adaptable Lawyer Track Sammy Ford Abraham, Watkins, Nichols, Sorrels, Agosto & Friend Houston Al Harrison Harrison Law Office PC Houston Friday, June 19, :30 p.m. 2:30 p.m.
2 Sammy Ford I represent plaintiffs who have been hurt. I am board certified in Personal Injury Trial Law and handle catastrophic personal injury cases, but I also practice construction, securities, and complex commercial litigation, for companies and individuals. I am a native Houstonian and attended St. Thomas High School where I currently serve on the board. I went to Harvard and graduated with high honors, magna cum laude, in At Harvard, I served as Historian of the Harvard Political Union, the College's debating society, and as Secretary of Harvard CHANCE, a group dedicated to mentoring and tutoring students from Cambridge Rindge and Latin School. While participating in the leadership of CHANCE, I also helped two recently-immigrated students prepare for their English as a Second Language exam. After graduating from college, I came back to Texas for law school, finishing with Honors from the University of Texas School of Law in During my time there, I served as Development Editor of The Review of Litigation and as Chair of the Career Services Committee of the Thurgood Marshall Legal Society. In my final year, I participated in the school s first Supreme Court Clinic. We convinced the United States Supreme Court to review our client's case during a term in which the Court agreed to hear only 78 of the 8,517 cases filed. After graduation, I returned to Houston to clerk for the Honorable Jerry E. Smith of the United States Court of Appeals for the Fifth Circuit. During my time with Fifth Circuit, I worked on cases ranging from insurance law to administrative law to one of the most watched white-collar criminal cases of the 21st century. I then worked for two years at the Houston trial firm that pioneered contingent-fee commercial litigation, handling bet-the-company litigation. I am active in the community as a member of the local and state bar associations and the local, state, and national trial lawyer associations. I currently serve as a member of the State Bar's Computer and Technology Section Council, the Houston Lawyer magazine's editorial board, and the Houston Bar Association's Law Week Committee. When I am not working on behalf of my clients, I am active with travel, book collecting, and trying new and interesting restaurants.
3 Biographical Sketch: Al Harrison Harrison Law Office, P.C.; Houston Al Harrison is a patent attorney practicing intellectual property law in Houston with his wife Ronnie Harrison, a family law specialist, with the firm of Harrison Law Office, P.C. He has served as an expert witness and special counsel, and as a consultant on computer & online access, HIPAA protocol, and State Bar advertising review compliance issues. He speaks frequently on issues pertaining to intellectual property, ethics and advertising compliance, and law practice management. Prior to practicing law, he was employed as an engineer featuring operations research and mathematical modeling, and as a computer professional. Al has been a member of the State Bar Advertising Review Committee and presently is a member of the Web Services Committee. He also is a member of the Board of the Texas Bar College. He serves on the Houston Bar Association The Houston Lawyer Editorial Board and on the American Bar Association General Practice & Solos Division Book Publishing Board. He received a Bachelor of Engineering degree from City College of the City University of New York (cum laude; Tau Beta Pi); a Masters degree in Operations Research/Artificial Intelligence from New York University; and a J.D. from the University of Houston Law Center.
4 AL HARRISON Harrison Law Office, P.C. 411 Fannin Street, Suite 350 Houston, Texas (tel) (fax) Law Practice: Patent Law & Intellectual Property Matters; Computer & On-Line Law Education: City College of the City of New York: B. Eng (cum laude, Tau Beta Pi) New York University: M.S. Oper. Res University of Houston Law Center: J.D (Research Fellow 1984) Professional Activities Board, State Bar College Chair, SBOT Computer & Technology Section ; Council ; Lifetime Achievement Award 2007 Council, SBOT GP Solos/Small Firm Section Chair, SBOT Computer Law Committee, Intellectual Property Law Section SBOT Advertising Review Committee SBOT Law Practice Management Committee American Inns of Court, Garland Walker Chapter Editorial Board, HBA The Houston Lawyer ; Guest Co-Editor, IP/Litigation Issue 2007 Chair, HBA Law Practice Mgt. Section ; Chair, HBA Computer And Online Law Section HBA President's Award Board of Directors, Houston Intellectual Property Law Assoc Life Fellow, Texas Bar Foundation & Houston Bar Foundation Fellow, College of Law Practice Management Board of Governors, Downtown Club Houston President, Houston Area League of PC Users (HAL-PC) Law-Related Publications & Presentations Speaker, SBOT, Jefferson County Ethics Extravaganza Social Media 2012 Speaker, SBOT, Family Law Technology Course Cybersleuthing: Without Losing Your License 2012 Speaker, SBOT, Annual Meeting How Loud Is Your Cloud? 2012 Article, "Intellectual Property Issues: Thumbdrive Trademark"-The College Bulletin 2012 Speaker, SBOT, Annual Meeting Safeguarding Confidentiality & Privacy 2011 Speaker, Baylor GP Solos Institute "Enriching the Attorney-Client Relationship" 2011 Speaker, Harris County Attorney's Office, Emergency & Disaster Planning: Intellectual Property Issues 2011 Speaker, SBOT Advanced Consumer & Commercial Law Seminar Protecting Client Privacy 2010 Speaker, SBOT, Annual Meeting Safeguarding Confidentiality & Privacy 2010 Speaker, SBOT, Annual Meeting Billing & Collecting 2010 Speaker, SBOT, Advanced Consumer Bankruptcy Course, Virtual Practice 2010 Speaker, SBOT Emerging Legal Issues & Internet Course, Internet & Privacy 2009 Panelist, SBOT, Perfecting Your Practice Course, Law Practice Virtualization 2009 Panelist, San Antonio Bar Assoc, TechLawSA Course, Law Office Software-Taming Paper Tiger 2008 Panelist, SBOT Nailing It Course, Establishing SBOT-Compliant Website 2008 Panelist, Austin Bar Assoc & SBOT Webcast, Establishing SBOT-Compliant Website 2008 Article, The Houston Lawyer Magazine: Trademark-Surfing in Domain Name Space 2007 Speaker, Houston Solos & Galleria Chamber of Commerce Fail-Safed Electronic Office 2007 Speaker, SBOT Bill of Rights Course Freedom of Speech in Technology Age 2007 Speaker, Houston Bar Assoc. Empowering Your Law Practice: Online Strategies & Techniques 2006 Article, "Registration Roundup on Internet: Trademark Surfing in Domain Name Space"-Houston Lawyer 2006 Faculty, Center For Texas Judiciary Director, SBOT Lawyers and the Internet Seminar 1997 [2/2015]
5 Cloud Computing: Ethical considerations Sammy Ford IV - Abraham,Watkins, Nichols, Sorrels, Agosto & Friend, Houston Al Harrison Harrison Law Office PC
6 Agenda History Legal and Ethical Opinions Ethical Concerns with Data Privacy Popular Cloud Computing Options Questions
7 How We Work What exactly do we do in the office? What applications or tools do we use? How do we communicate with our colleagues both inside and outside the firm?
9 The Closed Network Model In-office Server [mail, documents] In-office Client [Attorney] In-office Client [Paralegal] In-office Client [Legal Assistant] In-office Client [Receptionist]
10 Remote Access to the Network Web Browser Tablet Inoffice Server Smartphone Office
11 Two Views of the Cloud: Overview Cloud File Server
12 Two Views of the Cloud: Client Cloud Server Cloud File Server Cloud Applications Client
13 Cloud: What is it? Definition: A decentralized model for access to shared computer resources. Key Characteristics: On Demand Self Service Network Access Resource Sharing Measurable Elastic
14 Cloud: Delivery Models Software as a Service o o Applications o Office 365 o Google Storage Infrastructure as a Service o o o o Secure Data Center Storage You rent hardware or space Co-location
15 Cloud: Why try it? Cost Savings o Pay overtime, not upfront Remote Access Syncronization Increased Security o Physical security, data backups, redundant power Advanced technologies and upgrades
17 Texas Rules of Professional Conduct Rule 1.01: Attorney has obligation to have competence in the performance of his/her duties. Rule 1.05: Attorney has obligation to protect and preserve the confidential information of his/her client. Rule 1.14: Attorney has obligation to safeguard the client s property.
18 ABA Model Rules of Professional Conduct Rule 1.1 Competence: A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation. Comment 8: To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with with all continuing legal education requirement to which the lawyer is subject.
19 Cont. Rule 1.6 Confidentiality of Information: (c) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client. [Subsection (c) added August 2012]
20 ABA: Cloud Broadly defined, cloud computing (or "Software as a Service") refers to a category of software that's delivered over the Internet via a Web browser (like Internet Explorer) rather than installed directly onto the user's computer. The cloud offers certain advantages in terms of minimal upfront costs, flexibility and mobility, and ease of use. Because cloud computing places data--including client data--on remote servers outside of the lawyer's direct control, it has given rise to some concerns regarding its acceptability under applicable ethics rules. harts_fyis/cloud-ethics-chart.html
21 ABA s Question How does the vendor safeguard the privacy/confidentiality of stored data? How often is the user's data backed up? Does the vendor backup data in multiple data centers in different geographic locations to safeguard against natural disaster? What is the history of the vendor? Where do they derive their funding? How stable are they financially? Can I get my data "off" their servers for my own offline use/backup? If I decide to cancel my subscription to the software, will I get my data? Is data supplied in a non-proprietary format that is compatible with other software? Does the vendor's Terms of Service or Service Level Agreement address confidentiality and security? If not, would the vendor be willing to sign a confidentiality agreement in keeping with your professional responsibilities?
23 Ethics Opinions Overview All states allow for the use of the cloud Standard: Reasonable Care
24 Ethical Opinions Arizona Opinion Rules 1.1 and 1.6 require an attorney or law firm to take competent and reasonable steps to ensure that the client s confidences are not disclosed to third parties through theft or inadvertence and that the client s electronic information is not destroyed. Lawyers must recognize their own competence limitations regarding security measures and take the necessary time and energy to become competent or alternately consult with available experts in the field.
25 Florida Opinion 10-2 Lawyers who use devices that contain electronic storage must take reasonable steps to ensure that client confidentiality is maintained and to sanitize the device before disposition.
26 Alabama Opinion Lawyers may use cloud computing to store client files if they keep current on the appropriate security safeguards and take reasonable steps to ensure the cloud vendor uses suitable methods to protect the stored data.
27 Connecticut Lawyers ownership and access to the data must not be hindered. Security policies and processes should segregate the lawyer s data to prevent unauthorized access to the data, including by the cloud service provider.
28 Massachusetts Review (and periodically revisit) terms of service, restrictions on access to data, data portability, and vendor's security practices. Follow clients' express instructions regarding use of cloud technology to store or transmit data. For particularly sensitive client information, obtain client approval before storing/transmitting via the internet.
30 Texas Opinion No. 648 April 2015 May a lawyer communicate confidential information by ? o Even if unencrypted? Yes.
31 Attacks on Law Firms FBI and MI5 have both issued warnings to law firms about data security Street crime has gone down as cybercrime has gone up o Why? 85 percent of assets are intangible.
32 Is your law firm safer than cloud providers?
33 Are you safer than Jlaw In May, Jennifer Lawrence joked to MTV: "My icloud keeps telling me to back it up, and I'm like, I don't know how to back you up. Do it yourself."
34 icloud Hack Fall 2014 celebrity hack o Jennifer Lawrence, Kate Upton Nude photos released How did they gain access? o Hackers guessed their passwords o icloud allowed an unlimited number of retries without locking the user out.
35 Access and Encryption Who can access your cloud? Can employees of the cloud provider access your data? Can you send encrypted data to the cloud? Is the data encrypted on the cloud provider s server?
36 Encrypting Medical Records Health Insurance Portability and Accountability Act of 1996 (HIPAA) o Covers protected health information. o Now applies to just about all law firms as a result of HB 300. o Documents and information in the cloud must be encrypted o Encrypt locally and save encrypted files in the cloud o Professional level cloud services encrypt documents in transit and on server
38 Who can get your data? PRISM o What is it? A way for NSA, through FISA subpoena, to get data at rest Companies such as Yahoo, Facebook, Microsoft, and Google participated
39 Government Access Backdoors and disclosure What about encryption? Only as good as the product itself Good reason to encrypt before you send. BULLRUN o NSA (UK counterpart: Edgehill) o Attempt to weaken encryption standards and obtain backdoors and master keys Is data on the internet ever really safe?
41 Litigation Concerns Cloud is new and still trying to figure out appropriate policies Still have duty to preserve and produce data under your possession, custody or control Google Apps for Business with Vault ($10/user/month) archives s and chats, allows for creation of data retention policies, and has e-discovery features (admins can search user's s) What happens if your provider goes away? (Megaupload)
42 Questions to ask oneself The issues which an attorney must consider before using a cloud computing service include the following: Is the provider of cloud computing services a reputable organization? Does the provider offer robust security measures? Such measures must include at a minimum password protections or other verification procedures limiting access to the data; safeguards such as data back-up and restoration, a firewall, or encryption; periodic audits by third parties of the provider's security; and notification procedures in case of a breach. Is the data stored in a format that renders it retrievable as well as secure? Is it stored in a proprietary format and is it promptly and reasonably retrievable by the lawyer in a format acceptable to the client? Who owns the data? Where is the data stored? Does the provider commingle the data?
43 Recommendations Use password or PIN to lock and secure mobile devices Report any lost or stolen devices immediately Blackberry and Firm-approved handheld devices can be remotely wiped Firm laptops use encrypted hard drives Use encrypted removable flash drives for transporting confidential materials
44 THE MOST IMPORTANT POINT YOUR PASSWORD IS THE WEAKEST LINK
45 Wi-Fi Wi-Fi networks with no passwords can be easily intercepted Wi-Fi spoofing is common in high traffic areas like malls, coffee shops and airports o Beware of strangely named and unfamiliar Wi-Fi hot spots Consider using VPN to encrypt communications even over open Wi-Fi networks.
46 Cloud Storage Types Internal o Owned and operated by your in-house IT department o Private External o Owned and operated by someone else; hosted by a third-party o External private server
47 Backup Sync Collaboration Cloud Storage Types
48 Cloud Storage: Privacy Encryption o What is it? o Why is it important? o Encrypted transmission vs. encrypted storage Zero-Knowledge o What is it? o Why is it important? o What are the downsides? None, in theory.
49 File/Folder Encryption What is it? Why use it? Providers o Windows o Adobe o Winzip Cloud providers may produce your data o Provider can t unencrypt file.
50 Cloud Storage: Backup Server Server Server Mozy/Carbonite /Amazon
51 Cloud Storage: Sync
52 Cloud Storage: Sync Most sync services provide file storage and collaboration options as well. o SugarSync o Dropbox
53 Cloud Storage: Collaboration
54 Cloud Storage: Collaboration Not all storage solutions are suitable for collaboration There is a difference between storage and backup and collaboration The most popular storage solutions, however, do provide collaboration; most of those also provide syncing services.
56 Dropbox o Most popular o 2GB 1TB Cloud Storage (Simply) o Boxcryptor Skydrive/Sharepoint o Integrated with MS Office going forward o 7/25GB 125GB o Boxcryptor Google Drive o Integrated with Google Documents/ o Boxcryptor
57 Box.com o 5GB Unlimited; Cloud Storage (Simply) o HIPAA Compliant o Encrypted storage in business accounts o Sync; Collaboration SpiderOak o Zero Knowledge o Probably HIPAA Compliant o SpiderOak's encryption is comprehensive -- even with physical access to the storage servers, SpiderOak staff cannot know even the names of your files and folders. On the server side, all that SpiderOak staff can see, are sequentially numbered containers of encrypted data.
58 Cloud Storage Horror Stories Some cloud storage providers are known for storing illegal and dangerous files Risks associated with using those providers Examples o Megaupload o Rapidshare
59 Productivity, , Calendar Hasn't this always been in "the cloud"? What's New? o Pricing per user per month o Scales with need o Maintenance done by host
60 Productivity, , Calendar What's included? Services: o o Calendar o Tasks o Contacts o Documents Software o Office suites accessible from a browser
61 Productivity, , Calendar Should We Purchase Office Software? o Does it make sense to purchase Microsoft Office for your office o Microsoft and Google are betting that many will not think so. Office Software As A Service o Benefits: Always up to date. Accessible anywhere Easy collaboration o Downsides Cost. Monthly fee. Not as feature rich
62 Productivity, , Calendar Services in Focus: Google Apps o o o o o o (cont.) Free to $50 per user per year Gmail-based . Use your own domain for free Google Drive-based storage Apps for word processing, spreadsheets, presentations; calendars; collaboration what we used to prepare presentation 4 million business customers / 5,000 new companies per day Small businesses to global banks
64 Productivity, , Calendar Office365 (cont.) o $4-$20 user/mo. o Cloud based using your own domain o Small Business Version: $6 per month gets , Word, Excel, etc. o Enterprise: $20/user comes with full version of Office, unlimited storage, external website, shared calendars. o Real-time collaboration o Sharepoint provides file storage for internal and external users.
69 Productivity, , Calendar Windows Live o o o o (cont.) Free through Hotmail Online storage through Skydrive Webapp allows retrieval of files stored on your computer, even if not synced in the cloud Webapp versions of Word, Excel, and Powerpoint Same as what's offered in Office365. More features than Google Apps. Option to edit document stored on Skydrive in browser or Office application. Easy collaboration
70 Remember the Milk o o o o Task Management Based on GTD Paradigm Multiple interfaces iphone/ipad Android Outlook (pro) Blackberry (pro) Web tasks Free for most users Pro: $25
71 Asana Task Management (cont.) o Online team and individual task manager Collaborative o Founded by facebook co-founder Dustin Moskovitz. o Free for teams up to 30 o Easy to add tasks to workspace: All ed tasks go to the user's general workspace o Multiple projects within a single workspace Tasks can be assigned and followed o
73 Faxing in the Cloud Fax is dying No need to purchase expensive server software o o o You have a fax number but no fax machine Move your fax server out of your office Many are using Microsoft Server's built-in fax server. Cloud options offer richer features Send and receive faxes by o View on your smartphone
74 Faxing in the Cloud (cont.) Services in Focus: RingCentral o o o Plans for either one fax number or individual fax numbers for each employee. $7.99/month - $49.99/month Toll free or local number ; Dedicated fax number; Receive faxes on your PC, via , or with a mobile application; Send faxes by ; Send faxes on your PC from any application
75 Faxing in the Cloud (cont.) efax o Standard: Choose a local or toll-free number; 150 Included inbound fax pages per month; 150 Included outbound fax pages per month; $.10 per page overage charge; $10.00 one-time setup fee; Lifetime storage; $16.95/mo o Pro: Choose a local or toll-free number; 200 Included inbound fax pages per month; 200 Included outbound fax pages per month; $.10 per page overage charge; $19.95 one-time setup fee; Lifetime storage o Incoming faxes delivered to inbox. Outgoing faxes sent to recipient's fax
76 Note Taking
77 Note Taking: Comparison Pro Con Both Programs Hold notes, lists, to do lists, pictures Great at syncing notes between computers and mobile devices OCR Translating handwriting into searchable notes Quick search of all notes Integration with Windows & MS Office Bundled with Microsoft Office Suite Basic account is free Better Mac support $99 Not in Mac version of Office $45/ year for a Pro account
78 Law Office Management Time Tracking Timesolv, Bill4Time, Time59 Billing and Finances Quickbooks Online, Freshbooks Legal Research Computer & Technology Section App All-in-One Options Amicus, RocketMatter, Total Attorneys
2013 USER GROUP CONFERENCE The Cloud This session will touch anything and everything cloud based that is important to districts today. We will compare and contrast Google Apps and Office 365, Cloud storage
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered
CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access
In the Cloud Scoville Memorial Library February, 2013 email@example.com What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the
2015 USER GROUP CONFERENCE The Cloud This session will touch anything and everything cloud based that is important to districts today. We will compare and contrast Google Apps and Office 365, Cloud storage
All can damage or destroy your company s computers along with the data and applications you rely on to run your business. Losing your computers doesn t have to disrupt your business if you take advantage
CNJG Annual Meeting Pre-Meeting Workshop Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist Agenda Overview of current state of technology Hardware Software
Safe-Guarding Client Information Basic Data Security Training for Lawyers Sponsored by the Law Practice Management Committee of The New York State Bar Association John R. McCarron Jr, Esq. Partner, Montes
Ten Ways To Protect Client Confidences (And Your Practice) In The 21 st Century By Ryan Squires Scott, Douglass, and McConnico Nailing It: The Tools You Need For Today s Practice May 15-16, 2008 Ryan Squires
Cloud Computing: Impact on Your Library Presented by Rita Gavelis November 19, 2013 1 st section What is Cloud Computing Cloud computing noun 1. The practice of using a network of remote servers hosted
Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations
(Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox Materials by: Colleen Heine Amicus Attorney Certified Consultant My name is Colleen Heine
Shafiq Khan An Introduction to Cloud Computing 13/12/2012 Who we are. > Part of East Lancashire Chamber of Commerce > Web design agency established in 1998 > Customer focused with web solutions for every
Dr. Gavin W. Manes, Chief Executive Officer About Us Avansic E-discovery and digital forensics company founded in 2004 by Dr. Gavin W. Manes, former Computer Science professor Scientific approach to ESI
CHAPTER 3: TECHNOLOGY FREE LEGAL RESEARCH AND RESOURCES As a member of the State Bar of Texas and the Texas Young Lawyers Association, you have access to many resources that will help start your own firm,
Email Security in Law Firms What you need to know and how you can use secure email to win more clients Introduction As clients are demanding greater protection of their information, law firms must incorporate
HIPAA & HITECH AND THE DISCOVERY PROCESS HEATHER L. HUGHES, J.D. U.S. Legal Support, Inc. 363 North Sam Houston Parkway East, Suite 900 Houston, Texas 77060 (713) 653-7100 State Bar of Texas 8 th ANNUAL
Office 365 The future of technology for the small business Microsoft Office 365 provides the latest email, communication, messaging, staff productivity and collaboration tools over the Web, ideally suited
EndPoint Device Secures Files Transferring and Sharing 1/24/2014 Rev 2.10 LucidPort Technology, Inc. www.lucidport.com Seminar series: Files transferring and Sharing Increasing Need for Data Protection
How to sell Hosted Exchange to SMB s July 2013. The Trusted Channel Centric Marketplace AGENDA The background Partner opportunity Target audience The solution: Microsoft Hosted Exchange 2013 How to capitalize
Presentation Agenda Turnkey Technologies, Inc. introduction Understanding & Embracing The Cloud Cloud Considerations How to Pick a Hosting Strategy Licensing Options & Sample Managed Services what to look
Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology
Litigating in the Cloud - Security Issues for the Trial Practice J. Walter Sinclair Stoel Rives LLP 101 S. Capitol Blvd, Suite 1900 Boise, Idaho 83702-7705 (208) 389-9000 firstname.lastname@example.org Mr. Sinclair
BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering
Microsoft Office 365 Presented By: Microsoft Office 365 Overview Basic Overview Packages and associated pricing 365 Vs. Office Installation Integration (local vs cloud) Inbox vs 365 (when to suggest or
Storage Made Easy Investor Open Cloud Newsletter File Server Unify, Govern, and Manage your files Cloud File Server Overview Cloud Computing is maturing fast. More and more applications and data are being
HOW HOSTED EXCHANGE COMPARES WITH GOOGLE APPS We know that choosing a cloud service provider is an important decision. Understanding the facts about your provider is essential to setting expectations on
877.557.4273 catalystsecure.com ARTICLE 10 Ways to Avoid Ethics Dangers in the Cloud Is Cloud Computing Bob Ambrogi, Esq. Director of Communications, Catalyst Repository Systems Is Cloud Computing Ethical
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
IDENTIFYING THE OPTIMAL MULTI- USER DOCUMENT SHARING PLATFORM FEBRUARY 2013 Ivana Lung, University of Guelph, Research Shop Intern Citation: Lung, I. (2013). Identifying the optimal multi-user document
Ethical Considerations for Lawyers Using the Cloud Presentation by Peter J. Guffin, Esq. Pierce Atwood LLP email@example.com (207) 791-1199 Maine State Bar Association Summer Meeting June 22, 2012
What we are covering Best practices The cloud Email and document storage Phones and faxes Home office suggestions Small business suggestions Where to buy Where to get support Fun stuff What (I hope) you
Data Privacy and Security: A Primer for Law Firms All We Do Is Work. Workplace Law. In four time zones and 46 major locations coast to coast. www.jacksonlewis.com JACKSON LEWIS SERVING THE DIVERSE NEEDS
University of Northern Colorado Data Security Policy for Research Projects Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope... 1 4.0 Definitions, Roles, and Requirements... 1 5.0 Sources of Data...
imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2 Owner: Cynthia Tan IT Services Table of Contents GENERAL FAQS... 4 1. How to access to Sunway imail account?... 4 2. I can t login to my
Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud
The Small Business Guide to Big Business Email How hosted Microsoft Exchange Server can help your small business become more competitive. Table of Contents Compete More Effectively With Hosted Exchange...
ETHICS for Lawyers and Law Firms Using Cloud Technology Donna Kirk Seyle ~ Legal Tech Advisor: Law Practice Strategy 108 MONTESANO ST SANTA CRUZ, CA 95062 (831) 332-2243 Donna Seyle is an attorney, author,
Cloud Computing Objectives At the end of this session, you will be able to: Define Cloud Services List some popular cloud services List cloud services useful for teachers Understand Hotmail, SkyDrive and
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and
Storing & Synchronizing Data In The Cloud Val D. Steed, CPA, MA, CITP CEO K2 Enterprises Copyright 2012, K2E, LLC. Reproduction or reuse for purposes other than a K2 Enterprises training event is prohibited.
Slide 1 Safe in the Cloud This presentation was given to the U3A South East Region Committees Workshop October 25 th 2013 and follows up the article published in Third Age Matters Issue 7 Summer 2013 page
Email Data Security Jim Brashear General Counsel Zix Corporation Dallas Business Uses Email The dominant business communication tool Time spent on email exceeds time spent on all other communication tools
Truly Secure Cloud Collaboration The Top Five Reasons Legal Professionals Must Adopt Private Cloud File Sharing Infrascale 0 Phone: +.866.79.78 Web: www.filelocker.com The Top Five Reasons Legal Professionals
Data Security Basics: Helping You Protect You Why the Focus on Data Security? Because ignoring it can get you: Fined Fired Criminally Prosecuted It can also impact your ability to get future funding, and
for -Grade CALL US EMAIL US ON THE WEB 1.800.379.7729 firstname.lastname@example.org intermedia.net for -Grade Goal of this report This report compares and contrasts various alternatives for file sharing in a business
Investor Newsletter SMEStorage Open Cloud File Server Unify, Govern, and Manage your files Cloud File Server Overview Cloud Computing is maturing fast. More and more applications and data are being built
HIPAA Myths WEDI Regional Affiliates Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the
The Genealogy Cloud: Which Online Storage Program is Right For You Thomas MacEntee, of High-Definition Genealogy http://hidefgen.com email@example.com Clouds in Genealogy? What is the Genealogy Cloud?
Welcome! What We Do At IntelliSystems, our goal is to get Information Technology and telecommunications management out of your way so that you can focus on your business. Historical PC Business Network
Every Cloud Has A Silver Lining Protecting Privilege Data In A Hosted World May 7, 2014 Introduction Lindsay Stevens Director of Software Development Liquid Litigation Management, Inc. firstname.lastname@example.org
The fastest Cloud upgrade for Windows desktops Key Benefits 1. 2. 3. Speed Elastic Desktop is the fastest Cloud desktop available for Windows business applications. Load applications instantly and search
HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR Chris Apgar, CISSP 2015 OVERVIEW Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right
Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public
Cloud storage buyer s guide for small business sponsored by 1 Table of contents Why should you read this guide? 3 Step 1: Decide how much security you need 4 Step 2: Consider what you need cloud storage
ISSUE 2 Current News & Events Microsoft is releasing a version of its OneNote note-taking software for Macs with added new features and a free tier for all the software s users. The free version of One-
THE 5 BIGGEST MISTAKES LAWYERS MAKE WHEN CHOOSING A CLOUD SERVICE PROVIDER ( and how to fix them ) In recent years, an increasingly large number of law firms have moved their software and data to the cloud.
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights
BYOD: BRING YOUR OWN DEVICE PART 5 OF THE LAW PRACTICE MANAGEMENT SERIES Sarah Banola Cooper, White & Cooper LLP James Y. Wu Law Office of James Y. Wu Bring Your Own Device (BYOD)Trend Increased use of
Hanging Out a Shingle: Technology Every Solo Needs Presented by: Nicholas B. Proy Biography Solo attorney Network administrator for 12+ years Practice law in Maryland, Pennsylvania and Washington, D.C.
Freelance Lawyers The industry's best kept secret. Christopher Kozlowski About Me Co-founder and partner of Streamline Litigation, which I started while I was still in law school at Villanova University
AlwaysMail Sector 5 Cloud E-Mail INDEX INDEX 2 SECTOR 5 COMPANY PROFILE 3 Background Company Name & Address 3 1. SECTOR 5 HOSTED E-MAIL OFFERING 4 2. MICROSOFT HOSTED EXCHANGE 5 3. HOW WE MIGRATE COMPANIES?
Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns by Sharon D. Nelson, Esq. and John W. Simek 2013 Sensei Enterprises, Inc. It seems like everybody is talking about the
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG INTRODUCTION My Background Some questions for you Why computer security? Principle of Incarnation What this presentation covers (and
PROFESSIONAL COUNSELSM ADVICE AND INSIGHT INTO THE PRACTICE OF LAW Lawyers Toolkit 3.0: A Guide to Managing the Attorney-Client Relationship A CNA PROFESSIONAL COUNSEL GUIDE FOR LAWYERS AND LAW FIRMS The
Cloud Computing for Education Workshop 2012 Copyright REZA CURTMOLA, NJIT Why Should You Learn This? Learn some useful software and services Backup and sync your materials for teaching Data reliability
USER GUIDE CLOUDME FOR WD SENTINEL Document 2013-11-17 Page 2 of 13 TABLE OF CONTENTS INTRODUCTION 2 Safe European Storage 2 How does this really work? 2 GETTING STARTED 3 Setting up an account 3 Setting
Microsoft Office 365 Microsoft Office 365 for Small Businesses (Plan P1) Top 10 Benefits Note: The information contained in this document relates to pre-release software and services, which may be substantially
HIPAA and Your Mobile Devices Not taking the appropriate precautions can be very costly. 99 BY MARK TERRY Alexey Poprotskiy Dreamstime.com Have you ever accessed patient data offsite using a laptop computer,
Cloud Computing in the Digital Age Cloud computing is a term used to refer to a computer situation where a program runs on a remote server rather than on a local computer, tablet or smartphone. Instead
TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS
E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting
What is ephi? ephi stands for Electronic Protected Health Information (PHI). It is any PHI that is stored, accessed, transmitted or received electronically. 1 PHI under HIPAA means any information that
Presented by Luke Downing What is the Cloud? Market research 5 key benefits Considerations/Risks ABA rules Questions to asks Q&A Incorporated in 2002 Founded by Luke Downing & Matt Bakey Located in Norfolk,
...Some people / organizations will be a target REGARDLESS of what they do, but most will be a target / victim BECAUSE of what they do (2013 DATA BREACH INVESTIGATIONS REPORT p.1) MOBILE D EVICE S AFETY
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers
Mobile Device Deployments-The Security Dangers of Technology on the Go Presented by Mark Bell, PMP, CISSP, CISA, CHSS OM03 Friday, 10/25/2013 3:45 PM - 5:00 PM Mobile Device Deployments Is Your Organization
WELCOME Wednesday, July 22, 2015 Pleasanton Library Community Meeting Room PANEL PRESENTATION Sandeep Deokule, DevCool, Inc. Taylor Backman, Zoho John DeKoven, Your Digital Handyman Mark Tanis, California
Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is