CLOUDY WITH A CHANCE OF ETHICS Adaptable Lawyer Track. Friday, June 19, :30 p.m. 2:30 p.m.

Size: px
Start display at page:

Download "CLOUDY WITH A CHANCE OF ETHICS Adaptable Lawyer Track. Friday, June 19, 2015 1:30 p.m. 2:30 p.m."

Transcription

1 CLOUDY WITH A CHANCE OF ETHICS Adaptable Lawyer Track Sammy Ford Abraham, Watkins, Nichols, Sorrels, Agosto & Friend Houston Al Harrison Harrison Law Office PC Houston Friday, June 19, :30 p.m. 2:30 p.m.

2 Sammy Ford I represent plaintiffs who have been hurt. I am board certified in Personal Injury Trial Law and handle catastrophic personal injury cases, but I also practice construction, securities, and complex commercial litigation, for companies and individuals. I am a native Houstonian and attended St. Thomas High School where I currently serve on the board. I went to Harvard and graduated with high honors, magna cum laude, in At Harvard, I served as Historian of the Harvard Political Union, the College's debating society, and as Secretary of Harvard CHANCE, a group dedicated to mentoring and tutoring students from Cambridge Rindge and Latin School. While participating in the leadership of CHANCE, I also helped two recently-immigrated students prepare for their English as a Second Language exam. After graduating from college, I came back to Texas for law school, finishing with Honors from the University of Texas School of Law in During my time there, I served as Development Editor of The Review of Litigation and as Chair of the Career Services Committee of the Thurgood Marshall Legal Society. In my final year, I participated in the school s first Supreme Court Clinic. We convinced the United States Supreme Court to review our client's case during a term in which the Court agreed to hear only 78 of the 8,517 cases filed. After graduation, I returned to Houston to clerk for the Honorable Jerry E. Smith of the United States Court of Appeals for the Fifth Circuit. During my time with Fifth Circuit, I worked on cases ranging from insurance law to administrative law to one of the most watched white-collar criminal cases of the 21st century. I then worked for two years at the Houston trial firm that pioneered contingent-fee commercial litigation, handling bet-the-company litigation. I am active in the community as a member of the local and state bar associations and the local, state, and national trial lawyer associations. I currently serve as a member of the State Bar's Computer and Technology Section Council, the Houston Lawyer magazine's editorial board, and the Houston Bar Association's Law Week Committee. When I am not working on behalf of my clients, I am active with travel, book collecting, and trying new and interesting restaurants.

3 Biographical Sketch: Al Harrison Harrison Law Office, P.C.; Houston Al Harrison is a patent attorney practicing intellectual property law in Houston with his wife Ronnie Harrison, a family law specialist, with the firm of Harrison Law Office, P.C. He has served as an expert witness and special counsel, and as a consultant on computer & online access, HIPAA protocol, and State Bar advertising review compliance issues. He speaks frequently on issues pertaining to intellectual property, ethics and advertising compliance, and law practice management. Prior to practicing law, he was employed as an engineer featuring operations research and mathematical modeling, and as a computer professional. Al has been a member of the State Bar Advertising Review Committee and presently is a member of the Web Services Committee. He also is a member of the Board of the Texas Bar College. He serves on the Houston Bar Association The Houston Lawyer Editorial Board and on the American Bar Association General Practice & Solos Division Book Publishing Board. He received a Bachelor of Engineering degree from City College of the City University of New York (cum laude; Tau Beta Pi); a Masters degree in Operations Research/Artificial Intelligence from New York University; and a J.D. from the University of Houston Law Center.

4 AL HARRISON Harrison Law Office, P.C. 411 Fannin Street, Suite 350 Houston, Texas (tel) (fax) Law Practice: Patent Law & Intellectual Property Matters; Computer & On-Line Law Education: City College of the City of New York: B. Eng (cum laude, Tau Beta Pi) New York University: M.S. Oper. Res University of Houston Law Center: J.D (Research Fellow 1984) Professional Activities Board, State Bar College Chair, SBOT Computer & Technology Section ; Council ; Lifetime Achievement Award 2007 Council, SBOT GP Solos/Small Firm Section Chair, SBOT Computer Law Committee, Intellectual Property Law Section SBOT Advertising Review Committee SBOT Law Practice Management Committee American Inns of Court, Garland Walker Chapter Editorial Board, HBA The Houston Lawyer ; Guest Co-Editor, IP/Litigation Issue 2007 Chair, HBA Law Practice Mgt. Section ; Chair, HBA Computer And Online Law Section HBA President's Award Board of Directors, Houston Intellectual Property Law Assoc Life Fellow, Texas Bar Foundation & Houston Bar Foundation Fellow, College of Law Practice Management Board of Governors, Downtown Club Houston President, Houston Area League of PC Users (HAL-PC) Law-Related Publications & Presentations Speaker, SBOT, Jefferson County Ethics Extravaganza Social Media 2012 Speaker, SBOT, Family Law Technology Course Cybersleuthing: Without Losing Your License 2012 Speaker, SBOT, Annual Meeting How Loud Is Your Cloud? 2012 Article, "Intellectual Property Issues: Thumbdrive Trademark"-The College Bulletin 2012 Speaker, SBOT, Annual Meeting Safeguarding Confidentiality & Privacy 2011 Speaker, Baylor GP Solos Institute "Enriching the Attorney-Client Relationship" 2011 Speaker, Harris County Attorney's Office, Emergency & Disaster Planning: Intellectual Property Issues 2011 Speaker, SBOT Advanced Consumer & Commercial Law Seminar Protecting Client Privacy 2010 Speaker, SBOT, Annual Meeting Safeguarding Confidentiality & Privacy 2010 Speaker, SBOT, Annual Meeting Billing & Collecting 2010 Speaker, SBOT, Advanced Consumer Bankruptcy Course, Virtual Practice 2010 Speaker, SBOT Emerging Legal Issues & Internet Course, Internet & Privacy 2009 Panelist, SBOT, Perfecting Your Practice Course, Law Practice Virtualization 2009 Panelist, San Antonio Bar Assoc, TechLawSA Course, Law Office Software-Taming Paper Tiger 2008 Panelist, SBOT Nailing It Course, Establishing SBOT-Compliant Website 2008 Panelist, Austin Bar Assoc & SBOT Webcast, Establishing SBOT-Compliant Website 2008 Article, The Houston Lawyer Magazine: Trademark-Surfing in Domain Name Space 2007 Speaker, Houston Solos & Galleria Chamber of Commerce Fail-Safed Electronic Office 2007 Speaker, SBOT Bill of Rights Course Freedom of Speech in Technology Age 2007 Speaker, Houston Bar Assoc. Empowering Your Law Practice: Online Strategies & Techniques 2006 Article, "Registration Roundup on Internet: Trademark Surfing in Domain Name Space"-Houston Lawyer 2006 Faculty, Center For Texas Judiciary Director, SBOT Lawyers and the Internet Seminar 1997 [2/2015]

5 Cloud Computing: Ethical considerations Sammy Ford IV - Abraham,Watkins, Nichols, Sorrels, Agosto & Friend, Houston Al Harrison Harrison Law Office PC

6 Agenda History Legal and Ethical Opinions Ethical Concerns with Data Privacy Popular Cloud Computing Options Questions

7 How We Work What exactly do we do in the office? What applications or tools do we use? How do we communicate with our colleagues both inside and outside the firm?

8 History

9 The Closed Network Model In-office Server [mail, documents] In-office Client [Attorney] In-office Client [Paralegal] In-office Client [Legal Assistant] In-office Client [Receptionist]

10 Remote Access to the Network Web Browser Tablet Inoffice Server Smartphone Office

11 Two Views of the Cloud: Overview Cloud File Server

12 Two Views of the Cloud: Client Cloud Server Cloud File Server Cloud Applications Client

13 Cloud: What is it? Definition: A decentralized model for access to shared computer resources. Key Characteristics: On Demand Self Service Network Access Resource Sharing Measurable Elastic

14 Cloud: Delivery Models Software as a Service o o Applications o Office 365 o Google Storage Infrastructure as a Service o o o o Secure Data Center Storage You rent hardware or space Co-location

15 Cloud: Why try it? Cost Savings o Pay overtime, not upfront Remote Access Syncronization Increased Security o Physical security, data backups, redundant power Advanced technologies and upgrades

16

17 Texas Rules of Professional Conduct Rule 1.01: Attorney has obligation to have competence in the performance of his/her duties. Rule 1.05: Attorney has obligation to protect and preserve the confidential information of his/her client. Rule 1.14: Attorney has obligation to safeguard the client s property.

18 ABA Model Rules of Professional Conduct Rule 1.1 Competence: A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation. Comment 8: To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with with all continuing legal education requirement to which the lawyer is subject.

19 Cont. Rule 1.6 Confidentiality of Information: (c) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client. [Subsection (c) added August 2012]

20 ABA: Cloud Broadly defined, cloud computing (or "Software as a Service") refers to a category of software that's delivered over the Internet via a Web browser (like Internet Explorer) rather than installed directly onto the user's computer. The cloud offers certain advantages in terms of minimal upfront costs, flexibility and mobility, and ease of use. Because cloud computing places data--including client data--on remote servers outside of the lawyer's direct control, it has given rise to some concerns regarding its acceptability under applicable ethics rules. harts_fyis/cloud-ethics-chart.html

21 ABA s Question How does the vendor safeguard the privacy/confidentiality of stored data? How often is the user's data backed up? Does the vendor backup data in multiple data centers in different geographic locations to safeguard against natural disaster? What is the history of the vendor? Where do they derive their funding? How stable are they financially? Can I get my data "off" their servers for my own offline use/backup? If I decide to cancel my subscription to the software, will I get my data? Is data supplied in a non-proprietary format that is compatible with other software? Does the vendor's Terms of Service or Service Level Agreement address confidentiality and security? If not, would the vendor be willing to sign a confidentiality agreement in keeping with your professional responsibilities?

22

23 Ethics Opinions Overview All states allow for the use of the cloud Standard: Reasonable Care

24 Ethical Opinions Arizona Opinion Rules 1.1 and 1.6 require an attorney or law firm to take competent and reasonable steps to ensure that the client s confidences are not disclosed to third parties through theft or inadvertence and that the client s electronic information is not destroyed. Lawyers must recognize their own competence limitations regarding security measures and take the necessary time and energy to become competent or alternately consult with available experts in the field.

25 Florida Opinion 10-2 Lawyers who use devices that contain electronic storage must take reasonable steps to ensure that client confidentiality is maintained and to sanitize the device before disposition.

26 Alabama Opinion Lawyers may use cloud computing to store client files if they keep current on the appropriate security safeguards and take reasonable steps to ensure the cloud vendor uses suitable methods to protect the stored data.

27 Connecticut Lawyers ownership and access to the data must not be hindered. Security policies and processes should segregate the lawyer s data to prevent unauthorized access to the data, including by the cloud service provider.

28 Massachusetts Review (and periodically revisit) terms of service, restrictions on access to data, data portability, and vendor's security practices. Follow clients' express instructions regarding use of cloud technology to store or transmit data. For particularly sensitive client information, obtain client approval before storing/transmitting via the internet.

29 Texas

30 Texas Opinion No. 648 April 2015 May a lawyer communicate confidential information by ? o Even if unencrypted? Yes.

31 Attacks on Law Firms FBI and MI5 have both issued warnings to law firms about data security Street crime has gone down as cybercrime has gone up o Why? 85 percent of assets are intangible.

32 Is your law firm safer than cloud providers?

33 Are you safer than Jlaw In May, Jennifer Lawrence joked to MTV: "My icloud keeps telling me to back it up, and I'm like, I don't know how to back you up. Do it yourself."

34 icloud Hack Fall 2014 celebrity hack o Jennifer Lawrence, Kate Upton Nude photos released How did they gain access? o Hackers guessed their passwords o icloud allowed an unlimited number of retries without locking the user out.

35 Access and Encryption Who can access your cloud? Can employees of the cloud provider access your data? Can you send encrypted data to the cloud? Is the data encrypted on the cloud provider s server?

36 Encrypting Medical Records Health Insurance Portability and Accountability Act of 1996 (HIPAA) o Covers protected health information. o Now applies to just about all law firms as a result of HB 300. o Documents and information in the cloud must be encrypted o Encrypt locally and save encrypted files in the cloud o Professional level cloud services encrypt documents in transit and on server

37

38 Who can get your data? PRISM o What is it? A way for NSA, through FISA subpoena, to get data at rest Companies such as Yahoo, Facebook, Microsoft, and Google participated

39 Government Access Backdoors and disclosure What about encryption? Only as good as the product itself Good reason to encrypt before you send. BULLRUN o NSA (UK counterpart: Edgehill) o Attempt to weaken encryption standards and obtain backdoors and master keys Is data on the internet ever really safe?

40

41 Litigation Concerns Cloud is new and still trying to figure out appropriate policies Still have duty to preserve and produce data under your possession, custody or control Google Apps for Business with Vault ($10/user/month) archives s and chats, allows for creation of data retention policies, and has e-discovery features (admins can search user's s) What happens if your provider goes away? (Megaupload)

42 Questions to ask oneself The issues which an attorney must consider before using a cloud computing service include the following: Is the provider of cloud computing services a reputable organization? Does the provider offer robust security measures? Such measures must include at a minimum password protections or other verification procedures limiting access to the data; safeguards such as data back-up and restoration, a firewall, or encryption; periodic audits by third parties of the provider's security; and notification procedures in case of a breach. Is the data stored in a format that renders it retrievable as well as secure? Is it stored in a proprietary format and is it promptly and reasonably retrievable by the lawyer in a format acceptable to the client? Who owns the data? Where is the data stored? Does the provider commingle the data?

43 Recommendations Use password or PIN to lock and secure mobile devices Report any lost or stolen devices immediately Blackberry and Firm-approved handheld devices can be remotely wiped Firm laptops use encrypted hard drives Use encrypted removable flash drives for transporting confidential materials

44 THE MOST IMPORTANT POINT YOUR PASSWORD IS THE WEAKEST LINK

45 Wi-Fi Wi-Fi networks with no passwords can be easily intercepted Wi-Fi spoofing is common in high traffic areas like malls, coffee shops and airports o Beware of strangely named and unfamiliar Wi-Fi hot spots Consider using VPN to encrypt communications even over open Wi-Fi networks.

46 Cloud Storage Types Internal o Owned and operated by your in-house IT department o Private External o Owned and operated by someone else; hosted by a third-party o External private server

47 Backup Sync Collaboration Cloud Storage Types

48 Cloud Storage: Privacy Encryption o What is it? o Why is it important? o Encrypted transmission vs. encrypted storage Zero-Knowledge o What is it? o Why is it important? o What are the downsides? None, in theory.

49 File/Folder Encryption What is it? Why use it? Providers o Windows o Adobe o Winzip Cloud providers may produce your data o Provider can t unencrypt file.

50 Cloud Storage: Backup Server Server Server Mozy/Carbonite /Amazon

51 Cloud Storage: Sync

52 Cloud Storage: Sync Most sync services provide file storage and collaboration options as well. o SugarSync o Dropbox

53 Cloud Storage: Collaboration

54 Cloud Storage: Collaboration Not all storage solutions are suitable for collaboration There is a difference between storage and backup and collaboration The most popular storage solutions, however, do provide collaboration; most of those also provide syncing services.

55 Cloud Storage Providers Amazon Cloud Drive Box.com Comodo Cloud Storage CX (Cloud Experience) Dropbox Glide Google Drive HiDrive Idrive MegaCloud Memopal Mimedia Safecopy Sharepoint Skydrive Spideroak Sugarsync Synplicity Teamdrive Wuala

56 Dropbox o Most popular o 2GB 1TB Cloud Storage (Simply) o Boxcryptor Skydrive/Sharepoint o Integrated with MS Office going forward o 7/25GB 125GB o Boxcryptor Google Drive o Integrated with Google Documents/ o Boxcryptor

57 Box.com o 5GB Unlimited; Cloud Storage (Simply) o HIPAA Compliant o Encrypted storage in business accounts o Sync; Collaboration SpiderOak o Zero Knowledge o Probably HIPAA Compliant o SpiderOak's encryption is comprehensive -- even with physical access to the storage servers, SpiderOak staff cannot know even the names of your files and folders. On the server side, all that SpiderOak staff can see, are sequentially numbered containers of encrypted data.

58 Cloud Storage Horror Stories Some cloud storage providers are known for storing illegal and dangerous files Risks associated with using those providers Examples o Megaupload o Rapidshare

59 Productivity, , Calendar Hasn't this always been in "the cloud"? What's New? o Pricing per user per month o Scales with need o Maintenance done by host

60 Productivity, , Calendar What's included? Services: o o Calendar o Tasks o Contacts o Documents Software o Office suites accessible from a browser

61 Productivity, , Calendar Should We Purchase Office Software? o Does it make sense to purchase Microsoft Office for your office o Microsoft and Google are betting that many will not think so. Office Software As A Service o Benefits: Always up to date. Accessible anywhere Easy collaboration o Downsides Cost. Monthly fee. Not as feature rich

62 Productivity, , Calendar Services in Focus: Google Apps o o o o o o (cont.) Free to $50 per user per year Gmail-based . Use your own domain for free Google Drive-based storage Apps for word processing, spreadsheets, presentations; calendars; collaboration what we used to prepare presentation 4 million business customers / 5,000 new companies per day Small businesses to global banks

63

64 Productivity, , Calendar Office365 (cont.) o $4-$20 user/mo. o Cloud based using your own domain o Small Business Version: $6 per month gets , Word, Excel, etc. o Enterprise: $20/user comes with full version of Office, unlimited storage, external website, shared calendars. o Real-time collaboration o Sharepoint provides file storage for internal and external users.

65

66

67

68

69 Productivity, , Calendar Windows Live o o o o (cont.) Free through Hotmail Online storage through Skydrive Webapp allows retrieval of files stored on your computer, even if not synced in the cloud Webapp versions of Word, Excel, and Powerpoint Same as what's offered in Office365. More features than Google Apps. Option to edit document stored on Skydrive in browser or Office application. Easy collaboration

70 Remember the Milk o o o o Task Management Based on GTD Paradigm Multiple interfaces iphone/ipad Android Outlook (pro) Blackberry (pro) Web tasks Free for most users Pro: $25

71 Asana Task Management (cont.) o Online team and individual task manager Collaborative o Founded by facebook co-founder Dustin Moskovitz. o Free for teams up to 30 o Easy to add tasks to workspace: x@mail.asana.com All ed tasks go to the user's general workspace o Multiple projects within a single workspace Tasks can be assigned and followed o

72

73 Faxing in the Cloud Fax is dying No need to purchase expensive server software o o o You have a fax number but no fax machine Move your fax server out of your office Many are using Microsoft Server's built-in fax server. Cloud options offer richer features Send and receive faxes by o View on your smartphone

74 Faxing in the Cloud (cont.) Services in Focus: RingCentral o o o Plans for either one fax number or individual fax numbers for each employee. $7.99/month - $49.99/month Toll free or local number ; Dedicated fax number; Receive faxes on your PC, via , or with a mobile application; Send faxes by ; Send faxes on your PC from any application

75 Faxing in the Cloud (cont.) efax o Standard: Choose a local or toll-free number; 150 Included inbound fax pages per month; 150 Included outbound fax pages per month; $.10 per page overage charge; $10.00 one-time setup fee; Lifetime storage; $16.95/mo o Pro: Choose a local or toll-free number; 200 Included inbound fax pages per month; 200 Included outbound fax pages per month; $.10 per page overage charge; $19.95 one-time setup fee; Lifetime storage o Incoming faxes delivered to inbox. Outgoing faxes sent to recipient's fax

76 Note Taking

77 Note Taking: Comparison Pro Con Both Programs Hold notes, lists, to do lists, pictures Great at syncing notes between computers and mobile devices OCR Translating handwriting into searchable notes Quick search of all notes Integration with Windows & MS Office Bundled with Microsoft Office Suite Basic account is free Better Mac support $99 Not in Mac version of Office $45/ year for a Pro account

78 Law Office Management Time Tracking Timesolv, Bill4Time, Time59 Billing and Finances Quickbooks Online, Freshbooks Legal Research Computer & Technology Section App All-in-One Options Amicus, RocketMatter, Total Attorneys

79 Law Office Mgmt (cont.)

80 Question?

81 Questions? Sammy Ford IV - sford@abrahamwatkins.com

2013 USER GROUP CONFERENCE

2013 USER GROUP CONFERENCE 2013 USER GROUP CONFERENCE The Cloud This session will touch anything and everything cloud based that is important to districts today. We will compare and contrast Google Apps and Office 365, Cloud storage

More information

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013 CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street

More information

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered

More information

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org In the Cloud Scoville Memorial Library February, 2013 ccayne@biblio.org What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the

More information

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access

More information

2015 USER GROUP CONFERENCE

2015 USER GROUP CONFERENCE 2015 USER GROUP CONFERENCE The Cloud This session will touch anything and everything cloud based that is important to districts today. We will compare and contrast Google Apps and Office 365, Cloud storage

More information

All can damage or destroy your company s computers along with the data and applications you rely on to run your business.

All can damage or destroy your company s computers along with the data and applications you rely on to run your business. All can damage or destroy your company s computers along with the data and applications you rely on to run your business. Losing your computers doesn t have to disrupt your business if you take advantage

More information

Is Cloud Computing Inevitable for Lawyers?

Is Cloud Computing Inevitable for Lawyers? Is Cloud Computing Inevitable for Lawyers? by Sharon D. Nelson and John W. Simek 2015 Sensei Enterprises, Inc. Not a single day goes by when you don t hear something about cloud computing. It could be

More information

Safe-Guarding Client Information Basic Data Security Training for Lawyers

Safe-Guarding Client Information Basic Data Security Training for Lawyers Safe-Guarding Client Information Basic Data Security Training for Lawyers Sponsored by the Law Practice Management Committee of The New York State Bar Association John R. McCarron Jr, Esq. Partner, Montes

More information

CNJG Annual Meeting Pre-Meeting Workshop. Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist

CNJG Annual Meeting Pre-Meeting Workshop. Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist CNJG Annual Meeting Pre-Meeting Workshop Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist Agenda Overview of current state of technology Hardware Software

More information

Why Email Encryption is Essential to the Safety of Your Business

Why Email Encryption is Essential to the Safety of Your Business Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations

More information

Cloud Computing: Impact on Your Library Presented by Rita Gavelis November 19, 2013

Cloud Computing: Impact on Your Library Presented by Rita Gavelis November 19, 2013 Cloud Computing: Impact on Your Library Presented by Rita Gavelis November 19, 2013 1 st section What is Cloud Computing Cloud computing noun 1. The practice of using a network of remote servers hosted

More information

Ten Ways To Protect Client Confidences (And Your Practice) In The 21 st Century. By Ryan Squires Scott, Douglass, and McConnico Austin, Texas

Ten Ways To Protect Client Confidences (And Your Practice) In The 21 st Century. By Ryan Squires Scott, Douglass, and McConnico Austin, Texas Ten Ways To Protect Client Confidences (And Your Practice) In The 21 st Century By Ryan Squires Scott, Douglass, and McConnico Nailing It: The Tools You Need For Today s Practice May 15-16, 2008 Ryan Squires

More information

Using Dropbox with Amicus Attorney. (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox

Using Dropbox with Amicus Attorney. (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox Materials by: Colleen Heine Amicus Attorney Certified Consultant My name is Colleen Heine

More information

Shafiq Khan. An Introduction to. Cloud Computing 13/12/2012

Shafiq Khan. An Introduction to. Cloud Computing 13/12/2012 Shafiq Khan An Introduction to Cloud Computing 13/12/2012 Who we are. > Part of East Lancashire Chamber of Commerce > Web design agency established in 1998 > Customer focused with web solutions for every

More information

Digital Security. Dr. Gavin W. Manes, Chief Executive Officer

Digital Security. Dr. Gavin W. Manes, Chief Executive Officer Dr. Gavin W. Manes, Chief Executive Officer About Us Avansic E-discovery and digital forensics company founded in 2004 by Dr. Gavin W. Manes, former Computer Science professor Scientific approach to ESI

More information

Email Security in Law Firms. What you need to know and how you can use secure email to win more clients

Email Security in Law Firms. What you need to know and how you can use secure email to win more clients Email Security in Law Firms What you need to know and how you can use secure email to win more clients Introduction As clients are demanding greater protection of their information, law firms must incorporate

More information

HIPAA & HITECH AND THE DISCOVERY PROCESS

HIPAA & HITECH AND THE DISCOVERY PROCESS HIPAA & HITECH AND THE DISCOVERY PROCESS HEATHER L. HUGHES, J.D. U.S. Legal Support, Inc. 363 North Sam Houston Parkway East, Suite 900 Houston, Texas 77060 (713) 653-7100 State Bar of Texas 8 th ANNUAL

More information

Office Professional Plus - Outlook, Word, Excel, PowerPoint, Publisher, Access, InfoPath, Lync and more...

Office Professional Plus - Outlook, Word, Excel, PowerPoint, Publisher, Access, InfoPath, Lync and more... Office 365 The future of technology for the small business Microsoft Office 365 provides the latest email, communication, messaging, staff productivity and collaboration tools over the Web, ideally suited

More information

Turnkey Technologies- A Closer Look

Turnkey Technologies- A Closer Look Presentation Agenda Turnkey Technologies, Inc. introduction Understanding & Embracing The Cloud Cloud Considerations How to Pick a Hosting Strategy Licensing Options & Sample Managed Services what to look

More information

EndPoint Device Secures Files Transferring and Sharing

EndPoint Device Secures Files Transferring and Sharing EndPoint Device Secures Files Transferring and Sharing 1/24/2014 Rev 2.10 LucidPort Technology, Inc. www.lucidport.com Seminar series: Files transferring and Sharing Increasing Need for Data Protection

More information

CHAPTER 3: TECHNOLOGY

CHAPTER 3: TECHNOLOGY CHAPTER 3: TECHNOLOGY FREE LEGAL RESEARCH AND RESOURCES As a member of the State Bar of Texas and the Texas Young Lawyers Association, you have access to many resources that will help start your own firm,

More information

HIPAA Privacy & Security White Paper

HIPAA Privacy & Security White Paper HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 sabrina@captureproof.com Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements

More information

BUILT FOR YOU. Contents. Cloudmore Exchange

BUILT FOR YOU. Contents. Cloudmore Exchange BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering

More information

10 Ways to Avoid Ethics Dangers in the Cloud

10 Ways to Avoid Ethics Dangers in the Cloud 877.557.4273 catalystsecure.com ARTICLE 10 Ways to Avoid Ethics Dangers in the Cloud Is Cloud Computing Bob Ambrogi, Esq. Director of Communications, Catalyst Repository Systems Is Cloud Computing Ethical

More information

Microsoft Office 365. Presented By:

Microsoft Office 365. Presented By: Microsoft Office 365 Presented By: Microsoft Office 365 Overview Basic Overview Packages and associated pricing 365 Vs. Office Installation Integration (local vs cloud) Inbox vs 365 (when to suggest or

More information

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014 Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology

More information

How to sell Hosted Exchange to SMB s

How to sell Hosted Exchange to SMB s How to sell Hosted Exchange to SMB s July 2013. The Trusted Channel Centric Marketplace AGENDA The background Partner opportunity Target audience The solution: Microsoft Hosted Exchange 2013 How to capitalize

More information

Litigating in the Cloud - Security Issues for the Trial Practice

Litigating in the Cloud - Security Issues for the Trial Practice Litigating in the Cloud - Security Issues for the Trial Practice J. Walter Sinclair Stoel Rives LLP 101 S. Capitol Blvd, Suite 1900 Boise, Idaho 83702-7705 (208) 389-9000 jwsinclair@stoel.com Mr. Sinclair

More information

The Small Business Guide to Big Business Email

The Small Business Guide to Big Business Email The Small Business Guide to Big Business Email How hosted Microsoft Exchange Server can help your small business become more competitive. Table of Contents Compete More Effectively With Hosted Exchange...

More information

Storage Made Easy. Cloud File Server Overview

Storage Made Easy. Cloud File Server Overview Storage Made Easy Investor Open Cloud Newsletter File Server Unify, Govern, and Manage your files Cloud File Server Overview Cloud Computing is maturing fast. More and more applications and data are being

More information

Cyber Self Assessment

Cyber Self Assessment Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have

More information

Troy Cablevision, Inc. Subscriber Privacy Policy

Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. ( Troy Cable ) is committed to protecting and securely maintaining our customers privacy. The following privacy policy applies to

More information

Save Time and Money with Web-based Email Messaging and Collaboration for Teams

Save Time and Money with Web-based Email Messaging and Collaboration for Teams Save Time and Money with Web-based Email Messaging and Collaboration for Teams If you re looking for a robust alternative to your current email server or hosted email service, Google Apps for Business

More information

A Winning Combination!!

A Winning Combination!! Connect Cloud Continuity and 1 A Winning Combination!! Hosted Cloud Differentiators 2 TelePacific Cloud Services Communications Compliance & Security Collaboration Back up & Recovery Professional Services

More information

HOW HOSTED EXCHANGE COMPARES WITH GOOGLE APPS

HOW HOSTED EXCHANGE COMPARES WITH GOOGLE APPS HOW HOSTED EXCHANGE COMPARES WITH GOOGLE APPS We know that choosing a cloud service provider is an important decision. Understanding the facts about your provider is essential to setting expectations on

More information

Ethical Considerations for Lawyers Using the Cloud

Ethical Considerations for Lawyers Using the Cloud Ethical Considerations for Lawyers Using the Cloud Presentation by Peter J. Guffin, Esq. Pierce Atwood LLP pguffin@pierceatwood.com (207) 791-1199 Maine State Bar Association Summer Meeting June 22, 2012

More information

imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2

imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2 imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2 Owner: Cynthia Tan IT Services Table of Contents GENERAL FAQS... 4 1. How to access to Sunway imail account?... 4 2. I can t login to my

More information

Data Privacy and Security: A Primer for Law Firms

Data Privacy and Security: A Primer for Law Firms Data Privacy and Security: A Primer for Law Firms All We Do Is Work. Workplace Law. In four time zones and 46 major locations coast to coast. www.jacksonlewis.com JACKSON LEWIS SERVING THE DIVERSE NEEDS

More information

How To Protect Research Data From Being Compromised

How To Protect Research Data From Being Compromised University of Northern Colorado Data Security Policy for Research Projects Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope... 1 4.0 Definitions, Roles, and Requirements... 1 5.0 Sources of Data...

More information

INTRODUCTION TO CLOUD STORAGE

INTRODUCTION TO CLOUD STORAGE University of North Carolina at Chapel Hill Libraries Carrboro Cybrary Chapel Hill Public Library Durham County Public Library INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What

More information

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Regional Affiliates Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the

More information

Eliminate Risk & Gain Rewards Using Technology: How Savvy Successful Small Businesses Operate By Laura Leist, CPO, MOS, CRTS January 12, 2015

Eliminate Risk & Gain Rewards Using Technology: How Savvy Successful Small Businesses Operate By Laura Leist, CPO, MOS, CRTS January 12, 2015 How Savvy Successful Small Businesses Operate By Laura Leist, CPO, MOS, CRTS January 12, 2015 Contact Information Laura Leist Eliminate Chaos laura@eliminatechaos.com 425.670.2551 877.342.8592 Author:

More information

IDENTIFYING THE OPTIMAL MULTI- USER DOCUMENT SHARING PLATFORM

IDENTIFYING THE OPTIMAL MULTI- USER DOCUMENT SHARING PLATFORM IDENTIFYING THE OPTIMAL MULTI- USER DOCUMENT SHARING PLATFORM FEBRUARY 2013 Ivana Lung, University of Guelph, Research Shop Intern Citation: Lung, I. (2013). Identifying the optimal multi-user document

More information

Protecting Your Data On The Network, Cloud And Virtual Servers

Protecting Your Data On The Network, Cloud And Virtual Servers Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public

More information

Google Drive @ Holy Family University

Google Drive @ Holy Family University Google Drive @ Holy Family University A Hard Drive in the Cloud. Access & share anything everywhere Google Docs has been retired and replaced by Drive. And if you are familiar with Google Docs, Google

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

INFORMATION SECURITY FOR YOUR AGENCY

INFORMATION SECURITY FOR YOUR AGENCY INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection

More information

( and how to fix them )

( and how to fix them ) THE 5 BIGGEST MISTAKES LAWYERS MAKE WHEN CHOOSING A CLOUD SERVICE PROVIDER ( and how to fix them ) In recent years, an increasingly large number of law firms have moved their software and data to the cloud.

More information

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and

More information

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR Chris Apgar, CISSP 2015 OVERVIEW Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

Comparing Alternatives for Business-Grade File Sharing. intermedia.net 1.800.379.7729. sales@intermedia.net CALL US EMAIL US ON THE WEB

Comparing Alternatives for Business-Grade File Sharing. intermedia.net 1.800.379.7729. sales@intermedia.net CALL US EMAIL US ON THE WEB for -Grade CALL US EMAIL US ON THE WEB 1.800.379.7729 sales@intermedia.net intermedia.net for -Grade Goal of this report This report compares and contrasts various alternatives for file sharing in a business

More information

Storing & Synchronizing Data In The Cloud

Storing & Synchronizing Data In The Cloud Storing & Synchronizing Data In The Cloud Val D. Steed, CPA, MA, CITP CEO K2 Enterprises Copyright 2012, K2E, LLC. Reproduction or reuse for purposes other than a K2 Enterprises training event is prohibited.

More information

Data Security Basics: Helping You Protect You

Data Security Basics: Helping You Protect You Data Security Basics: Helping You Protect You Why the Focus on Data Security? Because ignoring it can get you: Fined Fired Criminally Prosecuted It can also impact your ability to get future funding, and

More information

www.dowsemurray.co.nz

www.dowsemurray.co.nz What we are covering Best practices The cloud Email and document storage Phones and faxes Home office suggestions Small business suggestions Where to buy Where to get support Fun stuff What (I hope) you

More information

CD and DVD drives offered a lot more capacity to install and store files but lacked the convenience of the small floppy disks.

CD and DVD drives offered a lot more capacity to install and store files but lacked the convenience of the small floppy disks. Slide 1 Safe in the Cloud This presentation was given to the U3A South East Region Committees Workshop October 25 th 2013 and follows up the article published in Third Age Matters Issue 7 Summer 2013 page

More information

FileLocker. The Top Five Reasons Legal Professionals Must Adopt Private Cloud File Sharing

FileLocker. The Top Five Reasons Legal Professionals Must Adopt Private Cloud File Sharing Truly Secure Cloud Collaboration The Top Five Reasons Legal Professionals Must Adopt Private Cloud File Sharing Infrascale 0 Phone: +.866.79.78 Web: www.filelocker.com The Top Five Reasons Legal Professionals

More information

Introduction to Cloud Services

Introduction to Cloud Services Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud

More information

Microsoft Office 365 for Small Businesses (Plan P1) Top 10 Benefits

Microsoft Office 365 for Small Businesses (Plan P1) Top 10 Benefits Microsoft Office 365 Microsoft Office 365 for Small Businesses (Plan P1) Top 10 Benefits Note: The information contained in this document relates to pre-release software and services, which may be substantially

More information

The Genealogy Cloud: Which Online Storage Program is Right For You Page 1 2012, copyright High-Definition Genealogy. All rights reserved.

The Genealogy Cloud: Which Online Storage Program is Right For You Page 1 2012, copyright High-Definition Genealogy. All rights reserved. The Genealogy Cloud: Which Online Storage Program is Right For You Thomas MacEntee, of High-Definition Genealogy http://hidefgen.com hidefgen@gmail.com Clouds in Genealogy? What is the Genealogy Cloud?

More information

Welcome! What We Do At IntelliSystems, our goal is to get Information Technology and telecommunications management out of your way so that you can focus on your business. Historical PC Business Network

More information

ETHICS for Lawyers and Law Firms Using Cloud Technology

ETHICS for Lawyers and Law Firms Using Cloud Technology ETHICS for Lawyers and Law Firms Using Cloud Technology Donna Kirk Seyle ~ Legal Tech Advisor: Law Practice Strategy 108 MONTESANO ST SANTA CRUZ, CA 95062 (831) 332-2243 Donna Seyle is an attorney, author,

More information

Email Data Security. The dominant business communication tool

Email Data Security. The dominant business communication tool Email Data Security Jim Brashear General Counsel Zix Corporation Dallas Business Uses Email The dominant business communication tool Time spent on email exceeds time spent on all other communication tools

More information

Cloud storage buyer s guide

Cloud storage buyer s guide Cloud storage buyer s guide for small business sponsored by 1 Table of contents Why should you read this guide? 3 Step 1: Decide how much security you need 4 Step 2: Consider what you need cloud storage

More information

Multi-Factor Authentication

Multi-Factor Authentication Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to

More information

Neoscope www.neoscopeit.com 888.810.9077

Neoscope www.neoscopeit.com 888.810.9077 Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your practice without IT. Today,

More information

Current News & Events

Current News & Events ISSUE 2 Current News & Events Microsoft is releasing a version of its OneNote note-taking software for Macs with added new features and a free tier for all the software s users. The free version of One-

More information

Skills You Will Need

Skills You Will Need Cloud Computing Objectives At the end of this session, you will be able to: Define Cloud Services List some popular cloud services List cloud services useful for teachers Understand Hotmail, SkyDrive and

More information

Data In The Cloud: Who Owns It, and How Do You Get it Back?

Data In The Cloud: Who Owns It, and How Do You Get it Back? Data In The Cloud: Who Owns It, and How Do You Get it Back? Presented by Dave Millier, Soban Bhatti, and Oleg Sotnikov 2013 Sentry Metrics Inc. Agenda Reasons for Cloud Adoption How Did My Data Get There?

More information

Investor Newsletter. SMEStorage Open Cloud File Server Unify, Govern, and Manage your files. Cloud File Server Overview

Investor Newsletter. SMEStorage Open Cloud File Server Unify, Govern, and Manage your files. Cloud File Server Overview Investor Newsletter SMEStorage Open Cloud File Server Unify, Govern, and Manage your files Cloud File Server Overview Cloud Computing is maturing fast. More and more applications and data are being built

More information

BYOD: BRING YOUR OWN DEVICE

BYOD: BRING YOUR OWN DEVICE BYOD: BRING YOUR OWN DEVICE PART 5 OF THE LAW PRACTICE MANAGEMENT SERIES Sarah Banola Cooper, White & Cooper LLP James Y. Wu Law Office of James Y. Wu Bring Your Own Device (BYOD)Trend Increased use of

More information

Hanging Out a Shingle: Technology Every Solo Needs. Presented by: Nicholas B. Proy

Hanging Out a Shingle: Technology Every Solo Needs. Presented by: Nicholas B. Proy Hanging Out a Shingle: Technology Every Solo Needs Presented by: Nicholas B. Proy Biography Solo attorney Network administrator for 12+ years Practice law in Maryland, Pennsylvania and Washington, D.C.

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be

More information

MICROSOFT EXCHANGE SERVER 2007 upgrade campaign. Telesales script

MICROSOFT EXCHANGE SERVER 2007 upgrade campaign. Telesales script MICROSOFT EXCHANGE SERVER 2007 upgrade campaign Telesales script This document was created to help prepare an outbound telesales professional for a Microsoft Exchange Server 2007 upgrade sales call. This

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Cloud Computing for Education Workshop

Cloud Computing for Education Workshop Cloud Computing for Education Workshop 2012 Copyright REZA CURTMOLA, NJIT Why Should You Learn This? Learn some useful software and services Backup and sync your materials for teaching Data reliability

More information

Freelance Lawyers. The industry's best kept secret. Christopher Kozlowski

Freelance Lawyers. The industry's best kept secret. Christopher Kozlowski Freelance Lawyers The industry's best kept secret. Christopher Kozlowski About Me Co-founder and partner of Streamline Litigation, which I started while I was still in law school at Villanova University

More information

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns by Sharon D. Nelson, Esq. and John W. Simek 2013 Sensei Enterprises, Inc. It seems like everybody is talking about the

More information

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1 Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is

More information

COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG

COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG INTRODUCTION My Background Some questions for you Why computer security? Principle of Incarnation What this presentation covers (and

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

GUESTBOOK REWARDS, INC. Privacy Policy

GUESTBOOK REWARDS, INC. Privacy Policy GUESTBOOK REWARDS, INC. Privacy Policy Welcome to Guestbook Rewards, Inc. the online and mobile service of Guestbook Rewards, Inc. ( The Guestbook, we, or us ). Our Privacy Policy explains how we collect,

More information

The fastest Cloud upgrade for Windows desktops

The fastest Cloud upgrade for Windows desktops The fastest Cloud upgrade for Windows desktops Key Benefits 1. 2. 3. Speed Elastic Desktop is the fastest Cloud desktop available for Windows business applications. Load applications instantly and search

More information

Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World

Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World Every Cloud Has A Silver Lining Protecting Privilege Data In A Hosted World May 7, 2014 Introduction Lindsay Stevens Director of Software Development Liquid Litigation Management, Inc. lstevens@llminc.com

More information

Have you ever accessed

Have you ever accessed HIPAA and Your Mobile Devices Not taking the appropriate precautions can be very costly. 99 BY MARK TERRY Alexey Poprotskiy Dreamstime.com Have you ever accessed patient data offsite using a laptop computer,

More information

Cloud computing: the lowdown

Cloud computing: the lowdown 1 de 6 07/11/2011 0:52 Printing sponsored by: Cloud computing: the lowdown Much of our computing (including the storage of our personal data) is now being done remotely via the 'cloud'. But what is it?

More information

Cloud Computing in the Digital Age

Cloud Computing in the Digital Age Cloud Computing in the Digital Age Cloud computing is a term used to refer to a computer situation where a program runs on a remote server rather than on a local computer, tablet or smartphone. Instead

More information

Presented by Luke Downing

Presented by Luke Downing Presented by Luke Downing What is the Cloud? Market research 5 key benefits Considerations/Risks ABA rules Questions to asks Q&A Incorporated in 2002 Founded by Luke Downing & Matt Bakey Located in Norfolk,

More information

HIPAA ephi Security Guidance for Researchers

HIPAA ephi Security Guidance for Researchers What is ephi? ephi stands for Electronic Protected Health Information (PHI). It is any PHI that is stored, accessed, transmitted or received electronically. 1 PHI under HIPAA means any information that

More information

Mobile Security & BYOD Policy

Mobile Security & BYOD Policy Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers

More information

Mobile Device Deployments-The Security Dangers of Technology on the Go

Mobile Device Deployments-The Security Dangers of Technology on the Go Mobile Device Deployments-The Security Dangers of Technology on the Go Presented by Mark Bell, PMP, CISSP, CISA, CHSS OM03 Friday, 10/25/2013 3:45 PM - 5:00 PM Mobile Device Deployments Is Your Organization

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

CLOUD SUPPORT FOR SMALL BUSINESS GROWTH WELCOME. Wednesday, July 22, 2015 Pleasanton Library Community Meeting Room

CLOUD SUPPORT FOR SMALL BUSINESS GROWTH WELCOME. Wednesday, July 22, 2015 Pleasanton Library Community Meeting Room WELCOME Wednesday, July 22, 2015 Pleasanton Library Community Meeting Room PANEL PRESENTATION Sandeep Deokule, DevCool, Inc. Taylor Backman, Zoho John DeKoven, Your Digital Handyman Mark Tanis, California

More information

Data Security Considerations for Research

Data Security Considerations for Research Data Security Considerations for Research Institutional Review Board Annual Education May 8, 2012 1 PRIVACY vs. SECURITY What s the Difference?: PRIVACY Refers to WHAT is protected Health information about

More information

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Windows 8 Hacks O'REILLY* Preston Gralla. Beijing. Cambridge Famham. Koln Sebastopol Tokyo

Windows 8 Hacks O'REILLY* Preston Gralla. Beijing. Cambridge Famham. Koln Sebastopol Tokyo Windows 8 Hacks Preston Gralla Beijing Cambridge Famham O'REILLY* Koln Sebastopol Tokyo Table of Contents Preface vii 1. Setup and Startup Hacks 1 Hack 01. Disable Windows 8's Lock Screen 1 Hack 02. Hack

More information

Microsoft Office 365 From Vodafone 2015 Update

Microsoft Office 365 From Vodafone 2015 Update Microsoft Office 365 From Vodafone 2015 Update What is Microsoft Office 365? Microsoft Office 365 offered by Vodafone is a hosted, cloud-based IT solution that combines Microsoft s suite of communication

More information

HIPAA Security Rule Changes and Impacts

HIPAA Security Rule Changes and Impacts HIPAA Security Rule Changes and Impacts Susan A. Miller, JD Tony Brooks, CISA, CRISC HIPAA in a HITECH WORLD American Health Lawyers Association March 22, 2013 Baltimore, MD Agenda I. Introduction II.

More information

EasiShare Whitepaper - Empowering Your Mobile Workforce

EasiShare Whitepaper - Empowering Your Mobile Workforce Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for

More information