THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers. December 13, 2012 Telephone Seminar/Audio Webcast



Similar documents
MobileConnect. Getting Started Guide

Smart Ideas for Smartphone Security

Getting Familiar With Android

Mobile Operating Systems & Security

Taking Your Android. Tablets to the Max. Apress. Russell Holly

Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always.

Encryption Made Simple for Lawyers

Quick View. Folder Details

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

Access All Your Files on All Your Devices

Bring Your Own Device Policy

Safe-Guarding Client Information Basic Data Security Training for Lawyers

IONU PRO Product Overview

[BRING YOUR OWN DEVICE POLICY]

Organizing Electronic Documents and Records in Cloud-Based Systems (5-4) K.J. McCorry

When enterprise mobility strategies are discussed, security is usually one of the first topics

How to Successfully Roll Out an Android BYOD Program

Mobiliti. Certified Device List MR5 Release. Last Updated November 21, ASP Version

CSC E Mail. Mobile Device Configuration Settings and Setup Instructions

Full version is >>> HERE <<<

Codeproof Mobile Security & SaaS MDM Platform

CNJG Annual Meeting Pre-Meeting Workshop. Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

TELUS Business Connect Meeting User Guide. Video Conference. Web Share.

Mobile Iron User Guide

IONU BETA USER MANUAL IONU Security, Inc.

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Smartwatch Security Research

Cloud Computing for Education Workshop

Best practices for introducing tablets in your enterprise

Washwood Heath Academy Use by staff of private communication devices policy

Guidelines. London School of Economics & Political Science. Remote Access and Mobile Working Guidelines. Information Management and Technology

Research Information Security Guideline

Android support for Microsoft Exchange in pure Google devices

Cloud Backup and Recovery for Endpoint Devices

Full version is >>> HERE <<<

Perception and knowledge of IT threats: the consumer s point of view

Guideline on Safe BYOD Management

SA Series SSL VPN Virtual Appliances

Tom Schauer TrustCC cell

Android Support on Galaxy Nexus, Nexus S, and Motorola Xoom for Microsoft Exchange Policies

ONE Mail Direct for Mobile Devices

Mobility at Northwestern

The Need for BYOD Mobile Device Security Awareness and Training

Mobile Security Standard

Exchange ActiveSync (EAS)

Neat Cloud Service + Mobile App

Backing up your digital image collection provides it with essential protection.

IceBreak FileShare. Quick Guide. File sharing with workflow management

Cell Phone Operating Systems

Ecommerce Quarterly EQ a publication from

MobileLink User Guide

Mobile Device Security

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices

1:1 ipad Program Device Setup Guide

Cloud Managed Printing

Supported Operating Systems and Browsers Phone Channel

Discovering Computers

Securing Corporate on Personal Mobile Devices

BADA platform, 16 Bookworm, tablet user, Bootloader, 4 Browser, Google account creation from, 41, 42 Bugdroid, 4

Joseph Guarino Owner/CEO/Sr. Consultant Evolutionary IT CISSP, LPIC, MCSE 2000, MCSE 2003, PMP

Novell Filr. Mobile Client

Evolving in the global digital scenario. Politecnico di Torino

Why you need. McAfee. Multi Acess PARTNER SERVICES

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

SmarterMail 9.x and Microsoft Exchange: An End User Comparison

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Quick Start Guide. Version R9. English

Security for the Road Warrior

PULSE SECURE FOR GOOGLE ANDROID

GoToMyPC reviewer s guide

Google Holy Family University

Creating A Data-Safe Employee Mobile Device Policy

About Us. About Joey & Craig. Two technology enthusiasts...

Operating Systems/Supported Browser Chart _

BYOD: End-to-End Security

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, What Cloud Computing is and How it Works

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

Introduction to Dropbox. Jim Miller, LCITO Office Mobile

Additional details >>> HERE <<<

Division of Information Technology Lehman College CUNY

Mobile Devices Using Without Losing

SECURING TODAY S MOBILE WORKFORCE

Evolving in the global digital scenario. Politecnico di Torino

The Genealogy Cloud: Which Online Storage Program is Right For You Page , copyright High-Definition Genealogy. All rights reserved.

EasiShare Whitepaper - Empowering Your Mobile Workforce

Healthcare Buyers Guide: Mobile Device Management

The Future of Mobile Device Management

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

AUT OneDrive for Business. Instructions for Using OneDrive on Windows Platform

STRONGER AUTHENTICATION for CA SiteMinder

A Guide to MAM and Planning for BYOD Security in the Enterprise

EXTENDING ORACLE WEBCENTER TO MOBILE DEVICES: BANNER ENGINEERING SUCCEEDS WITH MOBILE SALES ENABLEMENT

SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps

The. C s. of Mobile Device. Management

Transcription:

1 THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers Cosponsored with the ABA Law Practice Management Section December 13, 2012 Telephone Seminar/Audio Webcast Android Apps for Lawyers By Britt Lorish Affinity Consulting Group, LLC Roanoke, Virginia David G. Ries Thorp Reed & Armstrong, LLP Pittsburgh, Pennsylvania Daniel J. Siegel Law Offices of Daniel J. Siegel LLC Havertown, Pennsylvania

2 ANDROID APPS FOR LAWYERS December 2012 Adapted from course materials prepared Britt Lorish for ABA TECHSHOW 2012. Updated by Dave Ries and Dan Siegel. Introduction Google s Android operating system has quickly become the dominant system used to operate smartphones other than BlackBerrys, iphones and Windows phones, and its share of the tablet market is also increasing. In recent months we have seen the release of the Google Nexus tablet, the Galaxy SIII and HTC Droid DNA smartphones, and the Kindle HD. All of these devices run on Android and have received glowing reviews from critics and users. According to International Data Corporation, the Android operating system was included on three out of every four smartphones shipped during the third quarter of 2012. Out of the 181.1 million smartphones made in that quarter, 136 million ran on Android. Not surprisingly, the number of apps that is, software programs that run on the Android operating system has also grown, to more than 700,000 as of October 2012. Android use among lawyers and their staffs continues to grow and will expand as the number of apps increases, particularly those that help attorneys to be more productive. The increased use of Android devices by the legal profession also means that attorneys are purchasing these devices and bringing them to IT and saying: Make this work for me with the firm s technology. Fortunately, that request is becoming more of a reality. What is a Droid? While there has been significant focus on the itoys (iphones and ipads), the Droid has also seen a tremendous growth over the past two years. Droid is short for Android, a term coined (and licensed) by George Lucas of Star Wars fame. The Droid is actually an operating system (OS) not a device. More importantly, it is based on an open source code, which means that multiple contributors have created this operating system under the Open Handset Alliance, under the direction of Google. Because of this movement, Droid has a very close integration with everything Google. There are several interesting comparisons between the Droid and the iphone: The Droid OS is open source code, while the iphone OS (ios) is proprietary. There are more than 40 manufacturers of smart phones that utilize the Droid OS; Apple manufacturers the iphone. There are roughly 800,000 apps available for the Droid; there are roughly 700,000 apps available for the iphone.

3 The Droid OS holds approximately 58% of the market; Apple about 33%; BlackBerry about 3%; and Windows Mobile the bulk of the rest. What is an App? An app is merely a computer program that works on one of these devices, and is analogous to the software/programs that run on your own computer. Where do I finds apps? For the Droid, there are several places, although two sources Google Play and the Amazon Appstore for Android dominate the market. Sometimes, you can buy an app from either source, although both have their positives and negatives. In most cases, you can simply purchase apps (even when apps are free, you still have to buy them) directly from your device. There are plenty of free apps, but most of the apps that charge a fee are minimal when compared to software costs for the PC applications. One prerequisite to buying apps from either store, and most websites, is that you need to have an account at the website. Most Android devices will require you to have a Google email address just to use the device, and most users choose to use that email address as the default for device-related purchases. Regardless of the site from which you obtain your apps, you should be careful to assure that none includes any viruses or malware. Security? Attorneys have an ethical and a legal duty to take competent and reasonable measures to safeguard confidential client information; in addition, they may be subject to other 2

4 duties to protect this data, including statutes, regulations and contracts. Thus, the obligation to protect client data applies to the use of smartphones and other mobile devices, which can be lost or stolen, hacked, infected by malware, and have their communications intercepted all exposing confidential data. Consequently, you should (a) follow the device manufacturer s instructions for secure setup, (b) use security apps that have anti-virus and anti-malware protection, and (c) use apps that allow for remote wiping if your Droid if lost. A popular security app, Lookout Mobile Security, is discussed on page 16. We also recommend backing up your device; there are a number of apps that will allow for scheduled backups of your device online. Secure Set-Up Set Screen Lock. (with password or PIN or swipe pattern) Set Screen Timeout. Encrypt Phone / Tablet. (Honeycomb / Ice Cream Sandwich / Jellybean only) (Use 3 rd party app with earlier versions) Add find / lock / wipe app. Add security app. Some of Our Favorite Apps So what are our favorite apps? Well, we thought you would never ask! This whole program is about Android Apps for Attorneys. So, without further adieu, here is our list: Cloud Storage Products Dropbox, the most popular cloud storage app, integrates with numerous other apps and programs, including cloud-based case management and document management programs. Dropbox lets desktop and laptop users store information and automatically syncs files among computers. 3

5 For more general use, Amazon Cloud is an easy and inexpensive way to store data, including documents and photos, on Amazon s servers, so that you can access them anywhere. There has been considerable discussion about confidentiality and security in attorneys use of cloud services. Before using them for information relating to clients, be sure to understand the risks and take necessary measures for security. For recent examples of ethics opinions in this area, see Massachusetts Bar Association Ethics Opinion 12-03 and Pennsylvania Bar Association Ethics Opinion 2011-200. Pogoplug, a private cloud, provides the ability to store large amounts of data while maintaining full control of your firm s data. 4