An Introduction to the Technology and Ethics of Cloud Computing. Jack Newton Co founder and President Themis Solutions Inc. (Clio)



Similar documents
10 Ways to Avoid Ethics Dangers in the Cloud

( and how to fix them )

Privacy Policy. What is Covered in This Privacy Policy. What Information Do We Collect, and How is it Used?

Software as a Service (SaaS) Requirements

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

What is an SSL Certificate?

Software as a Service (SaaS) ethical issues

A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE

Mac Software for the Law Office

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)

A Checklist for Software as a Service (SaaS) Vendors and Application Service Providers

Enterprise level security, the Huddle way.

ProFESSIONAL COUNSELSM

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

Presented by Luke Downing

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

WhitePaper. Private Cloud Computing Essentials

Introduction PriorFX LTD Right to Privacy Information

U.S. Securities and Exchange Commission. Mailroom Package Tracking System (MPTS) PRIVACY IMPACT ASSESSMENT (PIA)

HIPAA Privacy & Security White Paper

Cloud Backup GLOSSARY

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Disclosure Requirements of CloudCode Software

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Evaluation criteria for Google Apps backup

HIPAA and Cloud IT: What You Need to Know

Internet Banking Agreement & Disclosure

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

HITS HR & PAYROLL CLOUD MODEL WHITEPAPER

Security Information & Policies

Management and Storage of Sensitive Information UH Information Security Team (InfoSec)

EDI 101 An Introduction to EDI. NewEDI 1

XIT CLOUD SOLUTIONS LIMITED

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

SAAS SERVICES ORDER FORM

EXECUTIVE BRIEF PON SPON. The Cloud Application Explosion. Published April An Osterman Research Executive Brief. sponsored by.

Federal Trade Commission Privacy Impact Assessment. for the: Secure File Transfer System

How To Renew A Contract At Mymellanox Online Via Mymllanox

Personal Internet Online Banking Frequently Asked Questions

A Global IT Managed Service Provider

Corporate Property Automated Information System CPAIS. Privacy Impact Assessment

Practice Resource. Cloud computing checklist. Introduction

IT SERVICE MANAGEMENT FAQ

DISCLOSURE STATEMENT PREPARED BY

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

I believe. Satya Nadella CEO, Microsoft. History of making big bets

Wellesley College Written Information Security Program

Service Level Program for Ariba cloud Services. Service Accessibility Warranty Security Miscellaneous

ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM )

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

ShareFile Security Overview

If You re a Lawyer Headed to the Cloud, Read This First By Reid F. Trautz, Director, AILA Practice & Professionalism Center

A SMALL BUSINESS GUIDE MOVING YOUR SMALL BUSINESS TO THE CLOUD

MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing

Social Media has never been so old

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses

Cloud Computing. What is Cloud Computing?

White Paper: Librestream Security Overview

The Winnipeg Foundation Privacy Policy

PHI- Protected Health Information

SURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Private vs. Public Cloud Solutions

How Cloud Computing is Changing the Face of IT. Ketul Parekh HCSS

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Veson Nautical Website Privacy Policy

ONLINE PRIVACY POLICY

Secure Data Hosting. Your data is our top priority.

DOCUMENT MANAGEMENT SOFTWARE: SAAS VS. INTERNAL DEPLOYMENT

HIPAA COMPLIANCE AND

Public Versus Private Cloud Services

Electronic business conditions of use

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

Cloud computing an insight

A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS

Office 365 Data Processing Agreement with Model Clauses

Is Cloud Computing Inevitable for Lawyers?

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

PowerVCS and Security

Introduction to Dropbox. Jim Miller, LCITO Office Mobile

Privacy Impact Assessment for the. Standardized Tracking and Accounting Reporting System- Financial Management System (STARS-FMS)

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

Welcome to Highlands State Bank Internet Banking Center. Important Information for New Users. System Security and Browser Information

Maximum Global Business Online Privacy Statement

CLOUD COMPUTING. 11 December 2013 TOWNSHIP OF KING TATTA 1

Dean Bank Primary and Nursery School. Secure Storage of Data and Cloud Storage

Things You Need to Know About Cloud Backup

Bell Code for Business to Consumer Electronic Commerce

CHIS, Inc. Privacy General Guidelines

How To Get Started With Backup Agent

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

Secure Client Guide

Storage Made Easy. Cloud File Server Overview

Cloud Computing Contracts. October 11, 2012

Transcription:

An Introduction to the Technology and Ethics of Cloud Computing Jack Newton Co founder and President Themis Solutions Inc. (Clio)

what is software-as-a-service?

traditional computing model The Internet Local Area Network

cloud computing model The Internet Local Area Network

traditional software distribution

cloud computing distribution

why software-as-a-service?

freedom

available from any device

security

terminology Secure Sockets Layer (SSL) Industry standard protocol for securing Internet communications Banks, e commerce sites (Amazon.com, etc.) all use SSL for secure communications

without ssl Information exchanged is insecure Please give me my bank account balance $2,031.34 Your Computer Your Bank s Server

with ssl Information exchanged is encrypted for security 01101010001010110101010100101010 11010001110 Your Computer Your Bank s Server

verifying ssl connections A sealed lock icon indicates a secure connection Internet Explorer: Firefox: Safari:

server security Are third party audits being performed?

server security

server security

privacy

privacy Does the SaaS provider have a published privacy policy? Need to ensure you own your data The private client information stored with your SaaS provider cannot be used for any other purposes

facebook privacy policy You hereby grant Facebook an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to (a) use, copy, publish, stream, store, retain, publicly perform or display, transmit, scan, reformat, modify, edit, frame, translate, excerpt, adapt, create derivative works and distribute (through multiple tiers), any User Content you (i) Post on or in connection with the Facebook Service or the promotion thereof subject only to your privacy settings. You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.

TRUSTe How is sensitive information being handled? TRUSTe s program requirements are based upon the Fair Information Principles and OCED Guidelines around notice, choice, access, security, and redress the core foundations of privacy and building trust. Sealholders are required to undergo a rigorous review process to assess the accuracy of privacy disclosures and compliance with TRUSTe s requirements in order to obtain certification.

data availability

internal backup policies How many times per day is data backed up? Is data backed up to multiple offsite locations?

external backup provisions Can you perform an export of your data? Comma Separated Values (CSV) Extensible Markup Language (XML) Microsoft Excel (XLS)

business continuity What if the SaaS provider goes out of business?

option 1: data export Comma Separated Values (CSV) Extensible Markup Language (XML) Microsoft Excel (XLS) Cross your fingers and hope you re up to date

newton s first law of backups: If it isn t automated you ll forget to do it

option 2: data escrow saasprovider escrow provider saas user

terms of service / service level agreement

terms of service ToS Outlines the conditions under which you agree to use the service Ensure you ve reviewed and accepted your provider s terms of service

service level agreement SLA Outlines guaranteed uptime percentages E.g. 99.9% Usually providers for some kind of compensation if downtime exceeds SLA guarantee

total cost of ownership

TCO total cost of ownership Assessment of both direct and indirect costs associated with software and hardware solutions

traditional desktop software tco original software purchase annual software renewal technical support contract

traditional desktop software tco original hardware purchase networking / virtual private network backups/ data redundancy

traditional desktop software tco

saas tco

google apps vs. exchange cost comparison Discovered the business community is largely unaware of the costs of running an e mail account Many companies surveyed gave guesses from $2 to $11 per user, although a detailed accounting showed that the costs were often several times that

google apps vs. exchange cost comparison

ethics of cloud computing

North Carolina Ethics Inquiry First ethics opinion in North America specifically focused on use of cloud computing in a law firm Hot off the presses committee met April 15th

North Carolina Ethics Inquiry Is it within the Rules of Professional Conduct for an attorney/law firm to use online ("cloud computing") practice management programs (e.g., the Clio program) as part of the practice of law? These are instances where the software program is accessed online with a password and is not software installed on a computer within the firm's office.

North Carolina Proposed Formal Ethics Opinion Yes, provided steps are taken effectively to minimize the risk of inadvertent or unauthorized disclosure of confidential client information and to protect client property, including file information, from risk of loss.

North Carolina Proposed Formal Ethics Opinion Yes, provided steps are taken effectively to minimize the risk of inadvertent or unauthorized disclosure of confidential client information and to protect client property, including file information, from risk of loss.

North Carolina Proposed Formal Ethics Opinion Although a lawyer has a professional obligation to protect confidential information from unauthorized disclosure, the Ethics Committee has long held that this duty does not compel any particular mode of handling confidential information nor does it prohibit the employment of vendors whose services may involve the handling of documents or data containing client information. See RPC 133 (no requirement that firm s waste paper be shredded if lawyer ascertains that persons or entities responsible for the disposal employ procedures that effectively minimize the risk that confidential information may be disclosed). Moreover, the committee has held that, while the duty of confidentiality extends to the use of technology to communicate, this obligation does not require that a lawyer use only infallibly secure methods of communication. RPC 215. Rather, the lawyer must use reasonable care to select a mode of communication that, in light of the circumstances, will best protect confidential communications and the lawyer must advise effected parties if there is reason to believe that the chosen communications technology presents an unreasonable risk to confidentiality.

www.goclio.com jack@goclio.com twitter: @goclio