12
kill the dinosaurs, and other tips for achieving technical competence in your law practice 2015 JOLT Symposium Antigone Peyton, Esq. Founder & CEO, Cloudigy Law PLLC #JOLTdinos Twitter: @AntigonePeyton

Kill the Dinosaurs, and Other Tips for Achieving Technical Competence

Embed Size (px)

Citation preview

kill the dinosaurs, and other tips for

achieving technical competence in your

law practice2015 JOLT SymposiumAntigone Peyton, Esq.

Founder & CEO, Cloudigy Law PLLC

#JOLTdinosTwitter: @AntigonePeyton

Dinosaur Thoughts…• Fax & Email are Secure• Public WiFi is Great!• Paper & Electronic

Worlds, All the Same

• Merging Personal & Firm Data, No Big Deal

2

extinction Milestones:• 2004 Zubulake Case; 2010

Pension Committee Case• Update: ABA Model Rule 1.1

Competence• Edward Snowden• NSA Snooping on Law Firm

Communications?• Ethics Updates on Cloud

Computing

3

What Can We Do to Change Them?

• Changes to Business Model, New Best Practices

• CLE Includes Tech Competence • Clients Demand Competent Counsel• Security Audits• Next hire—CIO/CTO?

4

Protecting Sensitive Data• Review Service & Product Providers’ TOS

and Privacy Policies • What’s on the Office Copier Hard Drive?• Networking Devices• Security on Mobile Devices and BYOD

Issues• Detecting Viruses, Malware, and

Spyware5

Protecting Sensitive Data• VPN, No “Public Wi-Fi”• Encrypting Internet & Cell

Communications on Mobile Devices• Only Authenticated Devices on Firm

Network• System is Only as Safe as the Weakest

Link

6

Weak Links are Everywhere

• Human Factors Create Weakest Links!

• Passwords• Unsecured,

Unattended Computers & Devices

Cybersecurity Insurance & Audits

• Do You Need It?• What Does

Insurance Cover?• Who’s Reading My

Communications?• System Monitoring

Options8

It’s Not the Cloud, It’s you• Online System

Redundancy• Off-Site Disaster

Recovery Backup• Adequate Physical

& Virtual Protection• Location of Data

9

Document Management• Centralized Data Storage

• Encrypted Communication w/in System, Encryption at Rest

• Access History Logging• Passwords Not Stored w/ Data or Employee

Accessible• Data Center Security & Remote Data

Redundancy• Meeting HIPAA, Privacy, EAR, ITAR, etc.

Requirements 10

The Future is Now, Change How You Think

• Tagged Client Files for Tracking & DMCA

• Secure Your WiFi Network

• Regular Technology Education Sessions

Questions?

[email protected]: @antigonepeyton

@cloudigylawLinkedIn: http://cl.oud.im/1yEm2XeInternet: HTTP://cloudigylaw.com

12