SlideShare une entreprise Scribd logo
1  sur  18
Cloud Computing
      Fred Wilf, Esq., Baer Crossey
     Dina Leytes, Esq., Griesing Law
Amy Larrimore, The Empire Builders Group
Client-Lawyer Relationship
      Rule 1.1 Competence
A lawyer shall provide competent
   representation to a client.
Competent representation
  requires the legal knowledge,
  skill, thoroughness and
  preparation reasonably
  necessary for the
  representation.
Client-Lawyer Relationship
Rule 1.6(a) Confidentiality Of Information

(a) A lawyer shall not reveal
  information relating to the
  representation of a client
  unless the client gives
  informed consent, the
  disclosure is impliedly
  authorized in order to carry
  out the representation or
  the disclosure is permitted
  by paragraph (b).
Client-Lawyer Relationship
Rule 1.6(b) Confidentiality Of Information
(b) A lawyer may reveal information relating to the representation of a client to the
     extent the lawyer reasonably believes necessary:

   (1) to prevent reasonably certain death or substantial bodily harm;

   (2) to prevent the client from committing a crime or fraud that is reasonably certain to result in
         substantial injury to the financial interests or property of another and in furtherance of which
         the client has used or is using the lawyer's services;

   (3) to prevent, mitigate or rectify substantial injury to the financial interests or property of another
         that is reasonably certain to result or has resulted from the client's commission of a crime or
         fraud in furtherance of which the client has used the lawyer's services;

   (4) to secure legal advice about the lawyer's compliance with these Rules;

   (5) to establish a claim or defense on behalf of the lawyer in a controversy between the lawyer
         and the client, to establish a defense to a criminal charge or civil claim against the lawyer
         based upon conduct in which the client was involved, or to respond to allegations in any
         proceeding concerning the lawyer's representation of the client; or

   (6) to comply with other law or a court order.
Business in the Cloud - Common

                 •Software as a service
                 •Web services
                       Social media
                         Linkedin
                         Wikipedia
                          Google
                 •Platform
                    Physical Hardware
                     Cloud - Amazon
Security Breach
 Generally speaking, it is   •   Adverse legal, regulatory and
 true that the ease of the       business consequences
      cloud increases
    vulnerability – with     •   Sanctions imposed by
significant consequences:        regulatory agencies
                             •   Loss of business
                             •   Reputational risk
                             •   Cost of complying with statutory
                                 notification obligations
                             •   Cost of remediation
Cloud Fear - Exposure
On Premise       Off Premise
Cloud Fear - Mitigation
     On Premise             Off Premise
•   Fire Employee(s)     • Sue them
•   Take the Blame       • Blame them
•   Claim against your   • Claim against their
    insurance policy       insurance policy
Due Diligence
•   Who at the service provider has         •   Does the provider have a privacy
    access to business records?                 and security policy?
•   Where is the service provider           •   What type of security is in place to
    located?                                    ensure data breaches do not occur?
•   Does the service provider comply with   •   Does the provider have a policy to
    all regulatory requirements?                be implemented in the case of a
•   How is the data stored – what is the
                                                data breach?
    data flow?                              •   What does that policy provider for
                                                with regards to client operations in
                                                such a case?

                                            •   What insurance or asset levels exist
                                                at the provider?
How does IT Bob Stack up?
             Due diligence process for
               outside providers tends to
               be common.
             Many providers are rejected
               as part of this process.
             Rarely would the internal
               alternatives pass if they
               were also subjected to
               the process.
Refusal to Approve
 Approval is a       •   Failure to adequately
                         assess, approve and implement
point in time, not       technology (non-action) is a
  an ongoing             significant exposure

    process          •   Exposure is reason new technology
                         is rejected
                     •   Secure products become unsecure
                         in short time frame
                     •   New tech presents the opportunity
                         for more security
                     •   Compliance and legal education and
                         approval cycle process
                     •   No case law
•   Courts are wiling to recognize
Jurisdiction             personal jurisdiction based on
  What are all the       location of cloud computing
locations in which       services.
 you do business         Forward Foods LLC v Next Proteins, Inc., 2008 BL
    virtually?               238516 (N.Y. Sup. 2008)

                     •   In some jurisdictions when
                         weighing convenience of a
                         forum, physical recordkeeping
                         takes precedence.
                         Gelmato S.A. v. HTC Corp., 2011 U.S. Dist. LEXIS
                            133612 (E.D. Tex. Nov. 18, 2011)

                     •   Compliance department requires
                         instruction on these issues.
The Cloud and The World
• There are no international rules governing cloud
  related concerns.
• The EU Data Protection
    Directive provides that
    transfer of personal data
    may be made only to
    member states and to
    jurisdictions with
    adequate data security
    standards.

•   The US is NOT currently deemed to have
    adequate data security standards.
Issues in E-Discovery
•   Parties that store third party data should not expect
    to be shielded from discovery rules
    Columbia Pictures, Inc. v. Bunnell, 245 F.R.D. 443 (C.D. Cal. 2007)
• FRCP require production based
    on “possession, custody or
    control”
•   If responding party has the ability
    to obtain data, it may be
    compelled to do so
•   Discoverable information is still
    protected by privilege, wherever it
    exists
    Tomlinson v. El Paso Corp.,245 F.R.D. 474 (D. Colo. 2007)
Protection of Trade Secrets
•   CFAA: Computer Fraud and Abuse Act
    •   What is unauthorized access?
    •   Employees, Third Party Providers, Social Media
•   Importance of policy vs. hardware controls
    U.S. v. Nosal, 642 F.3d 781 (9th Cir. 2011)

•   Social media
    •   Use or Excessive Use
    •   Social Media Policy
Summary
•   Ethics: Competence and Confidentiality
•   Matters of Business:
    •   Cloud Fear vs. Risk “Skeletons” in IT Closet
    •   Due Diligence and Point in Time Compliance
•   Matters of Law
    •   Jurisdiction
    •   The Cloud and the World
    •   E-Discovery
    •   Trade Secrets
Dina Leytes, Esq.
www.griesinglaw.com
215-732-3924
dleytes@griesinglaw.com

Frederic Wilf, Esq., Partner
http://www.baercrossey.com
215-636-9220
fwilf@baercrossey.com


Amy H. Larrimore, Chief Strategist
The Empire Builders Group
www.amylarrimore.com
www.empirebuilders.biz
215-645-2691 or me@amylarrimore.com


slide design, creativity & general awesomeness powered by:

Contenu connexe

Tendances

Legal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersLegal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and Users
MMMTechLaw
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
Jon Polenberg
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
itnewsafrica
 

Tendances (20)

Legal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersLegal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and Users
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
02 presentation-christianprobst
02 presentation-christianprobst02 presentation-christianprobst
02 presentation-christianprobst
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
 
Harry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get WorseHarry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get Worse
 
Under Lock And Key
Under Lock And KeyUnder Lock And Key
Under Lock And Key
 
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
 
Legal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & UsersLegal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & Users
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 

En vedette

Manati presentacion
Manati presentacionManati presentacion
Manati presentacion
Rodrigo Ruiz
 
Applying technology to jumpstart your sales v092311
Applying technology to jumpstart your sales v092311Applying technology to jumpstart your sales v092311
Applying technology to jumpstart your sales v092311
Amy Larrimore
 

En vedette (16)

Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
 
Manati presentacion
Manati presentacionManati presentacion
Manati presentacion
 
Get Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 PercentGet Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 Percent
 
Africa perspectives till 2020
Africa perspectives till 2020Africa perspectives till 2020
Africa perspectives till 2020
 
Increase Your Revenue 80% Using Technology
Increase Your Revenue 80% Using TechnologyIncrease Your Revenue 80% Using Technology
Increase Your Revenue 80% Using Technology
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud Computing
 
Twitter: How to Start a Revolution
Twitter: How to Start a RevolutionTwitter: How to Start a Revolution
Twitter: How to Start a Revolution
 
How to Fool the Lawyers and Get Your SaaS Tool Approved
How to Fool the Lawyers and Get Your SaaS Tool ApprovedHow to Fool the Lawyers and Get Your SaaS Tool Approved
How to Fool the Lawyers and Get Your SaaS Tool Approved
 
Get Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 PercentGet Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 Percent
 
What Technology Can Do For You - The Nonprofit Edition
What Technology Can Do For You - The Nonprofit EditionWhat Technology Can Do For You - The Nonprofit Edition
What Technology Can Do For You - The Nonprofit Edition
 
SCORE Peer Learning: Increasing your services with Technology
SCORE Peer Learning: Increasing your services with TechnologySCORE Peer Learning: Increasing your services with Technology
SCORE Peer Learning: Increasing your services with Technology
 
Applying technology to jumpstart your sales v092311
Applying technology to jumpstart your sales v092311Applying technology to jumpstart your sales v092311
Applying technology to jumpstart your sales v092311
 
Kuliah siklus otto
Kuliah siklus ottoKuliah siklus otto
Kuliah siklus otto
 
Latino immigration
Latino immigrationLatino immigration
Latino immigration
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)
 
When a Website Makes Cents for your Craft Business
When a Website Makes Cents for your Craft BusinessWhen a Website Makes Cents for your Craft Business
When a Website Makes Cents for your Craft Business
 

Similaire à Cloud Computing Legal for Pennsylvania Bar Association

William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
William Tanenbaum
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
James Fisher
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Ontario Cloud SIG
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
wdsnead
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
Valencell, Inc.
 

Similaire à Cloud Computing Legal for Pennsylvania Bar Association (20)

The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
An information management update for in house counsel
An information management update for in house counselAn information management update for in house counsel
An information management update for in house counsel
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Informed consent and cloud computing
Informed consent and cloud computingInformed consent and cloud computing
Informed consent and cloud computing
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
 
example
exampleexample
example
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 

Dernier

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
vineshkumarsajnani12
 

Dernier (20)

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 

Cloud Computing Legal for Pennsylvania Bar Association

  • 1. Cloud Computing Fred Wilf, Esq., Baer Crossey Dina Leytes, Esq., Griesing Law Amy Larrimore, The Empire Builders Group
  • 2.
  • 3. Client-Lawyer Relationship Rule 1.1 Competence A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.
  • 4. Client-Lawyer Relationship Rule 1.6(a) Confidentiality Of Information (a) A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent, the disclosure is impliedly authorized in order to carry out the representation or the disclosure is permitted by paragraph (b).
  • 5. Client-Lawyer Relationship Rule 1.6(b) Confidentiality Of Information (b) A lawyer may reveal information relating to the representation of a client to the extent the lawyer reasonably believes necessary: (1) to prevent reasonably certain death or substantial bodily harm; (2) to prevent the client from committing a crime or fraud that is reasonably certain to result in substantial injury to the financial interests or property of another and in furtherance of which the client has used or is using the lawyer's services; (3) to prevent, mitigate or rectify substantial injury to the financial interests or property of another that is reasonably certain to result or has resulted from the client's commission of a crime or fraud in furtherance of which the client has used the lawyer's services; (4) to secure legal advice about the lawyer's compliance with these Rules; (5) to establish a claim or defense on behalf of the lawyer in a controversy between the lawyer and the client, to establish a defense to a criminal charge or civil claim against the lawyer based upon conduct in which the client was involved, or to respond to allegations in any proceeding concerning the lawyer's representation of the client; or (6) to comply with other law or a court order.
  • 6. Business in the Cloud - Common •Software as a service •Web services Social media Linkedin Wikipedia Google •Platform Physical Hardware Cloud - Amazon
  • 7. Security Breach Generally speaking, it is • Adverse legal, regulatory and true that the ease of the business consequences cloud increases vulnerability – with • Sanctions imposed by significant consequences: regulatory agencies • Loss of business • Reputational risk • Cost of complying with statutory notification obligations • Cost of remediation
  • 8. Cloud Fear - Exposure On Premise Off Premise
  • 9. Cloud Fear - Mitigation On Premise Off Premise • Fire Employee(s) • Sue them • Take the Blame • Blame them • Claim against your • Claim against their insurance policy insurance policy
  • 10. Due Diligence • Who at the service provider has • Does the provider have a privacy access to business records? and security policy? • Where is the service provider • What type of security is in place to located? ensure data breaches do not occur? • Does the service provider comply with • Does the provider have a policy to all regulatory requirements? be implemented in the case of a • How is the data stored – what is the data breach? data flow? • What does that policy provider for with regards to client operations in such a case? • What insurance or asset levels exist at the provider?
  • 11. How does IT Bob Stack up? Due diligence process for outside providers tends to be common. Many providers are rejected as part of this process. Rarely would the internal alternatives pass if they were also subjected to the process.
  • 12. Refusal to Approve Approval is a • Failure to adequately assess, approve and implement point in time, not technology (non-action) is a an ongoing significant exposure process • Exposure is reason new technology is rejected • Secure products become unsecure in short time frame • New tech presents the opportunity for more security • Compliance and legal education and approval cycle process • No case law
  • 13. Courts are wiling to recognize Jurisdiction personal jurisdiction based on What are all the location of cloud computing locations in which services. you do business Forward Foods LLC v Next Proteins, Inc., 2008 BL virtually? 238516 (N.Y. Sup. 2008) • In some jurisdictions when weighing convenience of a forum, physical recordkeeping takes precedence. Gelmato S.A. v. HTC Corp., 2011 U.S. Dist. LEXIS 133612 (E.D. Tex. Nov. 18, 2011) • Compliance department requires instruction on these issues.
  • 14. The Cloud and The World • There are no international rules governing cloud related concerns. • The EU Data Protection Directive provides that transfer of personal data may be made only to member states and to jurisdictions with adequate data security standards. • The US is NOT currently deemed to have adequate data security standards.
  • 15. Issues in E-Discovery • Parties that store third party data should not expect to be shielded from discovery rules Columbia Pictures, Inc. v. Bunnell, 245 F.R.D. 443 (C.D. Cal. 2007) • FRCP require production based on “possession, custody or control” • If responding party has the ability to obtain data, it may be compelled to do so • Discoverable information is still protected by privilege, wherever it exists Tomlinson v. El Paso Corp.,245 F.R.D. 474 (D. Colo. 2007)
  • 16. Protection of Trade Secrets • CFAA: Computer Fraud and Abuse Act • What is unauthorized access? • Employees, Third Party Providers, Social Media • Importance of policy vs. hardware controls U.S. v. Nosal, 642 F.3d 781 (9th Cir. 2011) • Social media • Use or Excessive Use • Social Media Policy
  • 17. Summary • Ethics: Competence and Confidentiality • Matters of Business: • Cloud Fear vs. Risk “Skeletons” in IT Closet • Due Diligence and Point in Time Compliance • Matters of Law • Jurisdiction • The Cloud and the World • E-Discovery • Trade Secrets
  • 18. Dina Leytes, Esq. www.griesinglaw.com 215-732-3924 dleytes@griesinglaw.com Frederic Wilf, Esq., Partner http://www.baercrossey.com 215-636-9220 fwilf@baercrossey.com Amy H. Larrimore, Chief Strategist The Empire Builders Group www.amylarrimore.com www.empirebuilders.biz 215-645-2691 or me@amylarrimore.com slide design, creativity & general awesomeness powered by: