SlideShare une entreprise Scribd logo
1  sur  12
kill the dinosaurs, and
other tips for achieving
technical competence in
your law practice
2015 JOLT Symposium
Antigone Peyton, Esq.
Founder & CEO, Cloudigy Law
PLLC
#JOLTdinos
Twitter: @AntigonePeyton
Dinosaur Thoughts…
• Fax & Email are Secure
• Public WiFi is Great!
• Paper & Electronic Worlds,
All the Same
• Merging Personal & Firm
Data, No Big Deal
2
extinction Milestones:
• 2004 Zubulake Case; 2010
Pension Committee Case
• Update: ABA Model Rule 1.1
Competence
• Edward Snowden
• NSA Snooping on Law Firm
Communications?
• Ethics Updates on Cloud
Computing
3
What Can We Do
to Change Them?
• Changes to Business Model, New Best
Practices
• CLE Includes Tech Competence
• Clients Demand Competent Counsel
• Security Audits
• Next hire—CIO/CTO?
4
Protecting Sensitive Data
• Review Service & Product Providers’ TOS and
Privacy Policies
• What’s on the Office Copier Hard Drive?
• Networking Devices
• Security on Mobile Devices and BYOD Issues
• Detecting Viruses, Malware, and Spyware
5
Protecting Sensitive Data
• VPN, No “Public Wi-Fi”
• Encrypting Internet & Cell Communications on
Mobile Devices
• Only Authenticated Devices on Firm Network
• System is Only as Safe as the Weakest Link
6
Weak Links are Everywhere
• Human Factors Create
Weakest Links!
• Passwords
• Unsecured, Unattended
Computers & Devices
Cybersecurity Insurance
& Audits
• Do You Need It?
• What Does Insurance
Cover?
• Who’s Reading My
Communications?
• System Monitoring
Options
8
It’s Not the Cloud, It’s you
• Online System
Redundancy
• Off-Site Disaster
Recovery Backup
• Adequate Physical
& Virtual Protection
• Location of Data
9
Document Management
• Centralized Data Storage
• Encrypted Communication w/in System, Encryption
at Rest
• Access History Logging
• Passwords Not Stored w/ Data or Employee
Accessible
• Data Center Security & Remote Data Redundancy
• Meeting HIPAA, Privacy, EAR, ITAR, etc.
Requirements
10
The Future is Now,
Change How You Think
• Tagged Client Files for
Tracking & DMCA
• Secure Your WiFi
Network
• Regular Technology
Education Sessions
Questions?
antigone.peyton@cloudigylaw.com
Twitter: @antigonepeyton
@cloudigylaw
LinkedIn: http://cl.oud.im/1yEm2Xe
Internet: HTTP://cloudigylaw.com
12

Contenu connexe

Tendances

A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
Internet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOTInternet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOTPixelCrayons
 
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...Bruno Segers
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Thingsninaazmi4
 
Biometric authentication methods
Biometric authentication methodsBiometric authentication methods
Biometric authentication methodsFelixTaelemans
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksNicole Garton
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011Nicole Black
 
Web of Things Application Architecture
Web of Things Application ArchitectureWeb of Things Application Architecture
Web of Things Application ArchitectureDominique Guinard
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetupIshay Tentser
 
Wearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsWearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsGiulio Coraggio
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of ThingsGiulio Coraggio
 
The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115Devaraj Sl
 
e-Signatures Summit for Insurance Executives
e-Signatures Summit for Insurance Executivese-Signatures Summit for Insurance Executives
e-Signatures Summit for Insurance ExecutiveseSignLive by VASCO
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data28 Burnside
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyIshay Tentser
 

Tendances (19)

A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
Internet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOTInternet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOT
 
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Biometric authentication methods
Biometric authentication methodsBiometric authentication methods
Biometric authentication methods
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the Risks
 
Internet Of Things(IoT)
Internet Of Things(IoT)Internet Of Things(IoT)
Internet Of Things(IoT)
 
IOT
IOTIOT
IOT
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011
 
Web of Things Application Architecture
Web of Things Application ArchitectureWeb of Things Application Architecture
Web of Things Application Architecture
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
 
Wearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsWearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rights
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of Things
 
Tg05
Tg05Tg05
Tg05
 
The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115
 
e-Signatures Summit for Insurance Executives
e-Signatures Summit for Insurance Executivese-Signatures Summit for Insurance Executives
e-Signatures Summit for Insurance Executives
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technology
 

Similaire à Kill the Dinosaurs, and Other Tips for Achieving Technical Competence

This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017Ray Bugg
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
Recent developments in data analytics and big data
Recent developments in data analytics and big dataRecent developments in data analytics and big data
Recent developments in data analytics and big dataDez Blanchfield
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeLenin Aboagye
 
Internal Investigations and the Cloud
Internal Investigations and the CloudInternal Investigations and the Cloud
Internal Investigations and the CloudDan Michaluk
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Ethics of Big Data
Ethics of Big DataEthics of Big Data
Ethics of Big DataMatti Vesala
 
Law Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsLaw Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsJennifer Ellis, JD, LLC
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EUVCW Security Ltd
 
Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...
Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...
Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...Browne Jacobson LLP
 
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersThe ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersNicole Black
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsCarl Brown
 
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksTackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksIT Masterclasses
 
Cisco io t for vietnam cio community 2 apr 2015 - split
Cisco io t for vietnam cio community   2 apr 2015 - splitCisco io t for vietnam cio community   2 apr 2015 - split
Cisco io t for vietnam cio community 2 apr 2015 - splitPhuc (Peter) Huynh
 
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - splitCisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - splitSon Phan
 
TBR IT Trends Study
TBR IT Trends StudyTBR IT Trends Study
TBR IT Trends StudyTBRMarketing
 
Speaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsSpeaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsJustin Grammens
 

Similaire à Kill the Dinosaurs, and Other Tips for Achieving Technical Competence (20)

This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Recent developments in data analytics and big data
Recent developments in data analytics and big dataRecent developments in data analytics and big data
Recent developments in data analytics and big data
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagye
 
Internal Investigations and the Cloud
Internal Investigations and the CloudInternal Investigations and the Cloud
Internal Investigations and the Cloud
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Ethics of Big Data
Ethics of Big DataEthics of Big Data
Ethics of Big Data
 
Law Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsLaw Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and Ethics
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EU
 
Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...
Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...
Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...
 
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersThe ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyers
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your Apps
 
Internal social media: risks and added value
Internal social media: risks and added valueInternal social media: risks and added value
Internal social media: risks and added value
 
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksTackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
 
Cisco io t for vietnam cio community 2 apr 2015 - split
Cisco io t for vietnam cio community   2 apr 2015 - splitCisco io t for vietnam cio community   2 apr 2015 - split
Cisco io t for vietnam cio community 2 apr 2015 - split
 
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - splitCisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
 
TBR IT Trends Study
TBR IT Trends StudyTBR IT Trends Study
TBR IT Trends Study
 
Speaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsSpeaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of Things
 

Plus de Antigone Peyton

Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Antigone Peyton
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsAntigone Peyton
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIAAntigone Peyton
 
Angel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging TechnologiesAngel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging TechnologiesAntigone Peyton
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for LitigatorsAntigone Peyton
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP FracasAntigone Peyton
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Antigone Peyton
 
Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Antigone Peyton
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)Antigone Peyton
 
Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Antigone Peyton
 

Plus de Antigone Peyton (11)

Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy Implications
 
2013 SBIR Presentation
2013 SBIR Presentation2013 SBIR Presentation
2013 SBIR Presentation
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIA
 
Angel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging TechnologiesAngel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging Technologies
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for Litigators
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP Fracas
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)
 
Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)
 
Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)
 

Dernier

Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Nilendra Kumar
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for projectVarshRR
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理e9733fc35af6
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaYash
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理bd2c5966a56d
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理F La
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书irst
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理Airst S
 

Dernier (20)

Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 

Kill the Dinosaurs, and Other Tips for Achieving Technical Competence

  • 1. kill the dinosaurs, and other tips for achieving technical competence in your law practice 2015 JOLT Symposium Antigone Peyton, Esq. Founder & CEO, Cloudigy Law PLLC #JOLTdinos Twitter: @AntigonePeyton
  • 2. Dinosaur Thoughts… • Fax & Email are Secure • Public WiFi is Great! • Paper & Electronic Worlds, All the Same • Merging Personal & Firm Data, No Big Deal 2
  • 3. extinction Milestones: • 2004 Zubulake Case; 2010 Pension Committee Case • Update: ABA Model Rule 1.1 Competence • Edward Snowden • NSA Snooping on Law Firm Communications? • Ethics Updates on Cloud Computing 3
  • 4. What Can We Do to Change Them? • Changes to Business Model, New Best Practices • CLE Includes Tech Competence • Clients Demand Competent Counsel • Security Audits • Next hire—CIO/CTO? 4
  • 5. Protecting Sensitive Data • Review Service & Product Providers’ TOS and Privacy Policies • What’s on the Office Copier Hard Drive? • Networking Devices • Security on Mobile Devices and BYOD Issues • Detecting Viruses, Malware, and Spyware 5
  • 6. Protecting Sensitive Data • VPN, No “Public Wi-Fi” • Encrypting Internet & Cell Communications on Mobile Devices • Only Authenticated Devices on Firm Network • System is Only as Safe as the Weakest Link 6
  • 7. Weak Links are Everywhere • Human Factors Create Weakest Links! • Passwords • Unsecured, Unattended Computers & Devices
  • 8. Cybersecurity Insurance & Audits • Do You Need It? • What Does Insurance Cover? • Who’s Reading My Communications? • System Monitoring Options 8
  • 9. It’s Not the Cloud, It’s you • Online System Redundancy • Off-Site Disaster Recovery Backup • Adequate Physical & Virtual Protection • Location of Data 9
  • 10. Document Management • Centralized Data Storage • Encrypted Communication w/in System, Encryption at Rest • Access History Logging • Passwords Not Stored w/ Data or Employee Accessible • Data Center Security & Remote Data Redundancy • Meeting HIPAA, Privacy, EAR, ITAR, etc. Requirements 10
  • 11. The Future is Now, Change How You Think • Tagged Client Files for Tracking & DMCA • Secure Your WiFi Network • Regular Technology Education Sessions

Notes de l'éditeur

  1. Notes here
  2. Notes here
  3. Notes here