SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
6 National Paralegal Reporter®
by Pamela J. Starr,
CBA, J.S.M.
I
t takes a firm grasp on technology for paralegals to excel at their
jobs. Our feet are firmly planted in the ‘cloud’, as the Internet, com-
bined with our devices, apps, and software, renders us more produc-
tive, efficient, accessible, and vulnerable.
What is this ‘cloud’? It is not some ethereal or nebulous construct that
exists somewhere in the stratosphere, but is “a known road and location
that data travels to and on and does not mean that data is floating out in
space unprotected and unobtainable.”1 (emphasis added) For the uniniti-
ated, the terms ‘cloud’ and ‘cloud computing’ originally referred to the
visual devices programmers created to describe the complex network of
systems involved in data transfer and storage in cyberspace. These web-
based services increase productivity by allowing users to store and
retrieve data that has been centrally stored on an outside server, i.e. web-
based email, social media, online banking, e-commerce, and more.
Technology provides the tools for legal professionals to be more auton-
omous and produce exemplary work, anywhere and anytime. Attorneys
and paralegals use cloud-based productivity applications to telecommute
and work remotely. Files stored offsite can be viewed and edited in real
time, by several users, from any Internet-connected device, and meetings,
CLEs, and hearings are often conducted virtually. Whether working in a
traditional workspace, or minding the cloud, lawyers, paralegals, and
legal service providers are bound by the same legal and ethical constraints
as their brick and mortar counterparts.
The Intersection of Technology and Ethics
With all these tools and advances, we find ourselves at the very busy
intersection of technology and ethics. Not only does technology make it
possible to work virtually from practically anywhere, it has also made it
easier to inadvertently cross ethical lines.
We access the Internet anywhere and everywhere — from our homes,
Minding
‘The Cloud’
work, school, and even in-flight.
Visualize every computer, laptop, tab-
let, cell phone, application, and other
Internet portal as a window into your
life. (They call them ‘windows’ for a
reason.) Every window in your home
has, at the very least, a reliable lock-
ing mechanism; most have some sort
of covering — a pull-down shade,
blinds, or even black-out curtains —
to protect your privacy from the pry-
ing eyes of neighbors and passers-by.
Our digital ‘windows’ require similar
protection to protect personal infor-
mation from interception by fellow
travelers on the "interwebs."
So what does this mean for us as
paralegals? Think about Snowden and
the NSA, hacker attacks on retailers,
and recent denial-of-service attacks
on the CM/ECF system. Now consid-
er the nature of the information trans-
mitted from client to attorney, attor-
ney to paralegal, and so on. Paralegals
often have access to clients’ personal
information: credit reports, Social
Security numbers, and accounting,
financial and medical records, as well
as other forms of protected informa-
tion. Whether the information resides
on a device or in the cloud, we are
ethically bound to ensure that confi-
dentiality, privacy, and security poli-
cies and protocols are established and
enforced.
Minding The Cloud
Confidentiality
In August 2011, the ABA Standing Committee on
Ethics and Professional Responsibility published its
opinion on the “Duty to Protect the Confidentiality of
E-mail Communications with One’s Client.” Among
other things, the opinion addresses concerns as to the risk
of third party access to any online communication:
A lawyer sending or receiving substantive com-
munications with a client via email or other elec-
tronic means ordinarily must warn the client about
the risk of sending or receiving electronic commu-
nications using a computer or other device, or
email account, to which a third party may gain
access. The risk may vary. Whenever a lawyer
communicates with a client by email, the lawyer
must first consider whether, given the client’s situ-
ation, there is a significant risk that third parties
will have access to the communications. If so, the
lawyer must take reasonable care to protect the
confidentiality of the communications by giving
appropriately tailored advice to the client.2
(emphasis added)
Obviously, this legal and ethical obligation to protect
client data applies to paralegals in addition to the attor-
neys to whom the opinion was originally directed.
Privacy
Unless you choose to return to the time of “stone
knives and bear skins,”3 you must accept that personal
information is no longer sacrosanct. Legally speaking,
Personally Identifiable Information (PII) is:
Any information about an individual maintained
by an agency, including (1) any information that
can be used to distinguish or trace an individual’s
identity, such as name, social security number,
date and place of birth, mother’s maiden name, or
biometric records; and (2) any other information
that is linked or linkable to an individual, such as
medical, educational, financial, and employment
information.4
As soon as you connect to the Internet, your personal
information becomes vulnerable. Whether you are read-
ing or sending email, participating in a listserv, post-
ing to Twitter, updating Facebook, submitting a blog
post, commenting on LinkedIn, making online pur-
chases and payments, checking your bank and credit
card accounts, IM-ing, chatting, Skyping, making
VoIP calls, clicking a link, or sending information
from your cellphone or tablet, you have flung the
(previously mentioned) window wide open.
We, as a society and professionals, have become far
too complacent about sharing information. We liber-
ally supply our names, phone numbers, email address-
es, and more on online forms. All it takes is a simple
click of the mouse to release that information, irre-
trievably, into the ether and potentially into disreputa-
ble hands. Our easygoing attitude toward sharing
information combined with the trend toward BYOD
(bring your own device) is a recipe for disaster.
Summer 2014 7
8 National Paralegal Reporter®
Security
Every online activity has the
potential to reveal confidential
information. With so many para-
legals working virtually and
remotely, security is crucial. Not
only do you need to know the
physical location of your devices
and servers, as well as the type of
Internet connection being used,
but it is also essential to imple-
ment and follow safety protocols.
To quote Ben Schorr, author of
Office for Lawyers (www.officeforlawyers.com),
“security is a process, not a product.”
Getting Started
So, what should your process be? To start:
• Whenever possible, avoid public hotspots and use
a secure Internet connection to reduce exposure to
eavesdropping, piggy-backing, and hacking. When
a secure connection is unavailable, use some form
of Virtual Private Network (VPN) software to
encrypt the signal.
• Use (and regularly change) complicated pass-
words/passphrases. Short, simple passwords are
vulnerable to dictionary and brute force attacks.
The best passwords/passphrases contain 12 or
more characters, and incorporate upper and lower
case letters, symbols, spaces, and punctuation.
• Install and enable VPNs, firewalls, and programs
to detect and remove adware, spyware, malware,
viruses, browser hijackers, cookies, data miners,
temporary files, and virus remnants.
• Read Privacy Statements and Terms of Service for
everything — website access, downloads, web host-
ing, cloud service providers.
• Confirm where the servers
are located and where the
data is stored – servers and
data stored outside the U.S.
are subject to the laws of
the jurisdiction in which
they are physically located.
• Determine whether secure
technology is used to protect
your information: what infor-
mation is collected and for
what purpose; to whom is
access to the information permitted; and how is the
information backed up?
• Look for sites that implement Secure Sockets
Layer (SSL), Transport Layer Security (TLS) pro-
tocols, and HTTPS (Hypertext Transfer Protocol
Secure) encryption.
Remember, once information has been committed to
the interwebs, it is out there forever. Nothing on the
Internet is ever truly deleted. Information is shared,
stored, and cached. Safe surfing involves keeping
your windows locked and covered.
Pamela J. Starr launched StarrParalegals
in 2008 to provide 21st century paralegal
support to attorneys in Bankruptcy 
Creditors' Rights, Commercial
Transactions, UCC, and all things ECF. In
her role as Paralegal Extraordinaire, she
helps attorneys throughout the US make
their “billable dollar worth every
penny.”© Pamela, a former Georgia
Association of Paralegals’ Membership
Vice President, serves on NFPA’s Ethics Board, blogs as her
alter ego, 'Pamela the Paralegal', provides Career Mitigation©
services to transitioning professionals at ‘Sessions with a Starr’
and attends grad school. She can be reached at pjstarr@starr-
paralegals.com.
Minding The Cloud
1. Stephanie L. Kimbro, Virtual Law Practice: How to Deliver Legal Services Online (ABA, Law Practice Management Section. 2010).
2. ABA Standing Committee on Ethics and Professional Responsibility, Duty To Protect The Confidentiality of E-Mail Communications with One's Client,
Formal Opinion 11-459 (2011).
3. Star Trek — The City on the Edge of Forever (Desilu Productions, April 6, 1967).
4. E. McCallisterm, NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (2010-05-12, 2010).

Contenu connexe

Tendances

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
Natasha Khramtsovsky
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 
Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?
Nicole Black
 
CRNArticle_MobileDevices_v2
CRNArticle_MobileDevices_v2CRNArticle_MobileDevices_v2
CRNArticle_MobileDevices_v2
Wayne Klug
 
2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata
Steph Cliche
 

Tendances (20)

Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Tailored Interactions
Tailored InteractionsTailored Interactions
Tailored Interactions
 
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
 
Network security
Network securityNetwork security
Network security
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
CRNArticle_MobileDevices_v2
CRNArticle_MobileDevices_v2CRNArticle_MobileDevices_v2
CRNArticle_MobileDevices_v2
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Research Proposal K.M.Sangeetha
Research Proposal K.M.SangeethaResearch Proposal K.M.Sangeetha
Research Proposal K.M.Sangeetha
 
2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata
 
Data, data slides
Data, data  slidesData, data  slides
Data, data slides
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 

Similaire à MindingTheCloud_NPR_Sum2014-no cover

FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
Matthew Magner
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
Joseph White MPA CPM
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
Christopher Lisasi
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
Patrick Garrett
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
segughana
 

Similaire à MindingTheCloud_NPR_Sum2014-no cover (20)

Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Information security
Information securityInformation security
Information security
 
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Information security
Information securityInformation security
Information security
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 Assignment
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Whitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and SecurityWhitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and Security
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
 

MindingTheCloud_NPR_Sum2014-no cover

  • 1. 6 National Paralegal Reporter® by Pamela J. Starr, CBA, J.S.M. I t takes a firm grasp on technology for paralegals to excel at their jobs. Our feet are firmly planted in the ‘cloud’, as the Internet, com- bined with our devices, apps, and software, renders us more produc- tive, efficient, accessible, and vulnerable. What is this ‘cloud’? It is not some ethereal or nebulous construct that exists somewhere in the stratosphere, but is “a known road and location that data travels to and on and does not mean that data is floating out in space unprotected and unobtainable.”1 (emphasis added) For the uniniti- ated, the terms ‘cloud’ and ‘cloud computing’ originally referred to the visual devices programmers created to describe the complex network of systems involved in data transfer and storage in cyberspace. These web- based services increase productivity by allowing users to store and retrieve data that has been centrally stored on an outside server, i.e. web- based email, social media, online banking, e-commerce, and more. Technology provides the tools for legal professionals to be more auton- omous and produce exemplary work, anywhere and anytime. Attorneys and paralegals use cloud-based productivity applications to telecommute and work remotely. Files stored offsite can be viewed and edited in real time, by several users, from any Internet-connected device, and meetings, CLEs, and hearings are often conducted virtually. Whether working in a traditional workspace, or minding the cloud, lawyers, paralegals, and legal service providers are bound by the same legal and ethical constraints as their brick and mortar counterparts. The Intersection of Technology and Ethics With all these tools and advances, we find ourselves at the very busy intersection of technology and ethics. Not only does technology make it possible to work virtually from practically anywhere, it has also made it easier to inadvertently cross ethical lines. We access the Internet anywhere and everywhere — from our homes, Minding ‘The Cloud’ work, school, and even in-flight. Visualize every computer, laptop, tab- let, cell phone, application, and other Internet portal as a window into your life. (They call them ‘windows’ for a reason.) Every window in your home has, at the very least, a reliable lock- ing mechanism; most have some sort of covering — a pull-down shade, blinds, or even black-out curtains — to protect your privacy from the pry- ing eyes of neighbors and passers-by. Our digital ‘windows’ require similar protection to protect personal infor- mation from interception by fellow travelers on the "interwebs." So what does this mean for us as paralegals? Think about Snowden and the NSA, hacker attacks on retailers, and recent denial-of-service attacks on the CM/ECF system. Now consid- er the nature of the information trans- mitted from client to attorney, attor- ney to paralegal, and so on. Paralegals often have access to clients’ personal information: credit reports, Social Security numbers, and accounting, financial and medical records, as well as other forms of protected informa- tion. Whether the information resides on a device or in the cloud, we are ethically bound to ensure that confi- dentiality, privacy, and security poli- cies and protocols are established and enforced.
  • 2. Minding The Cloud Confidentiality In August 2011, the ABA Standing Committee on Ethics and Professional Responsibility published its opinion on the “Duty to Protect the Confidentiality of E-mail Communications with One’s Client.” Among other things, the opinion addresses concerns as to the risk of third party access to any online communication: A lawyer sending or receiving substantive com- munications with a client via email or other elec- tronic means ordinarily must warn the client about the risk of sending or receiving electronic commu- nications using a computer or other device, or email account, to which a third party may gain access. The risk may vary. Whenever a lawyer communicates with a client by email, the lawyer must first consider whether, given the client’s situ- ation, there is a significant risk that third parties will have access to the communications. If so, the lawyer must take reasonable care to protect the confidentiality of the communications by giving appropriately tailored advice to the client.2 (emphasis added) Obviously, this legal and ethical obligation to protect client data applies to paralegals in addition to the attor- neys to whom the opinion was originally directed. Privacy Unless you choose to return to the time of “stone knives and bear skins,”3 you must accept that personal information is no longer sacrosanct. Legally speaking, Personally Identifiable Information (PII) is: Any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual’s identity, such as name, social security number, date and place of birth, mother’s maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information.4 As soon as you connect to the Internet, your personal information becomes vulnerable. Whether you are read- ing or sending email, participating in a listserv, post- ing to Twitter, updating Facebook, submitting a blog post, commenting on LinkedIn, making online pur- chases and payments, checking your bank and credit card accounts, IM-ing, chatting, Skyping, making VoIP calls, clicking a link, or sending information from your cellphone or tablet, you have flung the (previously mentioned) window wide open. We, as a society and professionals, have become far too complacent about sharing information. We liber- ally supply our names, phone numbers, email address- es, and more on online forms. All it takes is a simple click of the mouse to release that information, irre- trievably, into the ether and potentially into disreputa- ble hands. Our easygoing attitude toward sharing information combined with the trend toward BYOD (bring your own device) is a recipe for disaster. Summer 2014 7
  • 3. 8 National Paralegal Reporter® Security Every online activity has the potential to reveal confidential information. With so many para- legals working virtually and remotely, security is crucial. Not only do you need to know the physical location of your devices and servers, as well as the type of Internet connection being used, but it is also essential to imple- ment and follow safety protocols. To quote Ben Schorr, author of Office for Lawyers (www.officeforlawyers.com), “security is a process, not a product.” Getting Started So, what should your process be? To start: • Whenever possible, avoid public hotspots and use a secure Internet connection to reduce exposure to eavesdropping, piggy-backing, and hacking. When a secure connection is unavailable, use some form of Virtual Private Network (VPN) software to encrypt the signal. • Use (and regularly change) complicated pass- words/passphrases. Short, simple passwords are vulnerable to dictionary and brute force attacks. The best passwords/passphrases contain 12 or more characters, and incorporate upper and lower case letters, symbols, spaces, and punctuation. • Install and enable VPNs, firewalls, and programs to detect and remove adware, spyware, malware, viruses, browser hijackers, cookies, data miners, temporary files, and virus remnants. • Read Privacy Statements and Terms of Service for everything — website access, downloads, web host- ing, cloud service providers. • Confirm where the servers are located and where the data is stored – servers and data stored outside the U.S. are subject to the laws of the jurisdiction in which they are physically located. • Determine whether secure technology is used to protect your information: what infor- mation is collected and for what purpose; to whom is access to the information permitted; and how is the information backed up? • Look for sites that implement Secure Sockets Layer (SSL), Transport Layer Security (TLS) pro- tocols, and HTTPS (Hypertext Transfer Protocol Secure) encryption. Remember, once information has been committed to the interwebs, it is out there forever. Nothing on the Internet is ever truly deleted. Information is shared, stored, and cached. Safe surfing involves keeping your windows locked and covered. Pamela J. Starr launched StarrParalegals in 2008 to provide 21st century paralegal support to attorneys in Bankruptcy Creditors' Rights, Commercial Transactions, UCC, and all things ECF. In her role as Paralegal Extraordinaire, she helps attorneys throughout the US make their “billable dollar worth every penny.”© Pamela, a former Georgia Association of Paralegals’ Membership Vice President, serves on NFPA’s Ethics Board, blogs as her alter ego, 'Pamela the Paralegal', provides Career Mitigation© services to transitioning professionals at ‘Sessions with a Starr’ and attends grad school. She can be reached at pjstarr@starr- paralegals.com. Minding The Cloud 1. Stephanie L. Kimbro, Virtual Law Practice: How to Deliver Legal Services Online (ABA, Law Practice Management Section. 2010). 2. ABA Standing Committee on Ethics and Professional Responsibility, Duty To Protect The Confidentiality of E-Mail Communications with One's Client, Formal Opinion 11-459 (2011). 3. Star Trek — The City on the Edge of Forever (Desilu Productions, April 6, 1967). 4. E. McCallisterm, NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (2010-05-12, 2010).