SlideShare une entreprise Scribd logo
1  sur  23
Ethical Challenges for Mobile
                      Practice
                      Jonathan I. Ezor
                   jezor@olshanlaw.com
                          Olshan
                    CLE Lunch Seminar
                      March 21, 2012

1604814-1
Electronic Communications Crucial
                      for All Businesspeople
             • Multiple channels of electronic business communication
                      –    E-mail
                      –    Text messages
                      –    Web sites
                      –    Videoconferencing
                      –    Social media
                      –    Others
             • Can be one-way, two-way or multipoint




            jezor@olshanlaw.com

1604814-1
Common Challenges of Electronic Business
                           Communication
             •      Addressing and attachment errors
             •      Lack of nuance & tone
             •      Heightened expectations of responsiveness
             •      Informality
             •      Compliance
             •      Management


            jezor@olshanlaw.com

1604814-1
Attorneys’ Ethical Obligations
                          Add to Challenges

             • Rules of Professional Conduct impact on attorney
               communication
             • Lawyers must ensure compliance with those as well as
               with good business practices
             • Substantial risks for failures
             • Risks beyond formal ethics issues

            jezor@olshanlaw.com

1604814-1
1604814-1
1604814-1
Concluding Paragraph from ABA
                          Technology Proposal
             •      Technology can increase the quality of legal services, reduce the cost of legal
                    services to existing clients, and enable lawyers to represent clients who might
                    not otherwise have been able to afford those services. Lawyers, however, need
                    to understand that technology can pose certain risks to clients’ confidential
                    information and that reasonable safeguards are ethically required. The
                    Commission’s proposals are designed to help lawyers understand these risks
                    so that they can take appropriate and reasonable measures when taking
                    advantage of technology’s many benefits….




            jezor@olshanlaw.com

1604814-1
Attorneys: Confidentiality is Not a
                                      Privilege
             • Attorneys required to maintain confidentiality
             • Encryption not (yet) required for e-mail, but must
               take appropriate precautions
             • Failure can lead not only to sanctions, but real-
               world consequences for clients
             • Problem can be compounded by lack of IT
               resources

            jezor@tourolaw.edu

1604814-1
Cloud and Other Remote Storage
             • Remote storage and applications newly
               relevant
             • Connect desktop and mobile devices to
               enterprise-level resources
             • Ethical concerns particularly over
               confidentiality

            jezor@olshanlaw.com

1604814-1
http://is.gd/X3j7BP
1604814-1
1604814-1
Home Office Ethical Issues
        • Wireless network security
        • Physical security
        • “Bona Fide Office” and residency
          requirements
                  – NY Judiciary Law §470
                  – Schoenefeld v. New York
            jezor@olshanlaw.com

1604814-1
1604814-1
http://www.schoenefeldlaw.com/images/pdf/summary_judgment_motions_decision.pdf
1604814-1
Mobile Devices & Telecommuting:
                                  Additional Confidentiality Risks
             • Attorneys carry entire client files, critical documents on
               tablets, smartphones & laptops
                      – Easily lost or stolen
                      – Often not protected with passwords
             • Many use unsecured public wireless networks
             • Public computers (hotels, business centers) can store info.
               in memory




            jezor@tourolaw.edu

1604814-1
1604814-1
1604814-1
Attorneys Tweeting Badly




            jezor@olshanlaw.com

1604814-1
1604814-1
1604814-1
1604814-1
Best Practices:
            Know Technology & Encrypt Data
        • Understanding and using security features critical
                  –    VPN
                  –    Passwords
                  –    Remote wipe
                  –    Screen privacy filters
        • Encrypt whenever possible
                  – Truecrypt
                  – SSL connections
        • Work closely with IT professionals
            jezor@olshanlaw.com

1604814-1
Questions?


       jezor@olshanlaw.com

1604814-1

Contenu connexe

Tendances

Safety And Security Of Data Student Work
Safety And Security Of Data Student WorkSafety And Security Of Data Student Work
Safety And Security Of Data Student WorkWynthorpe
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issuesblogzilla
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITYKak Yong
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The LawSaimaRafiq
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-bBbAOC
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
The challenges of digital evidence in ‘formal proceedings’ from Accuracy
The challenges of digital evidence in ‘formal proceedings’ from AccuracyThe challenges of digital evidence in ‘formal proceedings’ from Accuracy
The challenges of digital evidence in ‘formal proceedings’ from AccuracyPaul Wright MSc
 
Chapter4 issues with ict2016
Chapter4 issues with ict2016Chapter4 issues with ict2016
Chapter4 issues with ict2016asiara
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentationDarren McManus
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics Avinash Mavuru
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacymrzapper
 

Tendances (20)

Safety And Security Of Data Student Work
Safety And Security Of Data Student WorkSafety And Security Of Data Student Work
Safety And Security Of Data Student Work
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-b
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
The challenges of digital evidence in ‘formal proceedings’ from Accuracy
The challenges of digital evidence in ‘formal proceedings’ from AccuracyThe challenges of digital evidence in ‘formal proceedings’ from Accuracy
The challenges of digital evidence in ‘formal proceedings’ from Accuracy
 
Cybersmart
CybersmartCybersmart
Cybersmart
 
Chapter4 issues with ict2016
Chapter4 issues with ict2016Chapter4 issues with ict2016
Chapter4 issues with ict2016
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentation
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 

En vedette

4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLEJonathan Ezor
 
Social Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsSocial Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsJonathan Ezor
 
3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentationJonathan Ezor
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLEJonathan Ezor
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright PresentationJonathan Ezor
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security PresentationJonathan Ezor
 
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media RiskJonathan Ezor
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterJonathan Ezor
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality PresentationJonathan Ezor
 

En vedette (9)

4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE
 
Social Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsSocial Media Horror Stories for Law Students
Social Media Horror Stories for Law Students
 
3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation
 
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation
 

Similaire à 3 21-12 ethical challenges for mobile practice

Osgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slidesOsgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slidesDan Michaluk
 
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceAntigone Peyton
 
ILTA Product Briefing: How are your users sharing confidential information?
ILTA Product Briefing: How are your users sharing confidential information? ILTA Product Briefing: How are your users sharing confidential information?
ILTA Product Briefing: How are your users sharing confidential information? TitanFile
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyCompliancy Group
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptRogerPrimo2
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansRob Ragan
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applicationsedwinlorenzana
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...ImageSoft
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...William Tanenbaum
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallJ. David Morris
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksNicole Garton
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
An information management update for in house counsel
An information management update for in house counselAn information management update for in house counsel
An information management update for in house counselDan Michaluk
 

Similaire à 3 21-12 ethical challenges for mobile practice (20)

Osgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slidesOsgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slides
 
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
 
ILTA Product Briefing: How are your users sharing confidential information?
ILTA Product Briefing: How are your users sharing confidential information? ILTA Product Briefing: How are your users sharing confidential information?
ILTA Product Briefing: How are your users sharing confidential information?
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of Privacy
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
 
Internal social media: risks and added value
Internal social media: risks and added valueInternal social media: risks and added value
Internal social media: risks and added value
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applications
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the Firewall
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the Risks
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
An information management update for in house counsel
An information management update for in house counselAn information management update for in house counsel
An information management update for in house counsel
 

Dernier

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Dernier (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

3 21-12 ethical challenges for mobile practice

  • 1. Ethical Challenges for Mobile Practice Jonathan I. Ezor jezor@olshanlaw.com Olshan CLE Lunch Seminar March 21, 2012 1604814-1
  • 2. Electronic Communications Crucial for All Businesspeople • Multiple channels of electronic business communication – E-mail – Text messages – Web sites – Videoconferencing – Social media – Others • Can be one-way, two-way or multipoint jezor@olshanlaw.com 1604814-1
  • 3. Common Challenges of Electronic Business Communication • Addressing and attachment errors • Lack of nuance & tone • Heightened expectations of responsiveness • Informality • Compliance • Management jezor@olshanlaw.com 1604814-1
  • 4. Attorneys’ Ethical Obligations Add to Challenges • Rules of Professional Conduct impact on attorney communication • Lawyers must ensure compliance with those as well as with good business practices • Substantial risks for failures • Risks beyond formal ethics issues jezor@olshanlaw.com 1604814-1
  • 7. Concluding Paragraph from ABA Technology Proposal • Technology can increase the quality of legal services, reduce the cost of legal services to existing clients, and enable lawyers to represent clients who might not otherwise have been able to afford those services. Lawyers, however, need to understand that technology can pose certain risks to clients’ confidential information and that reasonable safeguards are ethically required. The Commission’s proposals are designed to help lawyers understand these risks so that they can take appropriate and reasonable measures when taking advantage of technology’s many benefits…. jezor@olshanlaw.com 1604814-1
  • 8. Attorneys: Confidentiality is Not a Privilege • Attorneys required to maintain confidentiality • Encryption not (yet) required for e-mail, but must take appropriate precautions • Failure can lead not only to sanctions, but real- world consequences for clients • Problem can be compounded by lack of IT resources jezor@tourolaw.edu 1604814-1
  • 9. Cloud and Other Remote Storage • Remote storage and applications newly relevant • Connect desktop and mobile devices to enterprise-level resources • Ethical concerns particularly over confidentiality jezor@olshanlaw.com 1604814-1
  • 12. Home Office Ethical Issues • Wireless network security • Physical security • “Bona Fide Office” and residency requirements – NY Judiciary Law §470 – Schoenefeld v. New York jezor@olshanlaw.com 1604814-1
  • 15. Mobile Devices & Telecommuting: Additional Confidentiality Risks • Attorneys carry entire client files, critical documents on tablets, smartphones & laptops – Easily lost or stolen – Often not protected with passwords • Many use unsecured public wireless networks • Public computers (hotels, business centers) can store info. in memory jezor@tourolaw.edu 1604814-1
  • 18. Attorneys Tweeting Badly jezor@olshanlaw.com 1604814-1
  • 22. Best Practices: Know Technology & Encrypt Data • Understanding and using security features critical – VPN – Passwords – Remote wipe – Screen privacy filters • Encrypt whenever possible – Truecrypt – SSL connections • Work closely with IT professionals jezor@olshanlaw.com 1604814-1
  • 23. Questions? jezor@olshanlaw.com 1604814-1