SlideShare a Scribd company logo
1 of 18
Cloud Computing
      Fred Wilf, Esq., Baer Crossey
     Dina Leytes, Esq., Griesing Law
Amy Larrimore, The Empire Builders Group
Client-Lawyer Relationship
      Rule 1.1 Competence
A lawyer shall provide competent
   representation to a client.
Competent representation
  requires the legal knowledge,
  skill, thoroughness and
  preparation reasonably
  necessary for the
  representation.
Client-Lawyer Relationship
Rule 1.6(a) Confidentiality Of Information

(a) A lawyer shall not reveal
  information relating to the
  representation of a client
  unless the client gives
  informed consent, the
  disclosure is impliedly
  authorized in order to carry
  out the representation or
  the disclosure is permitted
  by paragraph (b).
Client-Lawyer Relationship
Rule 1.6(b) Confidentiality Of Information
(b) A lawyer may reveal information relating to the representation of a client to the
     extent the lawyer reasonably believes necessary:

   (1) to prevent reasonably certain death or substantial bodily harm;

   (2) to prevent the client from committing a crime or fraud that is reasonably certain to result in
         substantial injury to the financial interests or property of another and in furtherance of which
         the client has used or is using the lawyer's services;

   (3) to prevent, mitigate or rectify substantial injury to the financial interests or property of another
         that is reasonably certain to result or has resulted from the client's commission of a crime or
         fraud in furtherance of which the client has used the lawyer's services;

   (4) to secure legal advice about the lawyer's compliance with these Rules;

   (5) to establish a claim or defense on behalf of the lawyer in a controversy between the lawyer
         and the client, to establish a defense to a criminal charge or civil claim against the lawyer
         based upon conduct in which the client was involved, or to respond to allegations in any
         proceeding concerning the lawyer's representation of the client; or

   (6) to comply with other law or a court order.
Business in the Cloud - Common

                 •Software as a service
                 •Web services
                       Social media
                         Linkedin
                         Wikipedia
                          Google
                 •Platform
                    Physical Hardware
                     Cloud - Amazon
Security Breach
 Generally speaking, it is   •   Adverse legal, regulatory and
 true that the ease of the       business consequences
      cloud increases
    vulnerability – with     •   Sanctions imposed by
significant consequences:        regulatory agencies
                             •   Loss of business
                             •   Reputational risk
                             •   Cost of complying with statutory
                                 notification obligations
                             •   Cost of remediation
Cloud Fear - Exposure
On Premise       Off Premise
Cloud Fear - Mitigation
     On Premise             Off Premise
•   Fire Employee(s)     • Sue them
•   Take the Blame       • Blame them
•   Claim against your   • Claim against their
    insurance policy       insurance policy
Due Diligence
•   Who at the service provider has         •   Does the provider have a privacy
    access to business records?                 and security policy?
•   Where is the service provider           •   What type of security is in place to
    located?                                    ensure data breaches do not occur?
•   Does the service provider comply with   •   Does the provider have a policy to
    all regulatory requirements?                be implemented in the case of a
•   How is the data stored – what is the
                                                data breach?
    data flow?                              •   What does that policy provider for
                                                with regards to client operations in
                                                such a case?

                                            •   What insurance or asset levels exist
                                                at the provider?
How does IT Bob Stack up?
             Due diligence process for
               outside providers tends to
               be common.
             Many providers are rejected
               as part of this process.
             Rarely would the internal
               alternatives pass if they
               were also subjected to
               the process.
Refusal to Approve
 Approval is a       •   Failure to adequately
                         assess, approve and implement
point in time, not       technology (non-action) is a
  an ongoing             significant exposure

    process          •   Exposure is reason new technology
                         is rejected
                     •   Secure products become unsecure
                         in short time frame
                     •   New tech presents the opportunity
                         for more security
                     •   Compliance and legal education and
                         approval cycle process
                     •   No case law
•   Courts are wiling to recognize
Jurisdiction             personal jurisdiction based on
  What are all the       location of cloud computing
locations in which       services.
 you do business         Forward Foods LLC v Next Proteins, Inc., 2008 BL
    virtually?               238516 (N.Y. Sup. 2008)

                     •   In some jurisdictions when
                         weighing convenience of a
                         forum, physical recordkeeping
                         takes precedence.
                         Gelmato S.A. v. HTC Corp., 2011 U.S. Dist. LEXIS
                            133612 (E.D. Tex. Nov. 18, 2011)

                     •   Compliance department requires
                         instruction on these issues.
The Cloud and The World
• There are no international rules governing cloud
  related concerns.
• The EU Data Protection
    Directive provides that
    transfer of personal data
    may be made only to
    member states and to
    jurisdictions with
    adequate data security
    standards.

•   The US is NOT currently deemed to have
    adequate data security standards.
Issues in E-Discovery
•   Parties that store third party data should not expect
    to be shielded from discovery rules
    Columbia Pictures, Inc. v. Bunnell, 245 F.R.D. 443 (C.D. Cal. 2007)
• FRCP require production based
    on “possession, custody or
    control”
•   If responding party has the ability
    to obtain data, it may be
    compelled to do so
•   Discoverable information is still
    protected by privilege, wherever it
    exists
    Tomlinson v. El Paso Corp.,245 F.R.D. 474 (D. Colo. 2007)
Protection of Trade Secrets
•   CFAA: Computer Fraud and Abuse Act
    •   What is unauthorized access?
    •   Employees, Third Party Providers, Social Media
•   Importance of policy vs. hardware controls
    U.S. v. Nosal, 642 F.3d 781 (9th Cir. 2011)

•   Social media
    •   Use or Excessive Use
    •   Social Media Policy
Summary
•   Ethics: Competence and Confidentiality
•   Matters of Business:
    •   Cloud Fear vs. Risk “Skeletons” in IT Closet
    •   Due Diligence and Point in Time Compliance
•   Matters of Law
    •   Jurisdiction
    •   The Cloud and the World
    •   E-Discovery
    •   Trade Secrets
Dina Leytes, Esq.
www.griesinglaw.com
215-732-3924
dleytes@griesinglaw.com

Frederic Wilf, Esq., Partner
http://www.baercrossey.com
215-636-9220
fwilf@baercrossey.com


Amy H. Larrimore, Chief Strategist
The Empire Builders Group
www.amylarrimore.com
www.empirebuilders.biz
215-645-2691 or me@amylarrimore.com


slide design, creativity & general awesomeness powered by:

More Related Content

What's hot

Legal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersLegal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersMMMTechLaw
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspacetimmcguinness
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers
 
Harry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get WorseHarry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get Worsecentralohioissa
 
Under Lock And Key
Under Lock And KeyUnder Lock And Key
Under Lock And KeyYarko Petriw
 
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...Jon Polenberg
 
Legal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & UsersLegal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & Usersjyates
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksResilient Systems
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensenjaredcarst
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2dbarton944
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortzitnewsafrica
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
 

What's hot (20)

Legal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersLegal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and Users
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
02 presentation-christianprobst
02 presentation-christianprobst02 presentation-christianprobst
02 presentation-christianprobst
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
 
Harry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get WorseHarry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get Worse
 
Under Lock And Key
Under Lock And KeyUnder Lock And Key
Under Lock And Key
 
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
 
Legal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & UsersLegal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & Users
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 

Viewers also liked

Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyAmy Larrimore
 
Manati presentacion
Manati presentacionManati presentacion
Manati presentacionRodrigo Ruiz
 
Get Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 PercentGet Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 PercentAmy Larrimore
 
Africa perspectives till 2020
Africa perspectives till 2020Africa perspectives till 2020
Africa perspectives till 2020Max Be
 
Increase Your Revenue 80% Using Technology
Increase Your Revenue 80% Using TechnologyIncrease Your Revenue 80% Using Technology
Increase Your Revenue 80% Using TechnologyAmy Larrimore
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingAmy Larrimore
 
Twitter: How to Start a Revolution
Twitter: How to Start a RevolutionTwitter: How to Start a Revolution
Twitter: How to Start a RevolutionAmy Larrimore
 
How to Fool the Lawyers and Get Your SaaS Tool Approved
How to Fool the Lawyers and Get Your SaaS Tool ApprovedHow to Fool the Lawyers and Get Your SaaS Tool Approved
How to Fool the Lawyers and Get Your SaaS Tool ApprovedAmy Larrimore
 
Get Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 PercentGet Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 PercentAmy Larrimore
 
What Technology Can Do For You - The Nonprofit Edition
What Technology Can Do For You - The Nonprofit EditionWhat Technology Can Do For You - The Nonprofit Edition
What Technology Can Do For You - The Nonprofit EditionAmy Larrimore
 
SCORE Peer Learning: Increasing your services with Technology
SCORE Peer Learning: Increasing your services with TechnologySCORE Peer Learning: Increasing your services with Technology
SCORE Peer Learning: Increasing your services with TechnologyAmy Larrimore
 
Applying technology to jumpstart your sales v092311
Applying technology to jumpstart your sales v092311Applying technology to jumpstart your sales v092311
Applying technology to jumpstart your sales v092311Amy Larrimore
 
Kuliah siklus otto
Kuliah siklus ottoKuliah siklus otto
Kuliah siklus ottoMas Hendrawan
 
Latino immigration
Latino immigrationLatino immigration
Latino immigrationLeonor Monreal
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)onlineprivacy
 
When a Website Makes Cents for your Craft Business
When a Website Makes Cents for your Craft BusinessWhen a Website Makes Cents for your Craft Business
When a Website Makes Cents for your Craft BusinessAmy Larrimore
 

Viewers also liked (16)

Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
 
Manati presentacion
Manati presentacionManati presentacion
Manati presentacion
 
Get Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 PercentGet Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 Percent
 
Africa perspectives till 2020
Africa perspectives till 2020Africa perspectives till 2020
Africa perspectives till 2020
 
Increase Your Revenue 80% Using Technology
Increase Your Revenue 80% Using TechnologyIncrease Your Revenue 80% Using Technology
Increase Your Revenue 80% Using Technology
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud Computing
 
Twitter: How to Start a Revolution
Twitter: How to Start a RevolutionTwitter: How to Start a Revolution
Twitter: How to Start a Revolution
 
How to Fool the Lawyers and Get Your SaaS Tool Approved
How to Fool the Lawyers and Get Your SaaS Tool ApprovedHow to Fool the Lawyers and Get Your SaaS Tool Approved
How to Fool the Lawyers and Get Your SaaS Tool Approved
 
Get Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 PercentGet Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 Percent
 
What Technology Can Do For You - The Nonprofit Edition
What Technology Can Do For You - The Nonprofit EditionWhat Technology Can Do For You - The Nonprofit Edition
What Technology Can Do For You - The Nonprofit Edition
 
SCORE Peer Learning: Increasing your services with Technology
SCORE Peer Learning: Increasing your services with TechnologySCORE Peer Learning: Increasing your services with Technology
SCORE Peer Learning: Increasing your services with Technology
 
Applying technology to jumpstart your sales v092311
Applying technology to jumpstart your sales v092311Applying technology to jumpstart your sales v092311
Applying technology to jumpstart your sales v092311
 
Kuliah siklus otto
Kuliah siklus ottoKuliah siklus otto
Kuliah siklus otto
 
Latino immigration
Latino immigrationLatino immigration
Latino immigration
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)
 
When a Website Makes Cents for your Craft Business
When a Website Makes Cents for your Craft BusinessWhen a Website Makes Cents for your Craft Business
When a Website Makes Cents for your Craft Business
 

Similar to Cloud Computing Legal for Pennsylvania Bar Association

MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015William Tanenbaum
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016centralohioissa
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE Sarah Stogner
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Shawn Tuma
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Ontario Cloud SIG
 
An information management update for in house counsel
An information management update for in house counselAn information management update for in house counsel
An information management update for in house counselDan Michaluk
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingDLA Piper (Canada) LLP
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyResilient Systems
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotatedwdsnead
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewMichael C. Keeling, Esq.
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Bianca Mueller, LL.M.
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsResilient Systems
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 

Similar to Cloud Computing Legal for Pennsylvania Bar Association (20)

The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
An information management update for in house counsel
An information management update for in house counselAn information management update for in house counsel
An information management update for in house counsel
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Informed consent and cloud computing
Informed consent and cloud computingInformed consent and cloud computing
Informed consent and cloud computing
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
 
example
exampleexample
example
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 

Recently uploaded

It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 

Recently uploaded (20)

It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 

Cloud Computing Legal for Pennsylvania Bar Association

  • 1. Cloud Computing Fred Wilf, Esq., Baer Crossey Dina Leytes, Esq., Griesing Law Amy Larrimore, The Empire Builders Group
  • 2.
  • 3. Client-Lawyer Relationship Rule 1.1 Competence A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.
  • 4. Client-Lawyer Relationship Rule 1.6(a) Confidentiality Of Information (a) A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent, the disclosure is impliedly authorized in order to carry out the representation or the disclosure is permitted by paragraph (b).
  • 5. Client-Lawyer Relationship Rule 1.6(b) Confidentiality Of Information (b) A lawyer may reveal information relating to the representation of a client to the extent the lawyer reasonably believes necessary: (1) to prevent reasonably certain death or substantial bodily harm; (2) to prevent the client from committing a crime or fraud that is reasonably certain to result in substantial injury to the financial interests or property of another and in furtherance of which the client has used or is using the lawyer's services; (3) to prevent, mitigate or rectify substantial injury to the financial interests or property of another that is reasonably certain to result or has resulted from the client's commission of a crime or fraud in furtherance of which the client has used the lawyer's services; (4) to secure legal advice about the lawyer's compliance with these Rules; (5) to establish a claim or defense on behalf of the lawyer in a controversy between the lawyer and the client, to establish a defense to a criminal charge or civil claim against the lawyer based upon conduct in which the client was involved, or to respond to allegations in any proceeding concerning the lawyer's representation of the client; or (6) to comply with other law or a court order.
  • 6. Business in the Cloud - Common •Software as a service •Web services Social media Linkedin Wikipedia Google •Platform Physical Hardware Cloud - Amazon
  • 7. Security Breach Generally speaking, it is • Adverse legal, regulatory and true that the ease of the business consequences cloud increases vulnerability – with • Sanctions imposed by significant consequences: regulatory agencies • Loss of business • Reputational risk • Cost of complying with statutory notification obligations • Cost of remediation
  • 8. Cloud Fear - Exposure On Premise Off Premise
  • 9. Cloud Fear - Mitigation On Premise Off Premise • Fire Employee(s) • Sue them • Take the Blame • Blame them • Claim against your • Claim against their insurance policy insurance policy
  • 10. Due Diligence • Who at the service provider has • Does the provider have a privacy access to business records? and security policy? • Where is the service provider • What type of security is in place to located? ensure data breaches do not occur? • Does the service provider comply with • Does the provider have a policy to all regulatory requirements? be implemented in the case of a • How is the data stored – what is the data breach? data flow? • What does that policy provider for with regards to client operations in such a case? • What insurance or asset levels exist at the provider?
  • 11. How does IT Bob Stack up? Due diligence process for outside providers tends to be common. Many providers are rejected as part of this process. Rarely would the internal alternatives pass if they were also subjected to the process.
  • 12. Refusal to Approve Approval is a • Failure to adequately assess, approve and implement point in time, not technology (non-action) is a an ongoing significant exposure process • Exposure is reason new technology is rejected • Secure products become unsecure in short time frame • New tech presents the opportunity for more security • Compliance and legal education and approval cycle process • No case law
  • 13. • Courts are wiling to recognize Jurisdiction personal jurisdiction based on What are all the location of cloud computing locations in which services. you do business Forward Foods LLC v Next Proteins, Inc., 2008 BL virtually? 238516 (N.Y. Sup. 2008) • In some jurisdictions when weighing convenience of a forum, physical recordkeeping takes precedence. Gelmato S.A. v. HTC Corp., 2011 U.S. Dist. LEXIS 133612 (E.D. Tex. Nov. 18, 2011) • Compliance department requires instruction on these issues.
  • 14. The Cloud and The World • There are no international rules governing cloud related concerns. • The EU Data Protection Directive provides that transfer of personal data may be made only to member states and to jurisdictions with adequate data security standards. • The US is NOT currently deemed to have adequate data security standards.
  • 15. Issues in E-Discovery • Parties that store third party data should not expect to be shielded from discovery rules Columbia Pictures, Inc. v. Bunnell, 245 F.R.D. 443 (C.D. Cal. 2007) • FRCP require production based on “possession, custody or control” • If responding party has the ability to obtain data, it may be compelled to do so • Discoverable information is still protected by privilege, wherever it exists Tomlinson v. El Paso Corp.,245 F.R.D. 474 (D. Colo. 2007)
  • 16. Protection of Trade Secrets • CFAA: Computer Fraud and Abuse Act • What is unauthorized access? • Employees, Third Party Providers, Social Media • Importance of policy vs. hardware controls U.S. v. Nosal, 642 F.3d 781 (9th Cir. 2011) • Social media • Use or Excessive Use • Social Media Policy
  • 17. Summary • Ethics: Competence and Confidentiality • Matters of Business: • Cloud Fear vs. Risk “Skeletons” in IT Closet • Due Diligence and Point in Time Compliance • Matters of Law • Jurisdiction • The Cloud and the World • E-Discovery • Trade Secrets
  • 18. Dina Leytes, Esq. www.griesinglaw.com 215-732-3924 dleytes@griesinglaw.com Frederic Wilf, Esq., Partner http://www.baercrossey.com 215-636-9220 fwilf@baercrossey.com Amy H. Larrimore, Chief Strategist The Empire Builders Group www.amylarrimore.com www.empirebuilders.biz 215-645-2691 or me@amylarrimore.com slide design, creativity & general awesomeness powered by: