Minnesota Rules of Professional Conduct Meet the Cloud, Mobile Devices and Social Media Todd C. Scott Minnesota Lawyers Mutual Ins. Co. Alice Sherren Minnesota.

Slides:



Advertisements
Similar presentations
American Bar Association Ethics 20/20 Commission Presentation to YLD Council Las Vegas, May 12, 2011 Professor Paul D. Paton, Reporter.
Advertisements

Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
It’s a jungle out there. IT Governance A 2009 Competitive Advantage.
Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening s that come through the work.
OneDrive for Business Introduction First Time Use First Time Use Access from Computer Access from Computer Access from Internet Access from Internet Access.
Steps to Compliance: Bring Your Own Device PRESENTED BY.
Setting Up A Low Overhead Virtual Law Practice Brian V Powers.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Phil Lee, Head of US Office, Fieldfisher Jim Brashear, General Counsel, Zix © 2015 ZixCorp. All Rights Reserved. THE CHANGING LEGAL PERSPECTIVE ON BYOD.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
SMART GRID: Privacy Awareness and Training – A Starting Point for Utilities October 2011 SGIP-CSWG Privacy Group 1.
Remote Access. What is the Remote Access Domain? remote access: the ability for an organization’s users to access its non-public computing resources from.
New Data Regulation Law 201 CMR TJX Video.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
ABA Ethics Commission 20/20 Presentation by Stephanie Kimbro, Esq., Owner of Kimbro Legal Services, LLC and Co- Founder of Virtual Law Office Technology,
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
Wireless Password:  “The cloud” is real  Electronic data growth is rapid and pervasive  Employees use the cloud to conduct government work.
Store, sync, and share your files
E-Commerce Taruna Diyapradana PBM. What is E-Commerce? E-Commerce is the trading in products and/or services conducted via computer networks.
Unit 8: Specialty Legal Software. Topics for Seminar Assignments this week LexisNexis Westlaw Special law firm management software SmartDraw.
Using Technology to Manage Information
The Model Rules of Professional Conduct and Electronic Tools: How Ethical Rules Must Adapt to Address Current and Forthcoming Technologies By Melissa Freeman.
IT Internal Audit “Hot Topics” April 2011 Agenda Survey Overview Survey Results IT Internal Audit Hot Topics Overview – Social Media and Social Networking.
Topic: MediaSMS Contact Backup File APPS About Speaker Name: Sorn Work: Buddhist Library Cambodia Project Org Web:
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
By Jared.  Under the terms of the alliance, epals this fall will add Microsoft’s
GOTBACKUP THE BEST BACKUP SOLUTIONS. SIGN UP TODAY! CLICK HERECLICK HERE.
Cloud Computing, Mobile Tech & Legal Apps By Stosh Jonjak.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
4 TH YEAR PARENTS EVENING MOBILE DEVICES Mrs Helen Alexander Head of ICT/Computing.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
HOW A MOBILE FAX APP CAN BOOST YOUR PRODUCTIVITY.
Enterprise | education | public printing locations PrinterOn for Legal.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Functions of Word Processing Software Preparing written forms of communications for clients, other lawyers,
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
In today’s world Smartphone are the most required tool in our life. They are like small computers in our palm.
Cloud Computing Guide to Legal Caroline Nguyen
UrPMA Your Personalized Multimedia Autograph for your eBook.
Maximize Your Decision-Making: A Review of Emerging Technology Trends.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. CLOUD.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Law Firm Data Security: What In-house Counsel Need to Know
Mobile App Set up Easy Step by Step
Warren Binford, Willamette U. College of Law
Internet Ethics Complications of the Digital Age and Web Sites to Help You Untangle Them Title misleading Really, talk about electronic data production,
What is virtual law practice?
WFSA E-Safety Guidance for Parents and Carers
ICT meeting Business needs
The online safety toolkit for Wales.
Mobile app development. Mobile app development is a term used to denote the act or process by which a mobile app is developed for mobile devices, such.
6 Unique features of Walkie Talkie App. Here are some key benefits of a Walkie Talkie app you should consider:
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
ABA Ethics Commission 20/20 Presentation by Stephanie Kimbro, Esq
The Successful lawyer’s toolkit
BTEC level 3 Learning Aim D.
کتابهای خریداری شده دروس عمومی 1397
Security in mobile technologies
Presentation transcript:

Minnesota Rules of Professional Conduct Meet the Cloud, Mobile Devices and Social Media Todd C. Scott Minnesota Lawyers Mutual Ins. Co. Alice Sherren Minnesota Lawyers Mutual Ins. Co.

How firms are using the cloud Storing data online safely Cloud based legal apps VPN’s & remote access Cloud Computing Ethics | 1

Cloud Computing Ethics | Online Backup Backing up online

Cloud Computing Ethics | Online Backup Backing up online

Cloud Computing Ethics | Online Backup Backing up online

Cloud Computing Ethics | Online Backup Backing up online

Cloud Computing Ethics | Virtual Law Applications Using cloud applications

Cloud Computing Ethics | Virtual Law Applications Using cloud applications - advantages

Cloud Computing Ethics | Virtual Law Applications CLICK HERE FOR MORE INFO Time & Billing

Cloud Computing Ethics | Virtual Law Applications CLICK HERE FOR MORE INFO Case Management

Cloud Computing Ethics | Virtual Law Applications CLICK HERE FOR MORE INFO Case Management

Cloud Computing Ethics | Virtual Law Applications CLICK HERE FOR MORE INFO Document Management

Cloud Computing Ethics | Virtual Law Applications Virtual Law Services

Cloud Computing Ethics | Virtual Law Applications Remote Access

The ethics of cloud computing Ethics opinions about the cloud Ethics rules and guidance Terms of service Cloud Computing Ethics | 2

Cloud Computing Ethics | Cloud Computing Ethics Opinions about the Cloud

Cloud Computing Ethics | Cloud Computing Ethical Rules and Guidance

Cloud Computing Ethics | Cloud Computing Ethical Rules and Guidance

Cloud Computing Ethics | Cloud Computing Ethical Rules and Guidance

Cloud Computing Ethics | Cloud Computing Ethical Rules and Guidance

Cloud Computing Ethics | Cloud Computing Ethical Rules and Guidance

Cloud Computing Ethics | Cloud Computing Ethical Rules and Guidance

Cloud Computing Ethics | Cloud Computing Terms of Service

Cloud Computing Ethics | Cloud Computing Terms of Service

Cloud Computing Ethics | Cloud Computing Terms of Service

Practical advice for using the cloud Interviewing cloud vendors Social Media Issues Wi-fi Smartphones Electronic use policies Cloud Computing Ethics | 3

Cloud Computing Ethics | Cloud Computing Interview your cloud vendors

Cloud Computing Ethics | Cloud Computing Interview your cloud vendors

Cloud Computing Ethics | Cloud Computing Interview your cloud vendors

Cloud Computing Ethics | Social Media Ethical roadblocks to social media

Cloud Computing Ethics | Mobile Device Security Understanding wi-fi vulnerabilities

Cloud Computing Ethics | Mobile Device Security Understanding wi-fi vulnerabilities

Cloud Computing Ethics | Mobile Device Security Understanding wi-fi vulnerabilities

Cloud Computing Ethics | Mobile Device Security Mobile insecurity: smart phone spyware

Cloud Computing Ethics | Mobile Device Security Securing your mobile devices

Cloud Computing Ethics | Mobile Device Security Securing your mobile devices

Cloud Computing Ethics | Mobile Device Security Securing your mobile devices Step 1 Step 2

Cloud Computing Ethics | Regulating Electronics CLICK HERE FOR MORE INFO Why have an electronic use policy? Your whole firm on a device the size of a Bic® Lighter.

Cloud Computing Ethics | Regulating Electronics Why have an electronic use policy?

Cloud Computing Ethics | Regulating Electronics Why have an electronic use policy?

Cloud Computing Ethics | Regulating Electronics Why have an electronic use policy?

Cloud Computing Ethics | More Information Contact: Todd C. Scott VP Risk Management Minnesota Lawyers Mutual Alice Sherren Claims Attorney Minnesota Lawyers Mutual