Instant Messaging – Turning Toys Into Tools Presented by: Marla K. Brock – Bilzin Sumberg Kajetan Koci – Loeb & Loeb Kevin Sullivan – Cohen & Grigsby.

Slides:



Advertisements
Similar presentations
GlobalCerts & SurfControl Only a layered approach can provide total risk management.
Advertisements

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
GAAP PowerPoint #1.  Generally Accepted Accounting Principles  Defined as the set of accepted industry rules, practices and guidelines for financial.
Compliance, eDiscovery, Continuity and Migration made easy with SaaS Archiving Warren Roy, President & CEO, Global Relay.
Group C.  There are about 250 billion s generated everyday.  There are many problems and risks related to security like privacy, improper.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
WELCOME Annual Meeting & Compliance Seminar. Code of Conduct - Impact on Corporate Culture by Andy Greenstein Knight Capital Group, Inc.
FACSys and ‘Compliancy’ Microsoft Windows Server 2003 with Share Point and FACSys can assist your compliancy efforts!
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
INTERNET and CODE OF CONDUCT
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Secure Public Instant Messaging (IM): A Survey Mohammad Mannan Paul C. Van Oorschot Digital Security Group School of Computer Science Carleton University,
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
Social Law Library MailSafe Encrypted Service Compliance Driven, Secure Service.
Do you Know Where your Data is? Gregory P. Silberman, CISSP Technology Intellectual Property & Outsourcing Group Kaye Scholer LLP May 10, 2005.
Electronic Records Management: What Management Needs to Know May 2009.
IT Roundtable Archiving Presented by: RKL eSolutions 1/18/2012.
1 Secure Services. 2 Secure is a hosted application that provides users with enterprise-grade business features including calendaring, contacts.
2002 Symantec Corporation, All Rights Reserved The dilemma European Security Policy and Privacy Ilias Chantzos Government Relations EMEA Terena Conference,
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Social Media in the Workplace MEGAN QUIRK, ATTORNEY AT LAW.
RULES OF ENGAGEMENT Engage if client expresses an interest in data preservation Engage if the client is experiencing one or more “pains” (see “customer.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Module 9 Configuring Messaging Policy and Compliance.
Privacy & Personal Information Prepared by the CBC Law Department CONFIDENTIAL – FALL 2011.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Storage Management Balance mailbox size demands with available storage resources Reduce the proliferation of PST files stored outside of IT control.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
AICP New England 13 th Annual Education Day PRIVACY Jenny Erickson Vice President, Legislative and Regulatory Affairs The Life Insurance Association of.
Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls.
Regulation of Personal Information Sally Brierley & Emma Harvey.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
TRADE SECRETS Presented By Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 1 © AIPLA 2012.
Module 7 Planning and Deploying Messaging Compliance.
Financial Services Authority New Rules for Trading Companies.
The U.S. Securities and Exchange Commission (SEC).
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
INTRODUCTION  netCORE offers 360 degree digital communication solutions Messaging and Mobility  Pioneers in Linux based mailing solution and catering.
CLOUD VIRTUALIZATION MLArchiver for vCloud Air Archiving | eDiscovery | Records Management | Analytics Stephen Catanzano August.
Secure Services Shared Hosted MS Exchange 2010.
Unified communications platform Enterprise-ready.
CLOUD VIRTUALIZATION MLArchiver for vCloud Air Archiving | eDiscovery | Records Management | Analytics Stephen Catanzano August.
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
Law Firm Data Security: What In-house Counsel Need to Know
Introduction to Barracuda IM Firewall
A Winning Combination !! and Good afternoon…
Legal and Ethical Responsibilities
Regulatory Compliance
Chapter 3: IRS and FTC Data Security Rules
Move this to online module slides 11-56
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Protect data in core business applications
Presentation transcript:

Instant Messaging – Turning Toys Into Tools Presented by: Marla K. Brock – Bilzin Sumberg Kajetan Koci – Loeb & Loeb Kevin Sullivan – Cohen & Grigsby

Instant Messaging Bridging the Gap of Understanding Between Technology and the Law Marla K. Brock Corporate Associate August 23, 2007

The Emergence of Instant Messaging A revolutionary form of communicating. Immediate and instantaneous. Widespread availability beginning in 1997, promulgated by AOL. Supplants telephone conversation and written correspondence.

Increasing Popularity of Instant Messaging Online Services for Buyers and Sellers. Real-time interaction. The race to communicate valuable information.

Concerns Related to Instant Messaging Creating an auditable trail. Protecting Governmental Interests (Domestic and Foreign Affairs. Protection of Intellectual Property. Deterring and Preventing Certain Activities.

Confidentiality Obligations A lawyer should take "reasonable steps" to secure confidential information against "inappropriate disclosure" by such lawyer (including lawyer's associates or agents). Confidential client information must be "acquired, stored, retrieved, and transmitted under systems and controls that are reasonably designed and managed to maintain confidentiality." If the lawyer knows or has reason to believe that the means of communication is susceptible to interception, the lawyer must advise the other party (or client) of the risks of such interception and the risk of loss of confidentiality.

Opinion 1: Attorneys may communicate with clients using unencrypted under most circumstances. Opinion 2: Absent client consent or waiver, should be encrypted to prevent a breach of confidentiality or the same precautions should be observed for as of cellular or cordless phone communications. Generally Held Opinion: Attorneys should consult with the client and follow client instructions with respect to transmitting highly sensitive information by . Encryption vs. Non-Encryption Applicability to Instant Messaging

Regulation Legislation in highly-regulated industries provides a "back door" to regulating instant messaging. The goal of regulation is to prevent fraud and manipulation, protect financial solvency and to prevent and deter abusive practices that may amount to violations of rules of custom and trade practices. Gramm-Leach-Bliley Act of 1999 Role of Sarbanes Oxley and the need for internal controls.

Best practices for law firms and companies Records management (SEC and NASD recordkeeping requirements) Compliance supervision Records retention and preservation Developing efficient search and retrieval methods Deleting records Duplicating storage Ensuring privacy and protecting confidential information Promulgating a disclosure protocol

Questions /Comments

Thank You! Marla K. Brock Tel:

Instant Messaging Turning Toys into Tools LOEB & LOEB adds Value. August 23 rd, 2007 ©2007 LOEB & LOEB LLP Kajetan Koci IT Manager

What tools are in place? Microsoft Live Communication Server (LCS) Federated, Secure, Encrypted Messaging Platform Windows Messenger 5.0 Supports: Aol, MSN, Yahoo Instant Messenger Optional: Archiving Agent LCS IM Archiving agent saves messages in SQL DB LOEB & LOEB adds Value.

Future Concerns Security Threats Inbound Threats: Worms, Viruses, Spyware Outbound Threats: Loss of IT Control, Loss of Intellectual Property Regulatory/Compliance Issues How long should IM messages be kept? Putting a $ Value on Collaborative Communication Cost of Long Distance calls, Exchange Mailbox Size (First Tier Storage Costs) LOEB & LOEB adds Value.

How will IM fit into your Organization? Cultural Differences User Training LOEB & LOEB adds Value.