You are on page 1of 28

Cloud Computing The Impact on the Practice of Law

Key Objectives
Gain an understanding of what to look for in a cloud computing solution. Discover how you can safe guard your client's data in the cloud. Learn of the trends happening in the legal industry. Understand how cloud computing can change the way you practice law. See how local and national bars are reacting

So What is Cloud Computing


Gartner: Cloud computing is a style of computing where massively scalable IT-related capabilities are provided as a service across the Internet to multiple external customers

Forrester: A pool of abstracted, highly scalable, and managed infrastructure capable of hosting endcustomer applications and billed by consumption Wikipedia: A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the cloud that supports them.

Cloud Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS)

Pre-Cloud Application Service Provider (ASP) Web Hosting Service Managed Hosting Service

Cloud Computing
Service turn on / turn off

Maintenance no expertise on cloud computing


needed to get started, and upgrades and updates

happen without your intervention


Scalable expand service/usage as needed

Understand associated costs that come with


amount of data you store and what your current

data plan is with your internet / web provider

Cloud Computing
Backup

Service Level Agreement/guaranteed up


time/reimbursement of respective services if

down
Governance

HARD DRIVE CRASHES


Vintage computers

LACK OF I.T. SUPPORT DISCIPLINARY ACTION NO ESTABLISHED OFFICE PROTOCOLS ENTITY CHANGE

What are the areas of concern when selecting an offering delivered in the cloud?
The product, offering or application should help you solve important problems or jobs
Also worry about. Data Protection Data Ownership Availability

Data Protection
The only truly secured computer is the one unplugged from the wall and locked in a vault. .But you should expect your vendor to provide better data security than you maintain internally
What about encryption? How secure is the providers environment? How do they test? Are they monitoring for intrusions in real time? Third party certifications? How about internal actors?
9

Know Who To Trust

Data Ownership
At the end of the day, your client confidential information belongs to you!

How about the contract or terms and conditions? Government requests? Getting your data back? What happens when you terminate your service? Third parties the vendor might use? Use of your data to provide a better offering? Anonymized information to help all customers?
11

Availability
Your cloud provider should be up and running when you need them
Uptime guarantees? Financial penalties? Number of data centers? Testing? Backups?

12

Other Evaluating Considerations


What is your budget?
Can you try before you buy? What is the total cost of ownership What are the customer support and training options? And is there an additional fee for these?

Other Evaluating Considerations


How can I get my data in?
Does it integrate with email? Who are the proven reputable companies?

Other Evaluating Considerations FUNCTIONALITY


Standard expectations for Practice Management Global and conflict of interest search Control of access

Tools fit for your area of practice


Mobility solution

Global Search Capability

Conflict of Interest

Roles Based Permissions

Practice Templates/Export Data

Trends in the Legal Industry


Virtual offices and virtual staff Outsourcing work Need for online collaboration easier way to obtain and deliver information outside of email Tablets and iPads Mobile apps
Device specific vs. Web based app Native application integration

Native Applications vs. Web 2.02


Type of Application Mobile Web-Based Device-Specific

Example Who Can Use It

LexisNexis Firm Manager Mobility app Anyone with a mobile web browser and live Internet connection

iPhone or Android App Only those with that specific device

Installation Requirements

No application installation is required if you already have a web browser on your phone/mobile device

Application must be installed on your phone/mobile device

Where Data Is Stored How Updates to the Mobile Application Are Delivered

In LexisNexis Firm Manager in the cloud Automatically through the Internetno action required on your part other than authentication

On the phone You must update the application on your phone/mobile device

Lexis Firm Manager


Cloud Based No Management Costs Same Experience across web enabled devices

Bar Ruling and Regulations


The American Bar Association is cautiously wading into the waters of cloud computing. An ABA ethics panel recently issued proposed rule changes to the Model Rules of Professional Conduct designed to assist attorneys in safeguarding confidential and sensitive client data while using remote internet servers to store, manage and process data The Minnesota Lawyer http://minnlawyer.com/201 1/05/27/aba-weighing-inon-cloud-computing/

Massachusetts Arizona North Carolina And so on

ABA Ethics 2020 Commission

Bar Ruling and Regulations


Commentary: Legal Currents: Pennsylvania rules on lawyers using cloud computing by Nicole Black 9/30/11 Question: Is it ethical for lawyers to store and access confidential client data in the "cloud" using computers or mobile devices?

Pennsylvania New York Arkansas And so on

Are You In the Know?

My contact information:
Christopher Anderson LexisNexis 2000 Regency Parkway, Suite 600 Cary, NC 27518 Christopher.T.Anderson@lexisnexis.com

APPENDIX

LexisNexis Firm Manager


Why Firm Manager raises the bar with risk-mitigating security measures and certifications: Encrypting all traffic between your systems and the on-line application/systems Supported from multiple, geographically distributed secure LexisNexis Protecting attorney client confidentiality by encrypting your confidential data Prepared to provide continuity of operations in case one of our data centers experiences a catastrophic failure or loss of connectivity Served from a highly redundant infrastructure, to reduce the impact of system failure or component problems. Regular testing by third parties (and internal auditors) for vulnerabilities and potential security concerns Maintaining a number of market leading information security and privacy certifications including Systrust, Trustwave and TRUSTe HIPAA/HiTech review and certification 24x7 monitoring of the environment against intrusion or compromise Compliance with Statement on Auditing Standards (SAS) No. 70 (also commonly referred to as a "SAS 70 Audit) Available at 99.9% uptime measured monthly, not including scheduled downtime and maintenance windows. We pay you back when we exceed this promise.

You might also like