July 23, 2013 in Cloud, Confidentiality, Connecticut, Electronic Files, Internet Use, Security by PeterK
Lawyers may use cloud services in their practice but must be conscientious to comply with the duties imposed by the Rules to knowledgeably and competently maintain confidentiality and supervisory standards.
April 28, 2013 in Cloud, Electronic Files, Internet Use, Security by PeterK
An interesting article describing the use of DropSmack to target networks via DropBox. In addition to broader considerations lawyers should consider before using cloud services, developments like this highlight the
April 24, 2013 in Advertising, Arizona, Domain Names, Internet Use by PeterK
For-profit Arizona law firms may use the .org domain name suffix as long as the website is otherwise not false or misleading. See Arizona Ethics Op. 11-04 (December 2011).
April 24, 2013 in California, Cloud, Internet Use by PeterK
California lawyers may maintain a virtual law office in the cloud where communications with the client, and storage of and access to all information about the clientâ€™s matter, are conducted
April 24, 2013 in California, Internet Use, UPL by PeterK
A California lawyer’s lawsuit against on online legal service provider alleging unauthorized practice of law withstood a demurrer. See Law Offices of Mathew Higbee v. Expungement Assistance Services, Cal. Ct.
April 10, 2013 in Cloud, Confidentiality, Electronic Files, Internet Use, Virginia by PeterK
Virginia lawyers must take care using a virtual law office or shared executive suite. Virginia Legal Ethics Opinion 1872 (March 29, 2013). When a lawyer is using cloud computing or any
November 30, 2011 in Cellular phones, Confidentiality, E-mail, Electronic Files, Internet Use, Privacy, Security by PeterK
An interesting, perhaps troubling, issue raised with respect to security of certain mobile devices. Read more about Carrier IQÂ (http://www.geek.com/articles/mobile/how-much-of-your-phone-is-yours-20111115/, http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/carrieriq-part2/, http://www.wired.com/threatlevel/2011/11/secret-software-logging-video.Â A somewhat long video of how this works