Mobile practice management philly bar 2014 handout

Post on 16-Jul-2015

101 views 2 download

Tags:

transcript

Mobile Practice Management

Joshua Lenon Lawyer-in-Residence

Clio

Agenda

1.  Mobile Overview 2.  Applying best practices to mobile in your law

practice 3.  Questions

MOBILE OVERVIEW

Rise of Mobile Computing

•  Computers now account for only 20.2% of computing device sales

•  Tablets are 14.6% – Expected to exceed computer sales in 2015

•  Cellphones account for 65% of all device sales

Photo%by%emma.marie%on%Flickr%under%Crea6ve%Commons%License%Source:%Financial%Times,%“Tablet%sales%set%%to%overtake%PCs,”%09/12/2013%

Source:%Interna6onal%Data%Corpora6on,%“Tablet%Shipments%Forecast%to%Top%Total%PC%%Shipments%in%the%Fourth%Quarter%of%2013%and%Annually%by%2015,%According%to%IDC”%%09/11/2013%

Mobile Computing in Law Firms

•  88% of lawyers have access to a smartphone – 77% of lawyers have used a smartphone for law-

related tasks •  52% of lawyers have access to a tablet •  83% of firms allow personal mobile devices to

access firm’s network •  25% of firms do not know if they have ever

experienced a security breach

Photo%by%ABC%Archive%on%Flickr%under%Crea6ve%Commons%License%Source:%2013%ABA%Legal%Technology%Survey%Report%

Risks of Mobile Computing

•  Loss of Device – 1/3 of robberies involves the theft of a mobile

phone – 142,708 smartphones were reported lost in

2011 – Accidental damage is 10 x more common than

loss or theft

Photo%by%The%Other%Dan%on%Flickr%under%Crea6ve%Commons%License%Sources:%NBC%News,%McAfee,%&%SquareTrade%

Risks of Mobile Computing

•  Device Confiscation – U.S. Border Guards can seize & search devices

with “reasonable suspicion” - United States v. Cotterman, 709 F.3d 952 (9th Cir., 2013)

– Police can search cell phones that lack password protection - R. v. Fearon, 2013 ONCA 106 (CanLII)

– Person has a high expectation of privacy in a cell phone's contents - Smallwood v. State (Fla., 2013)

Photo%by%Joseph%Kranak%on%Flickr%under%Crea6ve%Commons%License%

Risks of Mobile Computing

•  Device Confiscation –  Riley v. California • Search Incident to Arrest in

California –  United States v. Wurie • 1st District Requires Search Warrant

Photo%by%Joseph%Kranak%on%Flickr%under%Crea6ve%Commons%License%

Risks of Mobile Computing

•  Big Data collection – One in four law-enforcement agencies have

used a tactic known as a "tower dump” – Stingray devices used by FBI & at least 25 law

enforcement agencies in 33 states

Photo%by%Jason%Ahrns%on%Flickr%under%Crea6ve%Commons%License%Sources:%USA%Today,%“Cellphone%data%spying:%It's%not%just%the%NSA,”%%August%12,%2013%

Consequences

•  Unauthorized access to client information

•  Inability to act with diligence and promptness

Photo%by%Ma[%Hurst%on%Flickr%under%Crea6ve%Commons%License%

Mobile Security Procedures

•  Password protect your device •  Back up your device regularly •  Register with device location services •  Store data in Cloud services

APPLYING BEST PRACTICES TO MOBILE PHONES

Passwords

Backup Regularly

Backup Regularly

Location Services

Location Services

Password Protection

Password Protection

Extra Security

Extra Security

Cloud Stored Client Data

Cloud Stored Client Data

Cloud Stored Client Data

Cloud Stored Client Data

Cloud Stored Client Data

Cloud Stored Client Data

Cloud Stored Client Data

Security for Other Devices

CONCLUSION

Mobile Security Procedures

•  Password protect your device •  Back up your device regularly •  Register with device location services •  Store data in Cloud services

QUESTIONS?

Thank You

Joshua Lenon joshua@goclio.com @JoshuaLenon Linkedin.com/in/joshualenon