mobile practice management philly bar 2014 handout
TRANSCRIPT
Mobile Practice Management
Joshua Lenon Lawyer-in-Residence
Clio
Agenda
1. Mobile Overview 2. Applying best practices to mobile in your law
practice 3. Questions
MOBILE OVERVIEW
Rise of Mobile Computing
• Computers now account for only 20.2% of computing device sales
• Tablets are 14.6% – Expected to exceed computer sales in 2015
• Cellphones account for 65% of all device sales
Photo%by%emma.marie%on%Flickr%under%Crea6ve%Commons%License%Source:%Financial%Times,%“Tablet%sales%set%%to%overtake%PCs,”%09/12/2013%
Source:%Interna6onal%Data%Corpora6on,%“Tablet%Shipments%Forecast%to%Top%Total%PC%%Shipments%in%the%Fourth%Quarter%of%2013%and%Annually%by%2015,%According%to%IDC”%%09/11/2013%
Mobile Computing in Law Firms
• 88% of lawyers have access to a smartphone – 77% of lawyers have used a smartphone for law-
related tasks • 52% of lawyers have access to a tablet • 83% of firms allow personal mobile devices to
access firm’s network • 25% of firms do not know if they have ever
experienced a security breach
Photo%by%ABC%Archive%on%Flickr%under%Crea6ve%Commons%License%Source:%2013%ABA%Legal%Technology%Survey%Report%
Risks of Mobile Computing
• Loss of Device – 1/3 of robberies involves the theft of a mobile
phone – 142,708 smartphones were reported lost in
2011 – Accidental damage is 10 x more common than
loss or theft
Photo%by%The%Other%Dan%on%Flickr%under%Crea6ve%Commons%License%Sources:%NBC%News,%McAfee,%&%SquareTrade%
Risks of Mobile Computing
• Device Confiscation – U.S. Border Guards can seize & search devices
with “reasonable suspicion” - United States v. Cotterman, 709 F.3d 952 (9th Cir., 2013)
– Police can search cell phones that lack password protection - R. v. Fearon, 2013 ONCA 106 (CanLII)
– Person has a high expectation of privacy in a cell phone's contents - Smallwood v. State (Fla., 2013)
Photo%by%Joseph%Kranak%on%Flickr%under%Crea6ve%Commons%License%
Risks of Mobile Computing
• Device Confiscation – Riley v. California • Search Incident to Arrest in
California – United States v. Wurie • 1st District Requires Search Warrant
Photo%by%Joseph%Kranak%on%Flickr%under%Crea6ve%Commons%License%
Risks of Mobile Computing
• Big Data collection – One in four law-enforcement agencies have
used a tactic known as a "tower dump” – Stingray devices used by FBI & at least 25 law
enforcement agencies in 33 states
Photo%by%Jason%Ahrns%on%Flickr%under%Crea6ve%Commons%License%Sources:%USA%Today,%“Cellphone%data%spying:%It's%not%just%the%NSA,”%%August%12,%2013%
Consequences
• Unauthorized access to client information
• Inability to act with diligence and promptness
Photo%by%Ma[%Hurst%on%Flickr%under%Crea6ve%Commons%License%
Mobile Security Procedures
• Password protect your device • Back up your device regularly • Register with device location services • Store data in Cloud services
APPLYING BEST PRACTICES TO MOBILE PHONES
Passwords
Backup Regularly
Backup Regularly
Location Services
Location Services
Password Protection
Password Protection
Extra Security
Extra Security
Cloud Stored Client Data
Cloud Stored Client Data
Cloud Stored Client Data
Cloud Stored Client Data
Cloud Stored Client Data
Cloud Stored Client Data
Cloud Stored Client Data
Security for Other Devices
CONCLUSION
Mobile Security Procedures
• Password protect your device • Back up your device regularly • Register with device location services • Store data in Cloud services
QUESTIONS?
Thank You
Joshua Lenon [email protected] @JoshuaLenon Linkedin.com/in/joshualenon