mobile practice management philly bar 2014 handout
TRANSCRIPT
![Page 1: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/1.jpg)
Mobile Practice Management
Joshua Lenon Lawyer-in-Residence
Clio
![Page 2: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/2.jpg)
Agenda
1. Mobile Overview 2. Applying best practices to mobile in your law
practice 3. Questions
![Page 3: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/3.jpg)
MOBILE OVERVIEW
![Page 4: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/4.jpg)
Rise of Mobile Computing
• Computers now account for only 20.2% of computing device sales
• Tablets are 14.6% – Expected to exceed computer sales in 2015
• Cellphones account for 65% of all device sales
Photo%by%emma.marie%on%Flickr%under%Crea6ve%Commons%License%Source:%Financial%Times,%“Tablet%sales%set%%to%overtake%PCs,”%09/12/2013%
![Page 5: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/5.jpg)
Source:%Interna6onal%Data%Corpora6on,%“Tablet%Shipments%Forecast%to%Top%Total%PC%%Shipments%in%the%Fourth%Quarter%of%2013%and%Annually%by%2015,%According%to%IDC”%%09/11/2013%
![Page 6: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/6.jpg)
Mobile Computing in Law Firms
• 88% of lawyers have access to a smartphone – 77% of lawyers have used a smartphone for law-
related tasks • 52% of lawyers have access to a tablet • 83% of firms allow personal mobile devices to
access firm’s network • 25% of firms do not know if they have ever
experienced a security breach
Photo%by%ABC%Archive%on%Flickr%under%Crea6ve%Commons%License%Source:%2013%ABA%Legal%Technology%Survey%Report%
![Page 7: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/7.jpg)
Risks of Mobile Computing
• Loss of Device – 1/3 of robberies involves the theft of a mobile
phone – 142,708 smartphones were reported lost in
2011 – Accidental damage is 10 x more common than
loss or theft
Photo%by%The%Other%Dan%on%Flickr%under%Crea6ve%Commons%License%Sources:%NBC%News,%McAfee,%&%SquareTrade%
![Page 8: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/8.jpg)
Risks of Mobile Computing
• Device Confiscation – U.S. Border Guards can seize & search devices
with “reasonable suspicion” - United States v. Cotterman, 709 F.3d 952 (9th Cir., 2013)
– Police can search cell phones that lack password protection - R. v. Fearon, 2013 ONCA 106 (CanLII)
– Person has a high expectation of privacy in a cell phone's contents - Smallwood v. State (Fla., 2013)
Photo%by%Joseph%Kranak%on%Flickr%under%Crea6ve%Commons%License%
![Page 9: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/9.jpg)
Risks of Mobile Computing
• Device Confiscation – Riley v. California • Search Incident to Arrest in
California – United States v. Wurie • 1st District Requires Search Warrant
Photo%by%Joseph%Kranak%on%Flickr%under%Crea6ve%Commons%License%
![Page 10: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/10.jpg)
Risks of Mobile Computing
• Big Data collection – One in four law-enforcement agencies have
used a tactic known as a "tower dump” – Stingray devices used by FBI & at least 25 law
enforcement agencies in 33 states
Photo%by%Jason%Ahrns%on%Flickr%under%Crea6ve%Commons%License%Sources:%USA%Today,%“Cellphone%data%spying:%It's%not%just%the%NSA,”%%August%12,%2013%
![Page 11: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/11.jpg)
Consequences
• Unauthorized access to client information
• Inability to act with diligence and promptness
Photo%by%Ma[%Hurst%on%Flickr%under%Crea6ve%Commons%License%
![Page 12: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/12.jpg)
Mobile Security Procedures
• Password protect your device • Back up your device regularly • Register with device location services • Store data in Cloud services
![Page 13: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/13.jpg)
APPLYING BEST PRACTICES TO MOBILE PHONES
![Page 14: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/14.jpg)
Passwords
![Page 15: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/15.jpg)
Backup Regularly
![Page 16: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/16.jpg)
Backup Regularly
![Page 17: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/17.jpg)
Location Services
![Page 18: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/18.jpg)
Location Services
![Page 19: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/19.jpg)
Password Protection
![Page 20: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/20.jpg)
Password Protection
![Page 21: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/21.jpg)
Extra Security
![Page 22: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/22.jpg)
Extra Security
![Page 23: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/23.jpg)
Cloud Stored Client Data
![Page 24: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/24.jpg)
Cloud Stored Client Data
![Page 25: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/25.jpg)
Cloud Stored Client Data
![Page 26: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/26.jpg)
Cloud Stored Client Data
![Page 27: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/27.jpg)
Cloud Stored Client Data
![Page 28: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/28.jpg)
Cloud Stored Client Data
![Page 29: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/29.jpg)
Cloud Stored Client Data
![Page 30: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/30.jpg)
Security for Other Devices
![Page 31: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/31.jpg)
CONCLUSION
![Page 32: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/32.jpg)
Mobile Security Procedures
• Password protect your device • Back up your device regularly • Register with device location services • Store data in Cloud services
![Page 33: Mobile practice management philly bar 2014 handout](https://reader034.vdocuments.us/reader034/viewer/2022051400/55a696451a28ab702d8b45e0/html5/thumbnails/33.jpg)
QUESTIONS?