The Cybersecurity Law Report

Incisive intelligence on cybersecurity law and regulation

Articles By Topic

By Topic: Cloud-Based Technology

  • From Vol. 1 No.17 (Nov. 25, 2015)

    Implementing an Effective Cloud Service Provider Compliance Program

    The ubiquity of cloud computing platforms as a tool for companies to share, store and back up critical and sensitive data has catapulted the implementation of a comprehensive third-party cloud service provider program to the top of compliance officers’ ever growing to-do lists.  During a recent seminar held by the Society of Corporate Compliance & Ethics, Web Hull, a privacy, data protection and compliance advisor provided a practical framework for engaging, managing, auditing and monitoring third-party cloud computing providers.  This article summarizes those insights, including key risks, and compiles the resources compliance officers can use to meet the relevant state and federal cybersecurity regulatory requirements.  See also “Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part One of Two),” The Cybersecurity Law Report, Vol. 1, No. 11 (Aug. 26, 2015); Part Two,” Vol. 1, No. 12 (Sep. 16, 2015); and “The Advantages of Sending Data Up to the Cloud,” The Cybersecurity Law Report, Vol. 1, No. 6 (Jun. 17, 2015).

    Read Full Article …
  • From Vol. 1 No.12 (Sep. 16, 2015)

    Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part Two of Two)

     

    As technology advances – changing the way lawyers communicate with clients and store and use sensitive information – lawyers’ ethical obligations must evolve to keep up.  Addressing technology issues through a legal ethics prism, panelists Pamela A. Bresnahan, a senior partner at Vorys, Sater, Seymour and Pease; and David J. Elkanich, a partner at Holland & Knight, discussed the ethical issues that lawyers face when using technology in their practices, and the practical steps lawyers can take to prevent or mitigate these risks.  This second article in our two-part series covers ethical guidance for attorneys in the realm of social media.  The first article discussed application of ethical rules to technology and the proper use of cloud technology and mobile devices.  See also “Understanding and Addressing Cybersecurity Vulnerabilities at Law Firms: Strategies for Vendors, Lawyers and Clients,” The Cybersecurity Law Report, Vol. 1, No. 5 (Jun. 3, 2015).

    Read Full Article …
  • From Vol. 1 No.11 (Aug. 26, 2015)

    Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part One of Two)

    Lawyers often don’t think about the ethics rules as applied to their conduct online or through the use of technology, panelists said at a recent conference hosted by PLI’s TechLaw Institute.  But as technology advances and continues changing the way lawyers practice, the ethical obligations of lawyers have also evolved in light of the new ways that practitioners communicate with clients, and store and use sensitive information.  Addressing technology issues through a legal ethics prism, panelists David J. Elkanich, a partner at Holland & Knight, and Pamela A. Bresnahan, a senior partner at Vorys, Sater, Seymour and Pease, discussed the ethical issues that lawyers face when using technology in their practices, and the practical steps lawyers can take to prevent or mitigate these risks.  This article, the first of our two-part series, covers ethical rules as they apply to technology and the proper use of cloud technology and mobile devices. The second part will cover ethical guidance for attorneys in the realm of social media.  See also Understanding and Addressing Cybersecurity Vulnerabilities at Law Firms: Strategies for Vendors, Lawyers and Clients,” The Cybersecurity Law Report, Vol. 1, No. 5 (Jun. 3, 2015).

    Read Full Article …
  • From Vol. 1 No.11 (Aug. 26, 2015)

    FTC Weighs In on the Security of Health Care Data on the Cloud

    Like many industries, the health care sector is relying more heavily on new technology to provide digital medical records that are often stored on cloud-based servers and transmitted electronically.  With the technological advances come privacy and security concerns that the FTC is watching closely.  Cora Han, a senior attorney in the Division of Privacy and Identity Protection at the FTC, recently spoke at a meeting of the Health Care Cloud Coalition, a not-for-profit representing cloud computing, telecommunication, digital health, and healthcare companies in the health care sector.  Han addressed the FTC’s expectations and enforcement efforts for privacy and security related to cloud-based mobile technology companies in the health care industry.  See also “Steps to Take Following a Healthcare Data Breach,” The Cybersecurity Law Report, Vol. 1, No. 2 (Apr. 22, 2015).

    Read Full Article …
  • From Vol. 1 No.6 (Jun. 17, 2015)

    The Advantages of Sending Data Up to the Cloud 

    As their data storage and security requirements grow, companies are increasingly turning to cloud service providers.  Cloud storage offers a valuable and efficient option for companies as long as companies thoughtfully manage what data to store remotely and where to send it.  In this interview with The Cybersecurity Law Report, Paul Ferrillo, counsel at Weil, Gotshal & Manges in its Cybersecurity, Data Privacy and Information Management group, discussed the advantages of cloud services, how to select a secure cloud vendor, and data classification questions to ask to determine what to store in the cloud and what to keep on the ground.  See also “Weil Gotshal Attorneys Advise on Key Ways to Anticipate and Counter Cyber Threats,” The Cybersecurity Law Report, Vol. 1, No. 4 (May 20, 2015).

    Read Full Article …
  • From Vol. 1 No.4 (May 20, 2015)

    Weil Gotshal Attorneys Advise on Key Ways to Anticipate and Counter Cyber Threats

    How to handle five data privacy danger zones; the board’s role in cybersecurity; public relations strategies after a breach; and clauses to include in cloud vendor contracts were among the hot topics Weil, Gotshal & Manges attorneys discussed at a recent conference.  Partners Carrie Mahan Anderson, Jeffrey S. Klein, P.J. Himelfarb, Jeffrey D. Osterman and Michael A. Epstein shared their advice in the panel discussion.

    Read Full Article …
  • From Vol. 1 No.3 (May 6, 2015)

    Top Private Practitioners and Public Officials Detail Hot Topics in Cybersecurity and Best Practices for Government Investigations

    A former federal judge, officials at the Consumer Financial Protection Bureau and the DOJ as well as attorneys from Crowell Moring and Document Technologies Inc. were among the panelists at a recent program hosted by the Practising Law Institute.  The panel covered a broad range of topics including public awareness of data security issues; the scope and operation of government investigations regarding data breaches; practical advice for companies developing data security programs; and recent legal issues and developments related to data security.

    Read Full Article …