AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Sookasa off line access2/1/2024 The state bar ethics committees that have taken up the issue of cloud computing have certainly been cautious. Although all 19 committees that have issued formal opinions on cloud computing have given the green light, they have done so with, in some cases, a laundry list of qualifications. Nerino Petro, chief information officer atHolmstrom & Kennedy in Illinois, and a lecturer on data security for the American Bar Association, thinks that while there are legitimate risks, the legal community is, at times, unjustifiably afraid of the cloud. “Attorneys have this innate fear of cloud,” Petro said, “but it isn’t justifiable anymore. The ethics opinion issued by the Pennsylvania State Bar, for example, includes no less than 33 factors for deciding whether an attorney’s use of the cloud meets ethical standards. The opinion suggests implementing basic security measures, like encrypting and backing up data, but also requires an attorney to negotiate favorable terms of service with a cloud provider.ĭaniel Siegel, the principal author of the Pennsylvania opinion, acknowledged that firms don’t always have leverage to negotiate terms of use with cloud service provider, but rejected the notion that the ethical requirements were too onerous, or that requirements like these show an undue nervousness. “While the cloud is in many ways safer than it used to be, you still need to take appropriate measures,” Siegel said. Otherwise, you don’t have to use the cloud.” “Data encryption, strong passwords-these are reasonable requirements for storing client data in the cloud. Merri Baldwin, vice-chair of the California State Bar’s ethics committee, agreed with Siegel. “Attorney fears aren’t overblown,” Baldwin said. We’re talking about protecting the confidentiality of a client’s information.”īut if you ask Petro, cloud security comes down to only two things: multi-factor authentication and retention of the encryption key that allows access to encrypted files. “Who’s going do a better job of securing your data? A small firm, or somebody like Google or Dropbox who’s doing business with major companies? The reality is, from a security perspective, they’ll do a better job than most firms can afford to do.” Petro said that although it’s standard practice for a lot of cloud providers to keep the encryption key, there are likewise a number of services, like Spideroak and Sookasa, that can provide the user with such a key. Fill in your computing ID, and HS email address.Of course, for firms that were already nervous about cyber-security, 2014 probably didn’t help.Underneath the Role menu select the "Standard Account".Underneath the System menu select "Dropbox".Click on the green colored "Account Request" icon.Login using your Health System username and password. ![]() Click here to access the request form on the HIT website.You have to make a request to Health System IT in order to gain access to the UVA HS DropBox Sookasa service. To read more details about the service, please refer to Health System IT's official documentation on Dropbox Sookasa byĬlicking on this link. It can be used to share files between Health System users. Highly sensitive data such as a HIPAA compliant dataset or PHI/PII must be stored in a Sookasa folder. ![]() "DropBox Sookasa" is a free cloud-based service hosted on Dropbox that can be accessed over the internet on any device. If you plan on storing highly sensitive data such as PHI or PII, UVA Health System offers a secure encrypted storage for Health System affiliated researchers, students, and staff. DropBox®/Sookasa® Highly Sensitive Data (PHI/PII) storage
0 Comments
Read More
Leave a Reply. |