Locked Down: Information Security for Lawyers

Locked Down: Information Security for Lawyers

Sharon D. Nelson

Language: English

Pages: 319

ISBN: 1614383642

Format: PDF / Kindle (mobi) / ePub


In an age where lawyers frequently conduct business across wireless networks using smartphones and laptops, how can attorneys safeguard client data and confidential information? Locked Down explains the wide variety of information security risks facing law firms and how lawyers can best protect their data from these threats--with any budget.

Penetration Tester's Open Source Toolkit (3rd Edition)

Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves

Mastering OpenVPN

Network Security Hacks: Tips & Tools for Protecting Your Privacy (2nd Edition)

Secrets and Lies: Digital Security in a Networked World

Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This book. Cover design by RIPE Creative, Inc. Nothing contained in this book is to be considered as the rendering of legal advice for specific cases, and readers are responsible for obtaining such advice from their own legal counsel. This book and any forms and agreements herein are intended for educational and informational purposes only. The products and services mentioned in this publication are under trademark or service-mark protection. Product and service names and terms are used.

Ethical Duties Generally An attorney’s use of technology presents special ethics challenges, particularly in the areas of competence and 46 confidentiality. The duty of competence (ABA Model Rule 1.1) requires attorneys to know what technology is necessary and how to use it. It also requires attorneys who lack the necessary technical competence (many, if not most attorneys) to consult with qualified people who have the requisite expertise. The duty of confidentiality (ABA Model Rule 1.6) is.

Process to protect the confidentiality, integrity and availability of information. It must address people, policies and procedures 81 • • • • • • • • • • • • • • • and technology. The terms security program and security policy are sometimes used to mean the same thing. Other times, program is used broadly to describe the entire process, and policy more narrowly to describe the document that implements it. Although there are numerous descriptions of what should be included in an information.

SecureID). The third authentication factor, something you are or biometrics, uses a unique physical characteristic, like fingerprints, iris or retina patterns or facial characteristics. After the high-profile theft of a Department of Veterans Affairs laptop and portable drive containing personal information on more than 28 million veterans in 2006, the Office of Management and Budget (OMB) issued new security guidelines for federal agencies. They require twofactor authentication (e.g., a password.

The user is able to select the option to securely erase data. If the user does this, the data will not be recoverable. These studies and the technical information they report make it clear that disposal or reuse of hard drives without proper sanitization presents a major security threat. This threat is present when computers or hard drives are sold, given away, discarded or returned at the end of a lease. It also arises when defective hard drives are discarded or returned to vendors. The same.

Download sample

Download