SlideShare a Scribd company logo
1 of 2
IN BRIEF                   PROFESSIONAL LIABILITY FUND
                           www.osbplf.org
                    MALPRACTICE AVOIDANCE NEWSLETTER                                    OREGON LAWYERS
                                                                                 FOR


                LAPTOP COMPUTERS:                                                    Unauthorized use of data usually
                                                                                     results from: (a) loss or theft of the
                    PROTECTING                                                       laptop; (b) unauthorized access to
                CONFIDENTIAL CLIENT                                                  the laptop for long enough to view or
                   INFORMATION                                                       copy data; (c) loss or theft of data
                                                                                     copied to diskettes or other portable
                    Laptop computers present special                                 storage devices (e.g., memory sticks,
                data security risks because they are de-                             USB drives) for printing, backup, or
                signed for mobility and are frequently                               data transfer; or (d) interception or
                used outside the office. Some of the risks                           compromise of data transmitted over
                associated with laptop usage are:                                    telephone lines or the Internet.
                •     Loss and Theft. Laptops are                                   These security risks cannot be elimi-
                      vulnerable to both human error (loss)                     nated, but a combination of technology
                      and to greed (theft). The portable                        tools and user awareness can reduce
                      nature of laptops makes them easy to                      laptop data security risks to a reasonable
                      leave in a hotel room, airport, or                        level.
                      restaurant. They are also easily stolen
                      and sold on the black market. National                                PHYSICAL SECURITY
                      crime statistics report that roughly
                                                                                    The risks of theft, unauthorized ac-
                      150,000 laptops were stolen in 1994,
                                                                                cess, or unauthorized use of data can be
                      200,000 in 1995, and 275,000 in 1996.
                                                                                significantly reduced by diligently ob-
                      Theft is growing faster than the
                                                                                serving the following physical security
                      number of laptop computers in use.
THIS ISSUE                                                                      practices:
                      Theft from an office is the most
 October 2004
                      common, and airport theft the second
 Issue No. 93                                                                   •    Use a sturdy bag that doesn’t look
                      most common.
                                                                                     like a laptop bag to carry your laptop;
                •     Unauthorized        Access.       Laptop
                                                                                •    Hang the bag from your shoulder or
                      computers are frequently used in
                                                                                     keep it on the floor between your
                      insecure locations – conference rooms,
                                                                                     feet;
                      temporary offices, and airports, to name
                      a few. In most cases, the laptop is used                  •    Use locking cables or burglar alarms;
                      in a conference room or other public
                                                                                •    Never leave the laptop unattended or
                      area where the laptop user is not well
                                                                                     out of your sight in a public place;
                      known to others in the area. This
                      situation makes it easy for an                            •    Don’t check the laptop as luggage or
                      unauthorized user to view or use the                           in a coatroom;
                      laptop without looking suspicious. Be
                                                                                •    Don’t store the laptop in airports,
                      especially careful if you are using a
                                                                                     airplanes, trains, or subways;
                      high-quality large screen, as this allows
                      a much wider viewing angle.
                                                                                •    Keep the laptop with you when in
                                                                                     taxis, cars, or other transportation;
                •     Unauthorized              Use       of       Data.


                                                                         DISCLAIMER
                    THIS NEWSLETTER INCLUDES CLAIM PREVENTION TECHNIQUES THAT ARE DESIGNED TO MINIMIZE THE LIKELIHOOD OF BEING SUED FOR
                    LEGAL MALPRACTICE. THE MATERIAL PRESENTED DOES NOT ESTABLISH, REPORT, OR CREATE THE STANDARD OF CARE FOR ATTORNEYS.
                    THE ARTICLES DO NOT REPRESENT A COMPLETE ANALYSIS OF THE TOPICS PRESENTED AND READERS SHOULD CONDUCT THEIR OWN AP-
                    PROPRIATE LEGAL RESEARCH.
•   Watch the laptop as it goes through airport         2003 issue of Law Office Computing) and MemoPass.
    metal detectors (“snatch and grab” thefts are       These devices create and store personal profiles for
    common); and                                        the authorized user through a USB port or by access
                                                        card.
•   Use locking or even unlocked drawers or
    cabinets to store laptop computers when you             Creating a mobile system can backfire if the
    leave an office, conference room, or hotel room.    system is not secure. This is a very important con-
                                                        sideration when using a wireless connection. Wire-
                                                        less laptops and computers have wireless adapters
               ACCESS SECURITY
                                                        and wireless access ports that enable them to con-
    The second line of defense against laptop theft     nect to your computer network. Unfortunately, these
or unauthorized use of data is access security. If a    wireless access ports transmit radio signals continu-
laptop computer is lost, stolen, or otherwise outside   ously. Since only about one percent of wireless us-
the control of its owner, data remains secure if an     ers change the vendor’s default user name and con-
unauthorized person is prevented from turning the       figurations, 99 percent of these wireless access
computer on and using it.                               points are highly insecure. So if you are using a
                                                        wireless network, don’t rely on the default settings
    The simplest way to reduce access to your com-
                                                        of your laptop to protect you. Check with your wire-
puter data is to log off of the computer when you are
                                                        less vendor or consult with an expert about how to
not able to stay near it, and to take the computer
                                                        properly secure your wireless system.
with you. Since this option is not always practical,
you can also protect the data by using the lock com-        Last, but not least, laptop users can secure data
puter function of the computer. Simply hit Ctrl-Alt-    by being selective about what they store on the
Delete while your computer is on, then select Lock      laptop. If possible, avoid storing personal informa-
Computer. Your laptop is now locked until an autho-     tion (such as birth dates and social security num-
rized user logs on.                                     bers) on a laptop. When working away from the of-
                                                        fice, use resources that the computer can link to via
     Password security options include using pass-
                                                        the Internet as the sources of confidential data.
word protection on screen savers (so a password is
                                                        Intranets, extranets, and Web sites protected by pri-
needed once the screensaver appears), using a pass-
                                                        vate passwords are examples of such sources not lo-
word that guards against being easily guessed (of-
                                                        cated on a laptop’s hard drive. If the laptop is lost or
ten referred to as a “strong” password), changing
                                                        stolen, the client data will not be compromised. This
passwords regularly, and following the other secu-
                                                        is particularly true if you don’t store the passwords
rity suggestions that are available from the maker of
                                                        to such resources on the laptop itself, or if the pass-
your operating system. If you use Microsoft Win-
                                                        words are well encrypted to prevent unauthorized ac-
dows, you can find a list of security tips by search-
                                                        cess.
ing the Help menu.
                                                        Our thanks to Beverly Michaelis, PLF Practice
                DATA SECURITY                           Management Advisor; Dee Crocker, PLF Practice
                                                        Management Advisor; and Steel Scharbach of Steel
    Access security alone is not sufficient protec-     Scharbach Associates, LLC, for their assistance with
tion for laptop computers. Power-on and screen-lock     this article. The original article, “Notebook Security:
                                                        Protecting     Confidential     Client    Information,”
passwords can be eluded by removing a laptop’s
                                                        October 1997, can be found at www.ssa-lawtech.com.
hard drive and reinstalling the hard drive in another
                                                        Click on white papers, then on security issues.
laptop, and neither system protects data being trans-
mitted by CD, memory sticks, portable hard drives,
or e-mail. Using security software and hardware se-
curity devices provides additional data security. An
example of security software that includes e-mail en-
cryption is Steganos Security Suite, reviewed in the
September 2003 issue of PC World. Examples of
hardware security devices are DEFCON Authentica-
tor (reviewed by David Hiersekorn for the June/July



OCTOBER 2004                                IN BRIEF - PAGE 2                              www.osbplf.org

More Related Content

Similar to Laptop Computers Protecting Confidential Clt Info

Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationOregon Law Practice Management
 
wifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slideswifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slidesguest1c1a9a
 
Security Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentSecurity Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentCatherine MacAllister
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-bBbAOC
 
DLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoDLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoRamsés Gallego
 
Access Control - Week 4
Access Control - Week 4Access Control - Week 4
Access Control - Week 4jemtallon
 
9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)Isaac Feliciano
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...DroneSec
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology EducationSummerpair77
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersVi Tính Hoàng Nam
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsJohn Rhoton
 

Similar to Laptop Computers Protecting Confidential Clt Info (20)

Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client Information
 
Laptop
LaptopLaptop
Laptop
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
wifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slideswifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slides
 
wifi
wifiwifi
wifi
 
Security Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentSecurity Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect Equipment
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Computer safety
Computer safetyComputer safety
Computer safety
 
MIS (1).pptx
MIS (1).pptxMIS (1).pptx
MIS (1).pptx
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
 
DLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoDLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés Gallego
 
Access Control - Week 4
Access Control - Week 4Access Control - Week 4
Access Control - Week 4
 
9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)9. cellphone hardening (cyber awareness series)
9. cellphone hardening (cyber awareness series)
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
 
Computer security
Computer securityComputer security
Computer security
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
 
Senior Education
Senior EducationSenior Education
Senior Education
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 

More from Oregon Law Practice Management

Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Oregon Law Practice Management
 

More from Oregon Law Practice Management (20)

Protecting your iolta and operating accounts
Protecting your iolta and operating accountsProtecting your iolta and operating accounts
Protecting your iolta and operating accounts
 
OJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the publicOJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the public
 
The continuum of client communication
The continuum of client communicationThe continuum of client communication
The continuum of client communication
 
Scams will never stop
Scams will never stopScams will never stop
Scams will never stop
 
7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
 
A bright future for new lawyers
A bright future for new lawyersA bright future for new lawyers
A bright future for new lawyers
 
Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?
 
Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016
 
UTCR amendments 2016
UTCR amendments 2016UTCR amendments 2016
UTCR amendments 2016
 
eCourt malpractice traps and relation back
eCourt malpractice traps and relation backeCourt malpractice traps and relation back
eCourt malpractice traps and relation back
 
Marketing and client development in three easy steps
Marketing and client development in three easy stepsMarketing and client development in three easy steps
Marketing and client development in three easy steps
 
The 7 golden rules of collections
The 7 golden rules of collectionsThe 7 golden rules of collections
The 7 golden rules of collections
 
Bankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyerBankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyer
 
Oregon ecourt and arbitration
Oregon ecourt and arbitrationOregon ecourt and arbitration
Oregon ecourt and arbitration
 
The year in review - top posts of 2015
The year in review - top posts of 2015The year in review - top posts of 2015
The year in review - top posts of 2015
 
Glitches in oregon e service
Glitches in oregon e serviceGlitches in oregon e service
Glitches in oregon e service
 
Editing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dcEditing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dc
 
How to name client folders
How to name client foldersHow to name client folders
How to name client folders
 
Redaction tool in Acrobat XI
Redaction tool in Acrobat XIRedaction tool in Acrobat XI
Redaction tool in Acrobat XI
 
60 apps in 60 minutes
60 apps in 60 minutes60 apps in 60 minutes
60 apps in 60 minutes
 

Recently uploaded

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Laptop Computers Protecting Confidential Clt Info

  • 1. IN BRIEF PROFESSIONAL LIABILITY FUND www.osbplf.org MALPRACTICE AVOIDANCE NEWSLETTER OREGON LAWYERS FOR LAPTOP COMPUTERS: Unauthorized use of data usually results from: (a) loss or theft of the PROTECTING laptop; (b) unauthorized access to CONFIDENTIAL CLIENT the laptop for long enough to view or INFORMATION copy data; (c) loss or theft of data copied to diskettes or other portable Laptop computers present special storage devices (e.g., memory sticks, data security risks because they are de- USB drives) for printing, backup, or signed for mobility and are frequently data transfer; or (d) interception or used outside the office. Some of the risks compromise of data transmitted over associated with laptop usage are: telephone lines or the Internet. • Loss and Theft. Laptops are These security risks cannot be elimi- vulnerable to both human error (loss) nated, but a combination of technology and to greed (theft). The portable tools and user awareness can reduce nature of laptops makes them easy to laptop data security risks to a reasonable leave in a hotel room, airport, or level. restaurant. They are also easily stolen and sold on the black market. National PHYSICAL SECURITY crime statistics report that roughly The risks of theft, unauthorized ac- 150,000 laptops were stolen in 1994, cess, or unauthorized use of data can be 200,000 in 1995, and 275,000 in 1996. significantly reduced by diligently ob- Theft is growing faster than the serving the following physical security number of laptop computers in use. THIS ISSUE practices: Theft from an office is the most October 2004 common, and airport theft the second Issue No. 93 • Use a sturdy bag that doesn’t look most common. like a laptop bag to carry your laptop; • Unauthorized Access. Laptop • Hang the bag from your shoulder or computers are frequently used in keep it on the floor between your insecure locations – conference rooms, feet; temporary offices, and airports, to name a few. In most cases, the laptop is used • Use locking cables or burglar alarms; in a conference room or other public • Never leave the laptop unattended or area where the laptop user is not well out of your sight in a public place; known to others in the area. This situation makes it easy for an • Don’t check the laptop as luggage or unauthorized user to view or use the in a coatroom; laptop without looking suspicious. Be • Don’t store the laptop in airports, especially careful if you are using a airplanes, trains, or subways; high-quality large screen, as this allows a much wider viewing angle. • Keep the laptop with you when in taxis, cars, or other transportation; • Unauthorized Use of Data. DISCLAIMER THIS NEWSLETTER INCLUDES CLAIM PREVENTION TECHNIQUES THAT ARE DESIGNED TO MINIMIZE THE LIKELIHOOD OF BEING SUED FOR LEGAL MALPRACTICE. THE MATERIAL PRESENTED DOES NOT ESTABLISH, REPORT, OR CREATE THE STANDARD OF CARE FOR ATTORNEYS. THE ARTICLES DO NOT REPRESENT A COMPLETE ANALYSIS OF THE TOPICS PRESENTED AND READERS SHOULD CONDUCT THEIR OWN AP- PROPRIATE LEGAL RESEARCH.
  • 2. Watch the laptop as it goes through airport 2003 issue of Law Office Computing) and MemoPass. metal detectors (“snatch and grab” thefts are These devices create and store personal profiles for common); and the authorized user through a USB port or by access card. • Use locking or even unlocked drawers or cabinets to store laptop computers when you Creating a mobile system can backfire if the leave an office, conference room, or hotel room. system is not secure. This is a very important con- sideration when using a wireless connection. Wire- less laptops and computers have wireless adapters ACCESS SECURITY and wireless access ports that enable them to con- The second line of defense against laptop theft nect to your computer network. Unfortunately, these or unauthorized use of data is access security. If a wireless access ports transmit radio signals continu- laptop computer is lost, stolen, or otherwise outside ously. Since only about one percent of wireless us- the control of its owner, data remains secure if an ers change the vendor’s default user name and con- unauthorized person is prevented from turning the figurations, 99 percent of these wireless access computer on and using it. points are highly insecure. So if you are using a wireless network, don’t rely on the default settings The simplest way to reduce access to your com- of your laptop to protect you. Check with your wire- puter data is to log off of the computer when you are less vendor or consult with an expert about how to not able to stay near it, and to take the computer properly secure your wireless system. with you. Since this option is not always practical, you can also protect the data by using the lock com- Last, but not least, laptop users can secure data puter function of the computer. Simply hit Ctrl-Alt- by being selective about what they store on the Delete while your computer is on, then select Lock laptop. If possible, avoid storing personal informa- Computer. Your laptop is now locked until an autho- tion (such as birth dates and social security num- rized user logs on. bers) on a laptop. When working away from the of- fice, use resources that the computer can link to via Password security options include using pass- the Internet as the sources of confidential data. word protection on screen savers (so a password is Intranets, extranets, and Web sites protected by pri- needed once the screensaver appears), using a pass- vate passwords are examples of such sources not lo- word that guards against being easily guessed (of- cated on a laptop’s hard drive. If the laptop is lost or ten referred to as a “strong” password), changing stolen, the client data will not be compromised. This passwords regularly, and following the other secu- is particularly true if you don’t store the passwords rity suggestions that are available from the maker of to such resources on the laptop itself, or if the pass- your operating system. If you use Microsoft Win- words are well encrypted to prevent unauthorized ac- dows, you can find a list of security tips by search- cess. ing the Help menu. Our thanks to Beverly Michaelis, PLF Practice DATA SECURITY Management Advisor; Dee Crocker, PLF Practice Management Advisor; and Steel Scharbach of Steel Access security alone is not sufficient protec- Scharbach Associates, LLC, for their assistance with tion for laptop computers. Power-on and screen-lock this article. The original article, “Notebook Security: Protecting Confidential Client Information,” passwords can be eluded by removing a laptop’s October 1997, can be found at www.ssa-lawtech.com. hard drive and reinstalling the hard drive in another Click on white papers, then on security issues. laptop, and neither system protects data being trans- mitted by CD, memory sticks, portable hard drives, or e-mail. Using security software and hardware se- curity devices provides additional data security. An example of security software that includes e-mail en- cryption is Steganos Security Suite, reviewed in the September 2003 issue of PC World. Examples of hardware security devices are DEFCON Authentica- tor (reviewed by David Hiersekorn for the June/July OCTOBER 2004 IN BRIEF - PAGE 2 www.osbplf.org