Risk Management & the Digital Law Practice<br />David Whelan, Manager, Legal Information<br />The Law Society of Upper Can...
risk<br />
risk:physical    <br />
risk:virtual    <br />
risk:you    <br />
what is portable?  <br />
what is portable?<br />everything!<br />
8 GigaBytes =<br />20,000 documents <br />
8 GigaBytes =<br />5 years of practice? <br />
8 GigaBytes =<br />10 years of practice? <br />
free<br />is good<br />
free<br />may be a risk<br />
where to start?    <br />
where to start?<br />at the beginning<br />
password<br />bios<br />
bios<br />password<br />start up<br />
bios<br />password<br />network<br />startup<br />
your username<br />Password<br />
password<br />bad<br />
Excerpt from Zonealarm survey  results infographic by ColumnFive Media<br />
password <br />good<br />
password <br />good<br />12 characters<br />
password <br />good<br />UPPER, lower, $pecial<br />12 characters<br />
password <br />good<br />Ju$t!nB1eb3r<br />JustinBieber<br />
password <br />good<br />I♥theLaw$ociety<br />
http://www.thepasswordmeter.com<br />
encryption<br />
full disk<br />encryption<br />
full disk<br />partial disk<br />encryption<br />
encryption<br />decryption <br />
American Bear by ltshears / Wikimedia Commons<br />
re-<br />encryption<br />
encrypt<br />files<br />
files<br />encrypt<br />folders<br />
files<br />folders<br />encrypt<br />usb storage<br />
files<br />folders<br />hard drives<br />encrypt<br />usb storage<br />
encrypt w/ <br />
encrypt w/ <br />Mac<br />
Mac<br />encrypt w/ <br />Windows<br />
Mac<br />Truecrypt<br />encrypt w/ <br />Windows<br />
http<br />
http<br />surveillance<br />
http<br />sniffing<br />surveillance<br />
https<br />
https://www.safe<br />
https://www.secure<br />
https://www.smart<br />
encrypt<br />wireless<br />
encrypt<br />protect<br />wireless<br />
don't<br />die<br />
your data <br />
your data has data<br />metadata<br />
Got                ?<br />metadata<br />
Got                ?<br />metadata<br />in yourfiles<br />
Got                ?<br />metadata<br />in yourfile transfers<br />in your files<br />
clean your<br />metadata<br />
manage your<br />files<br />
back up your<br />files<br />
back up your<br />files<br />to a hard drive<br />
back up your<br />files<br />online<br />
store your<br />files<br />online<br />
access your<br />files<br />
access your<br />files<br />securely<br />
access your<br />files<br />using apps<br />
your device<br />protect<br />
your device<br />protect<br />with<br />a password<br />
your device<br />protect<br />encryption<br />with<br />a password<br />
remote<br />control<br />your device<br />
control<br />yourself<br /> staff<br />manage<br />
your<br />manage<br />access<br />
access<br />your<br />manage<br />device<br />
access<br />device<br />your<br />manage<br />staff<br />
access<br />device<br />your<br />manage<br />self<br />staff<br />
access<br />device<br />your<br />manage<br />risk<br />self<br />staff<br />
thank you.<br />dwhelan@lsuc.on.ca<br />
Upcoming SlideShare
Loading in …5
×

Risk Management and the Digital Law Practice

660 views

Published on

This presentation suggests areas where the use of technology by lawyers could potentially expose client confidential and private information. Suggestions include encrypting data, using stronger passwords, using secure sockets when on the Web.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
660
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Risk Management and the Digital Law Practice

  1. 1. Risk Management & the Digital Law Practice<br />David Whelan, Manager, Legal Information<br />The Law Society of Upper Canada, Toronto, Ontario<br />
  2. 2. risk<br />
  3. 3. risk:physical <br />
  4. 4. risk:virtual <br />
  5. 5. risk:you <br />
  6. 6.
  7. 7.
  8. 8.
  9. 9.
  10. 10. what is portable? <br />
  11. 11. what is portable?<br />everything!<br />
  12. 12. 8 GigaBytes =<br />20,000 documents <br />
  13. 13. 8 GigaBytes =<br />5 years of practice? <br />
  14. 14. 8 GigaBytes =<br />10 years of practice? <br />
  15. 15.
  16. 16.
  17. 17. free<br />is good<br />
  18. 18. free<br />may be a risk<br />
  19. 19. where to start? <br />
  20. 20. where to start?<br />at the beginning<br />
  21. 21.
  22. 22. password<br />bios<br />
  23. 23. bios<br />password<br />start up<br />
  24. 24. bios<br />password<br />network<br />startup<br />
  25. 25. your username<br />Password<br />
  26. 26. password<br />bad<br />
  27. 27. Excerpt from Zonealarm survey results infographic by ColumnFive Media<br />
  28. 28.
  29. 29. password <br />good<br />
  30. 30. password <br />good<br />12 characters<br />
  31. 31.
  32. 32. password <br />good<br />UPPER, lower, $pecial<br />12 characters<br />
  33. 33. password <br />good<br />Ju$t!nB1eb3r<br />JustinBieber<br />
  34. 34. password <br />good<br />I♥theLaw$ociety<br />
  35. 35. http://www.thepasswordmeter.com<br />
  36. 36.
  37. 37.
  38. 38. encryption<br />
  39. 39.
  40. 40. full disk<br />encryption<br />
  41. 41. full disk<br />partial disk<br />encryption<br />
  42. 42. encryption<br />decryption <br />
  43. 43. American Bear by ltshears / Wikimedia Commons<br />
  44. 44. re-<br />encryption<br />
  45. 45. encrypt<br />files<br />
  46. 46. files<br />encrypt<br />folders<br />
  47. 47. files<br />folders<br />encrypt<br />usb storage<br />
  48. 48. files<br />folders<br />hard drives<br />encrypt<br />usb storage<br />
  49. 49. encrypt w/ <br />
  50. 50. encrypt w/ <br />Mac<br />
  51. 51. Mac<br />encrypt w/ <br />Windows<br />
  52. 52. Mac<br />Truecrypt<br />encrypt w/ <br />Windows<br />
  53. 53. http<br />
  54. 54. http<br />surveillance<br />
  55. 55. http<br />sniffing<br />surveillance<br />
  56. 56.
  57. 57. https<br />
  58. 58. https://www.safe<br />
  59. 59. https://www.secure<br />
  60. 60. https://www.smart<br />
  61. 61. encrypt<br />wireless<br />
  62. 62. encrypt<br />protect<br />wireless<br />
  63. 63. don't<br />die<br />
  64. 64. your data <br />
  65. 65. your data has data<br />metadata<br />
  66. 66. Got ?<br />metadata<br />
  67. 67. Got ?<br />metadata<br />in yourfiles<br />
  68. 68. Got ?<br />metadata<br />in yourfile transfers<br />in your files<br />
  69. 69. clean your<br />metadata<br />
  70. 70. manage your<br />files<br />
  71. 71. back up your<br />files<br />
  72. 72. back up your<br />files<br />to a hard drive<br />
  73. 73. back up your<br />files<br />online<br />
  74. 74.
  75. 75. store your<br />files<br />online<br />
  76. 76. access your<br />files<br />
  77. 77. access your<br />files<br />securely<br />
  78. 78.
  79. 79. access your<br />files<br />using apps<br />
  80. 80.
  81. 81. your device<br />protect<br />
  82. 82. your device<br />protect<br />with<br />a password<br />
  83. 83. your device<br />protect<br />encryption<br />with<br />a password<br />
  84. 84. remote<br />control<br />your device<br />
  85. 85. control<br />yourself<br /> staff<br />manage<br />
  86. 86.
  87. 87.
  88. 88.
  89. 89.
  90. 90. your<br />manage<br />access<br />
  91. 91. access<br />your<br />manage<br />device<br />
  92. 92. access<br />device<br />your<br />manage<br />staff<br />
  93. 93. access<br />device<br />your<br />manage<br />self<br />staff<br />
  94. 94. access<br />device<br />your<br />manage<br />risk<br />self<br />staff<br />
  95. 95. thank you.<br />dwhelan@lsuc.on.ca<br />

×