SlideShare a Scribd company logo
1 of 12
Download to read offline
THE LAWYER’S GUIDE TO
MOBILE COMPUTER SECURITY
Ellen Freedman, CLM
© 2007 Freedman Consulting, Inc.
[With appreciation to co-authors Jim Calloway and Reid Trautz]
By all accounts, a personal computer is lost or stolen every 12 seconds. Most
contain confidential or sensitive information.
An article in the Sept. 22, 2006, online issue of Enterprise Security Today was
titled, “Hundreds of Census Bureau Laptops Lost.” The article went on to
detail that the Census Bureau has had 217 laptops, 46 portable data storage
devices and 15 handheld devices become lost or stolen since 2003. All held
confidential information. In fact, the Commerce Department performed a
review and found that since 2001, the department’s 15 operating units had
lost an astounding 1,137 laptop computers, all containing confidential
information. The monthly newsletter Privacy Journal reported 24 significant
instances of Social Security numbers and other sensitive data being placed at
risk through stolen or lost laptops so far in 2006.
Of course just one missing laptop can expose a great deal of information.
Most will recall the media firestorm when a laptop containing personally
identifiable information of 26.5 million veterans and family members was
stolen from the home of an employee of the Veterans Administration.
Having to explain to a client or disciplinary authority about lost or exposed
client data on a missing laptop would be unpleasant and difficult. With all of
the reported instances of this happening, how could anyone seriously
maintain that they had no idea that a laptop with confidential information
could be lost or stolen?
But PCs aren’t the only mobile devices that can contain confidential
information. Virtually all mobile devices and removable media could
THE LAWYER’S GUIDE TO
MOBILE COMPUTER SECURITY Page 2 of 12
Freedman Consulting, Inc.
(215) 628-9422
potentially expose the typical law firm to embarrassment and even serious
ethical breaches if they fall into the wrong hands. Law firms need to start
devoting more attention to protection of information on USB devices like
thumb drives and iPods or other MP3 players; to removable media like CDs,
DVDs, floppy disks and external hard drives; to seemingly innocuous devices
like dictation recorders; and to wireless devices like cell phones, smart
phones and personal digital assistants (PDAs).
We should also be aware that information can be stolen from a computer
without the alarm created by vanishing hardware. Software is readily
available on the Internet for efficiently purloining data. For example, third-
party packet capture driver applications enable nefarious use of USB thumb
drives. It prepares the device to enable both data and large applications to be
copied onto the removable media within seconds. Now a hacker no longer
needs to have a laptop available to compromise a network. A USB flash drive
can be plugged into a PC and used to steal large quantities of information
rapidly. Similar software for MP3 players is now available.
It would be easy for a short-sighted law firm manager or IT director to decree
that no client information would ever be taken out of the office on a mobile
device. But the demands of today’s workplace make laptop computers, PDAs,
flash drives and other devices almost a requirement for many. It would be
inconceivable to travel to visit with a client in another state without taking a
laptop packed with information about the client’s files so that any question
could be answered quickly. Remote access to the office network over the
Internet is an important productivity component for lawyers who are home
with a sick child or traveling. And, of course, e-mail with documents and
other data files attached leaves the office regularly.
It follows then that when we talk about mobile security, we are primarily
talking about training staff and lawyers to be aware of the risks of losing
important information and adopting policies to secure confidential
information. There is a need for every firm to develop and implement a
computer use policy which carefully balances the need for security with the
need of users to accomplish tasks effectively and efficiently without creating
undue administrative burden.
THE LAWYER’S GUIDE TO
MOBILE COMPUTER SECURITY Page 3 of 12
Freedman Consulting, Inc.
(215) 628-9422
This article will examine the various areas to be considered when drafting
and implementing a computer use policy.
METADATA
By now most lawyers should be aware of the fact that documents contain
hidden information called metadata. There have been some embarrassing
moments for individuals who are unaware that the documents they e-mailed
contained hidden information which might reveal things that would
embarrass the sender. For example, some of the most problematic items of
metadata are deleted comments or document revision history. Tools that
expose metadata and instructions on how to look for it are readily available
on the Internet. Sending a document to opposing counsel that potentially
exposes the client’s comments made while reviewing the document could
constitute a major ethical breach.
Law firm personnel must appreciate the potential problems of metadata and
deal with it before e-mailing a document outside of the office. One way to
create a document that is virtually metadata free is to create a new “clean”
document just before e-mailing it. First open a blank document. Then one can
select the text in the original document, copy it to the clipboard and paste it
into the new blank document to create a new document with no troublesome
metadata.
WordPerfect users might consider upgrading to version X3 that has a “save
without metadata” feature. There are various commercial products available
for both viewing and deleting metadata from a document, such as the
Metadata Assistant from PayneConsulting.com. Another option is to always
have a policy of printing a document to PDF before allowing it outside of the
office. While PDF documents created in this manner retain some metadata, it
is limited and not of the type likely to expose client confidences or to prove
embarrassing.
DOCUMENT SECURITY
While the issue of metadata is getting all the attention these days, we cannot
overlook the basic matter of office processes for protecting access to sensitive
THE LAWYER’S GUIDE TO
MOBILE COMPUTER SECURITY Page 4 of 12
Freedman Consulting, Inc.
(215) 628-9422
documents. There are two ways to protect access to documents and the
confidential information contained in them: authentication and encryption.
Encryption is explained further below.
Not all documents generated by a law firm contain sensitive or privileged
information. But documents are the lifeblood of attorneys. Attorneys have a
duty to preserve and protect the confidentiality of that information. That task
is made more difficult when documents are accessible across a firm network
or shared electronically with clients, co-counsel, opposing counsel and the
courts via e-mail, e-filing and extranets. Securing confidentiality is now much
more difficult than just locking a file cabinet or a desk drawer.
Authentication is the common term for proactively limiting access to
electronically created documents only to those people we want to have access.
We can easily install authentication requirements on a computer to view a
document, folder or the entire computer. Biometric authentication —
fingerprint and iris scans for example — is an emergent method, but
passwords are by far the most common form of authentication. All computers
should require at least one password to logon to the computer. Moreover,
individual documents containing sensitive information that are shared
electronically should also be individually password
protected.
Passwords can be very strong or relatively weak. A strong password will be at
least nine characters in length and contain both letters and numbers or
typographic symbols. Even a relatively insecure, or “soft” password may have
some benefits. A firm could adopt a universal password for all documents to
be taken outside of the firm in any way, including by e-mail attachment. This
password would be communicated to clients, co-counsel and opposing counsel
by phone. While the widespread knowledge of this password would limit its
perfect effectiveness, it would go a long way toward protecting “lost”
documents disclosed via misaddressed e-mail, a lost CD-ROM or a lost USB
flash drive. Policy should require that the password never be given out to a
caller, but only via a return call to a phone number contained in the firm’s
records. It should also never be sent out via e-mail, especially in the e-mail
transmitting the document.
THE LAWYER’S GUIDE TO
MOBILE COMPUTER SECURITY Page 5 of 12
Freedman Consulting, Inc.
(215) 628-9422
HOW TO PASSWORD PROTECT DOCUMENTS
Taking this extra precaution is quite easy, whether you use Word or
WordPerfect to create your documents. In MS Word 2003 under “Tools”
“Protect Document” you can limit editing to read-only, comments and track
changes. Under “Tools” “Options” “Security” you can enable password
protection to open or modify a document. There are also privacy options, such
as “make hidden markup visible when opening or saving” and “warn before
printing, saving or sending a file that contains tracked changes or
comments.”
In WordPerfect, click “File” “Save As.” Check the “Password Protect” box in
the lower corner of the dialogue box that opens. Then click “Save” and enter a
password in the dialog box that opens.
Even though all of the law firm staff are presumed to be trustworthy, it may
make sense to utilize password protection on some occasions so that
particularly sensitive client documents are only accessible by a few.
LOCKING DOWN PDF FILES
Another way to protect documents from unwanted changes or exposure is to
consider saving your Word or WordPerfect file in Portable Document Format
(PDF). This is also known as “publishing to PDF.” WordPerfect has this
function in all recent versions. Adobe Acrobat is the preferred, if most
expensive, method, but there are utilities that provide less expensive PDF
publishing. By using these tools, law firm users can “lock down” documents,
disallowing printing, copying, editing, commenting or even opening the
document. One can encrypt the file or use secure digital signatures and other
authentication protocols. By “locking down” PDF files, attorneys can make
sure that the document is used in the way they want, without exposing it to
alteration or copying. In other words, it is a more secure way to send
documents to clients and opposing counsel and know they cannot be altered,
or that one can easily see the alterations, depending upon the options you
chose.
THE LAWYER’S GUIDE TO
MOBILE COMPUTER SECURITY Page 6 of 12
Freedman Consulting, Inc.
(215) 628-9422
ENCRYPTION
Password protecting a document reminds one of the old adage that locking
your doors will keep out honest people, but would likely only slow down a
professional thief. For critically important information, document encryption
is the solution rather than password protection. A marital dissolution
settlement proposal might be effectively protected by a password. However,
information about a proposed multimillion-dollar merger or the defense of a
criminal matter making national headlines might need to be encrypted.
Encryption is the process of obscuring data or information to make it
unreadable without special software or knowledge to decrypt it. Governments
and military have long used encryption to protect sensitive communications,
but commercial encryption products have emerged in the marketplace to
protect software, Internet communications, mobile data, cell phones and
other sensitive information.
To encrypt digital information, the document, folder or data file is run
through a software application to obscure the information. There are various
levels of obscuring, general stated in “bits;” the higher the bits, the harder to
decrypt the information. Currently 256-bit encryption is a common standard,
but super-sensitive documents will have higher levels. The way to de-encrypt
the information is with a “key.” The key is often a pass code or another
software program tied to the original encryption software.
An obvious danger with document encryption is that the loss of the key
effectively “loses” the document.
Let us now consider security concerns related to computers and storage
devices rather than just documents.
CD-ROMS, DVDS AND FLOPPY DISK DRIVES
Although one can encrypt or password protect CD-ROMs, DVDs and floppy
drives, it generally makes more sense for the user to encrypt or password
protect the documents individually as noted in the preceding section. It is
also probably a good practice to keep a business card in any disk carrier just
in case an honest person finds it if it is lost.
THE LAWYER’S GUIDE TO
MOBILE COMPUTER SECURITY Page 7 of 12
Freedman Consulting, Inc.
(215) 628-9422
USB FLASH DRIVES
The use of USB flash drives is increasingly widespread. A USB flash drive is
a small removable data storage device that plugs into almost any computer
built in the past five years or so and is commonly used to transport and share
documents. These devices are as small as a matchbook or ink pen but can
hold thousands of documents, hundreds of photos, songs or slide
presentations. It is plugged into the USB port on any other computer for
access to any documents and other files previously transferred to the device.
These tools can be especially helpful if you do not have remote connectivity to
your office network. USB flash drives have largely replaced floppy disks for
transporting a few documents home. For example, if a lawyer needs to redraft
one agreement or finish drafting an article over the weekend, it can be copied
to a USB flash drive when leaving the office. Then one can plug it into
another computer and work on the document. When finished, one should save
it only on the flash drive, not the other computer’s hard drive.
Although these devices are very convenient, there are two main security
issues: They are easily misplaced, and they can leave confidential data on the
temporary host computer.
To avoid losing the flash drive, attach it to your office or car keys with a small
but secure chain. Treat it like a million dollar nugget of gold; you always
know where it is at all times. Why? Because that may be the cost to settle a
malpractice claim if confidential information is lost or stolen.
PROTECTING THE DATA ON YOUR FLASH DRIVE
The two most common methods to protect this data are authentication and
encryption.
As discussed above, authentication is often a password to access the data.
Some lawyers take the precaution to use a password to access the flash drive
contents and a second password for each file or folder on the flash drive.
Encryption is the other method of protecting your data. Although some flash
drive users view this as an inconvenience, it is much more secure than just a
password.
THE LAWYER’S GUIDE TO
MOBILE COMPUTER SECURITY Page 8 of 12
Freedman Consulting, Inc.
(215) 628-9422
Flash drive manufacturers continue to meet the security demands of
consumers and now add authentication and/or encryption software to some
flash drive models. For example, Lexar Media adds password-protected 256-
bit AES encryption to its JumpDrive Secure flash drive. Not every document
needs to be protected, but it’s nice to know you can secure critical documents
and data with less worry if it is lost.
PORTABLE HARD DRIVES
Portable hard drives are external storage devices that can be easily
transported in a briefcase, purse or pocket. These devices make it easy to
carry your data backup home. They can hold more information than a flash
drive, often as much or more than any computer in your office. They connect
to any computer through a cable, usually a USB or Firewire cable.
The portable hard drive has leaped in popularity as the physical size of the
devices has dropped, the storage capability has skyrocketed and the prices
continue to fall. Manufacturers include Iomega, Seagate, Pocketec and CMS
Products.
Many smaller firms are buying two of these devices to use for their data
backup protocol instead of using a magnetic tape drive. Coupled with reliable
back-up software (included with some portable hard drives), the firms swap
the two hard drives on a daily or weekly basis, keeping the other in a secure
off-site location.
As with any other information-laden storage device that leaves your office, it
must be secured against the possibility of theft or being lost. Again,
authentication and encryption are the best methods to protect data
confidentiality.
From a security standpoint, these drives have the same attendant risks and
protection schemes as USB flash drives. They are slightly more inherently
secure when used as backups because the backup software will compress the
data, often in a proprietary format. In addition, they sometimes work through
proprietary installed software systems rather than the “plug-and-play” model
of the USB flash drives. The finder of the lost USB flash drive merely needs
THE LAWYER’S GUIDE TO
MOBILE COMPUTER SECURITY Page 9 of 12
Freedman Consulting, Inc.
(215) 628-9422
to stick it into a computer’s USB port to look at the contents. Spying on
compressed data in a found backup portable hard drive would present a
greater challenge to the average user.
MOBILE PHONES AND PDAs
The current generation of high-end mobile phones incorporates many of the
information carrying characteristics of computers. Smart phones now
incorporate all of the functionality of PDAs.
Unfortunately, password protecting a mobile phone would tend to reduce a
great deal of its functionality and convenience. One should still consider
whether documents placed on a mobile phone should be password protected.
Probably the most practical advice is to consider whether sensitive
documents should be placed on a mobile phone at all.
Some PDAs and mobile phones now provide for remote purging of the
information when they are lost. One law firm that unsuccessfully tried to
utilize this feature on a phone learned that it would not work in the shielded
lower floors of a parking garage, where it was lost.
LAPTOP COMPUTERS
The number of lawyers who have laptop computers is significant and steadily
growing. It is a great convenience to have much of your client information,
your forms and other digital data with you when traveling or even going
home at night. However, the loss or theft of a laptop is not as rare as one
might think, as noted previously.
The minimum standard for laptop protection is that it should be password
protected. For laptops that are typically attached to a network, this is already
done by the network login password.
Readers will begin to notice some familiar themes. Sensitive documents on a
laptop can be either password protected or encrypted. Sometimes it may
make sense to encrypt the entire folders for keeping important documents
safe.
THE LAWYER’S GUIDE TO
MOBILE COMPUTER SECURITY Page 10 of 12
Freedman Consulting, Inc.
(215) 628-9422
Laptops left unattended in a hotel room can be secured by chain lock devices
similar to those used to protect a bicycle. (Just make sure you don’t “secure”
it to a table leg or something else that can be raised up.) Screen protectors
can be used to block prying eyes when working in public or on an airplane.
The authors have received, but not yet reviewed, some sophisticated software
packages that allow a stolen computer to “phone home” when it is connected
to the Internet. There are also packages for remotely deleting sensitive
information when the laptop is connected to the Internet. While these
concepts are new and “cutting edge” at present, one can anticipate that they
will become the minimum security standard within a few years. Likewise, it
is no longer the stuff of science fiction to consider a laptop with fingerprint or
iris scanning authentication.
We will continue to see both challenges and improvements with our digital
security plans. One of the most interesting methods of laptop remote access
security utilizes a key fob which displays a series of numbers. The displayed
numbers change every few minutes and is synchronized with the office
computer network. To log in to the network requires entry of the current set
of numbers followed by a several digit number that the lawyer had
memorized. The theory is that even if the purpose of the key fob is known and
it was lost or stolen along with the laptop, one would still be unable to crack
the network without the memorized set of numbers.
CONCLUSION
The most important thing about mobile security is for the firm to consider
everything in advance and draft a well thought-out policy. Then training and
education are the key. Like any other business, a law firm has to stay
competitive and take advantage of advances in technology. That will mean
that a firm has to take advantage of the benefits of mobile technology.
Spending some time drafting a written plan for mobile computing security is
important for both the law firm and the clients.
THE LAWYER’S GUIDE TO
MOBILE COMPUTER SECURITY Page 11 of 12
Freedman Consulting, Inc.
(215) 628-9422
SOME MOBILE SECURITY RESOURCES
Managing the Security and Privacy of Electronic Data in a Law Office
www.practicepro.ca/practice/ElectronicDataSecurity.asp
(This is a “must read” free booklet from PracticePRO)
Death by Laptop
By Sheila Blackford & Reid Trautz, Law Technology News
http://tinyurl.com/yg9vrs
Lojack for Laptops
www.absolute.com
www.denniskennedy.com
RoboForm password storage
www.roboform.com
USB Flash Drives
For password and encryption software for USB flash drives
www.Portableapps.com
www.lexar.com/jumpdrive/index.html
ABOUT MY CO-AUTHORS
Reid F. Trautz heads the American Immigration Lawyers Association’s
Practice and Professionalism Center, where he provides ethics guidance and
practice management information and consulting services to AILA members
to help them improve their businesses and the delivery of legal services to
their clients. He is a nationally recognized author and presenter on law firm
management. His articles have appeared in Law Technology News, The
Practical Lawyer, Law Practice Management, GP Solo, Washington Lawyer
and Law Practice Today, among others.
Jim Calloway is the director of the Oklahoma Bar Association Management
Assistance Program and manager of the OBA Solo and Small Firm
THE LAWYER’S GUIDE TO
MOBILE COMPUTER SECURITY Page 12 of 12
Freedman Consulting, Inc.
(215) 628-9422
Conference. As a member of the ABA, he served as chair of the ABA
TECHSHOW 2005 board, on which he has served as a board member for the
past three years. He has made over 200 presentations across the country on
law office management, legal technology, ethics and business operations.
A version of this document originally appeared in the March/April 2007
issue of The Pennsylvania Lawyer
©2007 Freedman Consulting, Inc. The information in this article is protected by U.S.
copyright. Visitors may print and download one copy of this article solely for
personal and noncommercial use, provided that all hard copies contain all copyright
and other applicable notices contained in the article. You may not modify, distribute,
copy, broadcast, transmit, publish, transfer or otherwise use any article or material
obtained from this site in any other manner except with written permission of the
author. The article is for informational use only, and does not constitute legal advice
or endorsement of any particular product or vendor.

More Related Content

What's hot

How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsBMDS3416
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White PaperKevin Featherly
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsAlfonso Sintjago
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Fasoo
 
Data Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEPData Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEPJoseph Lopez, M.ISM
 
Securing Business-Information from Microsoft -Presented by Atidan
Securing Business-Information from Microsoft -Presented by AtidanSecuring Business-Information from Microsoft -Presented by Atidan
Securing Business-Information from Microsoft -Presented by AtidanDavid J Rosenthal
 
Print Security? Are Businesses Complacent?
Print Security? Are Businesses Complacent?Print Security? Are Businesses Complacent?
Print Security? Are Businesses Complacent?Larry Levine
 
Fasoo Company And Product Information
Fasoo Company And Product InformationFasoo Company And Product Information
Fasoo Company And Product Informationpabatan
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataEMC
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of ITMichael Lew
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaksSocialKwan
 

What's hot (18)

How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic Documents
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Data, data slides
Data, data  slidesData, data  slides
Data, data slides
 
Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White Paper
 
Ccs16
Ccs16Ccs16
Ccs16
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security Considerations
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
 
Data Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEPData Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEP
 
Data trawling and security strategies
Data trawling and security strategiesData trawling and security strategies
Data trawling and security strategies
 
Securing Business-Information from Microsoft -Presented by Atidan
Securing Business-Information from Microsoft -Presented by AtidanSecuring Business-Information from Microsoft -Presented by Atidan
Securing Business-Information from Microsoft -Presented by Atidan
 
Print Security? Are Businesses Complacent?
Print Security? Are Businesses Complacent?Print Security? Are Businesses Complacent?
Print Security? Are Businesses Complacent?
 
Fasoo Company And Product Information
Fasoo Company And Product InformationFasoo Company And Product Information
Fasoo Company And Product Information
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of IT
 
Funsec3e ppt ch10
Funsec3e ppt ch10Funsec3e ppt ch10
Funsec3e ppt ch10
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 

Viewers also liked

8. pedro y la roca
8. pedro y la roca8. pedro y la roca
8. pedro y la rocaA L
 
13. crucificado y resucitado
13. crucificado y resucitado13. crucificado y resucitado
13. crucificado y resucitadoA L
 
Sc2014 proceedings
Sc2014 proceedingsSc2014 proceedings
Sc2014 proceedingsSteph Cliche
 
Tempo April 2014
Tempo April 2014 Tempo April 2014
Tempo April 2014 Tempoplanet
 
4. levántate y anda. fe y curación
4. levántate y anda. fe y curación4. levántate y anda. fe y curación
4. levántate y anda. fe y curaciónA L
 
13. cómo esperamos
13. cómo esperamos13. cómo esperamos
13. cómo esperamosA L
 
1987 artviisec18
1987 artviisec181987 artviisec18
1987 artviisec18Dean Bocobo
 
Languages dr. kshema jose class
Languages dr. kshema jose classLanguages dr. kshema jose class
Languages dr. kshema jose classamalul umam
 
Rachel Fullmer-portfolio
Rachel Fullmer-portfolioRachel Fullmer-portfolio
Rachel Fullmer-portfolioskeez0526
 
Tempo August 2015
Tempo August 2015Tempo August 2015
Tempo August 2015Tempoplanet
 
9. ídolos del alma y otras lecciones de jesús
9. ídolos del alma y otras lecciones de jesús9. ídolos del alma y otras lecciones de jesús
9. ídolos del alma y otras lecciones de jesúsA L
 
Setiembre de 2011
Setiembre de 2011Setiembre de 2011
Setiembre de 2011rubencoa
 
Tempo November 2013
Tempo November 2013 Tempo November 2013
Tempo November 2013 Tempoplanet
 
1530korterink 101107225906-phpapp02
1530korterink 101107225906-phpapp021530korterink 101107225906-phpapp02
1530korterink 101107225906-phpapp02Steph Cliche
 

Viewers also liked (20)

8. pedro y la roca
8. pedro y la roca8. pedro y la roca
8. pedro y la roca
 
13. crucificado y resucitado
13. crucificado y resucitado13. crucificado y resucitado
13. crucificado y resucitado
 
Sc2014 proceedings
Sc2014 proceedingsSc2014 proceedings
Sc2014 proceedings
 
Tempo April 2014
Tempo April 2014 Tempo April 2014
Tempo April 2014
 
Tempo June 2014
Tempo June 2014Tempo June 2014
Tempo June 2014
 
Submarine
SubmarineSubmarine
Submarine
 
4. levántate y anda. fe y curación
4. levántate y anda. fe y curación4. levántate y anda. fe y curación
4. levántate y anda. fe y curación
 
13. cómo esperamos
13. cómo esperamos13. cómo esperamos
13. cómo esperamos
 
1987 artviisec18
1987 artviisec181987 artviisec18
1987 artviisec18
 
Languages dr. kshema jose class
Languages dr. kshema jose classLanguages dr. kshema jose class
Languages dr. kshema jose class
 
Rachel Fullmer-portfolio
Rachel Fullmer-portfolioRachel Fullmer-portfolio
Rachel Fullmer-portfolio
 
Tempo August 2015
Tempo August 2015Tempo August 2015
Tempo August 2015
 
9. ídolos del alma y otras lecciones de jesús
9. ídolos del alma y otras lecciones de jesús9. ídolos del alma y otras lecciones de jesús
9. ídolos del alma y otras lecciones de jesús
 
20 years R-Style Company / Moscow
20 years R-Style Company / Moscow20 years R-Style Company / Moscow
20 years R-Style Company / Moscow
 
Setiembre de 2011
Setiembre de 2011Setiembre de 2011
Setiembre de 2011
 
Melissa pp
Melissa ppMelissa pp
Melissa pp
 
Tempo November 2013
Tempo November 2013 Tempo November 2013
Tempo November 2013
 
1530korterink 101107225906-phpapp02
1530korterink 101107225906-phpapp021530korterink 101107225906-phpapp02
1530korterink 101107225906-phpapp02
 
Alcon 458 - Specification
Alcon 458 - SpecificationAlcon 458 - Specification
Alcon 458 - Specification
 
Trth2000 24 ofdm-tdma long distance wireless backhaul datasheet-v1.0.7
Trth2000 24 ofdm-tdma long distance wireless backhaul datasheet-v1.0.7Trth2000 24 ofdm-tdma long distance wireless backhaul datasheet-v1.0.7
Trth2000 24 ofdm-tdma long distance wireless backhaul datasheet-v1.0.7
 

Similar to 2010 12-03 a-lawyers_guidetodata

En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordCor Ranzijn
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data securityEffOne_Technologies
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trustlmgangi
 
How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyClickSSL
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign
How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign
How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign Drysign By Exela
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 

Similar to 2010 12-03 a-lawyers_guidetodata (20)

En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption Strategy
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Data security
 Data security  Data security
Data security
 
Data Security Whitepaper
Data Security WhitepaperData Security Whitepaper
Data Security Whitepaper
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Task 3
Task 3Task 3
Task 3
 
How to keep printing processes GDPR compliant
How to keep printing processes GDPR compliantHow to keep printing processes GDPR compliant
How to keep printing processes GDPR compliant
 
How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign
How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign
How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 

More from Steph Cliche

Safes locking device-_mechanical_locks_versus_electronic_locks
Safes locking device-_mechanical_locks_versus_electronic_locksSafes locking device-_mechanical_locks_versus_electronic_locks
Safes locking device-_mechanical_locks_versus_electronic_locksSteph Cliche
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsSteph Cliche
 
Ieee interference-measurements-802.11n
Ieee interference-measurements-802.11nIeee interference-measurements-802.11n
Ieee interference-measurements-802.11nSteph Cliche
 
Guardi final report
Guardi final reportGuardi final report
Guardi final reportSteph Cliche
 
Tmplab hostile wrt-5-hacklu
Tmplab hostile wrt-5-hackluTmplab hostile wrt-5-hacklu
Tmplab hostile wrt-5-hackluSteph Cliche
 
Penetration document format slides
Penetration document format slidesPenetration document format slides
Penetration document format slidesSteph Cliche
 
Le petit livre_du_hacker_2013
Le petit livre_du_hacker_2013Le petit livre_du_hacker_2013
Le petit livre_du_hacker_2013Steph Cliche
 
013 50001-001 spy-elite_operators_manual_rev_e
013 50001-001 spy-elite_operators_manual_rev_e013 50001-001 spy-elite_operators_manual_rev_e
013 50001-001 spy-elite_operators_manual_rev_eSteph Cliche
 
Hack.lu 09 ip-morph
Hack.lu 09 ip-morphHack.lu 09 ip-morph
Hack.lu 09 ip-morphSteph Cliche
 
7 1-system plus-evolution_spares_eng_6.0
7 1-system plus-evolution_spares_eng_6.07 1-system plus-evolution_spares_eng_6.0
7 1-system plus-evolution_spares_eng_6.0Steph Cliche
 
Global maritime-security
Global maritime-securityGlobal maritime-security
Global maritime-securitySteph Cliche
 

More from Steph Cliche (20)

Spy pack
Spy packSpy pack
Spy pack
 
Spyddr
SpyddrSpyddr
Spyddr
 
Sat howto
Sat howtoSat howto
Sat howto
 
Satellite hacking
Satellite hackingSatellite hacking
Satellite hacking
 
Safes locking device-_mechanical_locks_versus_electronic_locks
Safes locking device-_mechanical_locks_versus_electronic_locksSafes locking device-_mechanical_locks_versus_electronic_locks
Safes locking device-_mechanical_locks_versus_electronic_locks
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systems
 
Ieee interference-measurements-802.11n
Ieee interference-measurements-802.11nIeee interference-measurements-802.11n
Ieee interference-measurements-802.11n
 
Guardi final report
Guardi final reportGuardi final report
Guardi final report
 
718001 000 en
718001 000 en718001 000 en
718001 000 en
 
Tmplab hostile wrt-5-hacklu
Tmplab hostile wrt-5-hackluTmplab hostile wrt-5-hacklu
Tmplab hostile wrt-5-hacklu
 
Public wifi
Public wifiPublic wifi
Public wifi
 
Penetration document format slides
Penetration document format slidesPenetration document format slides
Penetration document format slides
 
Le petit livre_du_hacker_2013
Le petit livre_du_hacker_2013Le petit livre_du_hacker_2013
Le petit livre_du_hacker_2013
 
013 50001-001 spy-elite_operators_manual_rev_e
013 50001-001 spy-elite_operators_manual_rev_e013 50001-001 spy-elite_operators_manual_rev_e
013 50001-001 spy-elite_operators_manual_rev_e
 
Hack.lu 09 ip-morph
Hack.lu 09 ip-morphHack.lu 09 ip-morph
Hack.lu 09 ip-morph
 
12
1212
12
 
09 09 2014
09 09 201409 09 2014
09 09 2014
 
7 1-system plus-evolution_spares_eng_6.0
7 1-system plus-evolution_spares_eng_6.07 1-system plus-evolution_spares_eng_6.0
7 1-system plus-evolution_spares_eng_6.0
 
Global maritime-security
Global maritime-securityGlobal maritime-security
Global maritime-security
 
Future war
Future warFuture war
Future war
 

2010 12-03 a-lawyers_guidetodata

  • 1. THE LAWYER’S GUIDE TO MOBILE COMPUTER SECURITY Ellen Freedman, CLM © 2007 Freedman Consulting, Inc. [With appreciation to co-authors Jim Calloway and Reid Trautz] By all accounts, a personal computer is lost or stolen every 12 seconds. Most contain confidential or sensitive information. An article in the Sept. 22, 2006, online issue of Enterprise Security Today was titled, “Hundreds of Census Bureau Laptops Lost.” The article went on to detail that the Census Bureau has had 217 laptops, 46 portable data storage devices and 15 handheld devices become lost or stolen since 2003. All held confidential information. In fact, the Commerce Department performed a review and found that since 2001, the department’s 15 operating units had lost an astounding 1,137 laptop computers, all containing confidential information. The monthly newsletter Privacy Journal reported 24 significant instances of Social Security numbers and other sensitive data being placed at risk through stolen or lost laptops so far in 2006. Of course just one missing laptop can expose a great deal of information. Most will recall the media firestorm when a laptop containing personally identifiable information of 26.5 million veterans and family members was stolen from the home of an employee of the Veterans Administration. Having to explain to a client or disciplinary authority about lost or exposed client data on a missing laptop would be unpleasant and difficult. With all of the reported instances of this happening, how could anyone seriously maintain that they had no idea that a laptop with confidential information could be lost or stolen? But PCs aren’t the only mobile devices that can contain confidential information. Virtually all mobile devices and removable media could
  • 2. THE LAWYER’S GUIDE TO MOBILE COMPUTER SECURITY Page 2 of 12 Freedman Consulting, Inc. (215) 628-9422 potentially expose the typical law firm to embarrassment and even serious ethical breaches if they fall into the wrong hands. Law firms need to start devoting more attention to protection of information on USB devices like thumb drives and iPods or other MP3 players; to removable media like CDs, DVDs, floppy disks and external hard drives; to seemingly innocuous devices like dictation recorders; and to wireless devices like cell phones, smart phones and personal digital assistants (PDAs). We should also be aware that information can be stolen from a computer without the alarm created by vanishing hardware. Software is readily available on the Internet for efficiently purloining data. For example, third- party packet capture driver applications enable nefarious use of USB thumb drives. It prepares the device to enable both data and large applications to be copied onto the removable media within seconds. Now a hacker no longer needs to have a laptop available to compromise a network. A USB flash drive can be plugged into a PC and used to steal large quantities of information rapidly. Similar software for MP3 players is now available. It would be easy for a short-sighted law firm manager or IT director to decree that no client information would ever be taken out of the office on a mobile device. But the demands of today’s workplace make laptop computers, PDAs, flash drives and other devices almost a requirement for many. It would be inconceivable to travel to visit with a client in another state without taking a laptop packed with information about the client’s files so that any question could be answered quickly. Remote access to the office network over the Internet is an important productivity component for lawyers who are home with a sick child or traveling. And, of course, e-mail with documents and other data files attached leaves the office regularly. It follows then that when we talk about mobile security, we are primarily talking about training staff and lawyers to be aware of the risks of losing important information and adopting policies to secure confidential information. There is a need for every firm to develop and implement a computer use policy which carefully balances the need for security with the need of users to accomplish tasks effectively and efficiently without creating undue administrative burden.
  • 3. THE LAWYER’S GUIDE TO MOBILE COMPUTER SECURITY Page 3 of 12 Freedman Consulting, Inc. (215) 628-9422 This article will examine the various areas to be considered when drafting and implementing a computer use policy. METADATA By now most lawyers should be aware of the fact that documents contain hidden information called metadata. There have been some embarrassing moments for individuals who are unaware that the documents they e-mailed contained hidden information which might reveal things that would embarrass the sender. For example, some of the most problematic items of metadata are deleted comments or document revision history. Tools that expose metadata and instructions on how to look for it are readily available on the Internet. Sending a document to opposing counsel that potentially exposes the client’s comments made while reviewing the document could constitute a major ethical breach. Law firm personnel must appreciate the potential problems of metadata and deal with it before e-mailing a document outside of the office. One way to create a document that is virtually metadata free is to create a new “clean” document just before e-mailing it. First open a blank document. Then one can select the text in the original document, copy it to the clipboard and paste it into the new blank document to create a new document with no troublesome metadata. WordPerfect users might consider upgrading to version X3 that has a “save without metadata” feature. There are various commercial products available for both viewing and deleting metadata from a document, such as the Metadata Assistant from PayneConsulting.com. Another option is to always have a policy of printing a document to PDF before allowing it outside of the office. While PDF documents created in this manner retain some metadata, it is limited and not of the type likely to expose client confidences or to prove embarrassing. DOCUMENT SECURITY While the issue of metadata is getting all the attention these days, we cannot overlook the basic matter of office processes for protecting access to sensitive
  • 4. THE LAWYER’S GUIDE TO MOBILE COMPUTER SECURITY Page 4 of 12 Freedman Consulting, Inc. (215) 628-9422 documents. There are two ways to protect access to documents and the confidential information contained in them: authentication and encryption. Encryption is explained further below. Not all documents generated by a law firm contain sensitive or privileged information. But documents are the lifeblood of attorneys. Attorneys have a duty to preserve and protect the confidentiality of that information. That task is made more difficult when documents are accessible across a firm network or shared electronically with clients, co-counsel, opposing counsel and the courts via e-mail, e-filing and extranets. Securing confidentiality is now much more difficult than just locking a file cabinet or a desk drawer. Authentication is the common term for proactively limiting access to electronically created documents only to those people we want to have access. We can easily install authentication requirements on a computer to view a document, folder or the entire computer. Biometric authentication — fingerprint and iris scans for example — is an emergent method, but passwords are by far the most common form of authentication. All computers should require at least one password to logon to the computer. Moreover, individual documents containing sensitive information that are shared electronically should also be individually password protected. Passwords can be very strong or relatively weak. A strong password will be at least nine characters in length and contain both letters and numbers or typographic symbols. Even a relatively insecure, or “soft” password may have some benefits. A firm could adopt a universal password for all documents to be taken outside of the firm in any way, including by e-mail attachment. This password would be communicated to clients, co-counsel and opposing counsel by phone. While the widespread knowledge of this password would limit its perfect effectiveness, it would go a long way toward protecting “lost” documents disclosed via misaddressed e-mail, a lost CD-ROM or a lost USB flash drive. Policy should require that the password never be given out to a caller, but only via a return call to a phone number contained in the firm’s records. It should also never be sent out via e-mail, especially in the e-mail transmitting the document.
  • 5. THE LAWYER’S GUIDE TO MOBILE COMPUTER SECURITY Page 5 of 12 Freedman Consulting, Inc. (215) 628-9422 HOW TO PASSWORD PROTECT DOCUMENTS Taking this extra precaution is quite easy, whether you use Word or WordPerfect to create your documents. In MS Word 2003 under “Tools” “Protect Document” you can limit editing to read-only, comments and track changes. Under “Tools” “Options” “Security” you can enable password protection to open or modify a document. There are also privacy options, such as “make hidden markup visible when opening or saving” and “warn before printing, saving or sending a file that contains tracked changes or comments.” In WordPerfect, click “File” “Save As.” Check the “Password Protect” box in the lower corner of the dialogue box that opens. Then click “Save” and enter a password in the dialog box that opens. Even though all of the law firm staff are presumed to be trustworthy, it may make sense to utilize password protection on some occasions so that particularly sensitive client documents are only accessible by a few. LOCKING DOWN PDF FILES Another way to protect documents from unwanted changes or exposure is to consider saving your Word or WordPerfect file in Portable Document Format (PDF). This is also known as “publishing to PDF.” WordPerfect has this function in all recent versions. Adobe Acrobat is the preferred, if most expensive, method, but there are utilities that provide less expensive PDF publishing. By using these tools, law firm users can “lock down” documents, disallowing printing, copying, editing, commenting or even opening the document. One can encrypt the file or use secure digital signatures and other authentication protocols. By “locking down” PDF files, attorneys can make sure that the document is used in the way they want, without exposing it to alteration or copying. In other words, it is a more secure way to send documents to clients and opposing counsel and know they cannot be altered, or that one can easily see the alterations, depending upon the options you chose.
  • 6. THE LAWYER’S GUIDE TO MOBILE COMPUTER SECURITY Page 6 of 12 Freedman Consulting, Inc. (215) 628-9422 ENCRYPTION Password protecting a document reminds one of the old adage that locking your doors will keep out honest people, but would likely only slow down a professional thief. For critically important information, document encryption is the solution rather than password protection. A marital dissolution settlement proposal might be effectively protected by a password. However, information about a proposed multimillion-dollar merger or the defense of a criminal matter making national headlines might need to be encrypted. Encryption is the process of obscuring data or information to make it unreadable without special software or knowledge to decrypt it. Governments and military have long used encryption to protect sensitive communications, but commercial encryption products have emerged in the marketplace to protect software, Internet communications, mobile data, cell phones and other sensitive information. To encrypt digital information, the document, folder or data file is run through a software application to obscure the information. There are various levels of obscuring, general stated in “bits;” the higher the bits, the harder to decrypt the information. Currently 256-bit encryption is a common standard, but super-sensitive documents will have higher levels. The way to de-encrypt the information is with a “key.” The key is often a pass code or another software program tied to the original encryption software. An obvious danger with document encryption is that the loss of the key effectively “loses” the document. Let us now consider security concerns related to computers and storage devices rather than just documents. CD-ROMS, DVDS AND FLOPPY DISK DRIVES Although one can encrypt or password protect CD-ROMs, DVDs and floppy drives, it generally makes more sense for the user to encrypt or password protect the documents individually as noted in the preceding section. It is also probably a good practice to keep a business card in any disk carrier just in case an honest person finds it if it is lost.
  • 7. THE LAWYER’S GUIDE TO MOBILE COMPUTER SECURITY Page 7 of 12 Freedman Consulting, Inc. (215) 628-9422 USB FLASH DRIVES The use of USB flash drives is increasingly widespread. A USB flash drive is a small removable data storage device that plugs into almost any computer built in the past five years or so and is commonly used to transport and share documents. These devices are as small as a matchbook or ink pen but can hold thousands of documents, hundreds of photos, songs or slide presentations. It is plugged into the USB port on any other computer for access to any documents and other files previously transferred to the device. These tools can be especially helpful if you do not have remote connectivity to your office network. USB flash drives have largely replaced floppy disks for transporting a few documents home. For example, if a lawyer needs to redraft one agreement or finish drafting an article over the weekend, it can be copied to a USB flash drive when leaving the office. Then one can plug it into another computer and work on the document. When finished, one should save it only on the flash drive, not the other computer’s hard drive. Although these devices are very convenient, there are two main security issues: They are easily misplaced, and they can leave confidential data on the temporary host computer. To avoid losing the flash drive, attach it to your office or car keys with a small but secure chain. Treat it like a million dollar nugget of gold; you always know where it is at all times. Why? Because that may be the cost to settle a malpractice claim if confidential information is lost or stolen. PROTECTING THE DATA ON YOUR FLASH DRIVE The two most common methods to protect this data are authentication and encryption. As discussed above, authentication is often a password to access the data. Some lawyers take the precaution to use a password to access the flash drive contents and a second password for each file or folder on the flash drive. Encryption is the other method of protecting your data. Although some flash drive users view this as an inconvenience, it is much more secure than just a password.
  • 8. THE LAWYER’S GUIDE TO MOBILE COMPUTER SECURITY Page 8 of 12 Freedman Consulting, Inc. (215) 628-9422 Flash drive manufacturers continue to meet the security demands of consumers and now add authentication and/or encryption software to some flash drive models. For example, Lexar Media adds password-protected 256- bit AES encryption to its JumpDrive Secure flash drive. Not every document needs to be protected, but it’s nice to know you can secure critical documents and data with less worry if it is lost. PORTABLE HARD DRIVES Portable hard drives are external storage devices that can be easily transported in a briefcase, purse or pocket. These devices make it easy to carry your data backup home. They can hold more information than a flash drive, often as much or more than any computer in your office. They connect to any computer through a cable, usually a USB or Firewire cable. The portable hard drive has leaped in popularity as the physical size of the devices has dropped, the storage capability has skyrocketed and the prices continue to fall. Manufacturers include Iomega, Seagate, Pocketec and CMS Products. Many smaller firms are buying two of these devices to use for their data backup protocol instead of using a magnetic tape drive. Coupled with reliable back-up software (included with some portable hard drives), the firms swap the two hard drives on a daily or weekly basis, keeping the other in a secure off-site location. As with any other information-laden storage device that leaves your office, it must be secured against the possibility of theft or being lost. Again, authentication and encryption are the best methods to protect data confidentiality. From a security standpoint, these drives have the same attendant risks and protection schemes as USB flash drives. They are slightly more inherently secure when used as backups because the backup software will compress the data, often in a proprietary format. In addition, they sometimes work through proprietary installed software systems rather than the “plug-and-play” model of the USB flash drives. The finder of the lost USB flash drive merely needs
  • 9. THE LAWYER’S GUIDE TO MOBILE COMPUTER SECURITY Page 9 of 12 Freedman Consulting, Inc. (215) 628-9422 to stick it into a computer’s USB port to look at the contents. Spying on compressed data in a found backup portable hard drive would present a greater challenge to the average user. MOBILE PHONES AND PDAs The current generation of high-end mobile phones incorporates many of the information carrying characteristics of computers. Smart phones now incorporate all of the functionality of PDAs. Unfortunately, password protecting a mobile phone would tend to reduce a great deal of its functionality and convenience. One should still consider whether documents placed on a mobile phone should be password protected. Probably the most practical advice is to consider whether sensitive documents should be placed on a mobile phone at all. Some PDAs and mobile phones now provide for remote purging of the information when they are lost. One law firm that unsuccessfully tried to utilize this feature on a phone learned that it would not work in the shielded lower floors of a parking garage, where it was lost. LAPTOP COMPUTERS The number of lawyers who have laptop computers is significant and steadily growing. It is a great convenience to have much of your client information, your forms and other digital data with you when traveling or even going home at night. However, the loss or theft of a laptop is not as rare as one might think, as noted previously. The minimum standard for laptop protection is that it should be password protected. For laptops that are typically attached to a network, this is already done by the network login password. Readers will begin to notice some familiar themes. Sensitive documents on a laptop can be either password protected or encrypted. Sometimes it may make sense to encrypt the entire folders for keeping important documents safe.
  • 10. THE LAWYER’S GUIDE TO MOBILE COMPUTER SECURITY Page 10 of 12 Freedman Consulting, Inc. (215) 628-9422 Laptops left unattended in a hotel room can be secured by chain lock devices similar to those used to protect a bicycle. (Just make sure you don’t “secure” it to a table leg or something else that can be raised up.) Screen protectors can be used to block prying eyes when working in public or on an airplane. The authors have received, but not yet reviewed, some sophisticated software packages that allow a stolen computer to “phone home” when it is connected to the Internet. There are also packages for remotely deleting sensitive information when the laptop is connected to the Internet. While these concepts are new and “cutting edge” at present, one can anticipate that they will become the minimum security standard within a few years. Likewise, it is no longer the stuff of science fiction to consider a laptop with fingerprint or iris scanning authentication. We will continue to see both challenges and improvements with our digital security plans. One of the most interesting methods of laptop remote access security utilizes a key fob which displays a series of numbers. The displayed numbers change every few minutes and is synchronized with the office computer network. To log in to the network requires entry of the current set of numbers followed by a several digit number that the lawyer had memorized. The theory is that even if the purpose of the key fob is known and it was lost or stolen along with the laptop, one would still be unable to crack the network without the memorized set of numbers. CONCLUSION The most important thing about mobile security is for the firm to consider everything in advance and draft a well thought-out policy. Then training and education are the key. Like any other business, a law firm has to stay competitive and take advantage of advances in technology. That will mean that a firm has to take advantage of the benefits of mobile technology. Spending some time drafting a written plan for mobile computing security is important for both the law firm and the clients.
  • 11. THE LAWYER’S GUIDE TO MOBILE COMPUTER SECURITY Page 11 of 12 Freedman Consulting, Inc. (215) 628-9422 SOME MOBILE SECURITY RESOURCES Managing the Security and Privacy of Electronic Data in a Law Office www.practicepro.ca/practice/ElectronicDataSecurity.asp (This is a “must read” free booklet from PracticePRO) Death by Laptop By Sheila Blackford & Reid Trautz, Law Technology News http://tinyurl.com/yg9vrs Lojack for Laptops www.absolute.com www.denniskennedy.com RoboForm password storage www.roboform.com USB Flash Drives For password and encryption software for USB flash drives www.Portableapps.com www.lexar.com/jumpdrive/index.html ABOUT MY CO-AUTHORS Reid F. Trautz heads the American Immigration Lawyers Association’s Practice and Professionalism Center, where he provides ethics guidance and practice management information and consulting services to AILA members to help them improve their businesses and the delivery of legal services to their clients. He is a nationally recognized author and presenter on law firm management. His articles have appeared in Law Technology News, The Practical Lawyer, Law Practice Management, GP Solo, Washington Lawyer and Law Practice Today, among others. Jim Calloway is the director of the Oklahoma Bar Association Management Assistance Program and manager of the OBA Solo and Small Firm
  • 12. THE LAWYER’S GUIDE TO MOBILE COMPUTER SECURITY Page 12 of 12 Freedman Consulting, Inc. (215) 628-9422 Conference. As a member of the ABA, he served as chair of the ABA TECHSHOW 2005 board, on which he has served as a board member for the past three years. He has made over 200 presentations across the country on law office management, legal technology, ethics and business operations. A version of this document originally appeared in the March/April 2007 issue of The Pennsylvania Lawyer ©2007 Freedman Consulting, Inc. The information in this article is protected by U.S. copyright. Visitors may print and download one copy of this article solely for personal and noncommercial use, provided that all hard copies contain all copyright and other applicable notices contained in the article. You may not modify, distribute, copy, broadcast, transmit, publish, transfer or otherwise use any article or material obtained from this site in any other manner except with written permission of the author. The article is for informational use only, and does not constitute legal advice or endorsement of any particular product or vendor.