Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Risk Management and the Digital Law Practice

751 views

Published on

This presentation suggests areas where the use of technology by lawyers could potentially expose client confidential and private information. Suggestions include encrypting data, using stronger passwords, using secure sockets when on the Web.

  • Be the first to comment

  • Be the first to like this

Risk Management and the Digital Law Practice

  1. 1. Risk Management & the Digital Law Practice<br />David Whelan, Manager, Legal Information<br />The Law Society of Upper Canada, Toronto, Ontario<br />
  2. 2. risk<br />
  3. 3. risk:physical <br />
  4. 4. risk:virtual <br />
  5. 5. risk:you <br />
  6. 6.
  7. 7.
  8. 8.
  9. 9.
  10. 10. what is portable? <br />
  11. 11. what is portable?<br />everything!<br />
  12. 12. 8 GigaBytes =<br />20,000 documents <br />
  13. 13. 8 GigaBytes =<br />5 years of practice? <br />
  14. 14. 8 GigaBytes =<br />10 years of practice? <br />
  15. 15.
  16. 16.
  17. 17. free<br />is good<br />
  18. 18. free<br />may be a risk<br />
  19. 19. where to start? <br />
  20. 20. where to start?<br />at the beginning<br />
  21. 21.
  22. 22. password<br />bios<br />
  23. 23. bios<br />password<br />start up<br />
  24. 24. bios<br />password<br />network<br />startup<br />
  25. 25. your username<br />Password<br />
  26. 26. password<br />bad<br />
  27. 27. Excerpt from Zonealarm survey results infographic by ColumnFive Media<br />
  28. 28.
  29. 29. password <br />good<br />
  30. 30. password <br />good<br />12 characters<br />
  31. 31.
  32. 32. password <br />good<br />UPPER, lower, $pecial<br />12 characters<br />
  33. 33. password <br />good<br />Ju$t!nB1eb3r<br />JustinBieber<br />
  34. 34. password <br />good<br />I♥theLaw$ociety<br />
  35. 35. http://www.thepasswordmeter.com<br />
  36. 36.
  37. 37.
  38. 38. encryption<br />
  39. 39.
  40. 40. full disk<br />encryption<br />
  41. 41. full disk<br />partial disk<br />encryption<br />
  42. 42. encryption<br />decryption <br />
  43. 43. American Bear by ltshears / Wikimedia Commons<br />
  44. 44. re-<br />encryption<br />
  45. 45. encrypt<br />files<br />
  46. 46. files<br />encrypt<br />folders<br />
  47. 47. files<br />folders<br />encrypt<br />usb storage<br />
  48. 48. files<br />folders<br />hard drives<br />encrypt<br />usb storage<br />
  49. 49. encrypt w/ <br />
  50. 50. encrypt w/ <br />Mac<br />
  51. 51. Mac<br />encrypt w/ <br />Windows<br />
  52. 52. Mac<br />Truecrypt<br />encrypt w/ <br />Windows<br />
  53. 53. http<br />
  54. 54. http<br />surveillance<br />
  55. 55. http<br />sniffing<br />surveillance<br />
  56. 56.
  57. 57. https<br />
  58. 58. https://www.safe<br />
  59. 59. https://www.secure<br />
  60. 60. https://www.smart<br />
  61. 61. encrypt<br />wireless<br />
  62. 62. encrypt<br />protect<br />wireless<br />
  63. 63. don't<br />die<br />
  64. 64. your data <br />
  65. 65. your data has data<br />metadata<br />
  66. 66. Got ?<br />metadata<br />
  67. 67. Got ?<br />metadata<br />in yourfiles<br />
  68. 68. Got ?<br />metadata<br />in yourfile transfers<br />in your files<br />
  69. 69. clean your<br />metadata<br />
  70. 70. manage your<br />files<br />
  71. 71. back up your<br />files<br />
  72. 72. back up your<br />files<br />to a hard drive<br />
  73. 73. back up your<br />files<br />online<br />
  74. 74.
  75. 75. store your<br />files<br />online<br />
  76. 76. access your<br />files<br />
  77. 77. access your<br />files<br />securely<br />
  78. 78.
  79. 79. access your<br />files<br />using apps<br />
  80. 80.
  81. 81. your device<br />protect<br />
  82. 82. your device<br />protect<br />with<br />a password<br />
  83. 83. your device<br />protect<br />encryption<br />with<br />a password<br />
  84. 84. remote<br />control<br />your device<br />
  85. 85. control<br />yourself<br /> staff<br />manage<br />
  86. 86.
  87. 87.
  88. 88.
  89. 89.
  90. 90. your<br />manage<br />access<br />
  91. 91. access<br />your<br />manage<br />device<br />
  92. 92. access<br />device<br />your<br />manage<br />staff<br />
  93. 93. access<br />device<br />your<br />manage<br />self<br />staff<br />
  94. 94. access<br />device<br />your<br />manage<br />risk<br />self<br />staff<br />
  95. 95. thank you.<br />dwhelan@lsuc.on.ca<br />

×