SlideShare a Scribd company logo
Confidentiality in a Wired World The Law Society of Upper Canada Professional Development & Competence David Whelan, Manager, Legal Information •  [email_address]
Competence (c) the records, systems, or procedures of the lawyer’s professional business
Confidentiality A lawyer at all times shall hold in strict confidence all information …
“ Oops”
 
 
A lawyer shall … assume complete professional responsibility for his or her practice of law …
 
Shhhhh! ,[object Object],[object Object],[object Object],[object Object]
COMMUNICATIONS ,[object Object]
 
…  conducted what should have been  a confidential conversation about pending layoffs at his firm  – in a loud voice…, on a crowded Acela train.
E-mail? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
One of the outside lawyers …had mistakenly e-mailed confidential information on the talks to  Times  reporter  Alex   Berenson  instead of  Bradford   Berenson , her co-counsel…
Who is Your Audience? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURE YOUR TECHNOLOGY ,[object Object]
 
 
mxyzptlk
Strong Passwords, Written Down ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Your data Encryption layer Encrypted
Your data Encryption layer Decrypted Once decrypted, your data is accessible until re-encrypted
Encryption  at rest
Encryption  at rest Web search for  endpoint encryption iPhone 4+: built-in Blackberry: built-in Android 3: built-in Windows: add-on Truecrypt.org (free) McAfee.com (McAfee Anti-Theft) TrendMicro.com (Endpoint Encryption) CheckPoint.com (Full Disk Encryption) Symantec.com (PGP Whole Disk Encryption) Windows Vista/7 Bitlocker Mac OS File Vault
Encryption  in motion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encryption  in motion
Cloud Computing ,[object Object],[object Object],[object Object]
SECURE YOUR DEVICE ,[object Object]
Physical Security
Physical Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Everything is Portable
Secure ALL Your Computers ,[object Object],[object Object]
Creature of Habit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
Are Your Security Aware?
Are Your Security Aware?Are Your Security Aware?
Are Your Security Aware?
ITecksolutionsLLC
 
Internet Terms
Internet TermsInternet Terms
Internet Terms
erowell
 
Fp611 kuliah 2
Fp611 kuliah 2Fp611 kuliah 2
Fp611 kuliah 2
Anis Mardhiyah
 
Avoiding Viruses 2003
Avoiding Viruses 2003Avoiding Viruses 2003
Avoiding Viruses 2003
hcj2010
 
Safety And Security Of Data Student Work
Safety And Security Of Data Student WorkSafety And Security Of Data Student Work
Safety And Security Of Data Student Work
Wynthorpe
 
Netiquette
NetiquetteNetiquette
Netiquette
Phoebe Gray
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
Arjun Tomar
 
Hacking
Hacking Hacking
Security awareness
Security awarenessSecurity awareness
Security awareness
Josh Chandler
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
Alwyn Dalmeida
 
Confidentiality in a Digital World
Confidentiality in a Digital WorldConfidentiality in a Digital World
Confidentiality in a Digital World
David Whelan
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
Nicholas Davis
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Syed Irshad Ali
 
Password protection
Password protectionPassword protection
Password protection
post_it
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
Karmaveersinghsankhl
 

What's hot (16)

Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Are Your Security Aware?
Are Your Security Aware?Are Your Security Aware?
Are Your Security Aware?
 
Internet Terms
Internet TermsInternet Terms
Internet Terms
 
Fp611 kuliah 2
Fp611 kuliah 2Fp611 kuliah 2
Fp611 kuliah 2
 
Avoiding Viruses 2003
Avoiding Viruses 2003Avoiding Viruses 2003
Avoiding Viruses 2003
 
Safety And Security Of Data Student Work
Safety And Security Of Data Student WorkSafety And Security Of Data Student Work
Safety And Security Of Data Student Work
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Hacking
Hacking Hacking
Hacking
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
 
Confidentiality in a Digital World
Confidentiality in a Digital WorldConfidentiality in a Digital World
Confidentiality in a Digital World
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Password protection
Password protectionPassword protection
Password protection
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 

Similar to Confidentiality in a Wired World

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
Infusionsoft
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Sylvain Maret
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
rtrautz
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
PKF Francis Clark
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
B2BPlanner Ltd.
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
andreasschuster
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
Security
SecuritySecurity
Security
majstors
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
Ken Holmes
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
AEGILITY
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
Engr. Md. Jamal Uddin Rayhan
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
Executive Management Solutions
 
Hack attack: Computer safety 101 for water utilities - v.06
Hack attack: Computer safety 101 for water utilities - v.06Hack attack: Computer safety 101 for water utilities - v.06
Hack attack: Computer safety 101 for water utilities - v.06
Brian Gongol
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
Ben Rothke
 
Security Training 2008
Security Training 2008Security Training 2008
Security Training 2008
bdill
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
guest3151b0
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
University of Southern Mississippi
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
Cyberhunter Cyber Security
 

Similar to Confidentiality in a Wired World (20)

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Security
SecuritySecurity
Security
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Hack attack: Computer safety 101 for water utilities - v.06
Hack attack: Computer safety 101 for water utilities - v.06Hack attack: Computer safety 101 for water utilities - v.06
Hack attack: Computer safety 101 for water utilities - v.06
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Security Training 2008
Security Training 2008Security Training 2008
Security Training 2008
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 

More from David Whelan

Practical and Ethical Use of Social Media for Lawyers
Practical and Ethical Use of Social Media for LawyersPractical and Ethical Use of Social Media for Lawyers
Practical and Ethical Use of Social Media for Lawyers
David Whelan
 
Ontario Courthouse Librarians Association: 45 Sites in 45 MInutes
Ontario Courthouse Librarians Association:  45 Sites in 45 MInutesOntario Courthouse Librarians Association:  45 Sites in 45 MInutes
Ontario Courthouse Librarians Association: 45 Sites in 45 MInutes
David Whelan
 
Social media research for litigation
Social media research for litigationSocial media research for litigation
Social media research for litigation
David Whelan
 
Tips for Better Professional Productivity
Tips for Better Professional ProductivityTips for Better Professional Productivity
Tips for Better Professional Productivity
David Whelan
 
Risk Management and the Digital Law Practice
Risk Management and the Digital Law PracticeRisk Management and the Digital Law Practice
Risk Management and the Digital Law Practice
David Whelan
 
Virtual Migration
Virtual MigrationVirtual Migration
Virtual Migration
David Whelan
 

More from David Whelan (6)

Practical and Ethical Use of Social Media for Lawyers
Practical and Ethical Use of Social Media for LawyersPractical and Ethical Use of Social Media for Lawyers
Practical and Ethical Use of Social Media for Lawyers
 
Ontario Courthouse Librarians Association: 45 Sites in 45 MInutes
Ontario Courthouse Librarians Association:  45 Sites in 45 MInutesOntario Courthouse Librarians Association:  45 Sites in 45 MInutes
Ontario Courthouse Librarians Association: 45 Sites in 45 MInutes
 
Social media research for litigation
Social media research for litigationSocial media research for litigation
Social media research for litigation
 
Tips for Better Professional Productivity
Tips for Better Professional ProductivityTips for Better Professional Productivity
Tips for Better Professional Productivity
 
Risk Management and the Digital Law Practice
Risk Management and the Digital Law PracticeRisk Management and the Digital Law Practice
Risk Management and the Digital Law Practice
 
Virtual Migration
Virtual MigrationVirtual Migration
Virtual Migration
 

Recently uploaded

How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
Aleksey Savkin
 
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Neil Horowitz
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
APCO
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdfHOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
46adnanshahzad
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
Stephen Cashman
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
Christian Dahlen
 

Recently uploaded (20)

How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
 
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdfHOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
 

Confidentiality in a Wired World

  • 1. Confidentiality in a Wired World The Law Society of Upper Canada Professional Development & Competence David Whelan, Manager, Legal Information • [email_address]
  • 2. Competence (c) the records, systems, or procedures of the lawyer’s professional business
  • 3. Confidentiality A lawyer at all times shall hold in strict confidence all information …
  • 5.  
  • 6.  
  • 7. A lawyer shall … assume complete professional responsibility for his or her practice of law …
  • 8.  
  • 9.
  • 10.
  • 11.  
  • 12. … conducted what should have been a confidential conversation about pending layoffs at his firm – in a loud voice…, on a crowded Acela train.
  • 13.
  • 14. One of the outside lawyers …had mistakenly e-mailed confidential information on the talks to Times reporter Alex Berenson instead of Bradford Berenson , her co-counsel…
  • 15.
  • 16.
  • 17.  
  • 18.  
  • 20.
  • 21. Your data Encryption layer Encrypted
  • 22. Your data Encryption layer Decrypted Once decrypted, your data is accessible until re-encrypted
  • 24. Encryption at rest Web search for endpoint encryption iPhone 4+: built-in Blackberry: built-in Android 3: built-in Windows: add-on Truecrypt.org (free) McAfee.com (McAfee Anti-Theft) TrendMicro.com (Endpoint Encryption) CheckPoint.com (Full Disk Encryption) Symantec.com (PGP Whole Disk Encryption) Windows Vista/7 Bitlocker Mac OS File Vault
  • 25.
  • 26. Encryption in motion
  • 27.
  • 28.
  • 30.
  • 32.
  • 33.
  • 34.