SlideShare a Scribd company logo
Confidentiality in the Information Age: How to Protect Yourself and Your Data Beverly A. Michaelis, J.D. Oregon State Bar Professional Liability Fund
Why is Confidentiality  Important?
[object Object],[object Object],[object Object],[object Object],[object Object],Consider the Consequences…
[object Object],[object Object],[object Object],[object Object],[object Object],Topics
Communication Technologies ,[object Object],[object Object],[object Object]
E-Mail & Fax ,[object Object],[object Object],[object Object],[object Object],[object Object]
Remote Access ,[object Object],[object Object],[object Object],[object Object],[object Object]
Metadata
Always Inspect ,[object Object],[object Object],[object Object],[object Object]
Invoke Warnings
Best Practices Individual Documents in Acrobat Document > Examine Document… ,[object Object],[object Object],[object Object],[object Object]
Redaction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],What Redaction is NOT
Use Acrobat to Redact
[object Object],[object Object],[object Object],[object Object],Destruction
Confidentiality Agreements ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Consider the Consequences…
Thank You! Beverly Michaelis Practice Management Advisor [email_address] 503-639-6911 or 800-452-1639 Twitter:  http://twitter.com/OreLawPracMgm t Blog:  http://oregonlawpracticemanagement.wordpress.com/ LinkedIn:  http://www.linkedin.com/in/beverlymichaelis

More Related Content

Viewers also liked

2014 Marketing Trends & Opportunities
2014 Marketing Trends & Opportunities2014 Marketing Trends & Opportunities
2014 Marketing Trends & Opportunities
Tyler Durbin
 
Advancing women in it 02.20.2014
Advancing women in it 02.20.2014Advancing women in it 02.20.2014
Advancing women in it 02.20.2014
Michelle Ragusa
 
Advncedgear
AdvncedgearAdvncedgear
Advncedgear
Ajay Yadav
 
Quelle gouvernance pour le numérique?
Quelle gouvernance pour le numérique?Quelle gouvernance pour le numérique?
Quelle gouvernance pour le numérique?
Antoine Vigneron
 
Febres-Cordero_SBUXBA497.03
Febres-Cordero_SBUXBA497.03Febres-Cordero_SBUXBA497.03
Febres-Cordero_SBUXBA497.03
Nicolas Febres-Cordero
 
Cardan shaft swp series
Cardan shaft swp seriesCardan shaft swp series
Cardan shaft swp series
august zeng
 
Follow-up of the WSRR 2015. Priority of action: Global Management of Soil Org...
Follow-up of the WSRR 2015. Priority of action: Global Management of Soil Org...Follow-up of the WSRR 2015. Priority of action: Global Management of Soil Org...
Follow-up of the WSRR 2015. Priority of action: Global Management of Soil Org...
ExternalEvents
 

Viewers also liked (7)

2014 Marketing Trends & Opportunities
2014 Marketing Trends & Opportunities2014 Marketing Trends & Opportunities
2014 Marketing Trends & Opportunities
 
Advancing women in it 02.20.2014
Advancing women in it 02.20.2014Advancing women in it 02.20.2014
Advancing women in it 02.20.2014
 
Advncedgear
AdvncedgearAdvncedgear
Advncedgear
 
Quelle gouvernance pour le numérique?
Quelle gouvernance pour le numérique?Quelle gouvernance pour le numérique?
Quelle gouvernance pour le numérique?
 
Febres-Cordero_SBUXBA497.03
Febres-Cordero_SBUXBA497.03Febres-Cordero_SBUXBA497.03
Febres-Cordero_SBUXBA497.03
 
Cardan shaft swp series
Cardan shaft swp seriesCardan shaft swp series
Cardan shaft swp series
 
Follow-up of the WSRR 2015. Priority of action: Global Management of Soil Org...
Follow-up of the WSRR 2015. Priority of action: Global Management of Soil Org...Follow-up of the WSRR 2015. Priority of action: Global Management of Soil Org...
Follow-up of the WSRR 2015. Priority of action: Global Management of Soil Org...
 

Similar to Confidentiality In The Information Age

Metadata: Complying with Oregon Formal Opinion 2011-187
Metadata: Complying with Oregon Formal Opinion 2011-187Metadata: Complying with Oregon Formal Opinion 2011-187
Metadata: Complying with Oregon Formal Opinion 2011-187
Oregon Law Practice Management
 
Confidentiality in a Wired World
Confidentiality in a Wired WorldConfidentiality in a Wired World
Confidentiality in a Wired World
David Whelan
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
Infusionsoft
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
ZitaAdlTrk
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
Jon Gatrell
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
rtrautz
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
B2BPlanner Ltd.
 
InfoSecConcepts.ppt
InfoSecConcepts.pptInfoSecConcepts.ppt
InfoSecConcepts.ppt
MobileAntitheft
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
Ben Rothke
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
musicalworld14
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
Microsoft Österreich
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
Ken Holmes
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
Constantine Karbaliotis
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
Devlog Integrated Services
 
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
ArethaSimons
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
Jack Pringle
 
Investigating computer system abuse power point final
Investigating computer system abuse power point finalInvestigating computer system abuse power point final
Investigating computer system abuse power point final
Dan Michaluk
 
Finding Your Lost Keys
Finding Your Lost KeysFinding Your Lost Keys
Finding Your Lost Keys
trueidentity
 
Security environment
Security environmentSecurity environment
Security environment
Jay Choudhary
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 

Similar to Confidentiality In The Information Age (20)

Metadata: Complying with Oregon Formal Opinion 2011-187
Metadata: Complying with Oregon Formal Opinion 2011-187Metadata: Complying with Oregon Formal Opinion 2011-187
Metadata: Complying with Oregon Formal Opinion 2011-187
 
Confidentiality in a Wired World
Confidentiality in a Wired WorldConfidentiality in a Wired World
Confidentiality in a Wired World
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
InfoSecConcepts.ppt
InfoSecConcepts.pptInfoSecConcepts.ppt
InfoSecConcepts.ppt
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
 
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
Investigating computer system abuse power point final
Investigating computer system abuse power point finalInvestigating computer system abuse power point final
Investigating computer system abuse power point final
 
Finding Your Lost Keys
Finding Your Lost KeysFinding Your Lost Keys
Finding Your Lost Keys
 
Security environment
Security environmentSecurity environment
Security environment
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 

More from Oregon Law Practice Management

Protecting your iolta and operating accounts
Protecting your iolta and operating accountsProtecting your iolta and operating accounts
Protecting your iolta and operating accounts
Oregon Law Practice Management
 
OJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the publicOJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the public
Oregon Law Practice Management
 
The continuum of client communication
The continuum of client communicationThe continuum of client communication
The continuum of client communication
Oregon Law Practice Management
 
7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
Oregon Law Practice Management
 
A bright future for new lawyers
A bright future for new lawyersA bright future for new lawyers
A bright future for new lawyers
Oregon Law Practice Management
 
Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?
Oregon Law Practice Management
 
Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016
Oregon Law Practice Management
 
UTCR amendments 2016
UTCR amendments 2016UTCR amendments 2016
UTCR amendments 2016
Oregon Law Practice Management
 
eCourt malpractice traps and relation back
eCourt malpractice traps and relation backeCourt malpractice traps and relation back
eCourt malpractice traps and relation back
Oregon Law Practice Management
 
Marketing and client development in three easy steps
Marketing and client development in three easy stepsMarketing and client development in three easy steps
Marketing and client development in three easy steps
Oregon Law Practice Management
 
The 7 golden rules of collections
The 7 golden rules of collectionsThe 7 golden rules of collections
The 7 golden rules of collections
Oregon Law Practice Management
 
Bankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyerBankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyer
Oregon Law Practice Management
 
Oregon ecourt and arbitration
Oregon ecourt and arbitrationOregon ecourt and arbitration
Oregon ecourt and arbitration
Oregon Law Practice Management
 
The year in review - top posts of 2015
The year in review - top posts of 2015The year in review - top posts of 2015
The year in review - top posts of 2015
Oregon Law Practice Management
 
Glitches in oregon e service
Glitches in oregon e serviceGlitches in oregon e service
Glitches in oregon e service
Oregon Law Practice Management
 
Editing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dcEditing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dc
Oregon Law Practice Management
 
How to name client folders
How to name client foldersHow to name client folders
How to name client folders
Oregon Law Practice Management
 
Redaction tool in Acrobat XI
Redaction tool in Acrobat XIRedaction tool in Acrobat XI
Redaction tool in Acrobat XI
Oregon Law Practice Management
 
60 apps in 60 minutes
60 apps in 60 minutes60 apps in 60 minutes
60 apps in 60 minutes
Oregon Law Practice Management
 
Why hiring staff pays YOU
Why hiring staff pays YOUWhy hiring staff pays YOU
Why hiring staff pays YOU
Oregon Law Practice Management
 

More from Oregon Law Practice Management (20)

Protecting your iolta and operating accounts
Protecting your iolta and operating accountsProtecting your iolta and operating accounts
Protecting your iolta and operating accounts
 
OJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the publicOJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the public
 
The continuum of client communication
The continuum of client communicationThe continuum of client communication
The continuum of client communication
 
7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
 
A bright future for new lawyers
A bright future for new lawyersA bright future for new lawyers
A bright future for new lawyers
 
Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?
 
Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016
 
UTCR amendments 2016
UTCR amendments 2016UTCR amendments 2016
UTCR amendments 2016
 
eCourt malpractice traps and relation back
eCourt malpractice traps and relation backeCourt malpractice traps and relation back
eCourt malpractice traps and relation back
 
Marketing and client development in three easy steps
Marketing and client development in three easy stepsMarketing and client development in three easy steps
Marketing and client development in three easy steps
 
The 7 golden rules of collections
The 7 golden rules of collectionsThe 7 golden rules of collections
The 7 golden rules of collections
 
Bankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyerBankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyer
 
Oregon ecourt and arbitration
Oregon ecourt and arbitrationOregon ecourt and arbitration
Oregon ecourt and arbitration
 
The year in review - top posts of 2015
The year in review - top posts of 2015The year in review - top posts of 2015
The year in review - top posts of 2015
 
Glitches in oregon e service
Glitches in oregon e serviceGlitches in oregon e service
Glitches in oregon e service
 
Editing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dcEditing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dc
 
How to name client folders
How to name client foldersHow to name client folders
How to name client folders
 
Redaction tool in Acrobat XI
Redaction tool in Acrobat XIRedaction tool in Acrobat XI
Redaction tool in Acrobat XI
 
60 apps in 60 minutes
60 apps in 60 minutes60 apps in 60 minutes
60 apps in 60 minutes
 
Why hiring staff pays YOU
Why hiring staff pays YOUWhy hiring staff pays YOU
Why hiring staff pays YOU
 

Confidentiality In The Information Age

  • 1. Confidentiality in the Information Age: How to Protect Yourself and Your Data Beverly A. Michaelis, J.D. Oregon State Bar Professional Liability Fund
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14. Use Acrobat to Redact
  • 15.
  • 16.
  • 17.
  • 18. Thank You! Beverly Michaelis Practice Management Advisor [email_address] 503-639-6911 or 800-452-1639 Twitter: http://twitter.com/OreLawPracMgm t Blog: http://oregonlawpracticemanagement.wordpress.com/ LinkedIn: http://www.linkedin.com/in/beverlymichaelis