risk management and the digital law practice

95
Risk Management & the Digital Law Practice David Whelan, Manager, Legal Information The Law Society of Upper Canada, Toronto, Ontario

Upload: david-whelan

Post on 19-Jan-2015

670 views

Category:

Business


1 download

DESCRIPTION

This presentation suggests areas where the use of technology by lawyers could potentially expose client confidential and private information. Suggestions include encrypting data, using stronger passwords, using secure sockets when on the Web.

TRANSCRIPT

Page 1: Risk Management and the Digital Law Practice

Risk Management & the Digital Law Practice

David Whelan, Manager, Legal InformationThe Law Society of Upper Canada, Toronto, Ontario

Page 2: Risk Management and the Digital Law Practice

risk

Page 3: Risk Management and the Digital Law Practice

risk: physical

Page 4: Risk Management and the Digital Law Practice

risk: virtual

Page 5: Risk Management and the Digital Law Practice

risk: you

Page 6: Risk Management and the Digital Law Practice
Page 7: Risk Management and the Digital Law Practice
Page 8: Risk Management and the Digital Law Practice
Page 9: Risk Management and the Digital Law Practice
Page 10: Risk Management and the Digital Law Practice

what is portable?

Page 11: Risk Management and the Digital Law Practice

what is portable?everything!

Page 12: Risk Management and the Digital Law Practice

8 GigaBytes = 20,000 documents

Page 13: Risk Management and the Digital Law Practice

8 GigaBytes = 5 years of practice?

Page 14: Risk Management and the Digital Law Practice

8 GigaBytes = 10 years of practice?

Page 15: Risk Management and the Digital Law Practice
Page 16: Risk Management and the Digital Law Practice
Page 17: Risk Management and the Digital Law Practice

free is good

Page 18: Risk Management and the Digital Law Practice

free may be a risk

Page 19: Risk Management and the Digital Law Practice

where to start?

Page 20: Risk Management and the Digital Law Practice

where to start?at the beginning

Page 21: Risk Management and the Digital Law Practice
Page 22: Risk Management and the Digital Law Practice

password bios

Page 23: Risk Management and the Digital Law Practice

password start upbios

Page 24: Risk Management and the Digital Law Practice

password networkbios

start up

Page 25: Risk Management and the Digital Law Practice

your username

Password

Page 26: Risk Management and the Digital Law Practice

password bad

Page 27: Risk Management and the Digital Law Practice

Excerpt from Zonealarm survey results infographic by ColumnFive Media

Page 28: Risk Management and the Digital Law Practice
Page 29: Risk Management and the Digital Law Practice

password good

Page 30: Risk Management and the Digital Law Practice

password good12 characters

Page 31: Risk Management and the Digital Law Practice
Page 32: Risk Management and the Digital Law Practice

UPPER, lower, $pecial

password good

12 characters

Page 33: Risk Management and the Digital Law Practice

JustinBieberpassword good

Ju$t!nB1eb3r

Page 34: Risk Management and the Digital Law Practice

I♥theLaw$ociety

password good

Page 35: Risk Management and the Digital Law Practice

http://www.thepasswordmeter.com

Page 36: Risk Management and the Digital Law Practice
Page 37: Risk Management and the Digital Law Practice
Page 38: Risk Management and the Digital Law Practice

encryption

Page 39: Risk Management and the Digital Law Practice
Page 40: Risk Management and the Digital Law Practice

full diskencryption

Page 41: Risk Management and the Digital Law Practice

partial diskfull disk

encryption

Page 42: Risk Management and the Digital Law Practice

encryption decryption

Page 43: Risk Management and the Digital Law Practice

American Bear by ltshears / Wikimedia Commons

Page 44: Risk Management and the Digital Law Practice

re-encryption

Page 45: Risk Management and the Digital Law Practice

encrypt files

Page 46: Risk Management and the Digital Law Practice

encrypt foldersfiles

Page 47: Risk Management and the Digital Law Practice

encrypt usb storage

filesfolders

Page 48: Risk Management and the Digital Law Practice

encrypt usb storage

filesfoldershard drives

Page 49: Risk Management and the Digital Law Practice

encrypt w/

Page 50: Risk Management and the Digital Law Practice

Macencrypt w/

Page 51: Risk Management and the Digital Law Practice

Windows

Mac

encrypt w/

Page 52: Risk Management and the Digital Law Practice

Windows

Mac

Truecryptencrypt w/

Page 53: Risk Management and the Digital Law Practice

http

Page 54: Risk Management and the Digital Law Practice

http surveillance

Page 55: Risk Management and the Digital Law Practice

http sniffing

surveillance

Page 56: Risk Management and the Digital Law Practice
Page 57: Risk Management and the Digital Law Practice

https

Page 58: Risk Management and the Digital Law Practice

https://www.safe

Page 59: Risk Management and the Digital Law Practice

https://www.secure

Page 60: Risk Management and the Digital Law Practice

https://www.smart

Page 61: Risk Management and the Digital Law Practice

encryptwireless

Page 62: Risk Management and the Digital Law Practice

encrypt

wirelessprotect

Page 63: Risk Management and the Digital Law Practice

don't die

Page 64: Risk Management and the Digital Law Practice

your data

Page 65: Risk Management and the Digital Law Practice

your data has datametadata

Page 66: Risk Management and the Digital Law Practice

metadataGot ?

Page 67: Risk Management and the Digital Law Practice

metadataGot ?in your files

Page 68: Risk Management and the Digital Law Practice

metadataGot ?

in your filesin your file transfers

Page 69: Risk Management and the Digital Law Practice

metadataclean your

Page 70: Risk Management and the Digital Law Practice

manage your files

Page 71: Risk Management and the Digital Law Practice

filesback up your

Page 72: Risk Management and the Digital Law Practice

filesback up yourto a hard drive

Page 73: Risk Management and the Digital Law Practice

filesback up youronline

Page 74: Risk Management and the Digital Law Practice
Page 75: Risk Management and the Digital Law Practice

filesstore youronline

Page 76: Risk Management and the Digital Law Practice

filesaccess your

Page 77: Risk Management and the Digital Law Practice

filesaccess yoursecurely

Page 78: Risk Management and the Digital Law Practice
Page 79: Risk Management and the Digital Law Practice

filesaccess yourusing apps

Page 80: Risk Management and the Digital Law Practice
Page 81: Risk Management and the Digital Law Practice

protect your device

Page 82: Risk Management and the Digital Law Practice

protect your devicewitha password

Page 83: Risk Management and the Digital Law Practice

protect your deviceencryptionwith

a password

Page 84: Risk Management and the Digital Law Practice

your devicecontrol

remote

Page 85: Risk Management and the Digital Law Practice

yourselfcontrol staffmanage

Page 86: Risk Management and the Digital Law Practice
Page 87: Risk Management and the Digital Law Practice
Page 88: Risk Management and the Digital Law Practice
Page 89: Risk Management and the Digital Law Practice
Page 90: Risk Management and the Digital Law Practice

yourmanage access

Page 91: Risk Management and the Digital Law Practice

yourmanageaccessdevice

Page 92: Risk Management and the Digital Law Practice

yourmanage

accessdevicestaff

Page 93: Risk Management and the Digital Law Practice

yourmanage

accessdevice

staffself

Page 94: Risk Management and the Digital Law Practice

yourmanage

accessdevice

staffselfrisk

Page 95: Risk Management and the Digital Law Practice

thank you.

[email protected]