risk management and the digital law practice
DESCRIPTION
This presentation suggests areas where the use of technology by lawyers could potentially expose client confidential and private information. Suggestions include encrypting data, using stronger passwords, using secure sockets when on the Web.TRANSCRIPT
![Page 1: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/1.jpg)
Risk Management & the Digital Law Practice
David Whelan, Manager, Legal InformationThe Law Society of Upper Canada, Toronto, Ontario
![Page 2: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/2.jpg)
risk
![Page 3: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/3.jpg)
risk: physical
![Page 4: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/4.jpg)
risk: virtual
![Page 5: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/5.jpg)
risk: you
![Page 6: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/6.jpg)
![Page 7: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/7.jpg)
![Page 8: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/8.jpg)
![Page 9: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/9.jpg)
![Page 10: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/10.jpg)
what is portable?
![Page 11: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/11.jpg)
what is portable?everything!
![Page 12: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/12.jpg)
8 GigaBytes = 20,000 documents
![Page 13: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/13.jpg)
8 GigaBytes = 5 years of practice?
![Page 14: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/14.jpg)
8 GigaBytes = 10 years of practice?
![Page 15: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/15.jpg)
![Page 16: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/16.jpg)
![Page 17: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/17.jpg)
free is good
![Page 18: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/18.jpg)
free may be a risk
![Page 19: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/19.jpg)
where to start?
![Page 20: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/20.jpg)
where to start?at the beginning
![Page 21: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/21.jpg)
![Page 22: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/22.jpg)
password bios
![Page 23: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/23.jpg)
password start upbios
![Page 24: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/24.jpg)
password networkbios
start up
![Page 25: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/25.jpg)
your username
Password
![Page 26: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/26.jpg)
password bad
![Page 27: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/27.jpg)
Excerpt from Zonealarm survey results infographic by ColumnFive Media
![Page 28: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/28.jpg)
![Page 29: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/29.jpg)
password good
![Page 30: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/30.jpg)
password good12 characters
![Page 31: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/31.jpg)
![Page 32: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/32.jpg)
UPPER, lower, $pecial
password good
12 characters
![Page 33: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/33.jpg)
JustinBieberpassword good
Ju$t!nB1eb3r
![Page 34: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/34.jpg)
I♥theLaw$ociety
password good
![Page 35: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/35.jpg)
http://www.thepasswordmeter.com
![Page 36: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/36.jpg)
![Page 37: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/37.jpg)
![Page 38: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/38.jpg)
encryption
![Page 39: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/39.jpg)
![Page 40: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/40.jpg)
full diskencryption
![Page 41: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/41.jpg)
partial diskfull disk
encryption
![Page 42: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/42.jpg)
encryption decryption
![Page 43: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/43.jpg)
American Bear by ltshears / Wikimedia Commons
![Page 44: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/44.jpg)
re-encryption
![Page 45: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/45.jpg)
encrypt files
![Page 46: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/46.jpg)
encrypt foldersfiles
![Page 47: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/47.jpg)
encrypt usb storage
filesfolders
![Page 48: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/48.jpg)
encrypt usb storage
filesfoldershard drives
![Page 49: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/49.jpg)
encrypt w/
![Page 50: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/50.jpg)
Macencrypt w/
![Page 51: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/51.jpg)
Windows
Mac
encrypt w/
![Page 52: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/52.jpg)
Windows
Mac
Truecryptencrypt w/
![Page 53: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/53.jpg)
http
![Page 54: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/54.jpg)
http surveillance
![Page 55: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/55.jpg)
http sniffing
surveillance
![Page 56: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/56.jpg)
![Page 57: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/57.jpg)
https
![Page 58: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/58.jpg)
https://www.safe
![Page 59: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/59.jpg)
https://www.secure
![Page 60: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/60.jpg)
https://www.smart
![Page 61: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/61.jpg)
encryptwireless
![Page 62: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/62.jpg)
encrypt
wirelessprotect
![Page 63: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/63.jpg)
don't die
![Page 64: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/64.jpg)
your data
![Page 65: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/65.jpg)
your data has datametadata
![Page 66: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/66.jpg)
metadataGot ?
![Page 67: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/67.jpg)
metadataGot ?in your files
![Page 68: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/68.jpg)
metadataGot ?
in your filesin your file transfers
![Page 69: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/69.jpg)
metadataclean your
![Page 70: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/70.jpg)
manage your files
![Page 71: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/71.jpg)
filesback up your
![Page 72: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/72.jpg)
filesback up yourto a hard drive
![Page 73: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/73.jpg)
filesback up youronline
![Page 74: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/74.jpg)
![Page 75: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/75.jpg)
filesstore youronline
![Page 76: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/76.jpg)
filesaccess your
![Page 77: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/77.jpg)
filesaccess yoursecurely
![Page 78: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/78.jpg)
![Page 79: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/79.jpg)
filesaccess yourusing apps
![Page 80: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/80.jpg)
![Page 81: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/81.jpg)
protect your device
![Page 82: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/82.jpg)
protect your devicewitha password
![Page 83: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/83.jpg)
protect your deviceencryptionwith
a password
![Page 84: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/84.jpg)
your devicecontrol
remote
![Page 85: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/85.jpg)
yourselfcontrol staffmanage
![Page 86: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/86.jpg)
![Page 87: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/87.jpg)
![Page 88: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/88.jpg)
![Page 89: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/89.jpg)
![Page 90: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/90.jpg)
yourmanage access
![Page 91: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/91.jpg)
yourmanageaccessdevice
![Page 92: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/92.jpg)
yourmanage
accessdevicestaff
![Page 93: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/93.jpg)
yourmanage
accessdevice
staffself
![Page 94: Risk Management and the Digital Law Practice](https://reader031.vdocuments.us/reader031/viewer/2022020122/54bc6dc14a7959022b8b456b/html5/thumbnails/94.jpg)
yourmanage
accessdevice
staffselfrisk