SlideShare ist ein Scribd-Unternehmen logo
1 von 57
Downloaden Sie, um offline zu lesen
Don't Diligence -
Information Security for Lawyers

Cloud Security, the Law Society and what every lawyer
needs to know
Darren Thurston – hardBox Solutions
Information technology solutions for
high and medium security office
environments

Secure data storage, sharing &
retrieval
Our Clients Include


Edelmann & Company Law Office
●



Helps Law Corporation
●



Wilson, Buck, Butcher and Sears
●



Browning, Ray, Soga, Dunne, Mirsky & Ng
●



Phillip A. Riddell
●



Don Morrison
●
Who Are You?
What size is your firm?
- Solo
- 2 to 5
- 6 to 20
- 21 to 75
- Over 75
- Crown Counsel
Security breaches are
    happening every day.


Reputation is the first thing to
 be effected when a breach
           occurs.
What is the cloud
Cloud Services

●   DropBox
●   Google
●   iCloud
●   AmazonCloudDrive
●   WindowsLive
Law Specific Cloud Services

●   PCLaw / TimeMatters - LexisNexis
●   EsiLaw.com
●   Clio
●   AmicusAttorney.com
●   Rocketmatter.com
Report Of The Cloud Computing
           Working Group
Law Society of B.C.
   Gavin Hume, QC (Chair)
   Bruce LeRose, QC
   Peter Lloyd, FCA
   Stacy Kuiack

http://www.lawsociety.bc.ca/docs/publications/reports/CloudComputing_2012.pdf
Cloud Issues

●   Location of data and jurisdictional issues
●   Security and data privacy issues
●   Legal compliance issues
●   Ownership issues
●   Access and retention issues
●   Force majeure issues
●   Liability issues
●   Termination issues
Where is my data?
Jurisdictional Issues
 There are several problems with lawyers having
their business records stored or processed outside
British Columbia. Lawyers have a professional
obligation to safeguard clients’ information to
protect confidentiality and privilege. When a lawyer
entrusts client information to a cloud provider the
lawyer will often be subjecting clients’ information
to a foreign legal system. The foreign laws may
have lower thresholds of protection than Canadian
law with respect to accessing information. A lawyer
must understand the risks (legal, political, etc.) of
having client data stored and processed in foreign
jurisdictions.
Jurisdictional Issues
●   US PATRIOT Act

●   Alberta, Canada: “Bill 54” and Personal

    Information Protection Act (PIPA)

●   UK Regulation of Investigatory Powers Act of 2000

●   EU Data Protection Directive

●   India Information Technology (Amendment) Act,

    2008 (the IT Act)
Security and Data Privacy
●   Confidentiality provisions
●   SAS 70
●   Statement on Standards for Attestation
    Engagements No. 16 (SSAE 16)
●   ISO 27002
●   Annual independent audits or
    assessments
●   Incident Response Plan
Legal compliance issues
●   The Personal Information Protection and Electronic Documents Act
    Personal Information Protection Act, B.C. of 2003
●   Sarbanes-Oxley Act of 2002 (SOX)
●   Health Insurance Portability and Accountability Act of
    1996 (HIPAA)
●   Health Information Technology for Economic and
    Clinical Health (HITECH) Act
●   Gramm-Leach-Bliley Act (GLB)
●   Payment Card Industry Data Security Standard
    (PCIDSS)
Potential impact on Rule 4-43
...the Law Society revised Rule 4-43 (in 2008) to create a process to
protect personal information. The balance that was sought recognized that
the Law Society has the authority to copy computer records and
investigate lawyers, but the process of making a forensic copy of
computer records can capture irrelevant personal information. In light of
this, the Law Society created a process to allow irrelevant personal
information to be identified and segregated, so it was not accessed by the
Law Society. Cloud computing creates a situation where that process
might not be able to be followed.
Ownership issues
            My data, right?
●   Google has recently been sued
    for mining data
●   Can your data be exported -
    PCLaw?!?@#
Access and Retention Issues


●   Litigation Hold

●   Audit Trail
How is my data stored?


      - Virtualization

      - Multi-tenancy

          - Other
Other issues
●   Force Majeure Issues
    natural disaster, act of war, etc.
●   Liability Issues
    services and not responsible for their downtime
●   Termination Issues
    exit strategy
Security Incidents
DropBox
The problem child of cloud
services
Not just cloud services
The dangers..
and your obligations
●   Unprotected computers infected/hacked
    within minutes of connecting to Internet
●   Lost / stolen cell phones or laptops
●   Theft of client, firm or personal data
●   Rules of professional conduct
    oblige you to protect client data
Information Security Best Practices

 ●   How much time, effort and
     money do you invest?
     ●   Absolute security is impossible
     ●   Safety vs. convenience
 ●   Find balance between:
     ●   Allowable risk
     ●   Acceptable cost/effort
Keep your electronic
             data secure and private
    Steps you must ensure:


●   Install all latest software updates
●   Use strong passwords
●   Antivirus software is essential
●   Install a firewall on your Internet
    connection
●   Avoid the dangers of e-mail

●   Beware the dangers of metadata
Keep your electronic
    data secure and private (cont.)
●   Lockdown and encrypt your data
●   Harden your wireless connections
●   Learn how to safely surf the Web
●   Change key default settings
●   Implement a technology use policy
●   A backup solution, can save your practice
Install updates...
●   Microsoft products particularly prone
●   Update all software regularly!
●   Microsoft / Apple Mac's
●   Don’t forget non-OS software!
    Java / Flash / Adobe PDF
●   Check on a regular schedule
Further update issues
●   Turn on Automatic Updates
●   Automatic vs. ask to install
●   Periodically check Microsoft website
●   Critical updates ASAP
●   Watch for “optional” software
●   Backup before you install updates
●   Create Restore point (Windows)
A few thoughts on passwords

   How many of you re-use
        passwords?

Use a your child's or pet's name
        or birthdate?
Top used passwords
 1) password
 2) 123456
 3) 12345678
 4) 1234
 5) qwerty
 6) 12345
 7) dragon
 8) pussy
 9) baseball
 10) football
 11) letmein
 12) monkey
 13) 696969
 14) abc123
Use strong passwords

Frankiepoo1 = BAD


m%")FZTm"d*A = DECENT


a{3xQXbDZ`k=/T8z>Mx = GOOD
Proper use
●   Passwords are the keys to
    “unlock” your computer
●   Essential for securing your
    electronic data and entire corporate
    network
●   You need to be conscientious about
    how to set them up and use them
Proper use
●   Don’t use the same password
    for everything
●   Don’t tell anyone your
    passwords, EVER!!
●   Be wary of saving passwords
    in your browser
Proper use
●   Never write them down
●   If you must store them securely (safe)
●   Be careful about storing passwords on
    your computer – Use an encrypted
    password safe
●   A security breach can compromise your
    entire network
●   Rotate important passwords every
    60 to 90 days
Anti-virus software Essential
●   Protect your computer and data from malware
    - Viruses
    - Worms
    - Trojan Horses
    - Key Stroke Recorders
    - Backdoors
    - Rootkits
Anti-Virus Use
●   Decent free anti-virus is available
    Microsoft Security Essentials
●   Needs to set up correctly
●   Daily scans of all data
●   Regularl updates of your
    virus definition or signature files
False Security
●   The anti-virus game is one of
    catch-up
●   20 % of viruses will get past most
    anti-virus products
Use a Firewall
●   A gatekeeper that ensures incoming and
    outgoing communications are legitimate
●   All computers on the Internet can see
    one another
●   Lines of communication are established
    through ports
●   Open ports can allow unwanted
    access to a computer
E-mail dangers
●   Protect access with passwords
●   Use privacy statements
     Please note that this email correspondence is *not*
    encrypted or secured in any way. If you are sending
    sensitive information or attachments you may wish
    to send them in another format. If you choose to
    communicate with us by email, you agree to accept
    the possible risk of loss of privacy.
         The information in this internet email is
    confidential and may be legally privileged. It is
    intended solely for the addressee. Access to this
    internet email by anyone else is unauthorized .
Smart email use
●   Read email in text format not html
●   Be wary of phishing emails
●   Be wary of links & attachments
    in emails
●   Implement a spam filter
metadata
●   Data About Data
●   MS Offices Products
●   Adobe pdf's
●   Photo's
Lockdown and encrypt your data
●   Startup & Users passwords
●   Put a password on your screensaver
●   Data stored on computers and
    on external drives should
    ALWAYS be encrypted
●   USB Drives !
Harden your wireless connections
●   Disable SSID Broadcast
●   MAC Filtration
●   Change Defaults
●   Enable Logging
●   Use Encryption WEP is not secure
●   WPA2 with AES Algorithm
●   WPS can be hacked w/ Reaver
Learn how to safely surf the Web
●   Safe browser choices = No IE
●   Disabling some browser features
●   Controlling which cookies can be stored on
    your computer
●   Preventing pop-ups
●   Plug-ins turned off by default
Change key default settings
●   File Sharing
●   Administrator account
●   Normal user account for everyday use
●   Domain name
●   Workgroup name
Technology use policy
●   Does your office have one?
●   Law Society has templates
●   Internet and Email Use Policy
Backup solutions
●   Secure
●   Encrypted
●   Onsite
●   Offsite
Backup details
●   Who’s Responsible
●   Full Backup
●   Daily Backups
●   Establish Alerts
●   Files
●   E-mail
●   Logs
Further information
●   The Law Society of BC – practice
    docs/tips
●   CBA - Guidelines for Practicing
    Ethically with New Information
    Technologies
●   Give us a call
Questions?
Contact Information

  Darren Thurston




darren@hardbox.ca

  www.hardbox.ca

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerIdan Tohami
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness trainingSandeep Taileng
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013salleh1n
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas IndonesiaIGN MANTRA
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Dr. Ahmed Al Zaidy
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 

Was ist angesagt? (19)

Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran Adler
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Funsec3e ppt ch03
Funsec3e ppt ch03Funsec3e ppt ch03
Funsec3e ppt ch03
 
Hacking3e ppt ch13
Hacking3e ppt ch13Hacking3e ppt ch13
Hacking3e ppt ch13
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Hacking3e ppt ch10
Hacking3e ppt ch10Hacking3e ppt ch10
Hacking3e ppt ch10
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
 
How to keep printing processes GDPR compliant
How to keep printing processes GDPR compliantHow to keep printing processes GDPR compliant
How to keep printing processes GDPR compliant
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 

Andere mochten auch

semiología auditiva
semiología auditivasemiología auditiva
semiología auditivaCarol Quiroga
 
Osman assigmet 2 the business idea
Osman assigmet 2 the  business ideaOsman assigmet 2 the  business idea
Osman assigmet 2 the business ideaosman_71
 
The bright spark_within_us_all_-_mini v4
The bright spark_within_us_all_-_mini v4The bright spark_within_us_all_-_mini v4
The bright spark_within_us_all_-_mini v4James Williams
 
Eegg437 assigment 1 osman şimşek 286046 comp eng
Eegg437 assigment 1 osman şimşek 286046 comp engEegg437 assigment 1 osman şimşek 286046 comp eng
Eegg437 assigment 1 osman şimşek 286046 comp engosman_71
 
تكنولوجيا الحاسوب والعملية التعليمية
تكنولوجيا الحاسوب والعملية التعليميةتكنولوجيا الحاسوب والعملية التعليمية
تكنولوجيا الحاسوب والعملية التعليميةمسقط
 
Kad jemputan majlis aryan
Kad jemputan majlis aryanKad jemputan majlis aryan
Kad jemputan majlis aryanPiya Sabawi
 
Grade 10 Science Module (1st Quarter)
Grade 10 Science Module (1st Quarter)Grade 10 Science Module (1st Quarter)
Grade 10 Science Module (1st Quarter)Luwen Borigas
 
Grade 10 English Module (1st Quarter)
Grade 10 English Module (1st Quarter)Grade 10 English Module (1st Quarter)
Grade 10 English Module (1st Quarter)Luwen Borigas
 
Grade 10 Math Module (1st Quarter)
Grade 10 Math Module (1st Quarter)Grade 10 Math Module (1st Quarter)
Grade 10 Math Module (1st Quarter)Luwen Borigas
 
Grade 10 Filipino Module (1st Quarter)
Grade 10 Filipino Module (1st Quarter)Grade 10 Filipino Module (1st Quarter)
Grade 10 Filipino Module (1st Quarter)Luwen Borigas
 
الوسائط المتعددة في التربية
 الوسائط المتعددة في التربية الوسائط المتعددة في التربية
الوسائط المتعددة في التربيةمسقط
 
الوسائط المتعددة في التربية 2
الوسائط المتعددة في التربية 2الوسائط المتعددة في التربية 2
الوسائط المتعددة في التربية 2مسقط
 
Bahasa melayu tahun 1.ppt
Bahasa melayu tahun 1.pptBahasa melayu tahun 1.ppt
Bahasa melayu tahun 1.pptPiya Sabawi
 
Seismic waves (Grade 10)
Seismic waves (Grade 10)Seismic waves (Grade 10)
Seismic waves (Grade 10)Luwen Borigas
 

Andere mochten auch (17)

semiología auditiva
semiología auditivasemiología auditiva
semiología auditiva
 
02 introductioncensus
02 introductioncensus02 introductioncensus
02 introductioncensus
 
Osman assigmet 2 the business idea
Osman assigmet 2 the  business ideaOsman assigmet 2 the  business idea
Osman assigmet 2 the business idea
 
Spaghetti gate
Spaghetti gateSpaghetti gate
Spaghetti gate
 
The bright spark_within_us_all_-_mini v4
The bright spark_within_us_all_-_mini v4The bright spark_within_us_all_-_mini v4
The bright spark_within_us_all_-_mini v4
 
Eegg437 assigment 1 osman şimşek 286046 comp eng
Eegg437 assigment 1 osman şimşek 286046 comp engEegg437 assigment 1 osman şimşek 286046 comp eng
Eegg437 assigment 1 osman şimşek 286046 comp eng
 
Justforudear
JustforudearJustforudear
Justforudear
 
تكنولوجيا الحاسوب والعملية التعليمية
تكنولوجيا الحاسوب والعملية التعليميةتكنولوجيا الحاسوب والعملية التعليمية
تكنولوجيا الحاسوب والعملية التعليمية
 
Kad jemputan majlis aryan
Kad jemputan majlis aryanKad jemputan majlis aryan
Kad jemputan majlis aryan
 
Grade 10 Science Module (1st Quarter)
Grade 10 Science Module (1st Quarter)Grade 10 Science Module (1st Quarter)
Grade 10 Science Module (1st Quarter)
 
Grade 10 English Module (1st Quarter)
Grade 10 English Module (1st Quarter)Grade 10 English Module (1st Quarter)
Grade 10 English Module (1st Quarter)
 
Grade 10 Math Module (1st Quarter)
Grade 10 Math Module (1st Quarter)Grade 10 Math Module (1st Quarter)
Grade 10 Math Module (1st Quarter)
 
Grade 10 Filipino Module (1st Quarter)
Grade 10 Filipino Module (1st Quarter)Grade 10 Filipino Module (1st Quarter)
Grade 10 Filipino Module (1st Quarter)
 
الوسائط المتعددة في التربية
 الوسائط المتعددة في التربية الوسائط المتعددة في التربية
الوسائط المتعددة في التربية
 
الوسائط المتعددة في التربية 2
الوسائط المتعددة في التربية 2الوسائط المتعددة في التربية 2
الوسائط المتعددة في التربية 2
 
Bahasa melayu tahun 1.ppt
Bahasa melayu tahun 1.pptBahasa melayu tahun 1.ppt
Bahasa melayu tahun 1.ppt
 
Seismic waves (Grade 10)
Seismic waves (Grade 10)Seismic waves (Grade 10)
Seismic waves (Grade 10)
 

Ähnlich wie Don't Diligence Information Security for Lawyers

Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecuritySmartCompliance
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network SecurityAnjan Mahanta
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
Data privacy and data classification
Data  privacy  and  data  classificationData  privacy  and  data  classification
Data privacy and data classificationQasim965490
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
DSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness PresentationDSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness PresentationMohammedFarouk38
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08DallasHaselhorst
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...Jisc
 
Encryption by Default BoF by Gihan Dias [APRICOT 2015]
Encryption by Default BoF by Gihan Dias [APRICOT 2015]Encryption by Default BoF by Gihan Dias [APRICOT 2015]
Encryption by Default BoF by Gihan Dias [APRICOT 2015]APNIC
 
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
Webinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRWebinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRStorage Switzerland
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Bianca Mueller, LL.M.
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantClio - Cloud-Based Legal Technology
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 

Ähnlich wie Don't Diligence Information Security for Lawyers (20)

Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network Security
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Data privacy and data classification
Data  privacy  and  data  classificationData  privacy  and  data  classification
Data privacy and data classification
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
DSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness PresentationDSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness Presentation
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...
 
Encryption by Default BoF by Gihan Dias [APRICOT 2015]
Encryption by Default BoF by Gihan Dias [APRICOT 2015]Encryption by Default BoF by Gihan Dias [APRICOT 2015]
Encryption by Default BoF by Gihan Dias [APRICOT 2015]
 
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Webinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRWebinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPR
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Don't Diligence Information Security for Lawyers

  • 1. Don't Diligence - Information Security for Lawyers Cloud Security, the Law Society and what every lawyer needs to know Darren Thurston – hardBox Solutions
  • 2. Information technology solutions for high and medium security office environments Secure data storage, sharing & retrieval
  • 3. Our Clients Include Edelmann & Company Law Office ● Helps Law Corporation ● Wilson, Buck, Butcher and Sears ● Browning, Ray, Soga, Dunne, Mirsky & Ng ● Phillip A. Riddell ● Don Morrison ●
  • 5. What size is your firm? - Solo - 2 to 5 - 6 to 20 - 21 to 75 - Over 75 - Crown Counsel
  • 6. Security breaches are happening every day. Reputation is the first thing to be effected when a breach occurs.
  • 7.
  • 8. What is the cloud
  • 9.
  • 10. Cloud Services ● DropBox ● Google ● iCloud ● AmazonCloudDrive ● WindowsLive
  • 11. Law Specific Cloud Services ● PCLaw / TimeMatters - LexisNexis ● EsiLaw.com ● Clio ● AmicusAttorney.com ● Rocketmatter.com
  • 12. Report Of The Cloud Computing Working Group Law Society of B.C. Gavin Hume, QC (Chair) Bruce LeRose, QC Peter Lloyd, FCA Stacy Kuiack http://www.lawsociety.bc.ca/docs/publications/reports/CloudComputing_2012.pdf
  • 13. Cloud Issues ● Location of data and jurisdictional issues ● Security and data privacy issues ● Legal compliance issues ● Ownership issues ● Access and retention issues ● Force majeure issues ● Liability issues ● Termination issues
  • 14. Where is my data?
  • 15. Jurisdictional Issues There are several problems with lawyers having their business records stored or processed outside British Columbia. Lawyers have a professional obligation to safeguard clients’ information to protect confidentiality and privilege. When a lawyer entrusts client information to a cloud provider the lawyer will often be subjecting clients’ information to a foreign legal system. The foreign laws may have lower thresholds of protection than Canadian law with respect to accessing information. A lawyer must understand the risks (legal, political, etc.) of having client data stored and processed in foreign jurisdictions.
  • 16. Jurisdictional Issues ● US PATRIOT Act ● Alberta, Canada: “Bill 54” and Personal Information Protection Act (PIPA) ● UK Regulation of Investigatory Powers Act of 2000 ● EU Data Protection Directive ● India Information Technology (Amendment) Act, 2008 (the IT Act)
  • 17. Security and Data Privacy ● Confidentiality provisions ● SAS 70 ● Statement on Standards for Attestation Engagements No. 16 (SSAE 16) ● ISO 27002 ● Annual independent audits or assessments ● Incident Response Plan
  • 18. Legal compliance issues ● The Personal Information Protection and Electronic Documents Act Personal Information Protection Act, B.C. of 2003 ● Sarbanes-Oxley Act of 2002 (SOX) ● Health Insurance Portability and Accountability Act of 1996 (HIPAA) ● Health Information Technology for Economic and Clinical Health (HITECH) Act ● Gramm-Leach-Bliley Act (GLB) ● Payment Card Industry Data Security Standard (PCIDSS)
  • 19. Potential impact on Rule 4-43 ...the Law Society revised Rule 4-43 (in 2008) to create a process to protect personal information. The balance that was sought recognized that the Law Society has the authority to copy computer records and investigate lawyers, but the process of making a forensic copy of computer records can capture irrelevant personal information. In light of this, the Law Society created a process to allow irrelevant personal information to be identified and segregated, so it was not accessed by the Law Society. Cloud computing creates a situation where that process might not be able to be followed.
  • 20. Ownership issues My data, right? ● Google has recently been sued for mining data ● Can your data be exported - PCLaw?!?@#
  • 21.
  • 22. Access and Retention Issues ● Litigation Hold ● Audit Trail
  • 23. How is my data stored? - Virtualization - Multi-tenancy - Other
  • 24. Other issues ● Force Majeure Issues natural disaster, act of war, etc. ● Liability Issues services and not responsible for their downtime ● Termination Issues exit strategy
  • 26. DropBox The problem child of cloud services
  • 27.
  • 28. Not just cloud services
  • 29. The dangers.. and your obligations ● Unprotected computers infected/hacked within minutes of connecting to Internet ● Lost / stolen cell phones or laptops ● Theft of client, firm or personal data ● Rules of professional conduct oblige you to protect client data
  • 30.
  • 31. Information Security Best Practices ● How much time, effort and money do you invest? ● Absolute security is impossible ● Safety vs. convenience ● Find balance between: ● Allowable risk ● Acceptable cost/effort
  • 32. Keep your electronic data secure and private Steps you must ensure: ● Install all latest software updates ● Use strong passwords ● Antivirus software is essential ● Install a firewall on your Internet connection ● Avoid the dangers of e-mail ● Beware the dangers of metadata
  • 33. Keep your electronic data secure and private (cont.) ● Lockdown and encrypt your data ● Harden your wireless connections ● Learn how to safely surf the Web ● Change key default settings ● Implement a technology use policy ● A backup solution, can save your practice
  • 34. Install updates... ● Microsoft products particularly prone ● Update all software regularly! ● Microsoft / Apple Mac's ● Don’t forget non-OS software! Java / Flash / Adobe PDF ● Check on a regular schedule
  • 35. Further update issues ● Turn on Automatic Updates ● Automatic vs. ask to install ● Periodically check Microsoft website ● Critical updates ASAP ● Watch for “optional” software ● Backup before you install updates ● Create Restore point (Windows)
  • 36. A few thoughts on passwords How many of you re-use passwords? Use a your child's or pet's name or birthdate?
  • 37. Top used passwords 1) password 2) 123456 3) 12345678 4) 1234 5) qwerty 6) 12345 7) dragon 8) pussy 9) baseball 10) football 11) letmein 12) monkey 13) 696969 14) abc123
  • 38. Use strong passwords Frankiepoo1 = BAD m%")FZTm"d*A = DECENT a{3xQXbDZ`k=/T8z>Mx = GOOD
  • 39. Proper use ● Passwords are the keys to “unlock” your computer ● Essential for securing your electronic data and entire corporate network ● You need to be conscientious about how to set them up and use them
  • 40. Proper use ● Don’t use the same password for everything ● Don’t tell anyone your passwords, EVER!! ● Be wary of saving passwords in your browser
  • 41. Proper use ● Never write them down ● If you must store them securely (safe) ● Be careful about storing passwords on your computer – Use an encrypted password safe ● A security breach can compromise your entire network ● Rotate important passwords every 60 to 90 days
  • 42. Anti-virus software Essential ● Protect your computer and data from malware - Viruses - Worms - Trojan Horses - Key Stroke Recorders - Backdoors - Rootkits
  • 43. Anti-Virus Use ● Decent free anti-virus is available Microsoft Security Essentials ● Needs to set up correctly ● Daily scans of all data ● Regularl updates of your virus definition or signature files
  • 44. False Security ● The anti-virus game is one of catch-up ● 20 % of viruses will get past most anti-virus products
  • 45. Use a Firewall ● A gatekeeper that ensures incoming and outgoing communications are legitimate ● All computers on the Internet can see one another ● Lines of communication are established through ports ● Open ports can allow unwanted access to a computer
  • 46. E-mail dangers ● Protect access with passwords ● Use privacy statements Please note that this email correspondence is *not* encrypted or secured in any way. If you are sending sensitive information or attachments you may wish to send them in another format. If you choose to communicate with us by email, you agree to accept the possible risk of loss of privacy. The information in this internet email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this internet email by anyone else is unauthorized .
  • 47. Smart email use ● Read email in text format not html ● Be wary of phishing emails ● Be wary of links & attachments in emails ● Implement a spam filter
  • 48. metadata ● Data About Data ● MS Offices Products ● Adobe pdf's ● Photo's
  • 49. Lockdown and encrypt your data ● Startup & Users passwords ● Put a password on your screensaver ● Data stored on computers and on external drives should ALWAYS be encrypted ● USB Drives !
  • 50. Harden your wireless connections ● Disable SSID Broadcast ● MAC Filtration ● Change Defaults ● Enable Logging ● Use Encryption WEP is not secure ● WPA2 with AES Algorithm ● WPS can be hacked w/ Reaver
  • 51. Learn how to safely surf the Web ● Safe browser choices = No IE ● Disabling some browser features ● Controlling which cookies can be stored on your computer ● Preventing pop-ups ● Plug-ins turned off by default
  • 52. Change key default settings ● File Sharing ● Administrator account ● Normal user account for everyday use ● Domain name ● Workgroup name
  • 53. Technology use policy ● Does your office have one? ● Law Society has templates ● Internet and Email Use Policy
  • 54. Backup solutions ● Secure ● Encrypted ● Onsite ● Offsite
  • 55. Backup details ● Who’s Responsible ● Full Backup ● Daily Backups ● Establish Alerts ● Files ● E-mail ● Logs
  • 56. Further information ● The Law Society of BC – practice docs/tips ● CBA - Guidelines for Practicing Ethically with New Information Technologies ● Give us a call
  • 57. Questions? Contact Information Darren Thurston darren@hardbox.ca www.hardbox.ca