Top Banner
Confidentiality in a Wired World The Law Society of Upper Canada Professional Development & Competence David Whelan, Manager, Legal Information • [email protected]
34

Confidentiality in a Wired World

Nov 18, 2014

Download

Business

David Whelan

This is an update of a session I have given to lawyers participating in the Law Society of Upper Canada's professional competence course. It looks at managing risk in law practices when dealing with confidential client information. Topics include social media, communications and e-mail, ethics opinions and "reasonable" and "competent" standards for lawyer professionalism, endpoint encryption, and physical security.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Confidentiality in a Wired World

Confidentiality in a Wired World

The Law Society of Upper CanadaProfessional Development & Competence

David Whelan, Manager, Legal Information • [email protected]

Page 2: Confidentiality in a Wired World

Competence

(c) the records, systems, or procedures of the lawyer’s professional business

Page 3: Confidentiality in a Wired World

Confidentiality

A lawyer at all times shall hold in strict confidence all information …

Page 4: Confidentiality in a Wired World

“Oops”

Page 5: Confidentiality in a Wired World
Page 6: Confidentiality in a Wired World
Page 7: Confidentiality in a Wired World

A lawyer shall … assume complete professional responsibility for his or her practice of law …

Page 8: Confidentiality in a Wired World
Page 9: Confidentiality in a Wired World

Shhhhh!

Related topic: Privacy obligations under PIPEDA- “information about an identifiable

individual”

- Broad, includes potential client information

- Privacy Handbook for Lawyers

Page 10: Confidentiality in a Wired World

COMMUNICATIONS

Watch What You Say!

Page 11: Confidentiality in a Wired World
Page 12: Confidentiality in a Wired World

… conducted what should have been a confidential conversation about pending layoffs at his firm – in a loud voice…, on a crowded Acela train.

Page 13: Confidentiality in a Wired World

E-mail?

Reasonable expectation of privacy

But- Easy, free: Hushmail.com,

Yousendit.com

- May depend on client, subject matter

- May be better not to send as e-mail

- Consider informing client, getting signoff on using e-mail

Page 14: Confidentiality in a Wired World

One of the outside lawyers …had mistakenly e-mailed confidential information on the talks to Times reporter Alex Berenson instead of Bradford Berenson, her co-counsel…

Page 15: Confidentiality in a Wired World

Who is Your Audience?

E-mail Recipients- Address the e-mail last

- Verify the recipients

Is client’s e-mail private?- Web-based e-mail, not employer’s

- See ABA Formal Opinion 11-459 (8/2011)

Social Media (Twitter, Facebook)

Page 16: Confidentiality in a Wired World

SECURE YOUR TECHNOLOGY

Passwords and Encryption

Page 17: Confidentiality in a Wired World
Page 18: Confidentiality in a Wired World
Page 19: Confidentiality in a Wired World

mxyzptlk

Page 20: Confidentiality in a Wired World

Strong Passwords, Written Down

8 or more characters

UPPER, lower, $peci&l

Balance obscure with memorable- terms of art becomes t3rm$0f&rt

Test it: passwordmeter.com

Store it somewhere safe and secure

Page 21: Confidentiality in a Wired World

Your data

Encryption layerEncrypted

Page 22: Confidentiality in a Wired World

Your data

Encryption layerDecrypted

Once decrypted, your data is accessible until re-encrypted

Page 23: Confidentiality in a Wired World

Encryption at rest

Page 24: Confidentiality in a Wired World

Encryption at rest

Web search for endpoint encryption

iPhone 4+: built-in

Blackberry: built-in

Android 3: built-in

Windows: add-on

Truecrypt.org (free)

McAfee.com (McAfee Anti-Theft)

TrendMicro.com (Endpoint Encryption)

CheckPoint.com (Full Disk Encryption)

Symantec.com (PGP Whole Disk Encryption)

Windows Vista/7 Bitlocker

Mac OS File Vault

Page 25: Confidentiality in a Wired World

Encryption in motion

When you transmit or receive …- Password: https://mybank.com

- Search: https://www.google.com/

- Files: https://www.dropbox.com/

Firefox: HTTPS Everywhere add-on- Defaults over 200 sites to https://

Page 26: Confidentiality in a Wired World

Encryption in motion

Page 27: Confidentiality in a Wired World

Cloud Computing

Software-as-a-Service- Use SSL (https://) for connections

- Content should be encrypted at rest

Page 28: Confidentiality in a Wired World

SECURE YOUR DEVICE

You Better Take It With You

Page 29: Confidentiality in a Wired World

Physical Security

Page 30: Confidentiality in a Wired World

Physical Security

Your locks should reflect your duty- Household locks weaker than commercial

- File cabinets, shed/garage doors weak

Use them- No doors propped open

- Keep servers, important tech in locked, well-ventilated room

Page 31: Confidentiality in a Wired World

Everything is Portable

Page 32: Confidentiality in a Wired World

Secure ALL Your Computers

Value is in the case, not the data

Your risk is in data

Page 33: Confidentiality in a Wired World

Creature of Habit

Get into habits of handling devices- Put wireless phone, tablet in regular place

- Easy to check, notice it’s missing

Secure devices with password

Add remote control, wipe apps- Delete device content remotely

- Locate where device is

Page 34: Confidentiality in a Wired World

Conclusion

Watch your communications, what, how, and where

Secure entry with passwords, locks

Protect data with encryption at rest, in motion