Limit search to available items
Book Cover
E-book
Author Nelson, Sharon D., author.

Title Locked down information security for lawyers / Sharon D. Nelson, David G. Ries, and John W. Simek
Published Cleveland, Ohio : American Bar Association, 2014

Copies

Description 1 online resource
Contents Cover Page; Title Page; Copyright Page; Dedication; About the Authors; Acknowledgments; Introduction; Chapter One: Data Breach Nightmares and How to Prevent Them; Can Your Law Firm Be Breached?; Need More Convincing?; What's New In the Data Breach World?; The Bad Rap Law Firms Get On Information Security; A Recent Law Firm Data Breach; State Laws Protecting Personal Data; Spear Phishing-and a Data Breach Avoided; A Nasty Law Firm Data Breach; Okay, I'm Convinced: What's Next?; Secure Passwords: The Rules Have Changed; Lawyers and Passwords; A Conversation With a Law Firm Security Specialist
Chapter Two: Lawyers' Duty to Safeguard InformationEthical Duties Generally; Ethical Duties: Electronic Communications; Common Law Duties; Statutes and Regulations; Standards for Competent and Reasonable Measures; Conclusion; Selected Ethics Opinions: Technology, the Internet and Cloud Computing; Chapter Three: Physical Security; Introduction; Where Is Your Server and Who Has Access to It?; Alarm Systems, UPS and Paper; Security Assessments; Laptops; Lost and Stolen Devices; Training; Guests; Incident Response Plans and Disaster Recovery Plans; Chapter Four: Information Security Overview
Security StandardsSecurity Programs and Policies; Inventory and Risk Assessment; People; Policies and Procedures; Technology; Managed Security; Conclusion; Chapter Five: Desktops and Laptops; Authentication; User Accounts; Secure Configuration; Security Software; Patching; Hardware Firewall; Encryption; Backup; Installing Programs; Safe Browsing; Attachments and Embedded Links; Laptops; Chapter Six: E-Mail Security; Chapter Seven: Smartphones and Tablets for Lawyers: Managing and Securing Them; Some Statistics; Attorneys' Duty to Safeguard Client Information; Mobile Security Basics
Additional InformationChapter Eight: Voice Communications; Traditional Telephone Systems; VoIP Systems; Voice Mail; Chapter Nine: Portable Devices; Chapter Ten: Networks: Wired and Wireless; Authentication and Access Control; Wired Networks; Wireless Networks; Firewalls/IDS/IPS Devices; Routers; Switches; Secure Configuration and Management; Other Considerations; Chapter Eleven: Remote Access; Virtual Private Networking; Remote Control; Remote Node; Modems; Remote Authentication; Chapter Twelve: Backup and Business Continuity; Backup Job Types; Backup Media; Backup Solutions
Business ContinuityChapter Thirteen: Secure Disposal; The Issues; Solutions; Conclusion; Chapter Fourteen: Outsourcing and Cloud Computing; Outsourcing; Cloud Computing; The Practical Side of the Cloud; Conclusion; Information Sources: Professional Responsibility and Cloud Computing; Chapter Fifteen: Securing Documents; Word; Adobe Acrobat; Document Management; Compound Files; Metadata; Final Thoughts; Chapter Sixteen: Cyberinsurance; Introduction; How Much Does It Cost?; Coverage; Chapter Seventeen: The Future of Information Security; Laws and Regulations; BYOD; Passwords; Policies and Plans
Summary In an age where lawyers frequently conduct business across wireless networks using smartphones and laptops, how can attorneys safeguard client data and confidential information? Locked Down explains the wide variety of information security risks facing law firms and how lawyers can best protect their data from these threats--with any budget
Notes Vendor-supplied metadata
Subject Law offices -- Computer networks -- Security measures -- United States
LAW -- Essays.
LAW -- General Practice.
LAW -- Jurisprudence.
LAW -- Paralegals & Paralegalism.
LAW -- Practical Guides.
LAW -- Reference.
United States
Form Electronic book
Author Ries, David G., 1949- author.
Simek, John W., author.
American Bar Association. Section of Law Practice Management.
ISBN 9781614383659
1614383650