Legal Tech in the Blogosphere - Security

As computing solutions become more and more mobile and interconnected, questions and concerns about security arise with ever greater urgency, particularly in the context of law, with strict requirements to preserve client confidentiality.  To make some sense of all the emerging choices for storing and retrieving client data, International Legal Technology Association (ILTA) Peer Group for Server Operations and Security said Thursday is developing guidelines, according to Evan Koblenz at Law.com, ILTA Developing Law Firm Security Model The guidelines are due out in October. For now, Victoria Stovall suggests Website Security Basics for Lawyers at Attorney at Work. Financial Institutions already have informational guidelines for using outside services to store data (cloud computing) in a white paper published by the Federal Financial Institutions Examination Council Information Technology Subcommittee, Outsourced Cloud Computing posted at Hunt on Privacy Blog. With the emergence of mobile devices, security has become an even more important issue. Therefore, the question posed by Enrique Serrano and Geri Dreiling at their blog, Legal Tech Review, Are Public WiFi Networks Really Safe? is one for which every lawyer should have an answer.

Recently, hackers and Security Experts gathered at the annual Black Hat conference to report on and confront internet security issues. Sean Doherty summarized key presentation at that conference for Law.com, The Good, Bad, and Ugly News From Black Hat USA 2012. From a broader perspective, Eric Lundquist posted at Information Week, 5 Black Hat Security Lessons for CIO's. In it, he correctly points out that worrying exclusively about networks and firewalls is inadequate in today's world of smart phones and tablets. From the same conference, internet security expert Byron Acohido concluded, Why Threats are Worse than Ever on the Internet. As testament to the security risks facing law firms, Ride the Lightning provides the following cautionary tale: Wiley Rein Firm Breached by Chinese Hackers.

Legal Tech in the Blogosphere" is written by members of the ISBA's Standing Committee on Legal Technology (COLT).

Posted on August 1, 2012 by Chris Bonjean
Filed under: 

Login to post comments