SlideShare une entreprise Scribd logo
1  sur  1
Professional liability fund
                                www.osbplf.org

                                Malprac t i ce Pre ve n t i o n Ed u ca t i o n f o r O re g o n La w ye r s

                                      Easy	to	Use	or	Easy	to	Lose?
                                     How	to	Protect	Mobile	Devices	
                                                                             6.		 Explore	 Data	 Wiping. Research in
                    Mobile devices like the BlackBerry and Palm
                                                                         Motion’s BlackBerry Enterprise Server, as an
                Treo have become indispensable tools for many
                                                                         example, comes with a feature that wipes all data
                lawyers. Compact and easy to use, these devices
                                                                         from the device’s memory once a certain num-
                offer quick access to calendars, contacts, e-mail,
                                                                         ber of failed log-in attempts are exceeded. The
                documents, and other sensitive personal and cli-
                                                                         current version of Microsoft Exchange provides
                ent information. Unfortunately, the portability
                                                                         for a remote wipe of a lost or stolen Windows
                of such devices also makes them highly prone to
                                                                         PDA. Remember that if you have regularly syn-
                loss or theft. If you or members of your firm use
                                                                         chronized your device, the destroyed data can be
                a PDA, smartphone, or similar device, take ap-
                                                                         easily restored to a replacement device.
                propriate steps to protect client confidentiality:
                                                                             7.	 Starve	 the	 Virus. Virus attacks on
                    1.	 Limit	Use. Restrict the type of informa-
                                                                         handheld devices are rare but potentially dev-
                tion stored on a handheld device to reduce your
                                                                         astating if a compromised mobile device is
                exposure.
                                                                         synched to a desktop or network. All the major
                    2.	 Standardize. If more than one handheld
                                                                         antivirus vendors, including Symantec (Norton
                device is used, everyone in the firm should use
                                                                         Smartphone Security) and McAfee (McAfee
                the same type of device. Do not allow outside de-
                                                                         Mobile Security), offer security products de-
                vices. In the event of a problem, it will be easier
                                                                         signed for mobile platforms. Visit www.	 sy-
                to implement a firm-wide solution if everyone is
                                                                         mantec.com and www.mcafee.com for more
                using the same product.
                                                                         information.
tHis issue          3.	 Password	 Protect. Use “power-on”
                                                                            8.	 Learn	More. To learn more about mobile
                passwords. If the device is lost or stolen, data on
  august 2008                                                            devices, visit resources like the PDA Learning
                the device cannot be accessed without the pass-
                                                                         Center at http://palmtops.about.com/od/pda-
    issue 105
                word.
                                                                         learningcenter/PDA_Learning_Center.htm or
                    4.	 Use	the	Lock-out	Feature. Set devices            www.pdatoday.com.
                to lock out users after a specified number of in-
                correct log-in attempts. Use “sleep” settings to                                      Beverly A. MichAelis
                lock devices after 10 or 15 minutes of inactivity.                       PlF PrActice MAnAgeMent Advisor
                    5.	 Consider	 Encryption	 or	 Biometrics.
                Products like SafeGuard PDA from Utimaco
                go beyond password protection and lockouts to
                protect data by using encryption and biomet-
                rics. Biometrics protect data by requiring sig-
                nature, voice, or fingerprint authentication. If
                the device doesn’t recognize the user, it can’t
                be accessed. Visit http://americas.utimaco.
                com/safeguard_pda for more information.
                                                                   DISCLAIMER
                    IN BRIEF includes claim prevention information that helps you to minimize the likelihood of being sued
                    for legal malpractice. the material presented does not establish, report, or create the standard of care
                    for attorneys. the articles do not represent a complete analysis of the topics presented, and readers
                    should conduct their own appropriate research.

Contenu connexe

Plus de Oregon Law Practice Management

Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Oregon Law Practice Management
 
Retrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineRetrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineOregon Law Practice Management
 
Oregon eCourt news: live training, new website, and quick links
Oregon eCourt news: live training, new website, and quick linksOregon eCourt news: live training, new website, and quick links
Oregon eCourt news: live training, new website, and quick linksOregon Law Practice Management
 
Oregon civil procedure – amendments coming to utcr 5100
Oregon civil procedure – amendments coming to utcr 5100Oregon civil procedure – amendments coming to utcr 5100
Oregon civil procedure – amendments coming to utcr 5100Oregon Law Practice Management
 

Plus de Oregon Law Practice Management (20)

Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?
 
Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016
 
UTCR amendments 2016
UTCR amendments 2016UTCR amendments 2016
UTCR amendments 2016
 
eCourt malpractice traps and relation back
eCourt malpractice traps and relation backeCourt malpractice traps and relation back
eCourt malpractice traps and relation back
 
Marketing and client development in three easy steps
Marketing and client development in three easy stepsMarketing and client development in three easy steps
Marketing and client development in three easy steps
 
The 7 golden rules of collections
The 7 golden rules of collectionsThe 7 golden rules of collections
The 7 golden rules of collections
 
Bankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyerBankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyer
 
Oregon ecourt and arbitration
Oregon ecourt and arbitrationOregon ecourt and arbitration
Oregon ecourt and arbitration
 
The year in review - top posts of 2015
The year in review - top posts of 2015The year in review - top posts of 2015
The year in review - top posts of 2015
 
Glitches in oregon e service
Glitches in oregon e serviceGlitches in oregon e service
Glitches in oregon e service
 
Editing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dcEditing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dc
 
How to name client folders
How to name client foldersHow to name client folders
How to name client folders
 
Redaction tool in Acrobat XI
Redaction tool in Acrobat XIRedaction tool in Acrobat XI
Redaction tool in Acrobat XI
 
60 apps in 60 minutes
60 apps in 60 minutes60 apps in 60 minutes
60 apps in 60 minutes
 
Why hiring staff pays YOU
Why hiring staff pays YOUWhy hiring staff pays YOU
Why hiring staff pays YOU
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
The ethics of crowdfunding
The ethics of crowdfundingThe ethics of crowdfunding
The ethics of crowdfunding
 
Retrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineRetrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information online
 
Oregon eCourt news: live training, new website, and quick links
Oregon eCourt news: live training, new website, and quick linksOregon eCourt news: live training, new website, and quick links
Oregon eCourt news: live training, new website, and quick links
 
Oregon civil procedure – amendments coming to utcr 5100
Oregon civil procedure – amendments coming to utcr 5100Oregon civil procedure – amendments coming to utcr 5100
Oregon civil procedure – amendments coming to utcr 5100
 

Easy To Use Or Easy To Lose How To Protect Mobile Devices

  • 1. Professional liability fund www.osbplf.org Malprac t i ce Pre ve n t i o n Ed u ca t i o n f o r O re g o n La w ye r s Easy to Use or Easy to Lose? How to Protect Mobile Devices 6. Explore Data Wiping. Research in Mobile devices like the BlackBerry and Palm Motion’s BlackBerry Enterprise Server, as an Treo have become indispensable tools for many example, comes with a feature that wipes all data lawyers. Compact and easy to use, these devices from the device’s memory once a certain num- offer quick access to calendars, contacts, e-mail, ber of failed log-in attempts are exceeded. The documents, and other sensitive personal and cli- current version of Microsoft Exchange provides ent information. Unfortunately, the portability for a remote wipe of a lost or stolen Windows of such devices also makes them highly prone to PDA. Remember that if you have regularly syn- loss or theft. If you or members of your firm use chronized your device, the destroyed data can be a PDA, smartphone, or similar device, take ap- easily restored to a replacement device. propriate steps to protect client confidentiality: 7. Starve the Virus. Virus attacks on 1. Limit Use. Restrict the type of informa- handheld devices are rare but potentially dev- tion stored on a handheld device to reduce your astating if a compromised mobile device is exposure. synched to a desktop or network. All the major 2. Standardize. If more than one handheld antivirus vendors, including Symantec (Norton device is used, everyone in the firm should use Smartphone Security) and McAfee (McAfee the same type of device. Do not allow outside de- Mobile Security), offer security products de- vices. In the event of a problem, it will be easier signed for mobile platforms. Visit www. sy- to implement a firm-wide solution if everyone is mantec.com and www.mcafee.com for more using the same product. information. tHis issue 3. Password Protect. Use “power-on” 8. Learn More. To learn more about mobile passwords. If the device is lost or stolen, data on august 2008 devices, visit resources like the PDA Learning the device cannot be accessed without the pass- Center at http://palmtops.about.com/od/pda- issue 105 word. learningcenter/PDA_Learning_Center.htm or 4. Use the Lock-out Feature. Set devices www.pdatoday.com. to lock out users after a specified number of in- correct log-in attempts. Use “sleep” settings to Beverly A. MichAelis lock devices after 10 or 15 minutes of inactivity. PlF PrActice MAnAgeMent Advisor 5. Consider Encryption or Biometrics. Products like SafeGuard PDA from Utimaco go beyond password protection and lockouts to protect data by using encryption and biomet- rics. Biometrics protect data by requiring sig- nature, voice, or fingerprint authentication. If the device doesn’t recognize the user, it can’t be accessed. Visit http://americas.utimaco. com/safeguard_pda for more information. DISCLAIMER IN BRIEF includes claim prevention information that helps you to minimize the likelihood of being sued for legal malpractice. the material presented does not establish, report, or create the standard of care for attorneys. the articles do not represent a complete analysis of the topics presented, and readers should conduct their own appropriate research.