SlideShare une entreprise Scribd logo
1  sur  48
Télécharger pour lire hors ligne
PRACTICAL ENCRYPTION TIPS
AND TOOLS
CBA LEGALTECH CONFERENCE
HeidiAlexander
CTBar
YOUR OBLIGATIONS:
AN OVERVIEW
RULE 1.6 CONFIDENTIALITY OF INFORMATION
▸ “(a) A lawyer shall not reveal information relating to
representation of a client unless the client gives informed
consent . . . .”
▸ “(e) A lawyer shall make reasonable efforts to prevent the
inadvertent or unauthorized disclosure of, or unauthorized
access to, information relating to the representation of a
client.”
INADVERTENT DISCLOSURE DEFINED
“Inadvertent disclosure includes threats like leaving a
briefcase, laptop, or smartphone in a taxi or restaurant,
sending a confidential e-mail to the wrong recipient,
producing privileged documents or data, or exposing
confidential metadata. Unauthorized access includes threats
like hackers, criminals, malware, and insider threats.”
- Encryption Made Simple for Lawyers
ENCRYPTION IS A SOLUTION.
Ima Torney
REQUIRED?
▸ Under ordinary circumstances, NO
▸ But, YES for:
▸ Personal
▸ Sensitive
▸ Highly confidential information
HOW TO ENCRYPT
HARDDRIVES
HARDDRIVE (MAC)
HARD DRIVE (WINDOWS)
HARD DRIVES
▸ Mac
▸ http://www.lawtechnologytoday.org/2015/01/how-to-
encrypt-data-on-your-mac-in-a-few-simple-steps
▸ PC
▸ https://support.microsoft.com/
EXTERNAL DRIVE (MAC)
EXTERNAL DRIVE (WINDOWS)
EXTERNAL DRIVES
▸ Mac
▸ Right-click on drive > Encrypt
▸ http://www.lawtechnologytoday.org/2015/01/how-to-
encrypt-data-on-your-mac-in-a-few-simple-steps/
▸ Windows
▸ Right-click on drive > Turn on BitLocker
▸ http://www.techrepublic.com/blog/windows-and-office/
secure-your-usb-drives-with-bitlocker-to-go-for-windows-7/
FILES + FOLDERS
WORD PROCESSING (MAC)
WORD PROCESSING (WINDOWS)
WORD, EXCEL, POWER POINT
▸ Microsoft Office password protection feature
▸ Mac - https://support.office.com/en-us/article/Password-
protect-a-document-3e2d1a5e-2452-4546-
b28e-06974fa21bec
▸ Windows - https://support.office.com/en-us/article/
Password-protect-a-document-8f4afc43-62f9-4a3a-
bbe1-45477d99fa68
PDF (MAC)
PDF (WINDOWS)
PDFS
▸ Mac
▸ Print to PDF
▸ http://www.lawtechnologytoday.org/2015/01/how-to-encrypt-
data-on-your-mac-in-a-few-simple-steps/
▸ Windows
▸ Right-click on PDF > Properties > Advanced
▸ https://support.microsoft.com/en-us/instantanswers/
c5e573c5-78f0-48dd-a998-181580274cdf/how-to-encrypt-a-file
ENTIRE FOLDERS
▸ Mac
▸ Secure Disk Image
▸ https://support.apple.com/kb/ph5841?locale=en_US
▸ http://www.lawtechnologytoday.org/2015/01/how-to-encrypt-data-on-
your-mac-in-a-few-simple-steps/
▸ Windows
▸ Right-click on folder > Properties > Advanced
▸ https://support.microsoft.com/en-us/instantanswers/
c5e573c5-78f0-48dd-a998-181580274cdf/how-to-encrypt-a-file
COMMUNICATIONS
PHONE CALLS & TEXTS
Signal by Open Whisper Systems
https://whispersystems.org
Snowden approved!
https://www.eff.org/secure-messaging-scorecard
SHARING DOCUMENTS
▸ Encrypt file and attach to email
▸ Call or text with encryption key
▸ Only with info the recipient would know
▸ Pre-agreed password
▸ Secure cloud storage
▸ Client portal
▸ Encrypted email
CLOUD STORAGE
CLIENT PORTAL
TRUSTIFI EMAIL ENCRYPTION
STREAK SECURE GMAIL
ENLOCKED ENCRYPTED EMAIL
OFFICE 365 MESSAGE ENCRYPTION
MOBILE DEVICES
IPHONE
ANDROID
▸ Settings > More >Security
GOING BEYOND
CLIENT-SIDE ENCRYPTION
▸ Protect your data before it leaves your computer and is
uploaded to the cloud.
▸ Only you hold the encryption key.
▸ Use with cloud-based services such as Google Drive,
Dropbox, Box, and OneDrive.
ZERO KNOWLEDGE
QUESTIONS?
AND, THANK YOU!
Heidi Alexander
heidi@masslomap.org
www.masslomap.org

Contenu connexe

En vedette

infosec_for_journalists_2016
infosec_for_journalists_2016infosec_for_journalists_2016
infosec_for_journalists_2016
Justin Giles
 
Self Service Customer Care For Next Generation Networks
Self Service Customer Care For Next Generation NetworksSelf Service Customer Care For Next Generation Networks
Self Service Customer Care For Next Generation Networks
Green Packet
 
Lugares históricos de mendoza
Lugares históricos de mendozaLugares históricos de mendoza
Lugares históricos de mendoza
Sophia la Morocha
 
Proyecto girasol Bogota ingeniaaa
Proyecto girasol Bogota ingeniaaaProyecto girasol Bogota ingeniaaa
Proyecto girasol Bogota ingeniaaa
proyectogirasol
 
Angela vargas
Angela vargasAngela vargas
Angela vargas
94284682
 
Hl7 rep estandares
Hl7 rep estandaresHl7 rep estandares
Hl7 rep estandares
Daniel Lopez
 

En vedette (20)

infosec_for_journalists_2016
infosec_for_journalists_2016infosec_for_journalists_2016
infosec_for_journalists_2016
 
Internet and Personal Privacy
Internet and Personal PrivacyInternet and Personal Privacy
Internet and Personal Privacy
 
Safe Browsing in 2016
Safe Browsing in 2016Safe Browsing in 2016
Safe Browsing in 2016
 
End-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsEnd-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed Applications
 
Self Service Customer Care For Next Generation Networks
Self Service Customer Care For Next Generation NetworksSelf Service Customer Care For Next Generation Networks
Self Service Customer Care For Next Generation Networks
 
Pedagogia cpm
Pedagogia cpmPedagogia cpm
Pedagogia cpm
 
Significado de-los-nombres-de-los-katas
Significado de-los-nombres-de-los-katasSignificado de-los-nombres-de-los-katas
Significado de-los-nombres-de-los-katas
 
Lugares históricos de mendoza
Lugares históricos de mendozaLugares históricos de mendoza
Lugares históricos de mendoza
 
Vít Listík - Email.cz workshop
Vít Listík - Email.cz workshopVít Listík - Email.cz workshop
Vít Listík - Email.cz workshop
 
MiB jäsenkyselyn tulokset tiivistettynä 2015
MiB jäsenkyselyn tulokset tiivistettynä 2015MiB jäsenkyselyn tulokset tiivistettynä 2015
MiB jäsenkyselyn tulokset tiivistettynä 2015
 
GrabCAD CrowdSourcing in Design and Engineering
GrabCAD CrowdSourcing in Design and EngineeringGrabCAD CrowdSourcing in Design and Engineering
GrabCAD CrowdSourcing in Design and Engineering
 
Presentación sin voz
Presentación sin vozPresentación sin voz
Presentación sin voz
 
FP Standard - Spring 2015
FP Standard - Spring 2015FP Standard - Spring 2015
FP Standard - Spring 2015
 
QBE Commercial Property PDS
QBE Commercial Property PDSQBE Commercial Property PDS
QBE Commercial Property PDS
 
Presentación CTIF Madrid Oeste English
Presentación CTIF Madrid Oeste EnglishPresentación CTIF Madrid Oeste English
Presentación CTIF Madrid Oeste English
 
Gone forever1
Gone forever1Gone forever1
Gone forever1
 
Proyecto girasol Bogota ingeniaaa
Proyecto girasol Bogota ingeniaaaProyecto girasol Bogota ingeniaaa
Proyecto girasol Bogota ingeniaaa
 
NASA PDR Technical Report
NASA PDR Technical ReportNASA PDR Technical Report
NASA PDR Technical Report
 
Angela vargas
Angela vargasAngela vargas
Angela vargas
 
Hl7 rep estandares
Hl7 rep estandaresHl7 rep estandares
Hl7 rep estandares
 

Similaire à Practical Encryption Tips and Tools

2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata
Steph Cliche
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Hamisi Kibonde
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
Ashley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
JFashant
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
seadeloitte
 

Similaire à Practical Encryption Tips and Tools (20)

Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber Usalama
 
YBB-NW-distribution
YBB-NW-distributionYBB-NW-distribution
YBB-NW-distribution
 
Avoiding Common Security Breaches & HIPAA Violations
Avoiding Common Security Breaches & HIPAA ViolationsAvoiding Common Security Breaches & HIPAA Violations
Avoiding Common Security Breaches & HIPAA Violations
 
Protecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the BeefeatersProtecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the Beefeaters
 
How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption Strategy
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer security
Computer securityComputer security
Computer security
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdf
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Practical Encryption Tips and Tools