A Lawyer’s Ethical Duties Regarding Electronically Stored Information

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is identity theft, and how can you protect yourself from it?
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
ESCCO Data Security Training David Dixon September 2014.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Information Security Sharon Welna Information Security Officer.
This is the IT website. Submit a service request, find out hours and locations, reset your password and search for help. IT has service points across campus.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Important Information Provided by Information Technology Center
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Unit 4 IT Security.
Information Security.
Ways to protect yourself against hackers
Lesson 3 Safe Computing.
Overview 1. Phishing Scams
How to build a good reputation online
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Respecting privacy. Safeguarding data. Enabling trust.
Home Computer Security
Information Security 101 Richard Davis, Rob Laltrello.
Unit 4 IT Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Staying Austin College
Lesson 2- Protecting Yourself Online
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Information Security Awareness 101
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Information Technology Services Education and Awareness Team
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
Personal IT Security Cyber Security – Basic Steps
Digital $$ Quiz Test your knowledge.
Staying safe on the internet
Internet Safety Vocabulary
Lesson 2: Epic Security Considerations
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
Bethesda Cybersecurity Club
Internet Safety – Social Media
Information Technology Services Education and Awareness Team
Lesson 2- Protecting Yourself Online
What devices use the internet?
G061 - Network Security.
Presentation transcript:

A Lawyer’s Ethical Duties Regarding Electronically Stored Information The Harry Phillips American Inn of Court November 15, 2016 Presented by: Bill Koch Chris Javillonar Tracy Alcock Nora Machuga Sandy Garrett Laura Baker Jeremy Oliver Brigid Carpenter Eddie Davidson Andrea Sinclair Lyndsay Smith Hyde Tom Haroldson Eric Winters

Top 10 Electronic Usage Tips What You Need to Know Today to be Electronically Savvy and Safe! Presented by Tracy Alcock Top 10 Electronic Usage Tips

Top 10 Electronic Usage Tips Create Unique Passwords

Top 10 Electronic Usage Tips 1. Create Unique Passwords Use passwords that are hard to guess, unique, complicated, and long. Do not use the same password for all accounts, especially for your social media, email, and financial websites. Having separate passwords for every account helps to thwart cybercriminals. A strong password is at least 12 characters long. Focus on sentences or phrases that you like to think about and are easy to remember. Do not select “remember my password.” You can utilize a password-protected password manager – from a known, trustworthy company – to securely track and store your passwords.

Top 10 Electronic Usage Tips 2 Get Two Steps Ahead

Top 10 Electronic Usage Tips 2. Get Two Steps Ahead Turn on two-step authentication – also known as two-step verification or multi-factor authentication – on accounts where available. Two-step authentication can use anything from a text message to your phone to a biometric like your fingerprint to provide enhanced account security.

Top 10 Electronic Usage Tips 3 Password Protect Your Devices and Electronic Data

Top 10 Electronic Usage Tips 3. Password Protect Your Devices and Electronic Data Engage password-protected lock screens that lock access to your devices when you are not using them and that protect your devices if lost or stolen. Do not leave confidential or sensitive documents where they can be viewed by others. Password protect confidential electronic data that you are sending to someone else. Example: If you are sending confidential data via a CD or USB drive to an opposing counsel or to an expert witness, give each individual electronic file a password for the intended person to open and access the file.

Top 10 Electronic Usage Tips 4 Keep All Machines Clean and Up to Date

Top 10 Electronic Usage Tips 4. Keep All Machines Clean and Up to Date Keep the software on all devices up to date. All critical software, including computer and cell phone operating systems, security software and other frequently used programs and apps, should be running the most current versions. Utilize a spam filter in both your work and personal email accounts. Make sure all anti-virus software is up to date to detect and disable malicious programs.

Top 10 Electronic Usage Tips 5 When In Doubt, Throw It Out

Top 10 Electronic Usage Tips 5. When In Doubt, Throw It Out Links in email, social media posts and online advertising are often how cybercriminals try to steal your personal information. Do not open links or attachments in an email if you do not know the source or if it looks suspicious. Even if you know the source, if something looks suspicious, delete it. Telltale signs of a phishing email include messages from companies you don’t have accounts with, spelling mistakes, messages from the wrong email address, generic greetings (i.e. “Dear User,” instead of your name), and unexpected messages with a sense of urgency designed to prompt you into responding quickly. Be wary of communications that implore you to act immediately, offers something that sounds too good to be true, or asks for personal information. Do not follow links embedded in unsolicited emails.

Top 10 Electronic Usage Tips 6 Avoid Public Wi-Fi

Top 10 Electronic Usage Tips 6. Avoid Public Wi-Fi Avoid using public computers and open wireless networks, especially for sensitive online transactions. Wi-Fi spots in airports, hotels, coffee shops, and other public places can be convenient, but they are often not secure and can leave you at risk. Check whether the website you are visiting is secure. If the website you are visiting is on a secure server, it is should start with https:// (“s” for security) rather than the usual http://. If you are accessing the internet through an unsecured network, you should be aware that malicious individuals may be able to eavesdrop on your connection. This could allow them to steal your login credentials, financial information, or other sensitive information. You should consider any public Wi-Fi to be “unsecure.” Do not access sensitive accounts (i.e. banks, credit cards, etc.) over public networks. Don’t walk away from your mobile device in a public space – take the device with you.

Top 10 Electronic Usage Tips 7 Back It Up

Top 10 Electronic Usage Tips 7. Back It Up Protect your valuable work, music, photos and other digital information by regularly making an electronic copy and storing it safely.

Top 10 Electronic Usage Tips 8 Plug and Scan

Top 10 Electronic Usage Tips 8. Plug and Scan USBs and other external devices can be infected by viruses and malware. Use your security software to scan them.

Top 10 Electronic Usage Tips 9 Delete When Done

Top 10 Electronic Usage Tips 9. Delete When Done Many of us download apps for specific purposes or have apps that are no longer useful or interesting to us. It is a good security practice to delete all apps you no longer use.

Top 10 Electronic Usage Tips Think Before You Post

Top 10 Electronic Usage Tips 10. Think Before You Post Use discretion when posting personal information on social media, including you email address, etc. This information is a treasure-trove to scammers. Avoid posting where and when you are traveling on social media. When you reveal these specifics, you are providing information that criminals could use to target your home or your family while you are away.