Best Practices for Ethical Handling of Electronically Stored Information

Slide Note
Embed
Share

Learn about the ethical duties lawyers have regarding electronically stored information, as presented by the Harry Phillips American Inn of Court. Discover the top 10 electronic usage tips, including creating unique passwords, implementing two-step authentication, and password-protecting devices and data. Stay informed and enhance your electronic savvy while prioritizing security in the digital age.


Uploaded on Sep 20, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. A Lawyers Ethical Duties Regarding Electronically Stored Information The Harry Phillips American Inn of Court November 15, 2016 Presented by: Bill Koch Tracy Alcock Laura Baker Eddie Davidson Tom Haroldson Chris Javillonar Nora Machuga Jeremy Oliver Andrea Sinclair Eric Winters Sandy Garrett Brigid Carpenter Lyndsay Smith Hyde

  2. TOP 10 What You Need to Know Today to be Electronically Savvy and Safe! ELECTRONIC USAGE TIPS Presented by Tracy Alcock

  3. TOP 10 ELECTRONIC USAGE TIPS 1 1 Create Unique Passwords

  4. TOP 10 ELECTRONIC USAGE TIPS 1. 1. Create Unique Passwords Use passwords that are hard to guess, unique, complicated, and long. Do not use the same password for all accounts, especially for your social media, email, and financial websites. Having separate passwords for every account helps to thwart cybercriminals. A strong password is at least 12 characters long. Focus on sentences or phrases that you like to think about and are easy to remember. Do not select remember my password. You can utilize a password-protected password manager from a known, trustworthy company to securely track and store your passwords.

  5. TOP 10 ELECTRONIC USAGE TIPS 2 2 Get Two Steps Ahead

  6. TOP 10 ELECTRONIC USAGE TIPS 2. 2. Get Two Steps Ahead Turn on two-step authentication also known as two-step verification or multi-factor authentication on accounts where available. Two-step authentication can use anything from a text message to your phone to a biometric like your fingerprint to provide enhanced account security.

  7. TOP 10 ELECTRONIC USAGE TIPS 3 3 Password Protect Your Devices and Electronic Data

  8. TOP 10 ELECTRONIC USAGE TIPS 3. 3. Password Protect Your Devices and Electronic Data Engage password-protected lock screens that lock access to your devices when you are not using them and that protect your devices if lost or stolen. Do not leave confidential or sensitive documents where they can be viewed by others. Password protect confidential electronic data that you are sending to someone else. Example: If you are sending confidential data via a CD or USB drive to an opposing counsel or to an expert witness, give each individual electronic file a password for the intended person to open and access the file.

  9. TOP 10 ELECTRONIC USAGE TIPS 4 4 Keep All Machines Clean and Up to Date

  10. TOP 10 ELECTRONIC USAGE TIPS 4. 4. Keep All Machines Clean and Up to Date Keep the software on all devices up to date. All critical software, including computer and cell phone operating systems, security software and other frequently used programs and apps, should be running the most current versions. Utilize a spam filter in both your work and personal email accounts. Make sure all anti-virus software is up to date to detect and disable malicious programs.

  11. TOP 10 ELECTRONIC USAGE TIPS 5 5 When In Doubt, Throw It Out

  12. TOP 10 ELECTRONIC USAGE TIPS 5. When In Doubt, Throw It Out Links in email, social media posts and online advertising are often how cybercriminals try to steal your personal information. Do not open links or attachments in an email if you do not know the source or if it looks suspicious. Even if you know the source, if something looks suspicious, delete it. Telltale signs of a phishing email include messages from companies you don t have accounts with, spelling mistakes, messages from the wrong email address, generic greetings (i.e. Dear User, instead of your name), and unexpected messages with a sense of urgency designed to prompt you into responding quickly. Be wary of communications that implore you to act immediately, offers something that sounds too good to be true, or asks for personal information. Do not follow links embedded in unsolicited emails. 5.

  13. TOP 10 ELECTRONIC USAGE TIPS 6 6 Avoid Public Wi-Fi

  14. TOP 10 ELECTRONIC USAGE TIPS 6. Avoid Public Wi-Fi Avoid using public computers and open wireless networks, especially for sensitive online transactions. Wi-Fi spots in airports, hotels, coffee shops, and other public places can be convenient, but they are often not secure and can leave you at risk. Check whether the website you are visiting is secure. If the website you are visiting is on a secure server, it is should start with https:// ( s for security) rather than the usual http://. If you are accessing the internet through an unsecured network, you should be aware that malicious individuals may be able to eavesdrop on your connection. This could allow them to steal your login credentials, financial information, or other sensitive information. You should consider any public Wi-Fi to be unsecure. Do not access sensitive accounts (i.e. banks, credit cards, etc.) over public networks. Don t walk away from your mobile device in a public space take the device with you. 6.

  15. TOP 10 ELECTRONIC USAGE TIPS 7 7 Back It Up

  16. TOP 10 ELECTRONIC USAGE TIPS 7. 7. Back It Up Protect your valuable work, music, photos and other digital information by regularly making an electronic copy and storing it safely.

  17. TOP 10 ELECTRONIC USAGE TIPS 8 8 Plug and Scan

  18. TOP 10 ELECTRONIC USAGE TIPS 8. 8. Plug and Scan USBs and other external devices can be infected by viruses and malware. Use your security software to scan them.

  19. TOP 10 ELECTRONIC USAGE TIPS 9 9 Delete When Done

  20. TOP 10 ELECTRONIC USAGE TIPS 9. 9. Delete When Done Many of us download apps for specific purposes or have apps that are no longer useful or interesting to us. It is a good security practice to delete all apps you no longer use.

  21. TOP 10 ELECTRONIC USAGE TIPS 10 10 Think Before You Post

  22. TOP 10 ELECTRONIC USAGE TIPS 10. 10. Think Before You Post Use discretion when posting personal information on social media, including you email address, etc. This information is a treasure-trove to scammers. Avoid posting where and when you are traveling on social media. When you reveal these specifics, you are providing information that criminals could use to target your home or your family while you are away.

Related


More Related Content