confidentiality in the information age

18
Confidentiality in the Information Confidentiality in the Information Age: Age: How to Protect Yourself and Your Data How to Protect Yourself and Your Data Beverly A. Michaelis, J.D. Oregon State Bar Professional Liability Fund

Upload: oregon-law-practice-management

Post on 30-Jun-2015

361 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Confidentiality In The Information Age

Confidentiality in the Information Age:Confidentiality in the Information Age:How to Protect Yourself and Your DataHow to Protect Yourself and Your Data

Beverly A. Michaelis, J.D.Oregon State Bar Professional Liability Fund

Page 2: Confidentiality In The Information Age

Why is Confidentiality Why is Confidentiality Important?Important?

Page 3: Confidentiality In The Information Age

• Embarrassment

• Damage to your client

• Damage to your reputation

• Loss of trust

• Loss of future business

Consider the Consider the Consequences…Consequences…

Page 4: Confidentiality In The Information Age

1. Communication Technologies

2. Metadata

3. Redaction

4. Destruction

5. Confidentiality Agreements

TopicsTopics

Page 5: Confidentiality In The Information Age

Communication Communication TechnologiesTechnologies

• E-mail• Fax• Remote Access

Page 6: Confidentiality In The Information Age

E-Mail & FaxE-Mail & Fax

1. Verify

2. Send a greeting

3. Understand auto-complete

4. Resist “Reply to All”

5. Use disclaimers

Page 7: Confidentiality In The Information Age

Remote Remote AccessAccess

+ Unencrypted+ No firewalls + Unsecured Wi-Fi = Breach of Confidentiality

Consider Air Cards

Page 8: Confidentiality In The Information Age

MetadatMetadataa

Page 9: Confidentiality In The Information Age

Always InspectAlways Inspect

Copy Document First Office Button Prepare Inspect Document

Page 10: Confidentiality In The Information Age

Invoke Invoke WarningsWarnings

Page 11: Confidentiality In The Information Age

Best PracticesBest PracticesIndividual Documents in AcrobatDocument > Examine Document…

All Documents In AcrobatEdit > Preferences > Document > Examine Document

When closing document When sending document by e-mail

Page 12: Confidentiality In The Information Age

RedactionRedaction

What?The permanent removal of text or images

Why?Protect confidential content during peer

review

How?Through proper use of software

Page 13: Confidentiality In The Information Age

Changing the background color

Covering sensitive text with fill

What Redaction is NOTWhat Redaction is NOT

Page 14: Confidentiality In The Information Age

Use Acrobat to RedactUse Acrobat to Redact

Page 15: Confidentiality In The Information Age

1. Shred paper

2. Wipe hard drives www.dban.com

3. Properly dispose of electronics http://www.abanet.org/tech/ltrc/fyidocs/

http://www.deq.state.or.us/lq/ecycle/index.htm

DestructionDestruction

Page 16: Confidentiality In The Information Age

Confidentiality Confidentiality AgreementsAgreements

Employees Temps Outsourcing

Page 17: Confidentiality In The Information Age

• Embarrassment

• Damage to your client

• Damage to your reputation

• Loss of trust

• Loss of future business

Consider the Consider the Consequences…Consequences…

Page 18: Confidentiality In The Information Age

Thank You!Beverly Michaelis

Practice Management [email protected]

503-639-6911 or 800-452-1639

Twitter: http://twitter.com/OreLawPracMgmt

Blog: http://oregonlawpracticemanagement.wordpress.com/

LinkedIn: http://www.linkedin.com/in/beverlymichaelis