publication of the International Legal Technology Association
Issue link: https://epubs.iltanet.org/i/126361
10 PRACTICAL SECURITY TIPS the content therein, including any attachments that live in your email. Most firms require complex passwords or two-factor authentication to connect to sensitive client information. Protecting mobile device access to this information is equally important. track of where the data are located and who has access — including the cloud vendor staff — and it can be difficult to identify whether an exposure has occurred. Forwarding an email message or document to your Web mail provider in order to work on something at home may be easy, but it may also expose your client to unnecessary risk. could result in the loss of a client's key intellectual property, jeopardizing that company's position in the market. It is critical to ensure the appropriate protective order is in place before allowing access to your client's source code. Keep source code in secure locations, encrypted and with restricted access. Keeping track of where source code is With myriad devices out there, understanding which device has what security controls can be extremely confusing. For example, it's important to know if your Android device will encrypt the removable media card, and if so, whether it does so automatically. Most Android devices require encryption be activated manually. Why is this important? If you store information on your removable media card unencrypted and you lose your phone, that card is read easily on any computer. 2. CLOUD SERVICES The cloud offers convenient services that are moving from the consumer to the business realm. When cloud services are referenced, most people think of Google Docs, Dropbox or DocuSign, among others. Most don't think of Gmail or Hotmail, but Web-based mail services are some of the earliest versions of cloud services. Posting client information to cloud services can raise the risk of exposure significantly. Data leakage or loss is the chief concern. Once in the cloud, it is easy to lose 3. SOURCE CODE MANAGEMENT Handling source code, the human readable computer instructions a technology company uses to build their products, requires aggressive security measures. Source code is often considered the crown jewels of technology companies, as they rely on proprietary code for the success of their product(s) and their competitive advantage. Security breaches or mishandling of source code located, including printed versions, is also critical to maintaining the confidentiality of this highly sensitive information. 4. PUBLIC SPACE AWARENESS Conversations in public places can be overheard by anyone, and most people are conscientious when a conversation heads in a sensitive direction — but not always. Care should be taken, too, when working on a client matter on your computer.