Encryption Made Simple for Lawyers

Ries, David G.; Simek, John W.
May 2013
Nebraska Lawyer Magazine;May/Jun2013, Vol. 16 Issue 3, p25
Trade Publication
The article discusses encryption as a necessary security tool for attorneys to use in providing protection to information regarding their clients. It offers information on the use of encryption on devices such as full disk or limited encryption for laptops and portable media, and iOS 4 and Android OS (operating system) for smartphones and tablets as well as Wired Equivalent Privacy and Wi-Fi Protected Access on wireless networks and transport layer security encryption on electronic mails.


Related Articles

  • Could your mobile device land your CEO in court? Glynn, Sean // IM@T.Online;Sep2009, p1 

    The article presents information on data security in portable devices like smartphones. It is stated that on a laptop, smartphone, PDA or any other endpoint, data encryption is the best technical method to secure personal data. It is also stated that if one uses a portable device to store...

  • Indiana Closes Loophole. Fisher, Dennis // Information Security;May2008, Vol. 11 Issue 4, p16 

    The article reports on a legislation in Indiana that closed the loophole in data breach notification law that allowed some companies to avoid having to disclose breaches involving sensitive data on a stolen laptop as long as it is password protected. The new version requires organization to...

  • protect laptop data. Radding, Alan // Storage Magazine;Feb2007, Vol. 5 Issue 13, p28 

    The article offers suggestions on protecting data stored in laptop computers in the U.S. Companies have enough reason to encrypt data on laptop computers. For one, the government is doing it. Through a memorandum, the U.S. Office of Management and Budget ordered government agencies to secure...

  • Protecting Campus Data. Angelo, Jean Marie // University Business;Sep2006, Vol. 9 Issue 9, p75 

    The article focuses on how universities in the U.S. protect data in laptops. William Penn University in Iowa uses LoJack for Laptops, an IT security product from Absolute Software designed to secure data and track lost or stolen portable machines. The University of Toledo in Ohio and Brown...

  • Get Your Data Safely Across the Border. Bradley, Tony // PCWorld;Nov2010, Vol. 28 Issue 11, p34 

    The article offers tips on how to keep data safe from government inspections and searches. When traveling by air, laptops could be checked along with the luggage to avoid having them inspected by the U.S. Transportation Security Administration (TSA). Since baggage handlers do not always treat...

  • 5 THINGS… THAT CAN KEEP YOUR LAPTOP'S DATA SAFE FROM PRYING EYES. Jardin, Xeni // Popular Science;Nov2005, Vol. 267 Issue 5, p81 

    This section offers tips on how to keep data private in laptop computers. Encrypt sensitive files, or even the entire hard drive, with an application such as SafeHouse or PGPdisk, which can also encrypt e-mail. Thieves can bypass user-account passwords by simply reinstalling the operating system...

  • 8 ways to keep your laptop safe.  // Administrative Professional Today;Apr2014, Vol. 40 Issue 4, p3 

    The article recommends several ways on how to keep one's laptop and all the data stored in it safe, adapted from "How Can I Make Sure My Laptop is Secure While I Travel With It?" by Alan Henry. Among the tips are purchasing comfortable and travel-friendly bag for the device, taking the laptop...

  • On the Horizon. Phifer, Lisa // Information Security;Jul/Aug2007, Vol. 10 Issue 7, p42 

    This article focuses on laptop data encryption. Most companies fail to encrypt laptop data because they have not determined what they must do to comply with regulations and make their organization secure. Products commonly deployed to encrypt laptop data are cited, including the GuardianEdge...

  • How To Avoid Becoming The Next Data Loss Headline. Midgley, Stephen // Database & Network Journal;Feb2009, Vol. 39 Issue 1, p20 

    The article advises companies on preventing data loss. Data loss has been experienced by companies whose employees lost company laptops that contain business information. Among the recommended strategies are asset management, adequate protection for data using encryption software and other...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics