The book provides sound advice and offers valuable guidelines and assistance to bridge the worlds of law and technology on important information security issues that face the legal professional every day. This essential guide discusses the ethical duties of lawyers relating to securing their electronic information. If you are a small firm it will advise you on how you can have reliable security. If you are a large firm it will help you to decide what information security duties can be delegated. Other topics include, worms, Trojans, spyware, malware, spiders, key loggers and their implications, and whether or not it is safe to use wireless technology for the delivery of legal services.Just as you lock your doors to prevent someone from entering your house without permission, you use Acrobata#39;s security features to lock a PDF file. For example, you can use passwords to restrict others from opening, printing, and/or editing PDF files. ... can contain potentially damaging metadata (hidden data), not evident to the average user, which may be leveraged to the advantage of outside parties.
|Title||:||Information Security for Lawyers and Law Firms|
|Author||:||Sharon D. Nelson, David K. Isom, John W. Simek|
|Publisher||:||American Bar Association - 2006|