Protect your data

June 10, 2010
Back to TopCommentsE-mailPrintBookmark and Share

IL staff writer Rebecca Berfanger wrote this post.

The June edition of the Evansville Bar Association newsletter, the E-Summation, had a brief article explaining how even copiers might have data chips that store information, including images of anything that is scanned on them, and that attorneys should be aware of this. Bottom line: Just because you take your copies and originals with you, it doesn’t mean no one else can access those images later.

This makes sense, as I’ve used the copier at our office to make PDFs, and many copiers have this capability as a way to save time and paper when trying to e-mail a document or when posting something online as a PDF.

While Susan Vollmer, the executive director of the EBA, said she wasn’t aware of a specific case of this occurring to any lawyers in southwest Indiana, she included it in the newsletter because an attorney member of the organization sent her a message about the concern, including a link to this YouTube video

There was also an attorney who mentioned this at the Indiana State Bar Association’s Solo and Small Firm Conference on June 4 at a CLE session about security for law firms. That session was led by Lincoln Mead, IT director of the Utah State Bar Association, who was also one of the speakers at the Tech Camp June 3.

While most of what Mead said at the June 4 session was about how to protect information coming in and out of a law firm – including various types of server hardware, how to detect viruses and spyware, and security concerns that larger firms would generally hire an IT department to keep an eye on – he mentioned that printers might store information without a user’s knowledge.

After he mentioned this, an observer in the room also brought up the issue of copiers holding information. Unfortunately, I didn’t get a chance to flag him down afterward, so it’s possible it was the same attorney who sent this information to Vollmer or someone who may have read or heard about this from the E-Summation. Or it’s possible someone may have accessed information he had scanned at what he assumed was a secure copier.

Another security tip anyone can benefit from: Anything that stores information shouldn’t leave the building, except in teeny tiny pieces, Mead said. He suggested that if firms want to donate old computers to schools, non-profits, or anyone else who could benefit from them, they should. But first, they should have a day where the kids come in and, with hammers, destroy any chips that might have information on them, even if the data was erased already.

He also suggested that when firms shred old documents, they not only shred, but that they burn or pulp the bits of paper, whichever their state allows, as a way to ensure no one else will ever access confidential information.

Have you used any of these methods to protect information? Will you consider it from now on?
 

ADVERTISEMENT

Post a comment to this story

COMMENTS POLICY
We reserve the right to remove any post that we feel is obscene, profane, vulgar, racist, sexually explicit, abusive, or hateful.
 
You are legally responsible for what you post and your anonymity is not guaranteed.
 
Posts that insult, defame, threaten, harass or abuse other readers or people mentioned in Indiana Lawyer editorial content are also subject to removal. Please respect the privacy of individuals and refrain from posting personal information.
 
No solicitations, spamming or advertisements are allowed. Readers may post links to other informational websites that are relevant to the topic at hand, but please do not link to objectionable material.
 
We may remove messages that are unrelated to the topic, encourage illegal activity, use all capital letters or are unreadable.
 

Messages that are flagged by readers as objectionable will be reviewed and may or may not be removed. Please do not flag a post simply because you disagree with it.

Sponsored by
ADVERTISEMENT
  1. I was wondering about the 6 million put aside for common attorney fees?does that mean that if you are a plaintiff your attorney fees will be partially covered?

  2. My situation was hopeless me and my husband was on the verge of divorce. I was in a awful state and felt that I was not able to cope with life any longer. I found out about this great spell caster drlawrencespelltemple@hotmail.com and tried him. Well, he did return and now we are doing well again, more than ever before. Thank you so much Drlawrencespelltemple@hotmail.comi will forever be grateful to you Drlawrencespelltemple@hotmail.com

  3. I expressed my thought in the title, long as it was. I am shocked that there is ever immunity from accountability for ANY Government agency. That appears to violate every principle in the US Constitution, which exists to limit Government power and to ensure Government accountability. I don't know how many cases of legitimate child abuse exist, but in the few cases in which I knew the people involved, in every example an anonymous caller used DCS as their personal weapon to strike at innocent people over trivial disagreements that had no connection with any facts. Given that the system is vulnerable to abuse, and given the extreme harm any action by DCS causes to families, I would assume any degree of failure to comply with the smallest infraction of personal rights would result in mandatory review. Even one day of parent-child separation in the absence of reasonable cause for a felony arrest should result in severe penalties to those involved in the action. It appears to me, that like all bureaucracies, DCS is prone to interpret every case as legitimate. This is not an accusation against DCS. It is a statement about the nature of bureaucracies, and the need for ADDED scrutiny of all bureaucratic actions. Frankly, I question the constitutionality of bureaucracies in general, because their power is delegated, and therefore unaccountable. No Government action can be unaccountable if we want to avoid its eventual degeneration into irrelevance and lawlessness, and the law of the jungle. Our Constitution is the source of all Government power, and it is the contract that legitimizes all Government power. To the extent that its various protections against intrusion are set aside, so is the power afforded by that contract. Eventually overstepping the limits of power eliminates that power, as a law of nature. Even total tyranny eventually crumbles to nothing.

  4. Being dedicated to a genre keeps it alive until the masses catch up to the "trend." Kent and Bill are keepin' it LIVE!! Thank you gentlemen..you know your JAZZ.

  5. Hemp has very little THC which is needed to kill cancer cells! Growing cannabis plants for THC inside a hemp field will not work...where is the fear? From not really knowing about Cannabis and Hemp or just not listening to the people teaching you through testimonies and packets of info over the last few years! Wake up Hoosier law makers!

ADVERTISEMENT