18
Confidentiality in the Information Confidentiality in the Information Age: Age: How to Protect Yourself and Your Data How to Protect Yourself and Your Data Beverly A. Michaelis, J.D. Oregon State Bar Professional Liability Fund

Confidentiality In The Information Age

Embed Size (px)

Citation preview

Page 1: Confidentiality In The Information Age

Confidentiality in the Information Age:Confidentiality in the Information Age:How to Protect Yourself and Your DataHow to Protect Yourself and Your Data

Beverly A. Michaelis, J.D.Oregon State Bar Professional Liability Fund

Page 2: Confidentiality In The Information Age

Why is Confidentiality Why is Confidentiality Important?Important?

Page 3: Confidentiality In The Information Age

• Embarrassment

• Damage to your client

• Damage to your reputation

• Loss of trust

• Loss of future business

Consider the Consider the Consequences…Consequences…

Page 4: Confidentiality In The Information Age

1. Communication Technologies

2. Metadata

3. Redaction

4. Destruction

5. Confidentiality Agreements

TopicsTopics

Page 5: Confidentiality In The Information Age

Communication Communication TechnologiesTechnologies

• E-mail• Fax• Remote Access

Page 6: Confidentiality In The Information Age

E-Mail & FaxE-Mail & Fax

1. Verify

2. Send a greeting

3. Understand auto-complete

4. Resist “Reply to All”

5. Use disclaimers

Page 7: Confidentiality In The Information Age

Remote Remote AccessAccess

+ Unencrypted+ No firewalls + Unsecured Wi-Fi = Breach of Confidentiality

Consider Air Cards

Page 8: Confidentiality In The Information Age

MetadatMetadataa

Page 9: Confidentiality In The Information Age

Always InspectAlways Inspect

Copy Document First Office Button Prepare Inspect Document

Page 10: Confidentiality In The Information Age

Invoke Invoke WarningsWarnings

Page 11: Confidentiality In The Information Age

Best PracticesBest PracticesIndividual Documents in AcrobatDocument > Examine Document…

All Documents In AcrobatEdit > Preferences > Document > Examine Document

When closing document When sending document by e-mail

Page 12: Confidentiality In The Information Age

RedactionRedaction

What?The permanent removal of text or images

Why?Protect confidential content during peer

review

How?Through proper use of software

Page 13: Confidentiality In The Information Age

Changing the background color

Covering sensitive text with fill

What Redaction is NOTWhat Redaction is NOT

Page 14: Confidentiality In The Information Age

Use Acrobat to RedactUse Acrobat to Redact

Page 15: Confidentiality In The Information Age

1. Shred paper

2. Wipe hard drives www.dban.com

3. Properly dispose of electronics http://www.abanet.org/tech/ltrc/fyidocs/

http://www.deq.state.or.us/lq/ecycle/index.htm

DestructionDestruction

Page 16: Confidentiality In The Information Age

Confidentiality Confidentiality AgreementsAgreements

Employees Temps Outsourcing

Page 17: Confidentiality In The Information Age

• Embarrassment

• Damage to your client

• Damage to your reputation

• Loss of trust

• Loss of future business

Consider the Consider the Consequences…Consequences…

Page 18: Confidentiality In The Information Age

Thank You!Beverly Michaelis

Practice Management [email protected]

503-639-6911 or 800-452-1639

Twitter: http://twitter.com/OreLawPracMgmt

Blog: http://oregonlawpracticemanagement.wordpress.com/

LinkedIn: http://www.linkedin.com/in/beverlymichaelis