By John Simek bio Ars technica recently posted a very scary bit of information. In early 2013, security researchers discovered that some password managers used on Android devices can actually be accessed by other installed apps, even those with extremely low-level privileges. Almost two years later, apparently there is still a problem. The issue seems to revolve around the … [Read more...] about Leaky password managers on Android
Information security
The opportunities, concerns, and challenges related to adopting cloud services
According to the New Jersey Institute of Technology, by 2017 two-thirds of all workload will be processed in cloud data centers. Will your firm’s workload be there? Or are you hesitating due to concerns about security, compliance, or management of the services? This infographic created by NJIT’s Online Masters in Computer Science outlines the scale of cloud services and the … [Read more...] about The opportunities, concerns, and challenges related to adopting cloud services
Two quick tips from a cybersecurity expert
By John W. Simek bio 1. You are the product: default settings to “steal” your privacy data It amazes me that nobody seems to read the terms of service or the permission settings when installing software or configuring devices. In this day of instant gratification it seems as though the normal actions are click, click, click on the “I accept” button. That seems to be what … [Read more...] about Two quick tips from a cybersecurity expert
Model Tool: Client privacy policy
Why you need this policy: As with any other corporate website, law office websites collect and use personal information of site visitors, including "personally identifiable" information, i.e., names and other information that can be traced back to a specific individual. Such use and collection of personal information is subject to requirements under privacy laws. How this … [Read more...] about Model Tool: Client privacy policy
How secure is your content in cyber space?
www.Hackmageddon.com has released its timeline of the most notable cyber security breaches that occurred in the first half of October 2014. According to the timeline, in just 15 days, there were 46 attacks, with a wide range of targets and objectives. If you're concerned about how to protect your law practice against costly and destructive cyber attacks, register now for our … [Read more...] about How secure is your content in cyber space?
Model Policy: Employee computer use and social networking
Why you need this policy: The law governing your right to discipline employees for the things they say on blogs and social networks is still in its infancy stages. But even from the early cases, it has become clear that online conversations are not simply private matters. There's a big difference between bad mouthing a company, supervisor or colleague to a friend in a bar over … [Read more...] about Model Policy: Employee computer use and social networking
Model Tool: Privacy Risk Assessment
Why you need this assessment: Information collected about individual job applicants is considered personal information subject to privacy laws, regardless of whether the information is publicly available. You need to consider these privacy risks you face before using social media sites like Facebook to gather personal information about job applicants. How this assessment helps … [Read more...] about Model Tool: Privacy Risk Assessment
Model Tool: Pre-Employment Screening Notification
Why you need this notification: Collecting information about job applicants from social media websites like Facebook can get you into legal hot water. That's because the information you collect may be considered protected, personal information to the extent applicants can show they had a reasonable expectation of privacy in the material. How this notification helps you: It's … [Read more...] about Model Tool: Pre-Employment Screening Notification
Model Policy: Telecommuting
Why you need this policy: Telecommuting offers significant business advantages to a law firm. But it also comes with some liability challenges for employers who choose to offer telecommuting. How this policy helps you: The best way to avoid the 8 pitfalls of telecommuting is to establish a policy that sets out clearly the arrangement, the expectations and the criteria for … [Read more...] about Model Policy: Telecommuting
HR law and employee social networking
Can you discipline employees for social networking offenses? Answer: It depends. Explanation: Frittering away time, disclosing patient records, bad mouthing the practice and other offenses are grounds for discipline when they occur "off line." So why should it make a difference if employees do these things online while social networking? In theory, it shouldn't. The … [Read more...] about HR law and employee social networking