Linked: Congress Tells Tech Companies: Take Action on Encryption or We Will
|

Linked: Congress Tells Tech Companies: Take Action on Encryption or We Will

I agree with Sharon on this: “Backdoors don’t work. Government raises sensitive issues around human trafficking and child pornography to inflame the public. What it really wants is to snoop at will on everyone and to deprive Americans of our right to privacy. My opinion, but there it is.” The thing is, while the media…

What I’m Sharing (weekly)

What I’m Sharing (weekly)

Tying Deduplication to your eDiscovery Bottom Line Relativity Fest 2019: Top Buzzed-About eDiscovery and Legal Trends Dark Web Site Taken Down without Breaking Encryption 11 Short and Scary Tales from the Ediscovery Crypt 3 Ways the Workplace Is Changing as Millennials Prioritize Mental Health Is your law firm ready for a data breach? 76 Percent…

Why technologists need to get involved in public policy? – Bruce Schneier

Why technologists need to get involved in public policy? – Bruce Schneier

Bruce makes some interesting points in this presentation, it’s certainly something to think about. First, watch: I’ll be honest, I’ve been on the side of leaving technology alone for the most part, but his point about the legal industry, and how public policy law is a huge area of focus, and how even law schools…

Linked: The Myth of Consumer-Grade Security
|

Linked: The Myth of Consumer-Grade Security

Bruce is right on here: “In his keynote address at the International Conference on Cybersecurity, Attorney General William Barr argued that companies should weaken encryption systems to gain access to consumer devices for criminal investigations. Barr repeated a common fallacy about a difference between military-grade encryption and consumer encryption: “After all, we are not talking…

Linked: Facebook Denies That it Plans to Backdoor WhatsApp
|

Linked: Facebook Denies That it Plans to Backdoor WhatsApp

If Sharon, and others, are right about this, on the other hand, they won’t have to:   “There are many cybersecurity experts who believe it is only be a matter of time before device manufacturers and mobile operating system developers embed similar tools directly into devices themselves, making them impossible to escape. Embedding content scanning…

Linked: Law Firm Data Security Vulnerabilities
|

Linked: Law Firm Data Security Vulnerabilities

These results from the 2018 ABA Legal Technology Survey are not at all good, given how much information is laying around law firms these days. “Less than half of the responding firms have the following policies or plans that are important facets of a law firm’s security posture:  computer acceptable use policy (41%); remote access…