W3vina.COM Free Wordpress Themes Joomla Templates Best Wordpress Themes Premium Wordpress Themes Top Best Wordpress Themes 2012

Categorized | Lawyers

77% of lawyers can’t be trusted … with your confidential data – Network World

lawyer

Only 2 in 10 claim to use encryption

‘);//–>”;
var adDivString = “”;
placementDiff = applyInsert($(this), adDivString);
if (debug) {
console.log(“Just placed an ad and the placementDiff is: ” + placementDiff);
}
placementTarget = cumulativeHeight + placementDiff + interModuleHeight + adHeightBuffer;
}
else {
var moduleDivString = “”;
var elementId = “drr-mod-”+moduleCounter;
moduleDivString = “”;
modules.push(elementId);

placementDiff = applyInsert($(this), moduleDivString);
if (debug) {
console.log(“Just placed a module and the placementDiff is: ” + placementDiff);
}
placementTarget = cumulativeHeight + placementDiff + interModuleHeight + moduleHeightBuffer;
moduleCounter++;
}
loopCounter++;
}
// Avoid placing elements too soon due to non-large figures inflating the cumulative height
if ($(this).is(“figure”) && !$(this).is(“figure.large”)) {
cumulativeHeight += grafHeight;
}
else {
cumulativeHeight += $(this).height() + grafHeight;
}
}
});

// clone Related Stories module m-15 to come in after 2nd para in article body for mobile breakpoint display
var $relatedStories = $(‘.related-promo-wrapper’);
if ($relatedStories.length) {
var $relatedStoriesClone = $relatedStories.clone();
$relatedStoriesClone.insertAfter( “#drr-container > p:eq(1)”);
}

var $insiderPromo = $(‘.insider-promo-wrapper’);
if ($insiderPromo.length) {
var $insiderPromoClone = $insiderPromo.clone();
$insiderPromoClone.insertAfter( “#drr-container > p:eq(1)”);
}

//place left side element
cumulativeHeight = 0;
var leftPlacementTarget = tagHeight = leftPlacementTarget) {
if (debug) {
console.log(“congratulations… we’ve passed the initial start point”);
}
if (leftPlacementIndex == null) {
//it’s not good enough to not be a left avoid – it also shouldn’t be a

with an immediately preceding small or medium image left avoid.
if (!isLeftAvoid($(this)) && noPrevFigures($(this)) ) {
leftPlacementIndex = $(this).index();
$leftPlacementElement = $(this);
leftPlacementLookaheadStart = cumulativeHeight;
if (debug) {
console.log(“is not a left avoid and no prev figures. ########## set placementIndex (“+leftPlacementIndex+”) and lookaheadStart (“+leftPlacementLookaheadStart+”) ##########”);
}
} else {
if (debug) {
console.log(“is a left avoid or has previous figures. continue”);
}
}
} else {
if (debug) {
console.log(“#### leftPlacementIndex already set to “+leftPlacementIndex+”. looking ahead…”);
}
//not null; has been set
if ((cumulativeHeight – leftPlacementLookaheadStart) > leftIntervalHeight) {
if (debug) {
console.log(“###### THRESHOLD REACHED. LOOKAHEAD COMPLETE. END ###### (cumulativeHeight – leftPlacementLookaheadStart) (“+(cumulativeHeight-leftPlacementLookaheadStart)+”) > leftIntervalHeight (“+leftIntervalHeight+”).”);
}
return false;
} else {
if (debug) {
console.log(“threshold not reached: (cumulativeHeight – leftPlacementLookaheadStart) (“+(cumulativeHeight-leftPlacementLookaheadStart)+”) tags
if (!(isLeftAvoid($(this)) && ($(this).hasClass(‘small’) || $(this).hasClass(‘inline-small’) || $(this).hasClass(‘medium’) || $(this).hasClass(‘inline-medium’) || $(this).hasClass(‘apart’) ))) {
cumulativeHeight += $(this).height() + grafHeight;
}
if (debug) {
console.log(“——————– set cumulativeHeight(“+cumulativeHeight+”) —————”);
console.log(“”);
}
}
});
}

if (leftPlacementIndex != null && elementNotNearEnd($leftPlacementElement, leftPixelWindow)) {
if (debug) {
console.log(” insert into index “+leftPlacementIndex);
}
$(“#drr-container”).children().eq(leftPlacementIndex).before(“

“);
}

IDG.GPT.trackOmniture();

// Add Right rail module content
for (var i=0; i= 0) {
referrerValue = getReferrerArticle(“”, previousUrl); // sets _article if ajax returns article
if (_article != null) {
if (_article.categories instanceof Array && _article.categories.length > 0) {
var referrerCatId = _article.categories[0];
epoParams += “&catId=” + referrerCatId + “&referrer=article”;
}
}
else {
epoParams += “&typeId=” + defaultTypeId + “&referrer=home”; // default is ‘home’ behavior
}
}
// From SEARCH: Show article with catId same as current article
else if (previousUrl.indexOf(“google”) >= 0 || previousUrl.indexOf(“yahoo”) >= 0 || previousUrl.indexOf(“bing”) >= 0) {
var categories = [2206, 3329];
if (categories instanceof Array && categories.length > 0) {
var primaryCatId = categories[0];
epoParams += “&catId=” + primaryCatId + “&referrer=search”;
}
else {
epoParams += “&typeId=” + defaultTypeId + “&referrer=home”; // default is ‘home’ behavior
}
}
// Default is to show like coming from homepage
else {
epoParams += “&typeId=” + defaultTypeId + “&referrer=home”; // default is ‘home’ behavior
}
return epoParams;
}

/**
* @param jqo Original jquery object target
* @param divString The div to be inserted.
* @return Difference in height between original placement target and final target.
* Checks first 6 elements for an allowable placement (600 pixel window).
* If none, check nearby for elements that are not right avoids.
* If none, place element before current target.
*/
function applyInsert(jqo, divString) {
if (debug) {
console.log(“applyInsert at top and jqo index is: ” + jqo.index());
}

for (var i=0; i 0) {
children = $(“#drr-container”).children().slice(jqo.index(), allowElement.index() );
}
else {
children = $(“#drr-container”).children().slice(allowElement.index(), jqo.index());

}
if (children != null) {
children.each(function(i) {
if (debug) {
console.log(“About to add this element’s height to heigh diff offset”);
console.log($(this));
}
height += $(this).height();
});
}
if (offset 300) {
if (debug) {
console.log(“isRightAvoid: found pre. return true”);
}
return true;
}
if (jqo.is(“figure”) && jqo.hasClass(‘large’)) {
if (debug) {
console.log(“isRightAvoid: found figure.large return true”);
}
return true;
}
if (jqo.is(“figure”) && jqo.hasClass(‘medium’) && jqo.hasClass(‘inline’)) {
if (debug) {
console.log(“isRightAvoid: found figure has class medium and inline.”);
}
return true;
}

if (jqo.hasClass(‘download-asset’)) {
if (debug) {
console.log(“isRightAvoid: found class download-asset return true”);
}
return true;
}
if (jqo.is(“aside”) && jqo.hasClass(‘tableLarge’)) {
if (debug) {
console.log(“isRightAvoid: found class download-asset return true”);
}
return true;
}

}
return false;
}

// Returns true if height of all elements after this one is more than 500; false otherwise
function elementNotNearEnd(element, pixelWindow) {
if (pixelWindow == null) {
pixelWindow = 500;
}
if (element == null) {
return false;
}
var remainingHeight = 0;
var children = $(“#drr-container”).children().slice(element.index());
if (children == null) {
return false;
}
children.each(function(i){
remainingHeight += $(this).height();
});
if ( remainingHeight > pixelWindow) {
return true;
}
else {
if (debug) {
console.log(“Element too close to end. Remaining height is: ” + remainingHeight + ” and window is ” + pixelWindow);
}
return false;
}
}

/**
* Return true if need to avoid this element when placing left module.
*/
function isLeftAvoid(jqo) {
if (jqo.is(“figure”)) {
if (debug) {
console.log(“isLeftAvoid: found figure. return true”);
}
return true;
}
if (jqo.is(“aside.pullquote”)) {
if (debug) {
console.log(“isLeftAvoid: found pullquote. return true”);
}
return true;
}
if (jqo.is(“pre”)) {
if (debug) {
console.log(“isLeftAvoid: found pre. return true”);
}
return true;
}
if (jqo.is(“div.gist”)) {
if (debug) {
console.log(“isLeftAvoid: found github code block. return true”);
}
return true;
}
if (jqo.hasClass(“statsTable”)) {
if (debug) {
console.log(“isLeftAvoid: found class statsTable. return true”);
}
return true;
}
return false;
}

/**
* return true if there are no figures before the target placement that might bleed down into placement element
*/
function noPrevFigures($originalTarget) {
var targetIndex = $originalTarget.index();
var numElementsLookBack = 5;
var figureIndex = null;
var figureHeight = null;
var startIndex = targetIndex – numElementsLookBack

When using email to communicate, more than three-quarters of all lawyers treat their clients’ confidential information with all the care you’d expect from a teenager posting to Facebook, according to a new survey.

Only 22 percent claim to use encryption. And a full 77% cop to relying solely on “confidentiality statements,” otherwise known as virtually nothing.

ambrogi

Robert Ambrogi, an attorney, writes of such “protection” on his LawSites blog:

If I were to leave a document on a table entitled, “My Deepest, Darkest Secrets,” under which I wrote, “Please do not read this unless you are someone I intended to read this,” how securely would you think I’d protected myself?

That, effectively, is all the majority of lawyers do to protect confidential documents they share with clients and colleagues, according to a LexisNexis survey published this week.

Ambrogi answered a few of my questions via email:

Are there any applicable rules, standards or guidelines that lawyers are supposed to follow when handling client data?

The rules vary somewhat by state, but the general rule is that lawyers have an ethical obligation to protect the confidentiality and security of client information. A number of state ethics bodies have issued advisory opinions on what this obligation means for cloud computing. I just compiled a list of these opinions at my blog:

These opinions are fairly unanimous in saying that lawyers may ethically use the cloud to store client documents, provided they exercise due diligence to ensure that the cloud provider has adequate security measures in place. Several of these opinions include checklists of questions a lawyer should ask about a provider. A minority of states — Massachusetts among them — have said that a lawyer should obtain express client consent before using a cloud service.

Also, I’ve posted to my blog a presentation I gave last September on Ethics and Security of Cloud Computing for Lawyers. It includes highlights from some of the key ethics opinions and discusses some of the measures lawyers should take to protect their clients:

Are you aware of any cases where this failure to handle data more securely has hurt a client in any way?

As for whether clients have been hurt, the NYT just had a piece making the point that it’s hard to know, because firms are reluctant to report such breaches: My presentation above talked about a notorious case out of Canada where Chinese hackers trying to derail a major corporate acquisition were able to get access to the files of seven of Canada’s largest firms.

And, in your opinion, who should do what to fix this problem?

As for what lawyers should do, it all comes down to taking reasonable security precautions. A good start is to encrypt email, vet cloud providers, and use secure file sharing. 

This story, “77% of lawyers can’t be trusted … with your confidential data” was originally published by


NetworkWorld
.

  • We haven’t visited Apple OS X since Snow Leopard, and while there have been incremental changes,…

  • You can’t see some malware until it’s too late. Sophisticated attacks arrive in pieces, each…

  • game over

  • This is the description


<!–




Social Share Toolbar

Leave a Reply