Alice arrives at her office. A security guard employed by her firm requires her to display her identification card before she enters the parking lot. After parking, Alice uses her ID card and a four-digit personal information number (PIN) to unlock the building door, and enters the building. She leaves her cellphone in a phone locker and uses her ID card and PIN a second time to enter another internal door to her group’s work area. At both doors, colleagues could have let her in, but they know Alice must use her own card and PIN to ensure proper recording of her ingress and egress. And, further, security cameras are watching.
Once inside her office, Alice turns on her two computers. The first is her “public” computer because it has access to the Internet. The second is a “confidential” computer linked only to a closed network. Both computers have encrypted drives. Both computers also require complex and regularly changing passwords. Yet the confidential computer is much more closely protected and monitored, and use is reviewed through periodic checks.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]