Data Security Ethics and Best Practices for Court Reporters
The issue of digital security and privacy should be a paramount concern to modern court reporters just as it is to their attorney clients. Yet their biggest risk remains the same as everyone else's: believing it won't happen to them.
May 29, 2019 at 09:57 AM
6 minute read
This article appeared in Cybersecurity Law & Strategy, an ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. Visit the website to learn more.
Individuals and companies, small and large, often neglect to develop their security infrastructures until an attack occurs and it's too late. No one is spared from the interest of cybercriminals. Hackers are largely indiscriminate in their approach, choosing to cast a broad net to collect information and reviewing what they've plundered for value after the attack. It's not necessarily about you; it's about the numbers.
The risk is real and can happen to anyone — personally or professionally, outside or inside the legal market, including court reporters. The issue of digital security and privacy should be a paramount concern to modern court reporters just as it is to their attorney clients. Yet their biggest risk remains the same as everyone else's: believing it won't happen to them.
As guardians of the record, court reporters have access to a broad expanse of privileged and confidential information, and it is their individual responsibility to protect that data. The National Court Reporters Association Code of Professional Ethics states, “(Reporters must) preserve confidentially and ensure the security of information, oral or written, entrusted to the reporter by any parties in a proceeding.” This responsibility extends to work product transmitted or stored on their devices and any individuals employed in their professional practice (i.e., scopists and proofreaders).
Attorneys must be able to trust that the court reporters taking their depositions are following every possible measure to protect the security and privacy of the data they're handling. As independent contractors, court reporters can take several measures to minimize their risk of a data breach
The first step for anyone to protect him- or herself is to recognize that the human factor is the weakest link to a security infrastructure and then act to protect his or her digital security based on that fact. With the busy life of a court reporter, it's difficult to stay apprised of the latest security trends. The good news is that there are some core guidelines that are a sound starting point to develop a digital security toolkit and will help to mitigate risk and exposure. The following are several recommendations for how court reporters can protect themselves and their work product. Most of these tips are good practices for anyone with an online presence or handling sensitive data.
Keep Software Up to Date
Turn on automatic updates and don't ignore them when prompted. Out-of-date software that hasn't been patched for security loopholes is often the point of entry for malicious attacks. Updating software can be annoying when trying finish a rough draft or other urgent client request, but it will be a lot more annoying when it is used against you!
Utilize Two-Factor Authentication
- Two-factor authentication is widely available for most secure websites and applications and is free to use. Two-factor authentication requires you to type in your password to access an account and then requires that you type in a second randomly generated pin number that is sent by push or SMS notification to your mobile device.
- The benefits of two-factor authentication are that cybercriminals now require two pieces of information to access your account, and if you are receiving pin codes while not trying to access your account, you're alerted that someone else is, and you can take the appropriate actions.
Create and Maintain Solid Passwords
- If you're using “Password,” “1234” or any simple variation thereof, you are creating more of a personal burden to access your own accounts than an actual boundary for a hacker. Simple passwords are as ineffective as not having a password at all.
- Lock your computer and mobile devices with a complex password.
- Use a mixture of characters, including characters and numbers—the longer the better.
- Don't write your passwords down.
- Don't use the same password for multiple important accounts.
- Multiple passwords, especially lengthy ones, can be difficult to remember. Use a password management tool to keep them all secure and in one place.
Think Twice and Exercise Skepticism When You Receive Strange E-Mails or Phone Calls
- Just because a link looks safe, that doesn't mean it is. Links can be sent in e-mails or messages that look like a website you know or trust but redirect you to a different website altogether.
- To combat this deception, hover over the link in your e-mail browser (without clicking), and the actual address to which the link will direct you will be displayed. Review the URL to make sure it's where you want to go.
- Social engineering is becoming an increasingly popular tactic hackers use to take advantage of seemingly real situations and manipulate the target into revealing personal or financial information.
Install Anti-Virus Protection On Devices
As mentioned previously, make sure to set anti-virus protection software to automatically update or to accept any updates when prompted. Anti-virus protection is only doing its job properly if it is up-to-date to combat the latest cybersecurity threats.
Back Up All Your Data and Information
- Last, but not least, back up all data! If something does compromise your device, the only guaranteed way to recover the information is through a backup.
- Consider using a cloud-based backup service.
- If you back up to an external hard drive, make sure the device is disconnected from the Internet and that it is stored in a physically secure space.
Conclusion
Modern technology has advanced the profession of court reporting in significant ways over the past several decades, improving productivity with state-of-the-art stenographic equipment, transcription software and even the ability to deliver real-time transcripts. However, technological advancement also presents some risks.
As independent contractors, many court reporters choose to work through agencies that may offer enhanced technology and other security measures to help mitigate the risk of their data being compromised. For court reporters with these tools at their disposal, it's recommended they take full advantage of them.
Furthermore, because a potential breach's impact could be far ranging, attorneys have a vested interest in what their court reporters are doing to prevent it. Whether scheduling them directly or through an agency, attorneys and their firms should require evidence of the data security and privacy practices their court reporters employ.
*****
Andy Fredericks is the California Director of Operations for court reporting company Veritext Legal Solutions.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View All'If the Job Is Better, You Get Better': Chief District Judge Discusses Overcoming Negative Perceptions During Q&A
Scammers Target Lawyers Across Country With Fake Court Notices
Unlocking Your Lawyers' Rainmaking Potential: A Coaching Guide
Trending Stories
- 1SurePoint Acquires Legal Practice Management Company ZenCase
- 2Day Pitney Announces Partner Elevations
- 3The New Rules of AI: Part 2—Designing and Implementing Governance Programs
- 4Plaintiffs Attorneys Awarded $113K on $1 Judgment in Noise Ordinance Dispute
- 5As Litigation Finance Industry Matures, Links With Insurance Tighten
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250