Consider this scenario: You are a lawyer heading to a café to meet with a client. At your side is your trusty tablet, a device whose use definitely tests the boundaries between professional and personal. With this device, you connect to the café’s wireless network. While going over work with your client and exchanging messages that will find their way onto ever more devices, the two of you are sharing a considerable volume of data, all of which is being transferred via the café’s unsecure network.
With much work remaining and never enough time in the day, you bring your tablet home with you. But while starting up your home computer, your pre-teen son starts bothering you. To keep him quiet while you focus, you concede the tablet, perhaps too willingly. And of course, your son isn’t thinking whatsoever about client confidentiality or information security when he decides to download apps and visit entertainment sites.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]