Today’s copiers typically are networked digital devices that manage a wide range of tasks, from printing and copying to scanning and faxing. Critical client information, such as privileged correspondence or strategy memos, passes through a firm’s digital copiers on a daily basis.

These copiers are equipped with processors, memory and hard drives. As a result, information can linger in that memory long after the job has been completed, unprotected and subject to theft. The most common method of stealing data from a digital copier is to remove documents from the copier after they are printed or copied. It’s not uncommon for lawyers to print a confidential document and then get distracted on the way to retrieve it. Another method is to remove the hard drive itself from the copier; this can happen when copiers are sent offsite for repair, moved from one department to another, or returned to a dealer after the lease expires or left unattended over the weekend.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]