By Marc Kraut, IT Manager
LOL. TTYL. BYOD.
While the consequences of laughing out loud (LOL) and talking to you later (TTYL) have minimal impact at work, bringing your own device (BYOD) to the office can cause major security concerns.
Think about it. When it comes to technology, we tend to blur the lines between our personal life and work environment. Generally, we use one cell phone for both. Often we take our multiple devices to client meetings. So what happens when you leave your job? Everything you ever wrote including client emails and colleague texts is on your device and can be considered a breach of security.
I recently attended an ABA Techshow in Chicago, where the topic of security was at the forefront. Hypothetically, a lawyer never has to set foot in the office. With data stored in “the cloud” and cellphone or tablet accessible, all information and correspondence is at your fingertips and possibly at the sticky fingers of others. Luckily, there are a host of new software/hardware products that protect and encrypt data like Seagate Secure, Check Point and IronKey.
There were also a wide range of seminars focused on how to collect social media for ediscovery. CloudPreservation and X1 Social Discovery are two examples of commercially available tools that are specifically designed for archiving and collecting social media content. The ethics of social media marketing was also a major source of discussion. Do LinkedIn endorsements violate legal ethics? Is it legal to blog about cases as long as client confidentiality is maintained?
The proliferation of social media and new security concerns has made my job as IT manager a challenging work in progress. Right now, researching the mobile device management software is top of my list.
#GTG (Got To Go)
Leave a Reply