Canada’s online legal magazine.

Search Results

Your search for “passwords” has returned the following results:

First Reported Case of CBSA Seizure of Legal Files

I’ve previously highlighted the concerns of border officials seizing and reviewing information and documents protected by solicitor-client privilege found on electronic devices.

The first publicly reported case of this occurring was released this weekend, involving an lawyer from Toronto returning from Guatemala and Colombia on April 10,

“The policy’s outrageous,” said Toronto business lawyer, Nick Wright. “I think that it’s a breach of our constitutional rights.”

His thoughts follow a personal experience. After landing at Toronto’s Pearson Airport on April 10, he said the Canada Border Services Agency (CBSA) flagged him for an additional inspection — for no stated reason.

. . . [more]
Posted in: Technology

New WPA3 WiFi Standard Released

Well, it’s finally here. In the fall of 2017, a vulnerability in WPA2 wireless encryption was discovered. Known as the Krack Attack, the flaw impacts every implementation of WPA2. The manufacturers needed to provide a patch update to fix the flaw. The Wi-Fi Alliance has now announced the availability of the WPA3 standard (to be implemented in certified devices starting later this year), vastly improving security over WPA2, which has been around for over 15 years and should be the current WiFi encryption of choice. WPA3 provides a new security protocol that contains improvements in terms of configuration, authentication and . . . [more]

Posted in: Legal Technology

When Does a Technical Standard Become a Legal Standard of Care?

The Guardian reports us that the World Wide Web Consortium (W3C) is close to adopting a new authentication standard that can replace passwords. This would be some kind of “who you are” (biometric) or “what you have” (token, phone to receive code) method of authentication, rather than a “what you know” password. (I suppose a code sent to your phone is what you know, but you know it only case by case, because you have another communications channel.)

Some web services already work this way, as the article notes – or does in special cases, as when one is logging . . . [more]

Posted in: Substantive Law, Technology: Internet, ulc_ecomm_list

Tips Tuesday

Here are excerpts from the most recent tips on SlawTips, the site that each week offers up useful advice, short and to the point, on research, writing, and practice.

Research & Writing

Please Tell Me You Don’t Write Letters Like This
Neil Guthrie

This is an excerpt from an actual letter received from a writer whose identity shall remain shrouded with a justly deserved veil of anonymity…

Technology

Canada Post Personal Vault
Law Society of Saskatchewan Library

Do you need safe online storage for confidential information such as passwords, birth certificate, bank accounts, medical records, passports, tax returns, wills,

. . . [more]
Posted in: Tips Tuesday

8 Legal/Tech Issues for 2018

Blockchain (the technology behind Bitcoin) is in a hype phase. It has been touted as the solution to many issues around trust. To some extent blockchain is still a solution in search of a problem. Blockchain will, however, become an important technology, and perhaps during 2018 we will begin to see some practical uses.

CASL, Canada’s anti-spam legislation, has been under review. It is a horrible law where the cost / benefit ratio is way off. Most small businesses simply don’t have the resources to comply. And no matter how hard they try, larger businesses have a difficult time complying . . . [more]

Posted in: Technology

I Was a Messenger Spoof Victim

 

A few days ago I returned to my office after a meeting to find emails and voicemails telling me that someone was sending facebook messenger messages pretending they were from me. The first message sent was an innocuous “Hello, how are you doing?” But if the recipient engaged it quickly turned into how I got a $300,000 government grant to pay off my bills, and tried to convince the recipient to send an email to “the agent in charge” to see if they were eligible. I suspect if followed through it would either ask for payment of a loan . . . [more]

Posted in: Technology

A Dozen Disaster Recovery Tips From the ABA Law Practice Division

From co-author Nelson: Normally, I write SLAW columns with Sensei VP John Simek, but in light of the recent and horrific disasters experienced by American law firms, I teamed up with Jim Calloway, Director of Management Assistance Program at Oklahoma Bar Association, to offer these disaster recovery tips.

  1. Immediately after a disaster, there is only one thing that matters – human life. Do what you can possibly do to help those in need and to ensure the safety of those who work with and for you. Supply your employees with all the support resources you can.
  2. Establish communications. Hopefully,
. . . [more]
Posted in: Legal Technology

Weak Data Security Will Erode Our Privacy and Our Liberties

I’ve been thinking a lot about cybersecurity recently. But when news of the Equifax data breach surfaced recently, I was more alarmed than usual. Although Equifax is the latest of a long line of data breaches where personal information has been stolen, this one was different.

There was the usual furor, of course, (US Senate hearings, questions in the House, newspaper headlines raging, stock tanking, etc.) when the fact of that massive data breach occurred was finally disclosed (a full five months after the breach occurred). More details on the scale of the breach have trickled out since then. But . . . [more]

Posted in: Legal Information

Prohibiting Access to Social Media: Reasonable Limits?

From time to time one reads of court orders banning people from using social media, usually in anticipation of trial but sometimes as part of a formal disposition.

For example, in R. v. Elliott, the defendant accused of harassment on Twitter was banned from using Twitter pending trial. Ultimately he was acquitted, and the ban was lifted. He had spent three years off Twitter.

A Nova Scotia court banned a teenaged defendant from social media for 21 months after his conviction for assault, uttering threat and criminal harassment. He was ordered to delete his Facebook, Twitter and Instagram accounts . . . [more]

Posted in: Legal Technology

Ransomware – Fix It Before You Wanna Cry

The WannaCry ransomware attack of almost 3 weeks ago may be a fading memory – but we can’t forget how important it is to protect our computer systems. This is true no matter what kind of business or organization you are.

This video does a good job of summarizing what happened.

The bottom line is that there are some basic things everyone needs to do to reduce the chances of ransomware or malware affecting us. Unfortunately not everyone does these simple things.

They include:

  • Keeping software and patches up to date
  • Upgrade operating systems before support ends (that means you
. . . [more]
Posted in: Technology

Further Legal Snapshots From the Internet of Things

Interconnected computers – computers that talk to each other – are no longer a novelty. These days, one is more inclined to be surprised by an electronic device, or even an electrical device, that is not part of a network.

We looked at some legal implications of interconnections a few years back. Here are several more, roughly divided into issues about privacy and security (which tend to overlap). Feel free to add others in a comment.

PRIVACY

By definition, interconnected devices communicate information about themselves or their environment, or both, to other devices. That information can and usually . . . [more]

Posted in: Legal Technology

LSBC Seeks Protection of Lawyers’ Electronic Devices Against Border Search

Not long ago, the US Supreme Court opined in Riley v. California:

Modern cell phones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans the privacies of life.

Riley involved evidence of serious criminal activity (gang shootings, drugs, firearms, etc.).

Notwithstanding this, SCOTUS decried warrantless cell phone searches and laid the groundwork for its conclusion that, in laypersons’ terms, snooping through someone’s cell phone is not just rude… it has become an extraordinarily intrusive act. The Court underscores that these devices contain a “digital record of nearly every . . . [more]

Posted in: Technology: Office Technology