Canada’s online legal magazine.

Search Results

Your search for “” has returned the following results:

Cybercrime: Be Ready With an Incident Response Plan

Because a cybercrime attack can cause irreparable harm, law firms should be prepared to take action immediately. Being able to do this requires an Incident Response Plan (IRP).

An effective IRP can put a firm in a position to effectively and efficiently manage a breach by protecting sensitive data, systems, and networks, and to quickly investigate the extent and source of the breach so that operations can be maintained or promptly restored. Many firms design IRPs so that they address inadvertent breaches as well – for example, a lost USB key, or a misdirected email. An IRP can help avoid . . . [more]

Posted in: Technology

Protecting Yourself From Cybercrime Danger: Inside People Can Be the Most Dangerous

Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the specific cybercrime dangers law firms need to be concerned about, and how they can mitigate their risks.

People inside your office have . . . [more]

Posted in: Reading: Recommended, Technology

Protecting Yourself From Cybercrime Dangers: Harden Your Wireless & Bluetooth Connections and Use Public Wifi With Extreme Caution

Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the specific cybercrime dangers law firms need to be concerned about, and how they can mitigate their risks.

At home, coffee shops, restaurants, . . . [more]

Posted in: Technology

Protecting Yourself From Cybercrime Dangers: Secure Your Mobile Devices to Protect the Data on Them

Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the specific cybercrime dangers law firms need to be concerned about, and how they can mitigate their risks.

Lost or stolen laptops, smartphones . . . [more]

Posted in: Technology

Protecting Yourself From Cybercrime Danger: Be Safer When Using Remote Access and Public Computers

Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the specific cybercrime dangers law firms need to be concerned about, and how they can mitigate their risks.

Being able to access your . . . [more]

Posted in: Technology

Fiduciaries’ Access to Digital Assets

Introduction

As people carry out a variety of activities using computers and other digital devices, and as they inhabit a number of ‘places’ online, they develop things of value that are expressed in digital form. These ‘things’ take many forms: bank accounts, non-bank payment accounts, gambling receipts, auction holdings, virtual life empires, the list expands over time. Some of these assets are in known computer systems with known proprietors, others are in the cloud – meaning in some computer system or systems somewhere in the world, controlled by somebody in a meshwork of contracts.

So long as the power stays . . . [more]

Posted in: Legal Technology

Protecting Yourself From Cybercrime Dangers: Lock Down and Protect Your Data Wherever It Is

Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the specific cybercrime dangers law firms need to be concerned about, and how they can mitigate their risks.

Long gone are the days . . . [more]

Posted in: Technology

Protecting Yourself From Cybercrime Dangers: Lock Down and Protect Your Data Wherever It Is

Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the specific cybercrime dangers law firms need to be concerned about, and how they can mitigate their risks.

Long gone are the days . . . [more]

Posted in: Technology

Thank Goodness for the NSA! — a Fable

If it weren’t for the U.S. National Security Agency’s trying to spy on everyone in the world, Bleeker Street Law would have been a cooked goose.

Back in 2013, we had a group of clients from a particular country applying for refugee status here in Canada. Because the NSA spying was in the news, we did a forensic audit of our computers, just to be safe. We promptly discovered that we had been hacked. Not by our clients’ former national security service, or by the NSA, but by a for-profit organization. A set of aspiring criminals had broken our security . . . [more]

Posted in: Technology: Office Technology

Protecting Yourself From Cybercrime Dangers: Lock Down Your Browser and Avoid Surfing Dangers

Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the specific cybercrime dangers law firms need to be concerned about, and how they can mitigate their risks.

After email, your Internet browser . . . [more]

Posted in: Technology

Protecting Yourself From Cybercrime Dangers: Avoid the Dangers of Email

Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the specific cybercrime dangers law firms need to be concerned about, and how they can mitigate their risks.

Email has become a primary . . . [more]

Posted in: Technology

Google Street View Case Granted a Rehearing

The United States Court of Appeals for the Ninth Circuit granted a new hearing this past Friday in Joffe v. Google, Inc., while affirming the decision in September that denied a motion to dismiss by Google.

Google had requested the class action be dismissed on the basis that their actions in collecting information for Google Street View was not illegal due to an exemption in the Wiretap Act, on the basis that they transmitted the data over a WiFi network. The Street View vans had used the service set identifier names and media access control address from routers . . . [more]

Posted in: Substantive Law: Foreign Law, Substantive Law: Judicial Decisions

3li_EnFr_Wordmark_W

This project has been made possible in part by the Government of Canada | Ce projet a été rendu possible en partie grâce au gouvernement du Canada