Law Practice Management and Technology
The Bottom Line Volume 34, No.3, August 2013
Content
- MCLE Self-Study Article: Cybersecurity -- a Top of Mind Issue That Companies Must Consider
- MCLE Self-Study Article: the Advanced Persistent Attack and What Your Law Firm Should Do
- Book Review By Larry Meyer
- Coach's Corner: Technology, Competence and Risk in Data Security and Privacy
- MCLE Self-Study Article: Data Security Breach Notification Laws: How They Affect Your Law Firm and Your Clients
- MCLE Self-Study Article: "Naked Online", an Excerpt from the Book "Protecting Your Internet Security"
- MCLE Self-Study Article: the Attorney as Employer: the Law Regarding Employee Privacy in Social Media Posts
- MCLE Self-Study Article: Using Client Portals to Protect Your Clients’ Privacy
- MCLE Self-Study Article: What Is Privacy in the Information Age?
- Message from the Chair: Privacy at Risk
- Message from the Guest Editor: Protecting Privacy in Your Law Practice
- MCLE Self-Study Article: Addressing Social Media Security and Privacy Challenges
MCLE Self-Study Article: Addressing Social Media Security and Privacy Challenges
By Rebecca Herold
Addressing information security and privacy within business organizations and law firms has provided numerous challenges since before recently introduced technologies and comparatively new online habits of individuals. Among the many challenges are those that come along with social media use. There are many benefits that can be realized through the use of certain social media sites within law firms, but itâs important when planning to take advantage of those benefits to also know and understand the associated risks, both to privacy as well as network and information security.
Risks
As with any technology, along with the good there is always the harmful. While there are many benefits, there are also many information security and privacy risks and dangers with social media use, most of which can negatively impact all types of businesses including law firms. The following sections list some of the most common damages that have already occurred, some of them many times.