ILTA White Papers

Risky Business

Issue link: http://read.uberflip.com/i/45522

Contents of this Issue

Navigation

Page 18 of 73

"Data can be encrypted both 'at-rest' and 'in-transit.'" Recent state and federal laws have also sought to provide certain digital rights to consumers, including legal clients. With nearly every state maintaining data-breach notification laws (and approximately a dozen federal laws related to data privacy pending in Congress), it is clear that regulation will continue. While certain professionals in the United States might remain behind their counterparts in Europe and other developed nations, recently formed organizations like the International Legal Technical Standards Organization (ILTSO) have set standards to help lawyers worldwide remain informed about best practices for adoption of new technologies in the practice of law. Many individuals (including the authors of this piece) have been involved in the development 20 Risky Business ILTA White Paper of those standards, and ongoing feedback from practitioners worldwide is encouraged through the organization's website: www.iltso.org. 2. 2. What encryption methods and strengths are appropriate for client data? Encryption is a fundamental component of any secure cloud computing solution. On a basic level, encryption involves transforming information from an unencrypted "plain text" into an encrypted form that is unreadable to anyone without the appropriate key. In the context of cloud computing, data can be encrypted both "at-rest" and "in-transit."

Articles in this issue

Archives of this issue

view archives of ILTA White Papers - Risky Business