Peer to Peer Magazine

September 2012

The quarterly publication of the International Legal Technology Association

Issue link: http://read.uberflip.com/i/80353

Contents of this Issue

Navigation

Page 84 of 127

Protecting Legal Documents in a Mobile World by Paula Skokowski of Accellion, Inc. A growing number of law firms are going mobile and adopting iPads, iPhones and Android devices for everyday work. The productivity benefits of these powerful, easy- to-use devices have become so compelling — and the devices so enjoyable to use — that, whether through top-down IT initiatives or bottom-up grassroots efforts, mobile computing is transforming daily life at law firms of all sizes. Mobile Technology Unlocks Doors Mobile computing brings risks as well as benefits, and these risks are especially troubling for data security. Devices such as iPads were designed primarily for personal use. They lack security features that IT departments count on in devices like laptops and the BlackBerry. Attorneys and other end users often purchase and configure their mobile devices themselves. They mix personal data with office data and often install mobile apps that haven't been tested for security vulnerabilities. Five years ago, an attorney's computer was probably a PC that would have been carefully configured by the IT department. Now, it might be a tablet loaded with client files, calendaring software, home movies, personal photos, recipes and games. Somehow the firm is supposed to keep it secure. Even as IT becomes "consumerized" with these personal devices, the threats against personal mobile devices are increasing. Hackers are creating new types of malware that specifically target 86 Peer to Peer

Articles in this issue

Archives of this issue

view archives of Peer to Peer Magazine - September 2012