Video+Intro.+++Syntax++%7C+++Gallery+++GitHub+QnA+Markup+Editor+BETA++MarkupStyle+++Load+File+++New+%0D%0ATitle%3A+Small+Firm+Efficiency+and+Security+Interview%0D%0AAuthor%3A+Dylan+C.+Barrett%0D%0ADescription%3A+This+is+Class+project+for+Suffolk+University+Law+School+%3Ca+href%3D+%22http%3A%2F%2Fwww.codingthelaw.org%2F%22%3Ehttp%3A%2F%2Fwww.codingthelaw.org%2F%3C%2Fa%3E%0D%0ABefore%3A%0D%0A%3Ch1+style%3D%22text-align%3Acenter%3B%22%3ESmall+Firm+Efficiency+and+Security+Q%26A%3C%2Fh1%3E%3Cp+style%3D%22text-align%3Acenter%3B%22%3E%3Ca+href%3D%22http%3A%2F%2Fwww.codingthelaw.org%2F%22%3ECoding+the+Law%3C%2Fa%3E%3Cbr%3ESuffolk+University+Law+School%2C+Fall+2018%3C%2Fp%3E%0D%0A%0D%0AQ%28intro%29%3A+Do+%3Cb%3ENOT%3C%2Fb%3E+rely+on+this+interview+or+treat+this+interview+as+legal+advice%21+This+interview+is+a+class+project+and+is+likely+incomplete.%0D%0A%3Cp%3EThis+is+a+%3Ca+href%3D%22http%3A%2F%2Fwww.codingthelaw.org%2F%22%3ECoding+the+Law%3C%2Fa%3E+class+project+for+Suffolk+University+Law+School%2C+Fall+2018%3C%2Fp%3E%0D%0A%0D%0AA%3A+By+clicking+here%2C+I+am+confirming+that+I+understand%3A%0D%0A%09%3Col+type%3D%221%22%3E%0D%0A+%3Cli%3EThis+Q%26A+is+a+%3Cb%3Eclass+project.%3C%2Fb%3E%3C%2Fli%3E%0D%0A+%3Cli%3EThese+questions+and+results+%3Cb%3Edo+not%3C%2Fb%3E+constitute+legal+advice.%3C%2Fli%3E%0D%0A+%3Cli%3EI+%3Cb%3Eshould+not+rely%3C%2Fb%3E+on+the+information+provided+in+this+Q%26A.%3C%2Fli%3E%0D%0A+%3C%2Fol%3E%0D%0A%09Q%281.1%29%3AGOTO%3Acase_management%0D%0A%0D%0AQ%28case_management%29%3A+Do+you+make+use+of+a+%3Cb%3Ecase+management%3C%2Fb%3E+software%3F%0D%0AA%28%3Cb%3ECase+Management+Software%3A%3C%2Fb%3E+Case+management+software+may+resolve+some+of+the+issues+in+this+questionnaire.%29%3A+Yes%0D%0A%09DOC%282.1%29%3A+%3Cx%3ECase+management+software+may+resolve+some+of+the+issues+in+this+questionnaire.%3C%2Fx%3E%0D%0A%09Q%28case_mgmt_yes%29%3AGOTO%3Acase_mgmt_warning%0D%0AA%28%3Cb%3E+Case+Management+Software%3A%3C%2Fb%3E+Consider+a+case+management+software%2C+as+it+will+solve+many+of+these+issues+simultaneously.%29%3A+No%0D%0A%09DOC%282.2%29%3A+%3Cx%3E%3Cb%3E+Case+Management+Software%3A%3C%2Fb%3E+Consider+a+case+management+software%2C+as+it+will+solve+many+of+these+issues+simultaneously.%3C%2Fx%3E%0D%0A%09Q%28case_management_2%29%3AGOTO%3Awork_personal_computer%0D%0A%0D%0AQ%28case_mgmt_warning%29%3A+If+you+make+use+of+Case+Management+software%2C+some+of+these+questions+may+not+apply.+Additionally%2C+your+current+software+may+provide+embedded+solutions+to+many+suggestions+provided+by+this+interview.+It+is+recommended+you+review+the+features+available+to+you+through+your+software+license.%0D%0AA%3A+I+understand.%0D%0A%09Q%283.1%29%3AGOTO%3Awork_personal_computer%0D%0A%0D%0AQ%28work_personal_computer%29%3A+Do+you+store+client+documents+on+a+work+or+personal+computer%3F+%28Locally+on+the+computer%27s+hard+drive%3F%29%0D%0AA%3A+Yes%0D%0A%09Q%28work_personal_computer_yes%29%3A+Is+this+the+only+place+that+you+store+them%3F%0D%0A%09A%28%3Cb%3ELocal+Storage%3A%3C%2Fb%3E+Storing+documents+exclusively+on+a+single+computer+risks+losing+those+files+if+the+computer+suffers+a+fatal+error.+Additionally%2C+this+leaves+important+documents+vulnerable+to+computer+viruses%2C+malware%2C+and+ransomware.%29%3A+Yes%0D%0A%09%09DOC%284.1.1%29%3A%3Cx%3E%3Cb%3ELocal+Storage%3A%3C%2Fb%3E+Storing+documents+exclusively+on+a+single+computer+risks+losing+those+files+if+the+computer+suffers+a+fatal+error.+Additionally%2C+this+leaves+important+documents+vulnerable+to+computer+viruses%2C+malware%2C+and+ransomware.%3C%2Fx%3E%0D%0A%09%09Q%28work_personal_computer_yes_2%29%3AGOTO%3Acomputer_pword%0D%0A%09A%3A+No%0D%0A%09%09DOC%284.1.2%29%3A%3Cx%3E%3Cb%3ELocal+Storage%3A%3C%2Fb%3E+Storing+documents+exclusively+on+a+single+computer+risks+losing+those+files+if+the+computer+suffers+a+fatal+error.+Additionally%2C+this+leaves+important+documents+vulnerable+to+computer+viruses%2C+malware%2C+and+ransomware.%3C%2Fx%3E%0D%0A%09%09Q%284.1.2%29%3AGOTO%3Astore_docs%0D%0AA%3A+No%0D%0A%09Q%28work_personal_computer_no%29%3AGOTO%3Astore_docs%0D%0A%0D%0AQ%28store_docs%29%3A+Where+do+you+store+these+documents%3F%0D%0AA%3A+Cloud+Storage+Service%0D%0A%09Q%28cloud_access%29%3A+Do+others+have+access+to+this+drive%3F%0D%0A%09A%28%3Cb%3ECloud+Storage+%26+User+Access%3A%3C%2Fb%3E+Cloud+drive+services+provide+users+with+tools+to+track+access%2C+including+who+has+access+to+specific+documents%2C+folders%2C+and+access+to+the+entire+drive.+Track+this+information+and+ensure+access+is+restricted+only+to+those+who+need+it.%29%3A+Yes%0D%0A%09%09DOC%285.1.1%29%3A%3Cx%3E%3Cb%3ECloud+Storage+%26+User+Access%3A%3C%2Fb%3E+Cloud+drive+services+provide+users+with+tools+to+track+access%2C+including+who+has+access+to+specific+documents%2C+folders%2C+and+access+to+the+entire+drive.+Track+this+information+and+ensure+access+is+restricted+only+to+those+who+need+it.%3C%2Fx%3E%0D%0A%09%09Q%28cloud_access_2%29%3AGOTO%3Aclient_docs_email%0D%0A%09A%3A+No%0D%0A%09%09Q%28cloud_access_3%29%3AGOTO%3Aclient_docs_email%0D%0AA%3A+Local+Network+Drive%0D%0A%09Q%28local_drive_access%29%3A+Do+others+have+access+to+this+local+drive%3F%0D%0A%09A%28%3Cb%3ELocal+Network+Drive+Users%3A%3C%2Fb%3E+Carefully+track+who+has+access+to+networked+drives.+Consider+making+use+of+tools+that+assign+user+credentials%2C+limit+access%2C+track+access%2C+and+provide+reports.+Consider+keeping+sensitive+documents+on+a+separate+drive.%29%3A+Yes%0D%0A%09%09DOC%285.2.1%29%3A%3Cx%3ECarefully+track+who+has+access+to+networked+drives.+Consider+making+use+of+tools+that+assign+user+credentials%2C+limit+access%2C+track+access%2C+and+provide+reports.+Consider+keeping+sensitive+documents+on+a+separate+drive.%3C%2Fx%3E%0D%0A%09%09Q%28local_drive_access_2%29%3AGOTO%3Adrive_pword%0D%0A%09A%3A+No%0D%0A%09%09Q%28local_drive_access_3%29%3AGOTO%3Aclient_docs_email%0D%0AA%3A+Both%0D%0A%09Q%285.3%29%3AGOTO%3Aclient_docs_email%0D%0A%0D%0AQ%28drive_pword%29%3A+Is+the+drive+password+protected%3F%0D%0AA%3A+Yes%0D%0A%09Q%28drive_pword_yes%29%3AGOTO%3Aclient_docs_email%0D%0AA%28Files+on+a+network+drive+are+vulnerable+to+any+unauthorized+or+malicious+party+that+has+access+to+the+network%2C+or+even+other+devices+on+the+network.+Adding+a+password+to+protect+the+drive+makes+it+more+difficult+for+adverse+parties%2C+viruses%2C+and+other+risks+to+access+your+information.%29%3A+No%0D%0A%09DOC%286.2%29%3A+%3Cx%3EFiles+on+a+network+drive+is+vulnerable+to+any+unauthorized+or+malicious+party+that+has+access+to+the+network%2C+or+even+other+devices+on+the+network.+Adding+a+password+to+protect+the+drive+makes+it+more+difficult+for+adverse+parties%2C+viruses%2C+and+other+risks+to+access+your+information.%3C%2Fx%3E%0D%0A%09Q%28docs_pword%29%3A+Are+documents+or+folders+in+the+drive+password+protected%3F%0D%0A%09A%3A+Yes%0D%0A%09%09Q%28docs_pword_yes%29%3AGOTO%3Aclient_docs_email%0D%0A%09A%28%3Cb%3EFile+%26+Document+Passwords%3A%3C%2Fb%3E+Files+and+documents+on+a+network+drive+are+vulnerable+to+any+unauthorized+or+malicious+party+that+has+access+to+the+network%2C+or+even+other+devices+on+the+network.+Adding+a+password+to+protect+important+documents+makes+it+more+difficult+for+adverse+parties%2C+viruses%2C+and+other+risks+to+access+your+information%2C+however%2C+adding+a+password+to+the+drive+itself+is+also+helpful%2C+and+requires+fewer+passwords.%29%3A+No%0D%0A%09%09DOC%286.2.2%29%3A+%3Cx%3E%3Cb%3EFile+%26+Document+Passwords%3A%3C%2Fb%3E+Files+and+documents+on+a+network+drive+are+vulnerable+to+any+unauthorized+or+malicious+party+that+has+access+to+the+network%2C+or+even+other+devices+on+the+network.+Adding+a+password+to+protect+important+documents+makes+it+more+difficult+for+adverse+parties%2C+viruses%2C+and+other+risks+to+access+your+information%2C+however%2C+adding+a+password+to+the+drive+itself+is+also+helpful%2C+and+requires+fewer+passwords.%3C%2Fx%3E%0D%0A%09%09Q%28docs_pword_no%29%3AGOTO%3Aclient_docs_email%0D%0A%0D%0AQ%28client_docs_email%29%3A+Do+you+send+sensitive+client+documents+or+information+over+email%3F%0D%0A%3Cp%3E+This+includes+information+you+have+entered+into+the+body+of+the+E-Mail+or+information+found+within+attached+documents.%3C%2Fp%3E%0D%0AA%3A+Yes%0D%0A%09Q%28client_docs_email_yes%29%3AGOTO%3Aclient_same%0D%0AA%3A+No+-+%3Cb%3ENEVER.%3C%2Fb%3E%0D%0A%09Q%28how_send_if_not_email%29%3A+How+do+you+send+documents+to+clients%3F%0D%0A%09A%28%3Cb%3ECloud+Document+Sharing%3A%3C%2Fb%3E+When+sharing+documents+with+others+over+cloud+services%2C+make+sure+to+verify+permissions+used.+If+you+do+not+want+a+recipient+to+have+permanent+access+to+a+document%2C+or+the+ability+to+alter+the+document+or+view+changes+you+might+make+to+the+same+document%2C+verify+that+you+can+set+access+permissions+to+expire.%29%3A+Cloud+Sharing+Service%0D%0A%09%09DOC%287.2.1%29%3A%3Cx%3E%3Cb%3ECloud+Document+Sharing%3A%3C%2Fb%3E+When+sharing+documents+with+others+over+cloud+services%2C+make+sure+to+verify+permissions+used.+If+you+do+not+want+a+recipient+to+have+permanent+access+to+a+document%2C+or+the+ability+to+alter+the+document+or+view+changes+you+might+make+to+the+same+document%2C+verify+that+you+can+set+access+permissions+to+expire.%3C%2FX%3E+%0D%0A%09%09Q%287.2.1%29%3A+Do+you+use+this+cloud+service+to+secure+signatures+for+documents+that+require+signing%3F%0D%0A%09%09A%3A+Yes%0D%0A%09%09%09Q%287.2.1.1%29%3AGOTO%3Aclient_collab%0D%0A%09%09A%3A+No%0D%0A%09%09%09Q%287.2.1.2%29%3AGOTO%3Aclient_sign%0D%0A%09A%3A+Secure+File+Sharing+Service%0D%0A%09%09Q%287.2.2%29%3A+Do+you+use+this+file+sharing+service+to+secure+signatures%3F%0D%0A%09%09A%3A+Yes%0D%0A%09%09%09Q%287.2.2.1%29%3AGOTO%3Aclient_collab%0D%0A%09%09A%3A+No%0D%0A%09%09%09Q%287.2.2.2%29%3AGOTO%3Aclient_sign%0D%0A%09A%3A+None+of+the+Above.%0D%0A%09%09Q%287.2.3%29%3AGOTO%3Aclient_sign%0D%0A%0D%0AQ%28client_same%29%3A+Do+clients+do+the+same%3F%0D%0AA%3A+Yes%0D%0A%09Q%288.1%29%3AGOTO%3Apaid_or_free%0D%0AA%3A+No%0D%0A%09Q%288.2%29%3AGOTO%3Apaid_or_free%0D%0A%0D%0AQ%28paid_or_free%29%3ADo+you+use+a+paid+E-mail+service%2C+or+a+free+E-mail+service%3F%0D%0AA%3A+Paid%0D%0A%09Q%289.1%29%3AGOTO%3Aclient_sign%0D%0AA%28%3Cb%3EFree+E-Mail+Service%3A%3C%2Fb%3E+Free+E-Mail+providers+generally+do+not+have+rigorous+privacy+and+data+security+standards.+It+is+important+you+research+your+provider%27s+privacy+and+security+practices+and+consider+making+use+of+a+paid+E-Mail+service.%29%3A+Free%0D%0A%09DOC%289.2%29%3A%3Cx%3E%3Cb%3EFree+E-Mail+Service%3A%3C%2Fb%3E+Free+E-Mail+providers+generally+do+not+have+rigorous+privacy+and+data+security+standards.+It+is+important+you+research+your+provider%27s+privacy+and+security+practices+and+consider+making+use+of+a+paid+E-Mail+service.%3C%2Fx%3E%0D%0A%09Q%289.2%29%3AGOTO%3Aclient_sign%0D%0A%0D%0AQ%28client_sign%29%3AHow+do+you+have+clients+%28or+any+other+parties%29+sign+documents%3F%0D%0AA%28%3Cb%3EDocument+Signatures%3A%3C%2Fb%3E+Consider+an+E-Signature+tool.+This+allows+you+to+acquire+signatures+whenever+you+need+them%2C+so+long+as+the+signing+party+has+access+to+a+computer%2C+tablet%2C+or+smartphone.%29%3A+Using+mail%2C+E-Mail%2C+Fax%2C+or+in-person+meetings+with+the+person+who+must+sign.%0D%0A%09DOC%2810.1%29%3A%3Cx%3E%3Cb%3EDocument+Signatures%3A%3C%2Fb%3E+Consider+an+E-Signature+tool.+This+allows+you+to+acquire+signatures+whenever+you+need+them%2C+so+long+as+the+signing+party+has+access+to+a+computer%2C+tablet%2C+or+smartphone.%3C%2Fx%3E%0D%0A%09Q%2810.1%29%3AGOTO%3Aclient_collab%0D%0AA%3A+An+electronic+signature+software.%0D%0A%09Q%2810.2%29%3AGOTO%3Aclient_collab%0D%0A%0D%0AQ%28client_collab%29%3A+If+you+need+to+collaboratively+work+on+a+document%2C+such+as+interrogatories%2C+contracts%2C+motions%2C+etc%2C+with+clients+or+colleagues%2C+do+you+make+use+of+a+screen+sharing+tool%3F%0D%0AA%3A+Yes%0D%0A%09Q%2811.1%29%3AGOTO%3Acomputer_pword%0D%0AA%28%3Cb%3EDocument+Collaboration%3A%3C%2Fb%3E+Try+a+screen+sharing+tool%21+These+tools+allow+you+to+work+on+documents+in+real+time+with+others%2C+with+no+need+to+exchange+multiple+copies.%29%3A+No%0D%0A%09DOC%2811.2%29%3A%3Cx%3E%3Cb%3EDocument+Collaboration%3A%3C%2Fb%3E+Try+a+screen+sharing+tool%21+These+tools+allow+you+to+work+on+documents+in+real+time+with+others%2C+with+no+need+to+exchange+multiple+copies.%3C%2Fx%3E%0D%0A%09Q%2811.2%29%3AGOTO%3Acomputer_pword%0D%0A%0D%0AQ%28computer_pword%29%3A+Is+your+computer+password+protected%3F%0D%0AA%3A+Yes%0D%0A%09Q%28computer_pword_yes%29%3AGOTO%3Acomp_lock%0D%0AA%28%3Cb%3EComputer+Password+Protection%3A%3C%2Fb%3E+It+is+essential+that+you+lock+and+password+protect+any+computer%2C+personal+or+business%21+Make+sure+to+password+protect+your+computer+and+set+it+to+automatically+lock+after+a+period+of+idleness.%29%3A+No%0D%0A%09DOC%2812.2%29%3A%3Cx%3E%3Cb%3EComputer+Password+Protection%3A%3C%2Fb%3E+It+is+essential+that+you+lock+and+password+protect+any+computer%2C+personal+or+business%21+Make+sure+to+password+protect+your+computer+and+set+it+to+automatically+lock+after+a+period+of+idleness.%3C%2Fx%3E%0D%0A%09Q%28computer_pword_no%29%3AGOTO%3Alocal_docs_pword%0D%0A%0D%0AQ%28local_docs_pword%29%3A+Are+the+documents+stored+on+your+computer+password+protected%2C+and%2For+are+the+folders+the+documents+are+kept+in+password+protected+or+encrypted%2C+or+both%3F%0D%0AA%3A+Yes%0D%0A%09Q%28local_docs_pword_yes%29%3AGOTO%3Acomp_lock%0D%0AA%3A+No%0D%0A%09Q%28local_docs_pword_no%29%3AGOTO%3Acomp_lock%0D%0A%0D%0AQ%28comp_lock%29%3A+is+your+computer+hard+drive+encrypted%3F%0D%0AA%3A+Yes%0D%0A%09Q%28comp_lock_yes%29%3AGOTO%3Asmartphone%0D%0AA%28%3Cb%3EHard+Drive+Encryption%3A%3C%2Fb%3E+Encrypting+your+hard+drive+adds+a+simple%2C+fast%2C+and+free+way+to+reduce+your+exposure+to+data+theft+and+other+malicious+attacks+on+your+computer.%29%3A+No%2FNot+Sure%0D%0A%09DOC%2814.2%29%3A%3Cx%3E%3Cb%3EHard+Drive+Encryption%3A%3C%2Fb%3E+Encrypting+your+hard+drive+adds+a+simple%2C+fast%2C+and+free+way+to+reduce+your+exposure+to+data+theft+and+other+malicious+attacks+on+your+computer.%3C%2Fx%3E%0D%0A%09Q%28comp_lock_no%29%3AGOTO%3Asmartphone%0D%0A%0D%0AQ%28smartphone%29%3A+do+you+open+case%2C+litigation%2C+or+client+documents+on+your+smartphone%3F%0D%0AA%3A+Yes%0D%0A%09Q%28smartphone2%29%3A+do+you+delete+these+documents+from+you+smartphone+after+reading+them%3F%0D%0A%09A%3A+Yes%0D%0A%09%09Q%28smartphone3%29%3A+Is+your+smartphone%27s+hard+drive+encrypted%3F%0D%0A%09%09A%3A+Yes%0D%0A%09%09%09Q%28smartphone4%29%3AGOTO%3Aphone_lock%0D%0A%09%09A%28%3Cb%3ESmartphone+Encryption%3A%3C%2Fb%3E+Encrypting+your+smartphone+hard+drive+is+just+as+important+as+encrypting+your+computer+hard+drive.+Consider+doing+so+using+an+approved+application.%29%3A+No%0D%0A%09%09%09DOC%2815.1.1.2%29%3A%3Cx%3E%3Cb%3ESmartphone+Encryption%3A%3C%2Fb%3E+Encrypting+your+smartphone+hard+drive+is+just+as+important+as+encrypting+your+computer+hard+drive.+Consider+doing+so+using+an+approved+application.%3C%2Fx%3E%0D%0A%09%09%09Q%28smartphone5%29%3AGOTO%3Aphone_lock%0D%0A%09A%28%3Cb%3ESmartphone+Documents%3C%2Fb%3E%3A+If+you+open+documents+on+your+smartphone%2C+particularly+E-Mail+attachments%2C+these+documents+are+typically+downloaded+and+saved+locally.+If+the+documents+contain+sensitive+information%2C+consider+deleting+them+after+you+have+read+them.%29%3A+No%0D%0A%09%09DOC%2815.1.2%29%3A%3Cx%3E%3Cb%3ESmartphone+Documents%3C%2Fb%3E%3A+If+you+open+documents+on+your+smartphone%2C+particularly+E-Mail+attachments%2C+these+documents+are+typically+downloaded+and+saved+locally.+If+the+documents+contain+sensitive+information%2C+consider+deleting+them+after+you+have+read+them.%3C%2Fx%3E%0D%0A%09%09Q%2815.1.2%29%3AGOTO%3Aphone_lock%0D%0A%09A%3A+Not+Sure%0D%0A%09%09Q%2815.1.3%29%3AGOTO%3Aphone_lock%0D%0AA%3A+No.%0D%0A%09Q%2815.2%29%3AGOTO%3Aisp%0D%0AA%3A+I+Do+not+Own+a+Smartphone.%0D%0A%09Q%2815.3%29%3AGOTO%3Aisp%0D%0A%0D%0AQ%28phone_lock%29%3A+Is+your+smartphone+set+to+automatically+lock%3F%0D%0AA%3A+Yes%0D%0A%09Q%2816.1%29%3AGOTO%3Aisp%0D%0AA%28%3Cb%3ESmartphone+Lock%3A%3C%2Fb%3E+You+should+set+your+phone+to+lock+at+all+times.%29%3A+No%0D%0A%09DOC%2816.2%29%3A%3Cx%3E%3Cb%3ESmartphone+Lock%3A%3C%2Fb%3E+You+should+set+your+phone+to+lock+at+all+times.%3C%2Fx%3E%0D%0A%09Q%2816.2%29%3AGOTO%3Aisp%0D%0A%0D%0AQ%28isp%29%3A+How+is+your+workplace+internet+access+provided%3F%0D%0AA%3A+Through+my%2Four+office+lease+-+provided+via+the+building+lessor%2C+management+company%2C+etc.%0D%0A%09Q%2817.1%29%3A+Do+other+organizations+or+businesses+in+your+office+have+access+to+this+same+network%3F%0D%0A%09A%28%3Cb%3EOthers+Have+Network+Access%3A%3C%2Fb%3E+This+is+a+strong+risk+given+you+may+not+have+control+over+other+organization%27s+employees%2C+network+usage+habits%2C+and+who+they+may+grant+permission+of+access+to.+At+a+minimum+consider+a+Virtual+Private+Network+tool%2C+this+will+encrypt+your+network+traffic.+Ensure+any+network+drives+your+organization+uses+are+password+protected.%29%3A+Yes%0D%0A%09%09DOC%2817.1.1%29%3A%3Cx%3E%3Cb%3EOthers+Have+Network+Access%3A%3C%2Fb%3E+This+is+a+strong+risk+given+you+may+not+have+control+over+other+organization%27s+employees%2C+network+usage+habits%2C+and+who+they+may+grant+permission+of+access+to.+At+a+minimum+consider+a+Virtual+Private+Network+tool%2C+this+will+encrypt+your+network+traffic.+Ensure+any+network+drives+your+organization+uses+are+password+protected.%3C%2Fx%3E%0D%0A%09%09Q%2817.1.1%29%3AGOTO%3A17.1.2%0D%0A%09A%3A+No%0D%0A%09%09Q%2817.1.2%29%3A+Do+you+provide+the+WiFi+password+to+clients%2C+guests%2C+or+others+that+do+not+work+for+your+organization%3F%0D%0A%09%09A%28%3Cb%3EGuest+Network+Access%3A%3C%2Fb%3E+At+a+minimum+set+up+a+guest+network+if+you+are+allowing+access+to+your+network+by+users+other+than+those+that+belong+to+your+organization.%29%3A+Yes%0D%0A%09%09%09DOC%2817.1.2.1%29%3A%3Cx%3E%3Cb%3EGuest+Network+Access%3A%3C%2Fb%3E+At+a+minimum+set+up+a+guest+network+if+you+are+allowing+access+to+your+network+by+users+other+than+those+that+belong+to+your+organization.%3C%2Fx%3E%0D%0A%09%09%09Q%2817.1.2.1%29%3AGOTO%3A17.1.2.2%0D%0A%09%09A%3A+No%0D%0A%09%09%09Q%2817.1.2.2%29%3A+Is+your+WiFi+password+posted+in+writing+anywhere+in+the+office%3F%0D%0A%09%09%09A%28%3Cb%3EPosted+WiFi+Passwords%3A%3C%2Fb%3E+A+WiFi+password+your+employees+can+see+is+a+WiFi+password+guests%2C+delivery+people%2C+and+even+passers-by+can+see.+This+may+provide+easy+unwanted+access+to+your+network.+Consider+not+posting+your+WiFi+password+in+the+open.%29%3A+Yes%0D%0A%09%09%09%09DOC%2817.1.2.2.1%29%3A%3Cx%3E%3Cb%3EPosted+WiFi+Passwords%3A%3C%2Fb%3E+A+WiFi+password+your+employees+can+see+is+a+WiFi+password+guests%2C+delivery+people%2C+and+even+passers-by+can+see.+This+may+provide+easy+unwanted+access+to+your+network.+Consider+not+posting+your+WiFi+password+in+the+open.%3C%2Fx%3E%0D%0A%09%09%09%09Q%2817.1.2.2.1%29%3AGOTO%3Aend%0D%0A%09%09%09A%3A+No%0D%0A%09%09%09%09Q%2817.1.2.2.2%29%3AGOTO%3Aend%0D%0AA%3A+Through+a+commercial+or+business+internet+service+provider.%0D%0A%09Q%2817.2%29%3AGOTO%3Aend%0D%0AA%3A+Other%0D%0A%09Q%2817.3%29%3AGOTO%3Aend%0D%0A%0D%0AQ%28end%29%3A+Thank+you+for+your+time.+Please+click+%22Complete%22+to+see+suggested+changes+and+potential+risks+based+on+your+answers.%0D%0AA%5Bjavascript%3Asubmit2%28%27https%3A%2F%2Fwww.qnamarkup.org%2Fdoc%2Fparse%2Fhtml%2F%27%2C%27POST%27%2C%27t%27%2C%27You+may+download+or+print+the+suggestions+here.%27%29%5D%3A+Complete%0D%0A%09Q%2818.1%29%3A+Thank+you.%0D%0A+++++word+wrap+++%7C+++report+bug%2FissueOutput+
Do
NOT rely on this interview or treat this interview as legal advice! This interview is a class project and is likely incomplete.
This is a Coding the Law class project for Suffolk University Law School, Fall 2018
GOTO:2
Do you make use of a case management software?
Case management software may resolve some of the issues in this questionnaire.
GOTO:3
Case Management Software: Consider a case management software, as it will solve many of these issues simultaneously.
GOTO:4
If you make use of Case Management software, some of these questions may not apply. Additionally, your current software may provide embedded solutions to many suggestions provided by this interview. It is recommended you review the features available to you through your software license.
GOTO:4
Do you store client documents on a work or personal computer? (Locally on the computer's hard drive?)
Is this the only place that you store them?
Local Storage: Storing documents exclusively on a single computer risks losing those files if the computer suffers a fatal error. Additionally, this leaves important documents vulnerable to computer viruses, malware, and ransomware.
GOTO:12
Local Storage: Storing documents exclusively on a single computer risks losing those files if the computer suffers a fatal error. Additionally, this leaves important documents vulnerable to computer viruses, malware, and ransomware.
GOTO:5
GOTO:5
Where do you store these documents?
Do others have access to this drive?
Cloud Storage & User Access: Cloud drive services provide users with tools to track access, including who has access to specific documents, folders, and access to the entire drive. Track this information and ensure access is restricted only to those who need it.
GOTO:7
GOTO:7
Do others have access to this local drive?
Carefully track who has access to networked drives. Consider making use of tools that assign user credentials, limit access, track access, and provide reports. Consider keeping sensitive documents on a separate drive.
GOTO:6
GOTO:7
GOTO:7
Is the drive password protected?
GOTO:7
Files on a network drive is vulnerable to any unauthorized or malicious party that has access to the network, or even other devices on the network. Adding a password to protect the drive makes it more difficult for adverse parties, viruses, and other risks to access your information.
Are documents or folders in the drive password protected?
GOTO:7
File & Document Passwords: Files and documents on a network drive are vulnerable to any unauthorized or malicious party that has access to the network, or even other devices on the network. Adding a password to protect important documents makes it more difficult for adverse parties, viruses, and other risks to access your information, however, adding a password to the drive itself is also helpful, and requires fewer passwords.
GOTO:7
Do you send sensitive client documents or information over email?
This includes information you have entered into the body of the E-Mail or information found within attached documents.
GOTO:8
How do you send documents to clients?
Cloud Document Sharing: When sharing documents with others over cloud services, make sure to verify permissions used. If you do not want a recipient to have permanent access to a document, or the ability to alter the document or view changes you might make to the same document, verify that you can set access permissions to expire.
Do you use this cloud service to secure signatures for documents that require signing?
GOTO:11
GOTO:10
Do you use this file sharing service to secure signatures?
GOTO:11
GOTO:10
GOTO:10
Do clients do the same?
GOTO:9
GOTO:9
Do you use a paid E-mail service, or a free E-mail service?
GOTO:10
Free E-Mail Service: Free E-Mail providers generally do not have rigorous privacy and data security standards. It is important you research your provider's privacy and security practices and consider making use of a paid E-Mail service.
GOTO:10
How do you have clients (or any other parties) sign documents?
Document Signatures: Consider an E-Signature tool. This allows you to acquire signatures whenever you need them, so long as the signing party has access to a computer, tablet, or smartphone.
GOTO:11
GOTO:11
If you need to collaboratively work on a document, such as interrogatories, contracts, motions, etc, with clients or colleagues, do you make use of a screen sharing tool?
GOTO:12
Document Collaboration: Try a screen sharing tool! These tools allow you to work on documents in real time with others, with no need to exchange multiple copies.
GOTO:12
Is your computer password protected?
GOTO:14
Computer Password Protection: It is essential that you lock and password protect any computer, personal or business! Make sure to password protect your computer and set it to automatically lock after a period of idleness.
GOTO:13
Are the documents stored on your computer password protected, and/or are the folders the documents are kept in password protected or encrypted, or both?
GOTO:14
GOTO:14
is your computer hard drive encrypted?
GOTO:15
Hard Drive Encryption: Encrypting your hard drive adds a simple, fast, and free way to reduce your exposure to data theft and other malicious attacks on your computer.
GOTO:15
do you open case, litigation, or client documents on your smartphone?
do you delete these documents from you smartphone after reading them?
Is your smartphone's hard drive encrypted?
GOTO:16
Smartphone Encryption: Encrypting your smartphone hard drive is just as important as encrypting your computer hard drive. Consider doing so using an approved application.
GOTO:16
Smartphone Documents: If you open documents on your smartphone, particularly E-Mail attachments, these documents are typically downloaded and saved locally. If the documents contain sensitive information, consider deleting them after you have read them.
GOTO:16
GOTO:16
GOTO:17
GOTO:17
Is your smartphone set to automatically lock?
GOTO:17
Smartphone Lock: You should set your phone to lock at all times.
GOTO:17
How is your workplace internet access provided?
Do other organizations or businesses in your office have access to this same network?
Others Have Network Access: This is a strong risk given you may not have control over other organization's employees, network usage habits, and who they may grant permission of access to. At a minimum consider a Virtual Private Network tool, this will encrypt your network traffic. Ensure any network drives your organization uses are password protected.
GOTO:17.1.2
Do you provide the WiFi password to clients, guests, or others that do not work for your organization?
Guest Network Access: At a minimum set up a guest network if you are allowing access to your network by users other than those that belong to your organization.
GOTO:17.1.2.2
Is your WiFi password posted in writing anywhere in the office?
Posted WiFi Passwords: A WiFi password your employees can see is a WiFi password guests, delivery people, and even passers-by can see. This may provide easy unwanted access to your network. Consider not posting your WiFi password in the open.
GOTO:18
GOTO:18
GOTO:18
GOTO:18
Thank you for your time. Please click "Complete" to see suggested changes and potential risks based on your answers.
Thank you.
By clicking here, I am confirming that I understand:
- This Q&A is a class project.
- These questions and results do not constitute legal advice.
- I should not rely on the information provided in this Q&A.
javascript:void('');
By clicking here, I am confirming that I understand:
- This Q&A is a class project.
- These questions and results do not constitute legal advice.
- I should not rely on the information provided in this Q&A.
Yes
javascript:void('');
Case Management Software: Case management software may resolve some of the issues in this questionnaire.
No
javascript:void('');
Case Management Software: Consider a case management software, as it will solve many of these issues simultaneously.
I understand.
javascript:void('');
I understand.
Yes
javascript:void('');
Yes
Yes
javascript:void('');
Local Storage: Storing documents exclusively on a single computer risks losing those files if the computer suffers a fatal error. Additionally, this leaves important documents vulnerable to computer viruses, malware, and ransomware.
No
javascript:void('');
No
No
javascript:void('');
No
Cloud Storage Service
javascript:void('');
Cloud Storage Service
Yes
javascript:void('');
Cloud Storage & User Access: Cloud drive services provide users with tools to track access, including who has access to specific documents, folders, and access to the entire drive. Track this information and ensure access is restricted only to those who need it.
No
javascript:void('');
No
Local Network Drive
javascript:void('');
Local Network Drive
Yes
javascript:void('');
Local Network Drive Users: Carefully track who has access to networked drives. Consider making use of tools that assign user credentials, limit access, track access, and provide reports. Consider keeping sensitive documents on a separate drive.
No
javascript:void('');
No
Both
javascript:void('');
Both
Yes
javascript:void('');
Yes
No
javascript:void('');
Files on a network drive are vulnerable to any unauthorized or malicious party that has access to the network, or even other devices on the network. Adding a password to protect the drive makes it more difficult for adverse parties, viruses, and other risks to access your information.
Yes
javascript:void('');
Yes
No
javascript:void('');
File & Document Passwords: Files and documents on a network drive are vulnerable to any unauthorized or malicious party that has access to the network, or even other devices on the network. Adding a password to protect important documents makes it more difficult for adverse parties, viruses, and other risks to access your information, however, adding a password to the drive itself is also helpful, and requires fewer passwords.
Yes
javascript:void('');
Yes
No - NEVER.
javascript:void('');
No - NEVER.
Cloud Sharing Service
javascript:void('');
Cloud Document Sharing: When sharing documents with others over cloud services, make sure to verify permissions used. If you do not want a recipient to have permanent access to a document, or the ability to alter the document or view changes you might make to the same document, verify that you can set access permissions to expire.
Yes
javascript:void('');
Yes
No
javascript:void('');
No
Secure File Sharing Service
javascript:void('');
Secure File Sharing Service
Yes
javascript:void('');
Yes
No
javascript:void('');
No
None of the Above.
javascript:void('');
None of the Above.
Yes
javascript:void('');
Yes
No
javascript:void('');
No
Paid
javascript:void('');
Paid
Free
javascript:void('');
Free E-Mail Service: Free E-Mail providers generally do not have rigorous privacy and data security standards. It is important you research your provider's privacy and security practices and consider making use of a paid E-Mail service.
Using mail, E-Mail, Fax, or in-person meetings with the person who must sign.
javascript:void('');
Document Signatures: Consider an E-Signature tool. This allows you to acquire signatures whenever you need them, so long as the signing party has access to a computer, tablet, or smartphone.
An electronic signature software.
javascript:void('');
An electronic signature software.
Yes
javascript:void('');
Yes
No
javascript:void('');
Document Collaboration: Try a screen sharing tool! These tools allow you to work on documents in real time with others, with no need to exchange multiple copies.
Yes
javascript:void('');
Yes
No
javascript:void('');
Computer Password Protection: It is essential that you lock and password protect any computer, personal or business! Make sure to password protect your computer and set it to automatically lock after a period of idleness.
Yes
javascript:void('');
Yes
No
javascript:void('');
No
Yes
javascript:void('');
Yes
No/Not Sure
javascript:void('');
Hard Drive Encryption: Encrypting your hard drive adds a simple, fast, and free way to reduce your exposure to data theft and other malicious attacks on your computer.
Yes
javascript:void('');
Yes
Yes
javascript:void('');
Yes
Yes
javascript:void('');
Yes
No
javascript:void('');
Smartphone Encryption: Encrypting your smartphone hard drive is just as important as encrypting your computer hard drive. Consider doing so using an approved application.
No
javascript:void('');
Smartphone Documents: If you open documents on your smartphone, particularly E-Mail attachments, these documents are typically downloaded and saved locally. If the documents contain sensitive information, consider deleting them after you have read them.
Not Sure
javascript:void('');
Not Sure
No.
javascript:void('');
No.
I Do not Own a Smartphone.
javascript:void('');
I Do not Own a Smartphone.
Yes
javascript:void('');
Yes
No
javascript:void('');
Smartphone Lock: You should set your phone to lock at all times.
Through my/our office lease - provided via the building lessor, management company, etc.
javascript:void('');
Through my/our office lease - provided via the building lessor, management company, etc.
Yes
javascript:void('');
Others Have Network Access: This is a strong risk given you may not have control over other organization's employees, network usage habits, and who they may grant permission of access to. At a minimum consider a Virtual Private Network tool, this will encrypt your network traffic. Ensure any network drives your organization uses are password protected.
No
javascript:void('');
No
Yes
javascript:void('');
Guest Network Access: At a minimum set up a guest network if you are allowing access to your network by users other than those that belong to your organization.
No
javascript:void('');
No
Yes
javascript:void('');
Posted WiFi Passwords: A WiFi password your employees can see is a WiFi password guests, delivery people, and even passers-by can see. This may provide easy unwanted access to your network. Consider not posting your WiFi password in the open.
No
javascript:void('');
No
Through a commercial or business internet service provider.
javascript:void('');
Through a commercial or business internet service provider.
Other
javascript:void('');
Other
Complete
javascript:submit2('https://www.qnamarkup.org/doc/parse/html/','POST','t','You may download or print the suggestions here.')
Complete