Zix Blog

Board Communications: A Better Security Approach to Managing Data Risks

Wed, 09/25/2013 - 11:00 by Jim Brashear
Thomson Reuters recently published its 2012 Board Governance Survey Report, Meeting Expectations of Board Governance: Board Oversight, Communications and Technology in a Global Landscape . The report notes the increased workload for the Corporate Secretary. On average, among responding corporations, 92 board books are created annually – each an average of 116 pages. That’s over 10,000 pages of board materials per year! Much of that material is sent to outside directors and advisors electronically. A disturbing aspect of the report is "a surprising absence of security measures taken in board...
Read More

Our Launch into DLP

Thu, 02/21/2013 - 14:35 by Geoff Bibby
Until recently all we’ve focused on is the advancement and optimization of email encryption. We have email encryption in a good place, delivering secure email as easy as regular email. No steps. No passwords. While we continue to invest in our email encryption, we saw a great opportunity to expand into a new technology – data loss prevention (DLP) – with a new product – ZixDLP . The opportunity was born out of listening to complaints about the complexity, cost and resources required to implement DLP coupled with our depth of email experience. So with that in mind, let’s dive into: “Why did we...
Read More

Going the Extra Mile Delivers Competitive Advantage

Wed, 11/14/2012 - 16:35 by ZixCorp
Email encryption enables businesses to confidently exchange sensitive information with customers and partners. It protects outbound email and automatically encrypts any replies. But what happens when customers and partners need to initiate a secure email from their side? How can businesses extend that secure experience? ZixCorp Secure Compose is the solution. A feature of ZixPort , Secure Compose allows your customers and partners to initiate a secure email without any complicated set-up process. Without delay, your customers and partners can initiate a new encrypted email through two...
Read More

Boilerplate Confidentiality Notices in Email - Why Bother?

Thu, 09/20/2012 - 16:18 by Jim Brashear
Recent conversations on the Association of Corporate Counsel message boards have considered whether there is any value in appending to emails an automated notice to the effect that the contents may be confidential or privileged. Law firms typically include those notices at the bottom of emails. Here's a typical example: This electronic message is confidential and is intended only for the use of the individual to whom it is addressed. The information may also be legally privileged. This transmission is sent in trust, for the sole purpose of delivery to the intended recipient. If you have...
Read More

ABA: Lawyers Must Implement Reasonable Data Security for Client Information

Tue, 08/07/2012 - 22:30 by Jim Brashear
This week, the American Bar Association (ABA) House of Delegates adopted changes to Model Rule 1.6 of the ABA Model Rules of Professional Conduct. New subsection (c) adds the following sentence to the model rule: “A lawyer shall make reasonable efforts to prevent the inadvertent disclosure of, or unauthorized access to, information relating to the representation of a client.” In comments to the revised model rule, the ABA provides a non-exclusive list of factors to be considered in determining the reasonableness of the lawyer’s data security efforts. They include: •the sensitivity of the...
Read More

Lawyer Use of Cloud Services, Part 2 – Reasonable Steps to Protect Confidentiality and Privacy

Fri, 07/20/2012 - 16:45 by Jim Brashear
Part one of our discussion of the evolving ethics rules about lawyers’ use of Cloud services covered Massachusetts State Bar Opinion 12-03 (May 2012). In part two, I’d like to explore steps lawyers should consider in light of the Massachusetts Bar Association Opinion. Risk of Interception and Reasonable Preventative Measures The Massachusetts Bar Association acknowledges in Opinion 12-03 that the use of Cloud services involves "a small, but genuine risk of unauthorized access or interception." It cites Opinion 00-1 (1998) which notes that email also carry some risk of interception. Opinion 00...
Read More

Lawyer Use of Cloud Services Versus Email - An Ethical Distinction Without a Practical Difference

Thu, 07/12/2012 - 11:00 by Jim Brashear
In earlier Legal Industry Series posts, we've examined the evolving ethics rules concerning lawyers' duty to protect the confidentiality of client information transmitted via the internet or stored in the "Cloud." In August 2012, the American Bar Association delegates will consider amendments to Model Rule 1.6 that would clarify the lawyers' responsibilities to take reasonable steps to protect electronic information related to the representation of a client. In the meantime, let's examine recent guidance from the Massachusetts Bar Association. Massachusetts Bar Association Opinion 12-03 On...
Read More

Is Email Encryption Like a Racecar?

Mon, 06/18/2012 - 15:27 by ZixCorp
Eric Ouellet, a Gartner Vice President, thinks so. How do they relate? When cars first entered the market, brakes were not included (a crazy thought!). When asked why brakes were added, most people naturally suggest that brakes enable drivers to stop. Mr. Ouellet points to the contrary – brakes were added so drivers could go faster! Mr. Ouellet proposes that if brakes were meant to stop, they would force cars to a hard stop and nothing else. In actuality, brakes enable cars to decelerate when needed. They allow drivers to take on more risk and increase their speed, knowing they can easily...
Read More

Guest Article on Attorneyatwork.com

Tue, 04/24/2012 - 14:45 by ZixCorp
Our very own Jim Brashear contributed an article for the Daily Dispatch via www.attorneyatwork.com . Titled "Sensitive Email? Things to Know Before Hitting Send," Jim covers the top five things lawyers need to consider before emailing sensitive information. Read the full article here . For more information on privacy laws and email encryption for lawyers, register for the free webinar Raising the Bar on Client Email Confidentiality , Thursday, May 3, 2012, at 2 p.m. ET.
Read More

Recent State Bar Opinion Offers Law Firms Guidance on Cloud Data Security

Tue, 03/13/2012 - 14:48 by Jim Brashear
With the American Bar Association (ABA) TECHSHOW coming up later this month in Chicago, it’s an opportune time to review a recent state bar opinion regarding law firms’ use of cloud-based Software-as-a-Service (SaaS). Because our ZixCorp Email Encryption Services are SaaS security solutions for Web-based email, this subject is near and dear to me. In late January, the North Carolina State Bar published 2011 Formal Ethics Opinion 6 : Subscribing to Software as a Service While Fulfilling the Duties of Confidentiality and Preservation of Client Property . The opinion cites the state’s ethics...
Read More

Pages

Subscribe to RSS - Communication

Switching to Zix Just Got Better

50 percent or more off your first year when you switch to Zix Email Encryption by Feb. 28, 2017, from an eligible competing solution.

Learn More