Zix Blog

Clinton’s Email Practices Sharply Criticized

Wed, 05/25/2016 - 15:44 by ZixCorp
We’ve been reading today that the State Department’s independent watchdog has severely criticized former Secretary of State Hillary Clinton for using a private email server during the course of her public business. In an obvious rebuke, the State Department Inspector General’s report says that Ms. Clinton’s use of her private server was a violation of State Department policies and practices. According to CNN , the report says a then director of the Office of Information Resources Management “stated that the Secretary's personal system had been reviewed and...
Read More

Webinar Round-Up: Enhancing Your Data Protection with ZixDLP

Wed, 04/09/2014 - 14:47 by ZixCorp
Email is the number one app used in business communications and still the preferred method for sharing information and documents. As a result, it’s where a large amount of your company’s IP and sensitive information can be found – and where security policy violations occur. While malicious hackers or even hostile insiders can pose a security threat, loyal employees can also make mistakes that have the potential to lead to a security breach as they move information around in email and expose your organization to compliance violations, security issues…or worse. Since email continues to be the...
Read More

Recent Email Breaches Illustrate Exposure of Unencrypted Email

Fri, 05/31/2013 - 09:00 by ZixCorp
The Final HIPAA/HITECH Omnibus Rule took effect on March 26, 2013. It was a historic event in the healthcare industry, and its impact is shining light on the vulnerability of unencrypted email. In the last month, we’ve witnessed a trend in email-related breaches. Three recently reported email breaches (see below) serve as a sobering reminder that sending PHI through unencrypted email can result in a breach. This is a good time to keep in mind that email encryption and email data loss prevention are critical components to your security and compliance strategy. ZixCorp has helped thousands of...
Read More

Our Launch into DLP

Thu, 02/21/2013 - 14:35 by Geoff Bibby
Until recently all we’ve focused on is the advancement and optimization of email encryption. We have email encryption in a good place, delivering secure email as easy as regular email. No steps. No passwords. While we continue to invest in our email encryption, we saw a great opportunity to expand into a new technology – data loss prevention (DLP) – with a new product – ZixDLP . The opportunity was born out of listening to complaints about the complexity, cost and resources required to implement DLP coupled with our depth of email experience. So with that in mind, let’s dive into: “Why did we...
Read More

Law Firm: Cryptography is Going Mainstream

Wed, 11/07/2012 - 10:30 by Jim Brashear
On the Privacy and Security Matters blog sponsored by the Mintz Levin law firm, Sara Crasson has a great observation about the growing use and importance of encryption to protect sensitive data - including sensitive data in email. The Internet has become a primary medium for everyday communication, but individuals rarely consider the potential data security problems. Sending an e-mail or instant message is like dropping a postcard in the mail. Many people handle a postcard as it travels to its final destination, and a message can be seen, copied, and misused. E-mails have the same risks,...
Read More

Boilerplate Confidentiality Notices in Email - Why Bother?

Thu, 09/20/2012 - 16:18 by Jim Brashear
Recent conversations on the Association of Corporate Counsel message boards have considered whether there is any value in appending to emails an automated notice to the effect that the contents may be confidential or privileged. Law firms typically include those notices at the bottom of emails. Here's a typical example: This electronic message is confidential and is intended only for the use of the individual to whom it is addressed. The information may also be legally privileged. This transmission is sent in trust, for the sole purpose of delivery to the intended recipient. If you have...
Read More

ABA: Lawyers Must Implement Reasonable Data Security for Client Information

Tue, 08/07/2012 - 22:30 by Jim Brashear
This week, the American Bar Association (ABA) House of Delegates adopted changes to Model Rule 1.6 of the ABA Model Rules of Professional Conduct. New subsection (c) adds the following sentence to the model rule: “A lawyer shall make reasonable efforts to prevent the inadvertent disclosure of, or unauthorized access to, information relating to the representation of a client.” In comments to the revised model rule, the ABA provides a non-exclusive list of factors to be considered in determining the reasonableness of the lawyer’s data security efforts. They include: •the sensitivity of the...
Read More

Lawyer Use of Cloud Services, Part 2 – Reasonable Steps to Protect Confidentiality and Privacy

Fri, 07/20/2012 - 16:45 by Jim Brashear
Part one of our discussion of the evolving ethics rules about lawyers’ use of Cloud services covered Massachusetts State Bar Opinion 12-03 (May 2012). In part two, I’d like to explore steps lawyers should consider in light of the Massachusetts Bar Association Opinion. Risk of Interception and Reasonable Preventative Measures The Massachusetts Bar Association acknowledges in Opinion 12-03 that the use of Cloud services involves "a small, but genuine risk of unauthorized access or interception." It cites Opinion 00-1 (1998) which notes that email also carry some risk of interception. Opinion 00...
Read More

Lawyer Use of Cloud Services Versus Email - An Ethical Distinction Without a Practical Difference

Thu, 07/12/2012 - 11:00 by Jim Brashear
In earlier Legal Industry Series posts, we've examined the evolving ethics rules concerning lawyers' duty to protect the confidentiality of client information transmitted via the internet or stored in the "Cloud." In August 2012, the American Bar Association delegates will consider amendments to Model Rule 1.6 that would clarify the lawyers' responsibilities to take reasonable steps to protect electronic information related to the representation of a client. In the meantime, let's examine recent guidance from the Massachusetts Bar Association. Massachusetts Bar Association Opinion 12-03 On...
Read More

Guest Article on Attorneyatwork.com

Tue, 04/24/2012 - 14:45 by ZixCorp
Our very own Jim Brashear contributed an article for the Daily Dispatch via www.attorneyatwork.com . Titled "Sensitive Email? Things to Know Before Hitting Send," Jim covers the top five things lawyers need to consider before emailing sensitive information. Read the full article here . For more information on privacy laws and email encryption for lawyers, register for the free webinar Raising the Bar on Client Email Confidentiality , Thursday, May 3, 2012, at 2 p.m. ET.
Read More

Pages

Subscribe to RSS - Email Leaks

Switching to Zix Just Got Better

50 percent or more off your first year when you switch to Zix Email Encryption by Feb. 28, 2017, from an eligible competing solution.

Learn More