skip to content
Law Institute Victoria
Library Resources
LIV Website - HOME
Practice Resources
Login
Library
Search Catalogue
Request Research
Home
>
Practice Resources
>
Library
>
Full Record
Print Friendly
Full Record
< Back To Results
|
Email Record
Smartphone security tips
Record ID:
83981
Format:
LIJ Article
Year:
2020
Pagination:
15
Author:
Derkley, Karin
;
Subject:
Mobile Phones
;
Security
;
Cyberlaw
;
Data Protection
;
Risk Assessment
;
Source:
LIJ (2020) 94 No 4
Date_of_entry:
31/03/2020
Notes:
Smartphones -- cyber experts suggest 10 tips for phone use.
Section:
News
Month:
April
Request Article
Item Availability
Item Availability
Similar Items
Similar Items
Expand
|
Email
|
Save
The weakest link
Author:
Blomfield, Ian ;
Year:
2017
Subject:
Technology
;
Cybercrime
;
Law Firms
;
Cyberlaw
;
Data Protection
;
Security
;
Notifiable data breaches: it's complicated
Author:
Horton, Fabian
;
Year:
2018
Subject:
Privacy
;
Risk Assessment
;
Data Protection
;
Cyberlaw
;
Data security in practice
Author:
Wakeling, Adam
;
Asthana, Molina
;
Moran, Peter
;
Year:
2019
Subject:
Privacy
;
Data Protection
;
Security
;
Cyberlaw
;
Necessity or nicety
Author:
Wise, E.J.
;
Year:
2020
Subject:
Technology
;
Cyberlaw
;
Security
;
Risk Assessment
;
Insurance
;
Password security
Author:
Faris, Peter
;
Year:
1996
Subject:
Security
;
Computer Hacking
;
Data Protection
;
Practice security
Author:
Reynolds, Adam
;
Year:
2002
Subject:
Security
;
Data Protection
;
Law Office Management
; This article discuss data security for the law firm: - headings includeback- up security and access security, the article also has a 6 point "to do"list ;
Lessen the loss
Author:
Reynolds, Adam
;
Year:
2007
Subject:
Information Technology
;
Security
;
Data Protection
;
Security in hand
Author:
Reynolds, Adam
;
Year:
2008
Subject:
Security
;
Data Protection
;
Smart Phones
;
Personal Digital Assistants
;
Breaching data security
Author:
Jackson, Margaret
;
Year:
2009
Subject:
Security
;
Data Protection
;
Law Reform
;
Comparative Law
;
How secure is your firm?
Author:
Derkley, Karin
;
Year:
2017
Subject:
Law Firms
;
Data Protection
;
Risk Management
;
Cybercrime
;
Security
;
Information Technology
;
Law Office Management
;
DLA Piper
;