Page 15 - 114th Edition
P. 15
114th Edition 29th November 2016
Computer Forensics Expert:
www.thegoodnewsnp.com.au
How To Keep Anyone From
Snooping Around Your Cloud
By: Scott P Greene
Article continued from unknown if there is healthcare, businesses In 2001, the PATRIOT vacy issues. It should PLAIN English.
page.. 11 a back door they are must strike a balance Act further added to be up to the organiza- Call for Electronic
2) Use an “On The able to use to access between government the authority of the tion or individual to Evidence Answers:
Fly” encryption prod- data stored on their oversight and con- federal government to establish a policy re- 866-795-7166
uct which encrypts servers. sumer privacy. search records under garding exactly what, or
data as it is stored by Businesses are acutely The U.S. Electronic its “Library Records” when and to whom http://www.Evi -
almost any online stor- denceSolutions.com
age provider. Prod- Scott Greene is a Se-
ucts like BoxCryptor, nior Technology Fo-
Cloudfogger, Safe- rensics Examiner for
Monk, and Viivo in- Shucks! This Cloud Evidence Solutions,
tegrate with the Cloud Is Locked Too! Inc. He has been doing
Storage provider(s) of Data Recovery, Com-
your choice encrypt- puter, Technology and
ing data locally, but Digital Forensics, and
seamlessly before it EDiscovery work for
is stored in the Cloud. over 30 years. Scott
These services pro- is the CEO of Evi-
vide encryption com- dence Solutions, Inc.
pletely separate from Scott and Evidence
the storage provider, Solutions have been
ensuring even the involved in Civil &
storage provider em- Criminal Cases, for
ployees can’t access Plaintiff, Defense and
data stored in their Special Master in Jus-
company’s Cloud. tice, Superior & Dis-
3) Choose a provider trict Courts as well as
that encrypts the data Internationally. He is
as part of their ser- a frequent speaker for
vice. Storage-As-A- many regional and na-
Service companies tional organizations.
like SpiderOak, iDrive sensitive to govern- Communications Pri- provision, offering a they disclose informa- Scott enjoys traveling
and Comodo not only ment information re- vacy Act of 1986 was wide range of person- tion from their Cloud to share his unique
transfer your data via quests due to their enacted in the early al material into which service provider.. knowledge of technol-
an encrypted proto- legal responsibilities days of the Internet. it could delve. scott@evidencesolu- ogy and forensics.
col, these companies under privacy laws, The act did not require We are not suggesting tions.com Article Source: http://
also store the data in such as HIPAA and government investiga- people should try to By Scott Greene EzineArticles.com/
an encrypted format the Gramm-Leach- tors to obtain a search skirt around the PA- Electronic Evidence expert/Scott_P_
preventing those who Bliley Act. Therefore, warrant for request- TRIOT Act. But com- Expert Witness Greene/1969505
don’t have an access in highly regulated ing access to emails panies and individuals Evidence Solutions,
key from easily view- industries, such as fi- and messages stored should do their best to Inc.
ing your data. It is nancial services and in online repositories. comply with data pri- Electronic Evidence in
Page 15
Page 15