Previous Page  25 / 462 Next Page
Information
Show Menu
Previous Page 25 / 462 Next Page
Page Background

GAZETTE

JANUARY/FEBRUARY 1991

Whether maintenance is per-

formed on site or on-line, by means

of a modem and on-line computer

diagnostics, the problem is that the

data stored is accessible to the

maintenance engineer or mechanic

who is performing the repair or

maintenance. Such a person can

readily access and copy all one's

clients' stored confidential data,

and if so minded make improper or

even fraudulent use of same.

It would appear that there is a

legal responsibility on a solicitor to

take reasonable steps to ensure

that the confidential information

stored on computer is not disclosed

to unauthorised persons. The pro-

blem is how is this to be achieved

as it is unrealistic to expect one's

clients to sign a general waiver.

However, one should make sure

that at least one's maintenance

contract includes a covenant

regarding confidential data and

unauthorised disclosure by the

company's employees.

As communication is becoming

a widely used microcomputer ap-

plication, the risk of unauthorised

access to one's data is becoming a

very real problem. Most of the

communications software available

today allows one to put one's

computer into an "auto-answer"

mode, wh i ch means it will

automatically answer any phone

call it receives. In this way anybody

with the phone number of your

computer can, theoretically, access

all the data files and programs on

your computer from a remote

location. This is how on-line com-

puter diagnostics works.

. . . t he re is a l egal res-

ponsibility on a solicitor t o take

reasonable steps t o ensure t hat

t he con f i den t i al i n f o rma t i on

s t ored on compu t er is not

d i s c l o s ed t o u n a u t h o r i s ed

per sons ."

However, communications soft-

ware programs nowadays do have

password protection so that only

those with the correct password

are able to gain access to hardware

and software data on the phone. If

a person has a working knowledge

of the password scheme and the

operating system, such a person

can of course obtain access to

one's data.

In fact it is now possible for data

to be removed from computers

from outside the building. The

radiation emitted from a VDU is

sufficiently powerful to be received

by anyone using an ordinary

television set, a standard television

aerial and a frequency modulator a

hundred metres away. This can be

done even where an office is full of

VDUs because the frequency signal

from each is different.

Finding information on a hard

disk is easy. There is a Public

Domain software program called

Whereis available that will search

through all the directories on disk

to find a specific file. Once an

unauthorised person has gained

access to one's computer he can

carry out a search for anything that

might be of interest in the

directories, and download that in-

formation. Even a particular word

or phrase can be searched for on an

entire disk. Files and directories

can, however, be hidden. Attributes

such as "hidden" and "read only"

can be assigned to programs and

data.

Utilities are also available on the

market which enable one to create

"secret" directories. In order for

these schemes to be effective, the

utilities used to hide the files and

data have to be removed from user

access: likewise directory utilities

which will show hidden files have

to be removed from user access.

Security packages, which in-

clude password assignments for all

users and encrypt or scramble data

files are available. These packages

do have drawbacks viz: —

(a) reduced processing speed;

(b) increased administrative tasks

e.g. assigning passwords, user

access, data file security, data

file security levels.

(c) pre-planning and determination

of who shall have access to

what on the hard disk.

(d) assignment of a hierarchy of

security levels for files depend-

ing on the sensitivity of the

data stored on them, and the

availability thereof to certain

users;

(e) regular monitoring of the

passwords assigned, and the

hierarchy of security levels, is

essential;

(f) the very real risk of forgetting

the password!; and

(g) inconvenience.

They do, however, provide the

highest level of data security

available for microcomputers.

There is software and hardware

on the market which will only allow

access to users at specific times;

that will make certain directories,

files, etc. unavailable to certain

staff or will only allow certain staff

access to certain files and prevent

them changing those files.

Electronic keys, or dongles, are

another form of security devjce.

These are hardware units which

slot into a 'key-ring' connected to

the printer port and allow use of the

computer to key carrying personnel

only.

There is another device which is

a combination of smartcards and

signature recognition pads. This

involves the person requiring

access to the system slotting his

smartcard into a receiver and then

signing an electronic pad. The

smartcard contains a three dimen-

sional image of the person's

signature which the control com-

puter uses to check against the one

WENTWORTH - Lr.

Grand Canal St.

• C. 2,250 Sq Ft Adj. Merrion Sq

• Superb Finish (Incl. Carpets etc.)

• Flexible lease term

• On Site Carparking

Joint Agents:

Sherry

fitzGerald

S 616198

6