X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

(courtesy photo)

Consider this scenario: You are a lawyer heading to a café to meet with a client. At your side is your trusty tablet, a device whose use definitely tests the boundaries between professional and personal. With this device, you connect to the café’s wireless network. While going over work with your client and exchanging messages that will find their way onto ever more devices, the two of you are sharing a considerable volume of data, all of which is being transferred via the café’s unsecure network.

ALM Legal Publication Newsletters

Sign Up Today and Never Miss Another Story.

As part of your digital membership, you can sign up for an unlimited number of a wide range of complimentary newsletters. Visit your My Account page to make your selections. Get the timely legal news and critical analysis you cannot afford to miss. Tailored just for you. In your inbox. Every day.

Copyright © 2017 ALM Media Properties, LLC. All Rights Reserved.