answersLogoWhite

0


Best Answer

Confidentiality is very important because even if you weren't the one the blame you can still be sued. My first suggestion to you is to invest in an internet security suite. I recommend AVG Internet Security. You download it search for and download it at download.com. Most data is stolen either because malware sends information about the user to sketchy peope or the user is tricked into downloadin rogue software and infecting their computer. However an internet security suite will prevent this. The next precaution you can take is to download encrytion software. Lets say your computer is stolen or compromised if important files are encrypted it will give the thief a very difficult time accessing the files. The next and finale precaution is to only store confidential information if it is absolutely necessary. The less information that is stored the less of a chance someone will gain access to it.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are steps that a network administrator for a law firm will take to protect his client confidentiality?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Who is not bound by confidentiality?

client


Which reaction is NOT an exergonic reaction?

-Human service professional protect the client's right to privacy and confidentiality except when such confidentiality would cause harm to the client or others, when agency guidelines state otherwise, or under other stated conditions. Professionals inform clients of the limits of confidentiality prior to the onset of the helping relationship. What do you think of this?


What did the Tarasoff decision establish?

confidentiality must be broken when a client threatens a specific person


What are the confidentiality rules for wills?

what are the confidentiality rulesregarding awill drawn up by asolicitor and his client


Is a therapist in breach of client confidentiality if he tells one client things about another?

Yes. Any case in which a therapist discloses client information to another person is considered a breach of confidentiality. Even in legitimate cases of disclosure like contacting the authorities when a client reports abusing a child, it is still considered a breach of client confidentiality even though it is a legal mandate.


A network administrator is designing a network for a new branch office of twenty-five users What are the advantages of using a client-server model?

In that way it's much easier to control network, maintenance, and control user computers.


Is it against confidentiality agreement if you tell a client they went to a clinic as a child?

The confidentiality agreement is between the attorney and the client. Anything the client says to the attorney in secret must remain secret, under most circumstances. The attorney is not prohibited from telling the client anything.


Difference between database administrator and system administrator?

A System Administrator is generically responsible for all parts of the computer network, such as user accounts, computer accounts, domain trusts, email accounts, etc. The System Administrator is probably specialized in the network server operating systems and user administration. A Database Administrator would deal specifically and in depth with all aspects of one or more databases. The Database Administrator will be highly specialized with the specific database server and client software.


How does an interpreter deal with confidentiality?

An interpreter must sign confidentiality agreements for any company he/she works for stating that in any environment where a client is protected by confidentiality laws, he/she will abide by those confidentiality laws.


What is anonymizing network in security?

Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every organization, regardless of size, industry or infrastructure, requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today. Benefits of Network security Network Security is vital in protecting client data and information, keeping shared data secure and ensuring reliable access and network performance as well as protection from cyber threats.


How do you login novell from my cellphone?

There is no Novell client software for a cellphone but your network administrator may allow you to log in via a web page. Ask him/her for more info.


A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration What are two advantages of the new configuration?

- Data is more secure in the event of hardware failures. - Data resources and access are centrally controlled.