In Jan 2019, hackers freely distributed a collection of 2.2 billion (yes, billion) unique usernames and associated passwords online.[i] Cyber-attacks that result in such data breaches are only increasing and pose a serious threat to the data mediators promise to keep private. With the dramatic rise of Online Dispute Resolution (ODR) and virtual communication and storage in light of the recent COVID-19 restrictions, mediators must discuss the importance of cybersecurity, and update our notions about what fulfills our ethical responsibility of confidentiality.
Cybersecurity
Cybersecurity is the protection of internet-connected systems like hardware, software and data from cyber-threats and unauthorized access that can be designed to access, delete, or extort a user’s sensitive and personal data.[ii] Perhaps the most media covered threats relate to geopolitical strife, massive hacks for profit and recognition, or ransom-ware attacks, where a virus locks someone out of their computer until a ransom is paid. However, the most common threats are simpler viruses and phishing, a form of fraud where the attacker masquerades as a reputable individual to distribute malicious links or attachments, typically over email, that can perform various functions and may even extract login credentials or account information.[iii]
The consequences can be severe. When usernames and passwords are stolen, even unskilled hackers could try leaked usernames and passwords on other public websites hoping that people have reused them. More experienced hackers only need an email and can use software tools to “guess” the passwords. If they succeed, they can do anything from changing your password, locking you out, or stealing any sensitive information like medical records or legal files. Cyber attacks don’t only compromise the computer they target either. Malware on one computer can jump to others. There is evidence that law firms have been targeted simply to be a route to reach one of their clients.[iv]
Confidential Information in Mediation
Mediators have adapted quite well to the threats to confidentiality in the mediation itself by tailoring introductions to the virtual landscape and using passwords and waiting rooms to keep unwanted parties out. However, a mediator’s ethical obligation to protect confidentiality begins not at the mediation, but the moment they receive any information related to the case. Such information is a treasure trove for hackers due to its sensitive nature and the fact it is collected together. Evidence of this is seen in how law firms of any size have become a significant target for hackers because they have access to sensitive information their clients consider worth suing over, all gathered in one place.[v] While the information mediators are privy to may not always be legal, it is still sensitive and personal. Family mediators are given information about a divorce, a mediator in personal injury will be provided medical records, and a business mediator could get patent information. For mediators to hold firm to our ethical principles and speak truthfully about confidentiality, we must confirm that the privileged information received before a mediation is genuinely safe.
How to Stay Secure
Change your passwords regularly. It’s inconvenient, but it’s necessary. The reality is you cannot expect to be informed or even aware of a data breach, so don’t rely on some notice to motivate change. LinkedIn was hacked in 2012, and passwords for nearly 6.5 million user accounts were stolen. Four years later, LinkedIn discovered that an additional 100 million email addresses and passwords had been taken in the same breach and had to forcefully invalidate many because the users had not changed their passwords over that period and were thus still compromised.[vi]
Use different passwords. If you use the same passwords for your business and personal accounts, both are essentially compromised in a breach. As I mentioned earlier, even novice hackers can simply use a username and password from one account and try it on others. Also, many websites now offer the option of logging in with your Google or Facebook account information. While that is certainly convenient, that means breaching just one of those accounts gives access to all of them. When Facebook was hacked, 50 million accounts gave access to millions more because they were all connected.[vii]
Conclusion
Cybersecurity can be overwhelming, but the threats to confidential information cannot be ignored. A cyber attack can expose the confidential information of the mediator, their clients, their colleagues, and anyone else they are digitally connected to. One of the founding ethical principles in mediation is confidentiality, and if we are going to stay true to that value, mediators must contemplate and implement cybersecurity protections to the fullest.
ENDNOTES
[i] Foote, A. (2019). Hackers are Passing Around a Megaleak of 2.2 Billion Records. Retrieved on October 13, 2020 from: https://www.wired.com/story/collection-leak-usernames-passwords-billions/?utm_source=twitter&utm_medium=social&utm_campaign=wired&utm_brand=wired&utm_social-type=owned&mbid=social_twitter
[ii] Gillis, A.; Clark, C. (2019). What is cybersecurity? Everything you need to know. Retrieved on November 24, 2020 from: https://searchsecurity.techtarget.com/definition/cybersecurity
[iii] Gillis, A.; Bedell, C.; Cobb, M.; Loshin, P.; Scheumack, M. (2019). Phising. Retrieved on November 24, 2020 from: https://searchsecurity.techtarget.com/definition/phishing
[iv] Polley, V. (2014). Cybersecurity for Lawyers and Lawfirms. Retrieved on November 24, 2020 from: https://www.americanbar.org/groups/judicial/publications/judges_journal/2014/fall/cybersecurity_for_lawyers_and_law_firms/
[v] Sullivan, C. (2020). Ransomware Hits Law Firms Hard – And It’s Worse Than Ever Before. Retrieved on October 13, 2020 from https://www.logikcull.com/blog/maze-ransomware-law-firms
[vi] Gunaratna, S. (2016). LinkeIn: 2012 data breach much worse than we thought. Retrieved on October 13, 2020 from: https://www.cbsnews.com/news/linkedin-2012-data-breach-hack-much-worse-than-we-thought-passwords-emails/
[vii] Manjoo, F. (2018). Why You Shouldn’t Use Facebook to Log In to Other Sites. Retrieved on November 24, 2020 from: https://www.nytimes.com/2018/10/02/technology/personaltech/facebook-log-in-hack.html
[viii] Johansen, A. G. (2020). What is encryption and how does it protect your data? Retrieved on November 24, 2020 from: https://us.norton.com/internetsecurity-privacy-what-is-encryption.html
PGP Mediation Blog by Phyllis G. Pollack In her July 2011 edition of One Minute Negotiation Tips (published by the Los Angeles County Bar Association) (Volume IV, No. 6) my...
By Phyllis PollackA skilled magician can make us see what isn’t there. We watch the silver dollar vanish but not the magician deftly palm the coin. Magic is filled with tricks —...
By Diane J. LevinIn this episode of the ICODR podcast, Ian interviews Dr. Tsisana Shamlikashvili, an international expert in ADR, international mediator, lawyer, neurologist and psychologist (with both medical and law degrees). She has been...
By Ian MacDuff