Thomas Shaw
This month, our committee's new book, Information Security and Privacy -A Practical Guide for Global Executives, Lawyers and Technologists, will become available (here). The ABA bookstore's webpage shows the table of contents, all of the contributors and part of the first chapter. But I wanted to do more to give a flavor for what is inside, so the following are a series of brief extracts from the book. In creating a book with such a (very) large number of contributors, most if not all of whose
more » ... f not all of whose work was intertwined with the work of others, it is not possible to individually credit each author's writing in each section. As such, I am using this article as a way to credit and give face to some of those contributors whose writings truly excelled. Now that the book is published, here are some ways to get it promoted. The book will be reviewed in the upcoming issue of SciTech Lawyer. We are also having a number of testimonials written on the book. There is a whole marketing plan around the book's publication, including an upcoming press release. There are also a variety of non-traditional marketing efforts underway to widely disseminate the book, including blurbs by presenters at the RSA conference and availability in the RSA bookstore, outreach to non-lawyer organizations and contacts with foreign bar associations. Please feel free to recommend this book to colleagues and clients and add it to your professional networks and presentations. Congratulations to all of you who wrote so well and thank you all for your team work. I also wanted to thank here not only those who followed through on their authoring commitments but several others who agreed to step into the breach when the original authors could not meet those commitments. Leading this group is Charlene Brownlee, who stepped in to help not just once but twice. Also stepping in and accepting the call to pick up the baton were Edward R. McNicholas, Rebecca Grassl Bradley, Daniel Garrie, Benjamin Tomhave, Dan Oseran and Steven Teppler. Your assistance in this complex endeavor is very much appreciated and made the book so much the better. The Extracts -Introductory Paragraphs Encryption -Robert Jueneman (in Chapter 5) The need for encryption has increased parallel to the increased movement of data outside controlled environments. The use of the Internet in all its forms, the vast increase in the use of outsourcing, and many new types of mobile technology mean that an organization's data may need to be protected at all times in all locations. Several key questions must be addressed in creating a cryptographic system that deploys encryption: