• Executive Summary: Encryption

    Encryption involves transforming data from “plaintext” into “ciphertext” using keys generated by algorithms.  Encrypted data must be decrypted, which can easily be done with the right key.


  • Don’t stand in my shoes

    Privacy laws like the Stored Communications Act and the Computer Fraud and Abuse Act can interfere with trust and probate law by making it difficult for fiduciaries to access digital records as part of client planning and estate settlement.


  • Executive Summary: Third Party Vulnerability

    Third parties are not always predictable, rational, reliable, timely, or trustworthy. When third party reliance is unavoidable, optimized systems minimize this vulnerability by distributing responsibility across several third parties where only a portion of them must perform at any given time.