The Law Offices of Mary N. Chaney, P.L.L.C.
The Cyber Security Law Firm of Texas

Mary's Blog

The Breach Whisperer

About Mary....

Mary N. Chaney, Esq., CISSP® is a former Special Agent for the FBI where she investigated cybercrime, a seasoned corporate executive that built and operated information security teams and now a cybersecurity attorney.

As a self-described “Breach Whisperer” our firm can train your company to properly prepare for your eventual breach!

The overall goal of our firm is to use our wealth of knowledge and expertise to help support, translate and advise, Boards of Directors, CIO's, CISO's and General Counsel's on how to legally protect their company from cyber related risk.

Blog Entries


Evidently Some Lawyers Need "Help" On How To Redact A Document

See Article Here

My head scratching moment for the week.

If you haven’t heard, the lawyers for Paul Manafort filed a .pdf document with the court in response to the Muller inquiry with portions that were redacted. The problem, if a person copies the text of that filing and paste it into another document the redacted portions are revealed. What did they do just use the highlighter function and change the highlight color to black as opposed to yellow? Really? When I saw this article (and news coverage) I said whoa, who forgot the Sharpe? Way back in the day, when I was in law school, I had a job with a company that was responsible for bates numbering (a way of indexing documents by number) and redacting documents for litigation. Not only were you supposed to redact manually with a Sharpe but you then copy the document so you couldn’t read through to the original text.

Any type of court case, has so much paper so the move to electronic documents is a good thing. But is it hard to redact a .pdf document? Ummmm… not supposed to be that hard. Actually Adobe (not promoting the software) has a “redact” button, as well as a sanitize document function, that will prevent these types of clerical errors. If this law firm can’t manage to effectively redact a document, I wonder what there other data security processes or controls are like?