We value your privacy

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

  • Schedule a Deposition
  • Download Transcripts & Exhibits
  • Access Records & Subpoenas
  • Filing Date Calculator
  • Pay by Credit Card
  • Partner Portal & Community
  • Visit Veritext Canada
Veritext
  • About Us
    • Executive Team
    • News
    • Careers
    • Awards & Recognitions
    • Industry Advocacy
    • Sustainability & Veritext Cares
  • Services
    • Court Reporting
    • Legal Video Technology
    • Remote Proceedings
    • Exhibit Solutions
      • Exhibit Share
      • Exhibit Capture
      • Advanced Case Exhibits (ACE)
    • Deposition Summaries
    • Process Service
    • CLE – Education
    • Privacy & Data Security
  • Solutions
    • For Law Firms
    • For Corporations
    • For Government
    • For Complex Cases
      • For Arbitrations
      • For Bankruptcy
    • For Independent Contractors
  • Repositories
    • MyVeritext
    • Bankruptcy Transcript Orders
    • Construction Defect
    • Veritext Vault
    • Records Retrieval
  • Contact Us
    • Find a Location
    • Selling Your Business
    • Request Information
    • Veritext Blog
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Access MyVeritext Client Portal

Data Security Ethics and Best Practices for Court Reporters

By Andy Fredericks I Director of Reporter Engagement

The issue of digital security and privacy should be a paramount concern to the modern court reporter.  Your biggest risk? Believing “it won’t happen to me.”

Individuals and companies, small and large, often neglect developing their security infrastructure until an attack occurs and it’s too late. No one is spared from the interest of cyber-criminals. Largely hackers are indiscriminate in their approach, choosing to cast a broad net to collect information and reviewing what they’ve plundered for value after the attack. It’s not necessarily about YOU, it’s about the numbers.

As guardians of the record, court reporters have access to a broad expanse of privileged and confidential information and it is their individual responsibility to protect that data. The NCRA’s Code of Professional Ethics states, “(Reporters must) preserve confidentially and ensure the security of information, oral or written, entrusted to the reporter by any parties in a proceeding.” This extends to work product transmitted or stored by your devices and any individuals you employ in your professional practice, i.e. Scopists and Proofreaders.

The first step in protecting yourself is recognizing that the human factor is weakest link to your security infrastructure and acting to protect your digital security based on that fact.  With the busy life of a court reporter it’s difficult to stay apprised of the latest security trends. The good news is that there are some core guidelines that are a sound starting point to develop your digital security toolkit and to mitigate your risk and exposure. Here are some of our top recommendations as to how you can protect yourself and your work product.

Keep your software up to date

Turn on your automatic updates and don’t ignore them when prompted. Out of date software that hasn’t been patched for security loopholes is often the point of entry for malicious attacks. Updating software can be annoying when you are trying finish that expedite, but it will be a lot more annoying when it is used against you!

Utilize two factor authentication

  1. Two factor authentication is widely available for most secure websites and applications and is FREE to use. Two factor authentication requires you to type in your password to access an account, but then requires that you type in a second randomly generated pin number that is sent by push or SMS notification to your mobile device.
  2. The benefits of two factor authentication are that cyber criminals now require two pieces of information to access your account and if you are receiving pin codes while not trying to access your account, you’re alerted that someone else is and you can take the appropriate actions.

Create and maintain solid passwords

  1. If you’re using “Password”, “1234” or any simple variation thereof, you are creating more of a personal burden to access your own accounts than an actual boundary for a hacker. Simple passwords are as ineffective as not having a password at all.
  2. Lock your computer and mobile devices with a complex password.
  3. Use a mixture of characters, including characters and numbers, the longer the better.
  4. Don’t write your passwords down.
  5. Don’t use the same password for multiple important accounts.
  6. Having multiple passwords, especially lengthy ones can be difficult to remember.  Use a password management tool to keep them all secure and in one place.

Think twice and exercise skepticism when you receive strange e-mails or phone calls

  1. Just because a link looks safe, doesn’t mean that it is. Links can be sent in e-mails or messages that look a website you know or trust, but re-direct to a different website all together.
  2. To combat this, hover over the link in your e-mail browser (without clicking) and the actual website that the link will take will be displayed. Review the website to make sure it’s where you want to go.
  3. Social engineering is becoming an increasingly popular tactic employed by hackers to take advantage of seemingly real situations and to manipulate the target into revealing personal or financial information.

Install anti-virus protection on your devices

Like we said in our first recommendation, make sure to set your anti-virus protection to automatically update or to accept any updates when prompted. Your anti-virus protection is only doing its job properly if it is up to date to combat the latest cyber-security threats.

Back up all your data and information

  1. Last, but not least, back up all your data! If something does compromise your device the only guaranteed way to recover the information is through a backup.
  2. Consider using a cloud based back up service
  3. If you back up to an external hard-drive make sure the device is removed from the internet and that it is stored in a physically secure space

Learn More about Digital Security

Want to learn more about digital security and how to best protect yourself?  Register for our complimentary CEU Webinar “Data Security Ethics and Best Practices for Court Reporters”

Questions about this article?  E-mail: CourtReporter@veritext.com

PARTNER NEWS
April 29, 2025

Veritext’s Mike Murray Featured on Legalweek 2025 Mixtape: Day One – Reinventing Professional Services

April 7, 2025

Veritext Legal Solutions Pioneers Sustainability in the Legal Services Industry

Womens History Month 2025
March 19, 2025

Women’s History Month 2025

March 18, 2025

Veritext Legal Solutions Introduces AI-Generated Smart Summaries for Arbitrations, Hearings and Court Trials

March 11, 2025

Veritext Legal Solutions Sweeps First Place across Multiple Categories in the 2025 Best of National Law Journal Awards

February 8, 2025

Black History Month

February 5, 2025

Veritext Welcomes Tampa, FL-Based Reporters On Madison

View All

RESOURCES

MyVeritext
Careers at Veritext
CLE Webinars
Veritext Court Reporting Scholarship
Policies, Terms & Conditions

NAVIGATION

  • Home
  • About Us
  • Services
  • Blog

Scheduling

Schedule a Deposition
Download Transcripts & Exhibits
Records & Subpoenas
Pay By Credit Card
Partner Portal & Community
Schedule Deposition

Contact Information

Find a Location
Contact Us Online

       
© Copyright 2025, Veritext, LLC
Link to: Veritext Partners with the FCRA to Promote the A to Z™ Program Link to: Veritext Partners with the FCRA to Promote the A to Z™ Program Veritext Partners with the FCRA to Promote the A to Z™ Program Link to: Veritext Legal Solutions Expands Presence in Southern California Link to: Veritext Legal Solutions Expands Presence in Southern California Veritext Legal Solutions Expands Presence in Southern California
Scroll to top