You should research current digital security best practices based on your individual threat model. But for posterity (and insight into organizing training sessions), check out our materials from our Digital Security Training with ACLU DC and Georgetown Law’s Institute for Technology Law & Policy in August 2017.

See also Georgetown Law’s Institute for Technology Law & Policy’s blog post. These materials serve as learning aids only and are not legal advice. Please note some of these instructions and recommendations may be out of date.

Digital Security Training Handouts

Digital Security Training Presentations

Leave a Reply

Your email address will not be published. Required fields are marked *