Law and Technology Tech Terms for Lawyers


This year we at Law Axis will be sharing with you different tech Terms that Lawyers and law students should know.

In this episode, we begin with Access Control. Access Control is majorly a security principle to control individual access to a location, software or hardware.

The means and mechanisms of managing access to and use of resources by users. There are three primary forms of access control: DAC, MAC, and RBAC. DAC (Discretionary Access Control) manages access through the use of on-object ACLs (Access Control Lists), which indicate which users have been granted (or denied) specific privileges or permissions on that object. MAC (Mandatory Access Control) restricts access by assigning each subject and object a classification or clearance level label; resource use is then controlled by limiting access to those subjects with equal or superior labels to that of the object. RBAC (Role Base Access Control) controls access through the use of job labels, which have been assigned the permissions and privilege needed to accomplish the related job tasks. (Also known as authorization.)

Source: Cybersecurity Glossary of Terms Global Knowledge.

Unauthorized access to system resources is prevented by using access restrictions. You may better manage your assets by creating access control solutions that are tailored to your organization. DAC, RBAC, and MAC access control systems are examples of paradigms that have been utilized to develop reliable and secure access control systems. DAC will be easier to adopt for businesses with smaller applications. Others who deal with highly confidential or sensitive data may opt for RBAC or MAC solutions.

We hope you have learnt a thing from this episode of Tech Terms for Lawyers. Join us next week for another episode. Kindly like, share and comment.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: