SlideShare une entreprise Scribd logo
1  sur  18
Law Firm File Sharing in 2014
A study of attorneys and legal professionals and the IT tools used for
collaborating with clients and 3rd parties on privileged information.
1
Executive Summary
 File sharing gaining importance in privileged communications. 73% of law firms say file sharing is more important
this year than in previous years. There is an increased awareness that the electronic compromise of privileged
communications has serious consequences.
 Despite concerns, un-encrypted email most used means of collaboration. Law firms rely on email more than any
other tool to collaborate with clients and third-parties on privileged information. 89% of law firms report using email and
another 74% say they use email daily. Despite concerns over security, most firms do not use encryption. Larger firms
are more likely to have encryption or secure means to share files in place; smaller firms tend to be more lackadaisical
and therefore more vulnerable.
 Confidentiality statements are the most common shield against compromise. Most law firms include a
confidentiality statement below the body of their emails as the primary means to protect privileged communication.
Some also include confidentiality statements in an email subject line, or require clients to sign consent forms. A
minority of firms are using security technology to protect electronic communications: email encryption (22%), password
protect documents (14%), use a secure file sharing site (13%). 4% of respondents said in an open-ended answer
section they take no measures at all. Larger law firms – those with 100 or more attorneys on staff – are more likely to
use encrypted email or other IT security tools.
 Commercial free file sharing services proliferate. About half of law firms say they have used free commercial file
sharing services to transmit privileged information. Vendors that are focused on serving businesses, rather than
consumers, tend to be more attentive to the security concerns of businesses and law firms. When asked if other
employees were using free file sharing services, about one-third said “yes,” another third said, “no,” and the final third
were “unsure.’ In larger law firms, respondents were more likely to say they don’t use free commercial file sharing
services however, they said that other employees in the firm did. The data suggests free file sharing services are
probably used more often than law firms are aware.
 Top three features law firms demand in file sharing services. The ability to add a watermark to documents was the
most popular feature law firms said they wanted in a file sharing service, which identifies the sender, but provides little
security on the recipient’s end. The ability to revoke or modify access privileges after a document was sent ranked
second. The ability to also use a file sharing service for document storage ranked third.
2
File Sharing Increasingly Important, Especially for Smaller Firms
Overwhelmingly, law firms believe file sharing is becoming
increasingly important. As it often is with new
technologies, disruption flows from the client and the
increase demand for file sharing likely stems from a client
need for an easy way to access information.
A cross-tab analysis comparing solo- and duo-attorney
firms with firms employing 100+ attorneys shows file
sharing tools are a more pressing need in smaller firms
than larger firms. Seventy-five percent of small firms said
file sharing was more important, as compared with 55%
from firms with 100 or more attorneys.
3
Electronic Security Compromise has Consequences
More than 80 percent of respondents believe that a
breach – that if someone other than a client or privileged
party accessed confidential documents – would be
consequential or very consequential to the firm. For most,
this seems like common sense given the confidentiality
that surrounds legal work. However, this statistic gets
interesting when it’s compared with how law firms say
they share documents, and the mitigating measures
taken, despite potential vulnerabilities.
4
Despite Security Fears, Email Dominates Privileged Sharing
Email and the good old-fashioned telephone or postal
service top the list as the primary means for collaborating
with clients and sharing files. Eighty-nine percent of firms
reported using email – and 74% use it frequently (on a
near daily basis). Email in particular is an area of concern,
given just about one-third of law firms report use
encrypted on email, which is vulnerable to security
threats.
Again on this question, a cross-tab analysis shows smaller
firms are less likely to use sophisticated security
technology: 60% of respondents from law firms with 100+
attorneys reported using encrypted email. Within the solo-
and duo-attorney firms, that percentage plummets to 28%.
In open-ended responses to this question, about 2% of
respondents also cited in-person meetings with clients as
a means to collaborate.
5
Email Security Hinges on Words
How do law firms report secure privileged communications
in email? The majority rely on a confidentiality statement
included beneath the body of the email. Four percent of
respondents answered this question with an open-ended
answer that no precautions are taken. It’s also noteworthy
that on a previous question, 32% of law firms reported
using encrypted email as a means of collaboration – but
when asked more directly the percentage reporting email
encrypting dropped to 22% – or about a 10% difference.
The data suggests a degree of uncertainty as to whether
or not a firm email communications are in fact encrypted.
6
Half of Law Firms Use Free Sharing Services
About half of all law firms have used free sharing services
and a cross-tab analysis again shows the usage is
significantly higher among smaller firms. Fifty-three
percent of solo- and duo-attorney firms said they have
used free commercial file sharing services.
Compare this with firms 100+ attorneys on staff and just
about one-third or 30% reported using free file sharing
services. This suggests greater rigor in the IT governance
policies at larger law firms.
7
File Sharing – You Don’t Know What You Don’t Know
When asked if other attorneys or staff within a firm use
free file sharing services the answers were nearly evenly
split across all three answers. There are two benchmarks
for comparing this survey:
First, a previous study exclusively of small law firms with a
similar question found 42% said no, 31% were unsure and
just 23% said yes. Second, a cross-tab analysis of this
survey sample finds that a slightly lower number among
solo- and duo-firms, just 27% say other employees are
using free commercial file sharing services, while in larger
law firms (100+ attorneys) the numbers move in the
opposite direction with 55% saying other employees do
use file sharing services.
The data suggests there is probably far more file sharing –
perhaps using tools that could compromise security – than
senior law firm leaders are aware. This underscores the
need for clear process, policy and IT tools that support the
need.
8
Secure File Sharing Services in Law Firms
On the whole, most law firms are not using enterprise-
grade file sharing services that focus on the security and
protections designed with law firms in mind. Cross-tab
analysis shows that larger law firms do in fact invest in
secure file sharing tools – about 50% or half – of 100+
attorney firms say they are using an enterprise grade file
sharing tool. A separate cross-tab analysis across all
firms by size demonstrates the larger the firm, the more
likely it is to provide secure file sharing tools. Among firms
with 50 or more attorneys on staff, about half provide their
team with an enterprise-grade file sharing service.
9
Top Features Required in File Sharing
Respondents were asked to rank features they expect to
find in a secure file sharing tool on a scale of 1 to 5, where
5 was most important. Applying a visual water mark – a
means to authenticate the sender – was top of the list.
However, law firms are clearly thinking about the
recipients and the data shows the ability to change access
permissions after a file is sent is a high priority.
10
In Their Own Words: Law Firms on File Sharing Security
The final question of the survey was an open-ended
question. The tag cloud you see nearby represents the
words most frequently used – the larger the word, the
more often it was cited. The question was optional and of
the 282 respondents that completed the survey and 233
answered this question: What would you say is the
most important issue or concern attorneys or law
firms should keep in mind with regard to file sharing?
Word Cloud Analysis of Open Ended Responses
Verbatim Responses
11
Are you peeking behind the curtain?
There’s nothing here!
Survey Methodology and Demographics
12
Survey Demographics and Methodology
This study aimed to understand the uses and perceptions of file sharing tools by attorneys and legal
professionals working in U.S.-based law firms. The survey was conducted online from March 5 to March
19, 2014. Respondents were required to identify as a practicing attorney or a legal professional
supporting a law firm.
Two-hundred and eighty two (N=282) attorneys or legal professionals from across more than 15 different
practice areas, and representing 40 different states and two territories, including Washington, D.C.
participated in the survey. Respondents were provided an incentive – a chance to be entered in a random
drawing for one of 14 prizes – to complete the survey.
Demographics at-a-glance:
• Mostly practicing attorneys. 77% of respondents identified as a practicing attorney; paralegal (7%)
and administrative support (6%) were the next largest categories.
• Generally small law firms. 73% of respondents reported working at firms with 10 or fewer attorneys;
49% of respondents identified as a solo- or duo-firm.
• Broad practice areas represented. 17% of respondents reported working for firms focused on
litigation – the single largest category; family law (14%) and general practice (13%) were next. The
rest represented a wide diversity from across more than a dozen additional practice areas.
13
Survey Demographics: Respondents by Role
14
Survey Demographics: Respondents by Law Firm Size
15
Survey Demographics: Respondents by Practice Area
16
Survey Demographics: Top 10 States by Survey Responses
17
LexisNexis Time Matters Resources
• Download a Comprehensive Report on this Survey:
• File Sharing Survey Report and Infographic.
• Resources:
• White Paper: A Law Firm Guide to Protecting the Confidentiality of Shared Client Files (PDF)
• White Paper: Safeguarding Your Law Firm from Liability (PDF)
• Press Release: LexisNexis Introduces Secure Client Portal to Small Law Market
• Press Release: LexisNexis Time Matters Named to the TL NewsWire Top 25 Products of 2013 Awards
• Law Technology News: LexisNexis and WatchDox Launch Client Portal for Small Law Firms
• TechnoLaywer: LexisNexis Time Matters 13: Read Our Exclusive Report
• Legal IT Insider: Legal Industry Video Awards – Entry #8: LexisNexis on Time Matters
• Infographic: Malpractice Claims for Attorneys and the Risks
• Blog Post: Legal Tech Briefs: Virtues of Virtual Law with Stacey L. Romberg
• Blog Post: 3 Basics for Choosing Law Firm Practice Management Software
• Blog Post: Product Notes: Time Matters 13.1 Available for Download
• Social Media:
• Blog: Business of Law Blog
• LinkedIn: LexisNexis Time Matters LinkedIn Group
• Twitter: @Business_of_Law
• Facebook: LexisNexis Business of Law
• Google+: +businessoflawblog

Contenu connexe

Tendances

The Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisers
The Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisersThe Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisers
The Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisersGalit Gonen-Cohen
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011   Integration Of Legal TechnologyILTA 2011   Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technologygrudoy
 
The risk executive agenda -- A compendium of Deloitte insights
The risk executive agenda -- A compendium  of Deloitte insights The risk executive agenda -- A compendium  of Deloitte insights
The risk executive agenda -- A compendium of Deloitte insights Deloitte United States
 
Lets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixLets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixFixNix Inc.,
 
Forrester GRC Q1 2016 Report
Forrester GRC Q1 2016 ReportForrester GRC Q1 2016 Report
Forrester GRC Q1 2016 ReportDaryl Resnick
 
Big Data Debate in Corporate Law - Inside Counsel - August 2015
Big Data Debate in Corporate Law - Inside Counsel - August 2015Big Data Debate in Corporate Law - Inside Counsel - August 2015
Big Data Debate in Corporate Law - Inside Counsel - August 2015Rayford Davis
 
The future of regulation: Principles for regulating emerging technologies
The future of regulation: Principles for regulating emerging technologiesThe future of regulation: Principles for regulating emerging technologies
The future of regulation: Principles for regulating emerging technologiesDeloitte United States
 
EU General Data Protection Regulation: Practical steps for compliance, third ...
EU General Data Protection Regulation: Practical steps for compliance, third ...EU General Data Protection Regulation: Practical steps for compliance, third ...
EU General Data Protection Regulation: Practical steps for compliance, third ...Deloitte United States
 
Communication Challenges in Federal Telework
Communication Challenges in Federal TeleworkCommunication Challenges in Federal Telework
Communication Challenges in Federal TeleworkGov BizCouncil
 
Closing the talent gap: Five ways government and business can team up to resk...
Closing the talent gap: Five ways government and business can team up to resk...Closing the talent gap: Five ways government and business can team up to resk...
Closing the talent gap: Five ways government and business can team up to resk...Deloitte United States
 
Legal Entity Risk and Counter-Party Exposure April 2016
Legal Entity Risk and Counter-Party Exposure  April 2016Legal Entity Risk and Counter-Party Exposure  April 2016
Legal Entity Risk and Counter-Party Exposure April 2016bfreeman1987
 
CAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growthCAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growthGrant Thornton LLP
 
Why Offer LegalShield As A Voluntary Benefit
Why Offer LegalShield As A Voluntary BenefitWhy Offer LegalShield As A Voluntary Benefit
Why Offer LegalShield As A Voluntary BenefitGeorge Petrilyak
 
Modernizing compliance: A tech lens on value protection and creation
Modernizing compliance: A tech lens on value protection and creationModernizing compliance: A tech lens on value protection and creation
Modernizing compliance: A tech lens on value protection and creationDeloitte United States
 
Creating a Federal Innovation Process
Creating a Federal Innovation ProcessCreating a Federal Innovation Process
Creating a Federal Innovation ProcessGov BizCouncil
 
Hedge accounting: Simplifying the accounting for hedging activities
Hedge accounting: Simplifying the accounting for hedging activitiesHedge accounting: Simplifying the accounting for hedging activities
Hedge accounting: Simplifying the accounting for hedging activitiesDeloitte United States
 
Talent Landscape in the Legal Sector
Talent Landscape in the Legal SectorTalent Landscape in the Legal Sector
Talent Landscape in the Legal SectorRobert Gurry, Esq.
 
Edelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman
 

Tendances (20)

The Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisers
The Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisersThe Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisers
The Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisers
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011   Integration Of Legal TechnologyILTA 2011   Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technology
 
The risk executive agenda -- A compendium of Deloitte insights
The risk executive agenda -- A compendium  of Deloitte insights The risk executive agenda -- A compendium  of Deloitte insights
The risk executive agenda -- A compendium of Deloitte insights
 
Lets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixLets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNix
 
Forrester GRC Q1 2016 Report
Forrester GRC Q1 2016 ReportForrester GRC Q1 2016 Report
Forrester GRC Q1 2016 Report
 
Vc us v4.0
Vc us v4.0Vc us v4.0
Vc us v4.0
 
Big Data Debate in Corporate Law - Inside Counsel - August 2015
Big Data Debate in Corporate Law - Inside Counsel - August 2015Big Data Debate in Corporate Law - Inside Counsel - August 2015
Big Data Debate in Corporate Law - Inside Counsel - August 2015
 
The future of regulation: Principles for regulating emerging technologies
The future of regulation: Principles for regulating emerging technologiesThe future of regulation: Principles for regulating emerging technologies
The future of regulation: Principles for regulating emerging technologies
 
EU General Data Protection Regulation: Practical steps for compliance, third ...
EU General Data Protection Regulation: Practical steps for compliance, third ...EU General Data Protection Regulation: Practical steps for compliance, third ...
EU General Data Protection Regulation: Practical steps for compliance, third ...
 
Communication Challenges in Federal Telework
Communication Challenges in Federal TeleworkCommunication Challenges in Federal Telework
Communication Challenges in Federal Telework
 
Closing the talent gap: Five ways government and business can team up to resk...
Closing the talent gap: Five ways government and business can team up to resk...Closing the talent gap: Five ways government and business can team up to resk...
Closing the talent gap: Five ways government and business can team up to resk...
 
Data breaches at home and abroad
Data breaches at home and abroad Data breaches at home and abroad
Data breaches at home and abroad
 
Legal Entity Risk and Counter-Party Exposure April 2016
Legal Entity Risk and Counter-Party Exposure  April 2016Legal Entity Risk and Counter-Party Exposure  April 2016
Legal Entity Risk and Counter-Party Exposure April 2016
 
CAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growthCAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growth
 
Why Offer LegalShield As A Voluntary Benefit
Why Offer LegalShield As A Voluntary BenefitWhy Offer LegalShield As A Voluntary Benefit
Why Offer LegalShield As A Voluntary Benefit
 
Modernizing compliance: A tech lens on value protection and creation
Modernizing compliance: A tech lens on value protection and creationModernizing compliance: A tech lens on value protection and creation
Modernizing compliance: A tech lens on value protection and creation
 
Creating a Federal Innovation Process
Creating a Federal Innovation ProcessCreating a Federal Innovation Process
Creating a Federal Innovation Process
 
Hedge accounting: Simplifying the accounting for hedging activities
Hedge accounting: Simplifying the accounting for hedging activitiesHedge accounting: Simplifying the accounting for hedging activities
Hedge accounting: Simplifying the accounting for hedging activities
 
Talent Landscape in the Legal Sector
Talent Landscape in the Legal SectorTalent Landscape in the Legal Sector
Talent Landscape in the Legal Sector
 
Edelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by Ponemon
 

En vedette

Software+struc+doc
Software+struc+docSoftware+struc+doc
Software+struc+docG.C Reddy
 
Project folder-structure-
Project folder-structure-Project folder-structure-
Project folder-structure-Daniel Downs
 
6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solutionNikec Solutions
 
Folder Structure and Document Naming Convention Best Practices
Folder Structure and Document Naming Convention Best PracticesFolder Structure and Document Naming Convention Best Practices
Folder Structure and Document Naming Convention Best PracticesSteve Smith
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacksariifuddin
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummiesIvo Depoorter
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

En vedette (11)

Software+struc+doc
Software+struc+docSoftware+struc+doc
Software+struc+doc
 
Project folder-structure-
Project folder-structure-Project folder-structure-
Project folder-structure-
 
6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution
 
Folder Structure and Document Naming Convention Best Practices
Folder Structure and Document Naming Convention Best PracticesFolder Structure and Document Naming Convention Best Practices
Folder Structure and Document Naming Convention Best Practices
 
Law Firms in Business Development Transition
Law Firms in Business Development TransitionLaw Firms in Business Development Transition
Law Firms in Business Development Transition
 
Ch19 system administration
Ch19 system administration Ch19 system administration
Ch19 system administration
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
 

Similaire à LexisNexis Survey of Law Firm File Sharing in 2014

Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Melissa Luongo
 
Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEchoworx
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetLexisNexis
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Securitysatyakam_biswas
 
2014 Year-End E-Discovery Update
2014 Year-End E-Discovery Update2014 Year-End E-Discovery Update
2014 Year-End E-Discovery UpdateGareth Evans
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Aspiration Software LLC
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingDan Michaluk
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAMBee_Ware
 
Ponemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAMPonemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAMEMC
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAXeniT Solutions nv
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
 

Similaire à LexisNexis Survey of Law Firm File Sharing in 2014 (20)

Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
 
Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey Report
 
2014: The Law Cloud Poised for Dramatic Growth
2014:  The Law Cloud Poised for Dramatic Growth 2014:  The Law Cloud Poised for Dramatic Growth
2014: The Law Cloud Poised for Dramatic Growth
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 
2014 Year-End E-Discovery Update
2014 Year-End E-Discovery Update2014 Year-End E-Discovery Update
2014 Year-End E-Discovery Update
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
Ss
SsSs
Ss
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
 
Ponemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAMPonemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAM
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 

Plus de LexisNexis Software Division

Case Organization, Analysis & Presentation in the Age of eDiscovery
Case Organization, Analysis & Presentation in the Age of eDiscoveryCase Organization, Analysis & Presentation in the Age of eDiscovery
Case Organization, Analysis & Presentation in the Age of eDiscoveryLexisNexis Software Division
 
Independent Attorney Survival Guide by LexisNexis Firm Manager
Independent Attorney Survival Guide by LexisNexis Firm ManagerIndependent Attorney Survival Guide by LexisNexis Firm Manager
Independent Attorney Survival Guide by LexisNexis Firm ManagerLexisNexis Software Division
 
Legally Optimistic: A study on legal departments and legal department operations
Legally Optimistic: A study on legal departments and legal department operationsLegally Optimistic: A study on legal departments and legal department operations
Legally Optimistic: A study on legal departments and legal department operationsLexisNexis Software Division
 
The Winning Case for (Law Firm) Online Document Management
The Winning Case for (Law Firm) Online Document Management The Winning Case for (Law Firm) Online Document Management
The Winning Case for (Law Firm) Online Document Management LexisNexis Software Division
 

Plus de LexisNexis Software Division (8)

Case Organization, Analysis & Presentation in the Age of eDiscovery
Case Organization, Analysis & Presentation in the Age of eDiscoveryCase Organization, Analysis & Presentation in the Age of eDiscovery
Case Organization, Analysis & Presentation in the Age of eDiscovery
 
Legal Industry Scorecard
Legal Industry ScorecardLegal Industry Scorecard
Legal Industry Scorecard
 
Independent Attorney Survival Guide by LexisNexis Firm Manager
Independent Attorney Survival Guide by LexisNexis Firm ManagerIndependent Attorney Survival Guide by LexisNexis Firm Manager
Independent Attorney Survival Guide by LexisNexis Firm Manager
 
Legally Optimistic: A study on legal departments and legal department operations
Legally Optimistic: A study on legal departments and legal department operationsLegally Optimistic: A study on legal departments and legal department operations
Legally Optimistic: A study on legal departments and legal department operations
 
ILTA 2014: LexisNexis Software Company Update
ILTA 2014:  LexisNexis Software Company UpdateILTA 2014:  LexisNexis Software Company Update
ILTA 2014: LexisNexis Software Company Update
 
Cornerstones of CASL Compliance
Cornerstones of CASL ComplianceCornerstones of CASL Compliance
Cornerstones of CASL Compliance
 
LexisNexis Moneyball for Lawyers
LexisNexis Moneyball for LawyersLexisNexis Moneyball for Lawyers
LexisNexis Moneyball for Lawyers
 
The Winning Case for (Law Firm) Online Document Management
The Winning Case for (Law Firm) Online Document Management The Winning Case for (Law Firm) Online Document Management
The Winning Case for (Law Firm) Online Document Management
 

Dernier

Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 

Dernier (20)

Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 

LexisNexis Survey of Law Firm File Sharing in 2014

  • 1. Law Firm File Sharing in 2014 A study of attorneys and legal professionals and the IT tools used for collaborating with clients and 3rd parties on privileged information.
  • 2. 1 Executive Summary  File sharing gaining importance in privileged communications. 73% of law firms say file sharing is more important this year than in previous years. There is an increased awareness that the electronic compromise of privileged communications has serious consequences.  Despite concerns, un-encrypted email most used means of collaboration. Law firms rely on email more than any other tool to collaborate with clients and third-parties on privileged information. 89% of law firms report using email and another 74% say they use email daily. Despite concerns over security, most firms do not use encryption. Larger firms are more likely to have encryption or secure means to share files in place; smaller firms tend to be more lackadaisical and therefore more vulnerable.  Confidentiality statements are the most common shield against compromise. Most law firms include a confidentiality statement below the body of their emails as the primary means to protect privileged communication. Some also include confidentiality statements in an email subject line, or require clients to sign consent forms. A minority of firms are using security technology to protect electronic communications: email encryption (22%), password protect documents (14%), use a secure file sharing site (13%). 4% of respondents said in an open-ended answer section they take no measures at all. Larger law firms – those with 100 or more attorneys on staff – are more likely to use encrypted email or other IT security tools.  Commercial free file sharing services proliferate. About half of law firms say they have used free commercial file sharing services to transmit privileged information. Vendors that are focused on serving businesses, rather than consumers, tend to be more attentive to the security concerns of businesses and law firms. When asked if other employees were using free file sharing services, about one-third said “yes,” another third said, “no,” and the final third were “unsure.’ In larger law firms, respondents were more likely to say they don’t use free commercial file sharing services however, they said that other employees in the firm did. The data suggests free file sharing services are probably used more often than law firms are aware.  Top three features law firms demand in file sharing services. The ability to add a watermark to documents was the most popular feature law firms said they wanted in a file sharing service, which identifies the sender, but provides little security on the recipient’s end. The ability to revoke or modify access privileges after a document was sent ranked second. The ability to also use a file sharing service for document storage ranked third.
  • 3. 2 File Sharing Increasingly Important, Especially for Smaller Firms Overwhelmingly, law firms believe file sharing is becoming increasingly important. As it often is with new technologies, disruption flows from the client and the increase demand for file sharing likely stems from a client need for an easy way to access information. A cross-tab analysis comparing solo- and duo-attorney firms with firms employing 100+ attorneys shows file sharing tools are a more pressing need in smaller firms than larger firms. Seventy-five percent of small firms said file sharing was more important, as compared with 55% from firms with 100 or more attorneys.
  • 4. 3 Electronic Security Compromise has Consequences More than 80 percent of respondents believe that a breach – that if someone other than a client or privileged party accessed confidential documents – would be consequential or very consequential to the firm. For most, this seems like common sense given the confidentiality that surrounds legal work. However, this statistic gets interesting when it’s compared with how law firms say they share documents, and the mitigating measures taken, despite potential vulnerabilities.
  • 5. 4 Despite Security Fears, Email Dominates Privileged Sharing Email and the good old-fashioned telephone or postal service top the list as the primary means for collaborating with clients and sharing files. Eighty-nine percent of firms reported using email – and 74% use it frequently (on a near daily basis). Email in particular is an area of concern, given just about one-third of law firms report use encrypted on email, which is vulnerable to security threats. Again on this question, a cross-tab analysis shows smaller firms are less likely to use sophisticated security technology: 60% of respondents from law firms with 100+ attorneys reported using encrypted email. Within the solo- and duo-attorney firms, that percentage plummets to 28%. In open-ended responses to this question, about 2% of respondents also cited in-person meetings with clients as a means to collaborate.
  • 6. 5 Email Security Hinges on Words How do law firms report secure privileged communications in email? The majority rely on a confidentiality statement included beneath the body of the email. Four percent of respondents answered this question with an open-ended answer that no precautions are taken. It’s also noteworthy that on a previous question, 32% of law firms reported using encrypted email as a means of collaboration – but when asked more directly the percentage reporting email encrypting dropped to 22% – or about a 10% difference. The data suggests a degree of uncertainty as to whether or not a firm email communications are in fact encrypted.
  • 7. 6 Half of Law Firms Use Free Sharing Services About half of all law firms have used free sharing services and a cross-tab analysis again shows the usage is significantly higher among smaller firms. Fifty-three percent of solo- and duo-attorney firms said they have used free commercial file sharing services. Compare this with firms 100+ attorneys on staff and just about one-third or 30% reported using free file sharing services. This suggests greater rigor in the IT governance policies at larger law firms.
  • 8. 7 File Sharing – You Don’t Know What You Don’t Know When asked if other attorneys or staff within a firm use free file sharing services the answers were nearly evenly split across all three answers. There are two benchmarks for comparing this survey: First, a previous study exclusively of small law firms with a similar question found 42% said no, 31% were unsure and just 23% said yes. Second, a cross-tab analysis of this survey sample finds that a slightly lower number among solo- and duo-firms, just 27% say other employees are using free commercial file sharing services, while in larger law firms (100+ attorneys) the numbers move in the opposite direction with 55% saying other employees do use file sharing services. The data suggests there is probably far more file sharing – perhaps using tools that could compromise security – than senior law firm leaders are aware. This underscores the need for clear process, policy and IT tools that support the need.
  • 9. 8 Secure File Sharing Services in Law Firms On the whole, most law firms are not using enterprise- grade file sharing services that focus on the security and protections designed with law firms in mind. Cross-tab analysis shows that larger law firms do in fact invest in secure file sharing tools – about 50% or half – of 100+ attorney firms say they are using an enterprise grade file sharing tool. A separate cross-tab analysis across all firms by size demonstrates the larger the firm, the more likely it is to provide secure file sharing tools. Among firms with 50 or more attorneys on staff, about half provide their team with an enterprise-grade file sharing service.
  • 10. 9 Top Features Required in File Sharing Respondents were asked to rank features they expect to find in a secure file sharing tool on a scale of 1 to 5, where 5 was most important. Applying a visual water mark – a means to authenticate the sender – was top of the list. However, law firms are clearly thinking about the recipients and the data shows the ability to change access permissions after a file is sent is a high priority.
  • 11. 10 In Their Own Words: Law Firms on File Sharing Security The final question of the survey was an open-ended question. The tag cloud you see nearby represents the words most frequently used – the larger the word, the more often it was cited. The question was optional and of the 282 respondents that completed the survey and 233 answered this question: What would you say is the most important issue or concern attorneys or law firms should keep in mind with regard to file sharing? Word Cloud Analysis of Open Ended Responses Verbatim Responses
  • 12. 11 Are you peeking behind the curtain? There’s nothing here! Survey Methodology and Demographics
  • 13. 12 Survey Demographics and Methodology This study aimed to understand the uses and perceptions of file sharing tools by attorneys and legal professionals working in U.S.-based law firms. The survey was conducted online from March 5 to March 19, 2014. Respondents were required to identify as a practicing attorney or a legal professional supporting a law firm. Two-hundred and eighty two (N=282) attorneys or legal professionals from across more than 15 different practice areas, and representing 40 different states and two territories, including Washington, D.C. participated in the survey. Respondents were provided an incentive – a chance to be entered in a random drawing for one of 14 prizes – to complete the survey. Demographics at-a-glance: • Mostly practicing attorneys. 77% of respondents identified as a practicing attorney; paralegal (7%) and administrative support (6%) were the next largest categories. • Generally small law firms. 73% of respondents reported working at firms with 10 or fewer attorneys; 49% of respondents identified as a solo- or duo-firm. • Broad practice areas represented. 17% of respondents reported working for firms focused on litigation – the single largest category; family law (14%) and general practice (13%) were next. The rest represented a wide diversity from across more than a dozen additional practice areas.
  • 17. 16 Survey Demographics: Top 10 States by Survey Responses
  • 18. 17 LexisNexis Time Matters Resources • Download a Comprehensive Report on this Survey: • File Sharing Survey Report and Infographic. • Resources: • White Paper: A Law Firm Guide to Protecting the Confidentiality of Shared Client Files (PDF) • White Paper: Safeguarding Your Law Firm from Liability (PDF) • Press Release: LexisNexis Introduces Secure Client Portal to Small Law Market • Press Release: LexisNexis Time Matters Named to the TL NewsWire Top 25 Products of 2013 Awards • Law Technology News: LexisNexis and WatchDox Launch Client Portal for Small Law Firms • TechnoLaywer: LexisNexis Time Matters 13: Read Our Exclusive Report • Legal IT Insider: Legal Industry Video Awards – Entry #8: LexisNexis on Time Matters • Infographic: Malpractice Claims for Attorneys and the Risks • Blog Post: Legal Tech Briefs: Virtues of Virtual Law with Stacey L. Romberg • Blog Post: 3 Basics for Choosing Law Firm Practice Management Software • Blog Post: Product Notes: Time Matters 13.1 Available for Download • Social Media: • Blog: Business of Law Blog • LinkedIn: LexisNexis Time Matters LinkedIn Group • Twitter: @Business_of_Law • Facebook: LexisNexis Business of Law • Google+: +businessoflawblog