The document summarizes a CLE presentation on the winning case for online document management. It introduces Christopher T. Anderson from LexisNexis Firm Manager and Dan Barahona from WatchDox who will be presenting. It provides brief biographies on each presenter, including their relevant experience and roles at their respective companies. The document then outlines several topics that will be covered in the presentation related to online document management, data security, ownership and expectations.
Did you know? The litigation software tools and business of law software tools have been combined into a single software division headquartered in our new Software Center of Excellence in Raleigh, NC. These slides were part of the presentation by the top LexisNexis software executive, Michael Lipps, at ILTA 2014. In it he maps what LexisNexis sees as top 5 technology trends in the legal community against a number of product updates in the software portfolio.
Ready to send the world’s mostexpensive email? Avoid a million-dollar mistake by understanding the rules of CASL with this overview of Canada's version of the CAN SPAM Act. Designed for law firm marketing, this presentation is geared to law firm business development, marketing and CRM specialists.
Your firm needs to be committed to protecting information assets, including personal data and client documents. As a trusted advisor to our clients, the expectation is that we are aware of threats and are guarding their data. Data privacy and information security are fundamental components of doing business today, no matter how large your firm is.
In this paper we will look at three specific ways of protecting our clients:
1. Protection through our ability to research and improve intellectual capital
2. Protection through policies, procedures and processes
3. Protection by securing client data
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersDATAVERSITY
This document summarizes key points from a presentation by Bill Tanenbaum on data strategy issues for Chief Data Officers (CDOs). It discusses how CDOs should be involved in outsourcing decisions to help prevent data breaches. When breaches do occur, CDOs should lead gap analyses of contracts and renegotiations. The presentation also covers topics like different data classes, intellectual property issues, data retention policies, and strategies for addressing persistent cyber attacks.
Data Governance, understand what you already know (IBM Global Business Services)IBM Danmark
This document discusses data governance and outlines IBM's leadership in this area. It summarizes that IBM created a Data Governance Council 5 years ago and now leads an Information Governance Community of 550 people working on global challenges. The community is updating the Data Governance Maturity Model to focus on business goals and outcomes by including both technical and process enablers.
The document discusses how organizations are facing challenges managing the growing amounts of data and information from various sources. This includes extracting insights from large amounts of structured and unstructured content across the enterprise. It also talks about the need to connect people and processes to improve collaboration, decision making and customer service. New approaches to enterprise information management are needed to gain control of data, drive business optimization and enable organizations to adapt quickly to changes.
OpenText Presents: Mastering the Digital Economy through Big Data and Custome...OpenText
IDC’s Helena Schwenk joins OpenText to discuss how big data can help overcome the barriers faced by Executives aiming to redefine their businesses to compete in the Digital Economy. The era of self-service analysis has exposed data to more people within a business, but this in itself creates challenges for IT, who retain responsibility for the health and hygiene of data, as well as security. View the webinar here: http://ow.ly/bImR307Ptue
Did you know? The litigation software tools and business of law software tools have been combined into a single software division headquartered in our new Software Center of Excellence in Raleigh, NC. These slides were part of the presentation by the top LexisNexis software executive, Michael Lipps, at ILTA 2014. In it he maps what LexisNexis sees as top 5 technology trends in the legal community against a number of product updates in the software portfolio.
Ready to send the world’s mostexpensive email? Avoid a million-dollar mistake by understanding the rules of CASL with this overview of Canada's version of the CAN SPAM Act. Designed for law firm marketing, this presentation is geared to law firm business development, marketing and CRM specialists.
Your firm needs to be committed to protecting information assets, including personal data and client documents. As a trusted advisor to our clients, the expectation is that we are aware of threats and are guarding their data. Data privacy and information security are fundamental components of doing business today, no matter how large your firm is.
In this paper we will look at three specific ways of protecting our clients:
1. Protection through our ability to research and improve intellectual capital
2. Protection through policies, procedures and processes
3. Protection by securing client data
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersDATAVERSITY
This document summarizes key points from a presentation by Bill Tanenbaum on data strategy issues for Chief Data Officers (CDOs). It discusses how CDOs should be involved in outsourcing decisions to help prevent data breaches. When breaches do occur, CDOs should lead gap analyses of contracts and renegotiations. The presentation also covers topics like different data classes, intellectual property issues, data retention policies, and strategies for addressing persistent cyber attacks.
Data Governance, understand what you already know (IBM Global Business Services)IBM Danmark
This document discusses data governance and outlines IBM's leadership in this area. It summarizes that IBM created a Data Governance Council 5 years ago and now leads an Information Governance Community of 550 people working on global challenges. The community is updating the Data Governance Maturity Model to focus on business goals and outcomes by including both technical and process enablers.
The document discusses how organizations are facing challenges managing the growing amounts of data and information from various sources. This includes extracting insights from large amounts of structured and unstructured content across the enterprise. It also talks about the need to connect people and processes to improve collaboration, decision making and customer service. New approaches to enterprise information management are needed to gain control of data, drive business optimization and enable organizations to adapt quickly to changes.
OpenText Presents: Mastering the Digital Economy through Big Data and Custome...OpenText
IDC’s Helena Schwenk joins OpenText to discuss how big data can help overcome the barriers faced by Executives aiming to redefine their businesses to compete in the Digital Economy. The era of self-service analysis has exposed data to more people within a business, but this in itself creates challenges for IT, who retain responsibility for the health and hygiene of data, as well as security. View the webinar here: http://ow.ly/bImR307Ptue
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
To do effective data governance, analysts should preview the amount of data their organization is collecting and consider if it is all necessary information to run the business or just “nice to have” data. Today companies are collecting a variety of Personally identifiable information (PII), combining it with location information, and using it to both personalize their own services and to sell to advertisers for behavioral marketing. Data brokers are tracking cell phone applications and insurance companies are installing devices to monitor driving habits. At the same time, however, hackers are embedding malicious software in company computers, opening a virtual door for criminals to rifle through an organization’s valuable personal and financial information.
This presentation explores:
•What company data should be tagged as “sensitive” data?
•Who within the company has access to personal data?
•Is the company breaking any privacy laws by storing PII data?
•Is the data secure from both internal and external hackers?
•What happens if there is an external data breech?
During the Chief Data Officer Exchange event in London, Denodo discussed the different ways in which data virtualization can help businesses. In this presentation, our guest speaker Simon Gratton (Deloitte UK), provides information about the emerging approaches to achieving agile data delivery and the cultural issues that stand in our way.
Pandemic has taken a fair share of the toll on every economy, affecting millions of businesses across the globe. As organizations are adopting technology and innovation to fulfil their quest for growth, they must comprehend, the ghost of cyberattack will come to haunt them sooner or later. Cyber breaches will not only cause brand degradation, but also lead to loss of digital assets, and change in consumer behaviour. As a result, companies are considering corporate cyber insurance as a part of their cybersecurity strategies. Click on the link to read what cyber insurance is and why companies direly need it.
Enterprise Data Webinar World Series: Leading the Data Asset Management Team ...DATAVERSITY
This document discusses the roles of Chief Data Officer (CDO) and top data job in an organization. It explores what qualifications and traits are needed for these roles and how the CDO organization fits within the larger organizational structure. The key responsibilities of a CDO include developing the enterprise data strategy, owning data governance and architecture, and managing legal and compliance issues. For the top data role to be effective, it requires a blend of technical skills, business knowledge, and strong relationship and communication abilities.
Big Data Means Big Business
Big data has the potential to disrupt existing businesses and help create new ones by extracting useful information from huge volumes of structured and unstructured data. To realize this promise, organizations need cheap storage, faster processing, smarter software, and access to larger and more diverse data sets. Big data can unlock new business value by enabling better-informed decisions, discovering hidden insights, and automating business processes. While the technology is available, organizations must also invest in skills, cultural change, and using information as a corporate asset to fully leverage big data.
Property & Casualty: Deterring Claims Leakage in the Digital AgeCognizant
For property and casualty insurers, the persistent and vexing problem of claims leakage can be effectively curtailed by applying digital technology with cutting-edge clarity.
Digital Transformation - Is Your Enterprise Prepared☁Jake Weaver ☁
- Enterprises are undergoing digital transformation to better utilize technologies like cloud, mobile, social and big data. This requires IT organizations to take on new strategic initiatives while still handling daily operations.
- IT leaders will need to partner with managed service providers that can take over routine tasks and support advanced technologies. This will allow internal IT teams to focus on strategic initiatives that drive business value, like using big data analytics for fraud detection.
- A survey found that IT teams expect to devote more time to strategic initiatives in the next two years. They will likely rely more on managed service providers with skills in areas like cloud, data analytics, hybrid IT and security. Partnering in this way can help IT support the business needs of digital
SIM IT Trends Study 2013 - SIMposium SessionLeon Kappelman
Since 1980 the Society for Information Management (SIM) has conducted a survey of its senior IT executive members to gauge trends within the IT industry. SIM's members are among the most accomplished and innovative leaders in IT, so their responses help to benchmark various areas such as major management issues, largest and most worrisome IT investments, sourcing, CIO roles, staffing, spending, and salaries. SIM's IT Trends Study is widely recognized as one of the most representative barometers of the information technology industry. More information at http://www.simnet.org/?ITTrendsStudy.
The document discusses how companies are shifting from traditional manual forecasting processes to ones that involve predictive algorithms and machine learning to more accurately forecast the future, highlighting how algorithmic forecasting uses historical data and statistical models to generate forecasts, and works best when combined with human judgment and expertise. It also outlines some common applications of algorithmic forecasting and provides an example of how it can enable faster, more confident decision making for companies.
Today’s online world brings new challenges to businesses, making the security of your businesses’ internal information extremely critical. As we are all connected to the Internet,
we all can become a victim of cyber-attacks.
So, what can you do to better protect your business and secure your internal data?
The document discusses the changing landscape of eDiscovery as corporate clients increasingly manage eDiscovery in-house using new technologies. It notes that outside counsel needs to understand these technologies and changes in order to create value for clients through collaboration, ensuring complete productions, and advising on the appropriate role of tools versus human expertise. Outside counsel that can educate clients and help balance in-house and outsourced resources will be best positioned to maintain strong client relationships in this evolving environment.
A Peek @ Trends'15 - SIMposium'14 FINAL 2postLeon Kappelman
The document summarizes findings from the 2015 SIM IT Trends Study, which surveyed over 1000 senior IT executives. Key findings include:
1) Organizations are undergoing profound changes in how they focus technology spending, deliver IT, and structure IT departments and leadership roles.
2) IT budgets are changing slightly, with a projected 1.9% increase in 2014 and 0.9% increase in 2015 on average. Spending is shifting from hardware to cloud and business services.
3) IT organization structures continue trending away from centralized models, with 71% now having decentralized, federated or hybrid structures.
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
Is your current state really threat ready?
Amit Walia, Senior Vice President, General Manager of Data Integration and Security at Informatica, shares how to protect data from the inside and the outside from the 2015 Informatica Government Summit.
Ntiva: 8 Experts on Outsourcing IT for Strategic AdvantageMighty Guides, Inc.
Outsourcing IT functions allows companies to focus on strategic initiatives rather than day-to-day operations. Experts recommend outsourcing commodity functions like help desk, patching, and cloud services so internal IT can focus on projects that provide business value. Outsourcing everything should be considered, as it provides scalability, succession planning, and expertise a small company cannot develop internally. Choosing the right provider is important - they should understand the business and become a true partner.
A Data-driven Maturity Model for Modernized, Automated, and Transformed ITbalejandre
This document presents a research-based maturity model for measuring organizations' progress in IT transformation. The model segments organizations into four levels of maturity based on surveys of 1,000 IT executives about their infrastructure, processes, and relationships. Only a small percentage have achieved the highest levels of modernized infrastructure, automated processes, and business-IT alignment needed for digital transformation. Higher maturity is correlated with improved agility, efficiency, innovation funding, and business outcomes. Adopting modern data center technologies, automated processes, and DevOps practices can help organizations progress to more mature states.
The document discusses improving customer experience through interactions. It states that 86% of customers quit doing business with a brand due to a bad customer experience. The document then lists 5 pain points companies commonly face regarding customer interactions: 1) providing personalized customer service is expensive and difficult, 2) concerns about data loss in a digital world, 3) customers dislike lengthy signup forms, 4) increasing risks to customer data as a company grows, and 5) difficulty servicing customers quickly through social media. It provides solutions to each pain point, such as using CRMs to access customer data and automating processes to improve the customer experience. Overall, the document stresses that customer interactions can define a company and securing data while streamlining processes is important to
The Trusted Path That Driven Big Data to Successankitbhandari32
The four D.A.T.A. questions formulated by Carsten Lund Pedersen & Thomas Ritter for big data are the following: Data, Autonomy, Technology & Accountability.
California Consumer Protection Act (CCPA) is
one such law that empowers the residents of
California, United States to have enhanced
privacy rights & consumer protection. It is the
most comprehensive US state privacy law to
date.
DataEd Slides: Getting Data Quality Right – Success StoriesDATAVERSITY
Good data is like good water: best served fresh, and ideally well-filtered. Data Management strategies can produce tremendous procedural improvements and increased profit margins across the board, but only if the data being managed is “of sufficient quality.” This program provides a useful framework guiding those approaching Data Quality challenges. Specifically, Data Quality must be approached as an engineering discipline. Data Quality engineering must be approached as a specific ROI-based discipline or it cannot effectively support business strategy. Better understanding of how to “do Data Quality right” allows for speedy identification of business problems, delineation between structural and practice-oriented defects in Data Management, and proactive prevention of future issues. Program learning objectives include:
• Vivid demonstrations of how chronic business challenges for organizations are often rooted in broader kinds of Data Quality that suggested treatments can address
• Helping you to understand foundational Data Quality concepts, guiding principles, best practices, and an improved approach to Data Quality at your organization
• The basis of a number of specific case studies illustrating the hallmarks and benefits of Data Quality success
1) There is a growing gap in capabilities and performance between companies that invest heavily in data and analytics compared to those that invest less. The capability gap is exacerbated by a shortage of analytical talent.
2) The amount of data being created is growing exponentially, estimated at 2.5 quintillion bytes per day globally. However, most organizations are not effectively using the data they already have.
3) Investing in analytics can provide significant financial benefits across industries. For example, leveraging big data in healthcare could capture $300 billion annually and increase retailers' operating margins by 60%.
This panel discussion focused on the importance of understanding a company's legal and contractual obligations and the real world best practices for a business, based on what it does and who works there. The topic was presented by a panel of experts in the legal, insurance, and accounting services: Kegler Brown attorney David Wilson, Vice President of Marsh & McLennan Agency LLC Joe Woods, Director of Information Technology Services at GBQ Doug Davidson, and Director of Breach Response Services at Beazley Alex Ricardo.
This document outlines a project plan for researching mobile technology solutions for a medium-sized law firm. It identifies key assets of the firm that need protection, such as client information, case files, employee records, and financial data. The document establishes a hypothesis that it is possible to create a secure mobile environment using cloud computing and applications while protecting confidential data. A research methodology is proposed involving examining other law firms' mobile strategies and vendor options. Risks like network failures, social engineering, and physical threats are analyzed. The timeline involves researching solutions, documenting findings, and making recommendations.
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
To do effective data governance, analysts should preview the amount of data their organization is collecting and consider if it is all necessary information to run the business or just “nice to have” data. Today companies are collecting a variety of Personally identifiable information (PII), combining it with location information, and using it to both personalize their own services and to sell to advertisers for behavioral marketing. Data brokers are tracking cell phone applications and insurance companies are installing devices to monitor driving habits. At the same time, however, hackers are embedding malicious software in company computers, opening a virtual door for criminals to rifle through an organization’s valuable personal and financial information.
This presentation explores:
•What company data should be tagged as “sensitive” data?
•Who within the company has access to personal data?
•Is the company breaking any privacy laws by storing PII data?
•Is the data secure from both internal and external hackers?
•What happens if there is an external data breech?
During the Chief Data Officer Exchange event in London, Denodo discussed the different ways in which data virtualization can help businesses. In this presentation, our guest speaker Simon Gratton (Deloitte UK), provides information about the emerging approaches to achieving agile data delivery and the cultural issues that stand in our way.
Pandemic has taken a fair share of the toll on every economy, affecting millions of businesses across the globe. As organizations are adopting technology and innovation to fulfil their quest for growth, they must comprehend, the ghost of cyberattack will come to haunt them sooner or later. Cyber breaches will not only cause brand degradation, but also lead to loss of digital assets, and change in consumer behaviour. As a result, companies are considering corporate cyber insurance as a part of their cybersecurity strategies. Click on the link to read what cyber insurance is and why companies direly need it.
Enterprise Data Webinar World Series: Leading the Data Asset Management Team ...DATAVERSITY
This document discusses the roles of Chief Data Officer (CDO) and top data job in an organization. It explores what qualifications and traits are needed for these roles and how the CDO organization fits within the larger organizational structure. The key responsibilities of a CDO include developing the enterprise data strategy, owning data governance and architecture, and managing legal and compliance issues. For the top data role to be effective, it requires a blend of technical skills, business knowledge, and strong relationship and communication abilities.
Big Data Means Big Business
Big data has the potential to disrupt existing businesses and help create new ones by extracting useful information from huge volumes of structured and unstructured data. To realize this promise, organizations need cheap storage, faster processing, smarter software, and access to larger and more diverse data sets. Big data can unlock new business value by enabling better-informed decisions, discovering hidden insights, and automating business processes. While the technology is available, organizations must also invest in skills, cultural change, and using information as a corporate asset to fully leverage big data.
Property & Casualty: Deterring Claims Leakage in the Digital AgeCognizant
For property and casualty insurers, the persistent and vexing problem of claims leakage can be effectively curtailed by applying digital technology with cutting-edge clarity.
Digital Transformation - Is Your Enterprise Prepared☁Jake Weaver ☁
- Enterprises are undergoing digital transformation to better utilize technologies like cloud, mobile, social and big data. This requires IT organizations to take on new strategic initiatives while still handling daily operations.
- IT leaders will need to partner with managed service providers that can take over routine tasks and support advanced technologies. This will allow internal IT teams to focus on strategic initiatives that drive business value, like using big data analytics for fraud detection.
- A survey found that IT teams expect to devote more time to strategic initiatives in the next two years. They will likely rely more on managed service providers with skills in areas like cloud, data analytics, hybrid IT and security. Partnering in this way can help IT support the business needs of digital
SIM IT Trends Study 2013 - SIMposium SessionLeon Kappelman
Since 1980 the Society for Information Management (SIM) has conducted a survey of its senior IT executive members to gauge trends within the IT industry. SIM's members are among the most accomplished and innovative leaders in IT, so their responses help to benchmark various areas such as major management issues, largest and most worrisome IT investments, sourcing, CIO roles, staffing, spending, and salaries. SIM's IT Trends Study is widely recognized as one of the most representative barometers of the information technology industry. More information at http://www.simnet.org/?ITTrendsStudy.
The document discusses how companies are shifting from traditional manual forecasting processes to ones that involve predictive algorithms and machine learning to more accurately forecast the future, highlighting how algorithmic forecasting uses historical data and statistical models to generate forecasts, and works best when combined with human judgment and expertise. It also outlines some common applications of algorithmic forecasting and provides an example of how it can enable faster, more confident decision making for companies.
Today’s online world brings new challenges to businesses, making the security of your businesses’ internal information extremely critical. As we are all connected to the Internet,
we all can become a victim of cyber-attacks.
So, what can you do to better protect your business and secure your internal data?
The document discusses the changing landscape of eDiscovery as corporate clients increasingly manage eDiscovery in-house using new technologies. It notes that outside counsel needs to understand these technologies and changes in order to create value for clients through collaboration, ensuring complete productions, and advising on the appropriate role of tools versus human expertise. Outside counsel that can educate clients and help balance in-house and outsourced resources will be best positioned to maintain strong client relationships in this evolving environment.
A Peek @ Trends'15 - SIMposium'14 FINAL 2postLeon Kappelman
The document summarizes findings from the 2015 SIM IT Trends Study, which surveyed over 1000 senior IT executives. Key findings include:
1) Organizations are undergoing profound changes in how they focus technology spending, deliver IT, and structure IT departments and leadership roles.
2) IT budgets are changing slightly, with a projected 1.9% increase in 2014 and 0.9% increase in 2015 on average. Spending is shifting from hardware to cloud and business services.
3) IT organization structures continue trending away from centralized models, with 71% now having decentralized, federated or hybrid structures.
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
Is your current state really threat ready?
Amit Walia, Senior Vice President, General Manager of Data Integration and Security at Informatica, shares how to protect data from the inside and the outside from the 2015 Informatica Government Summit.
Ntiva: 8 Experts on Outsourcing IT for Strategic AdvantageMighty Guides, Inc.
Outsourcing IT functions allows companies to focus on strategic initiatives rather than day-to-day operations. Experts recommend outsourcing commodity functions like help desk, patching, and cloud services so internal IT can focus on projects that provide business value. Outsourcing everything should be considered, as it provides scalability, succession planning, and expertise a small company cannot develop internally. Choosing the right provider is important - they should understand the business and become a true partner.
A Data-driven Maturity Model for Modernized, Automated, and Transformed ITbalejandre
This document presents a research-based maturity model for measuring organizations' progress in IT transformation. The model segments organizations into four levels of maturity based on surveys of 1,000 IT executives about their infrastructure, processes, and relationships. Only a small percentage have achieved the highest levels of modernized infrastructure, automated processes, and business-IT alignment needed for digital transformation. Higher maturity is correlated with improved agility, efficiency, innovation funding, and business outcomes. Adopting modern data center technologies, automated processes, and DevOps practices can help organizations progress to more mature states.
The document discusses improving customer experience through interactions. It states that 86% of customers quit doing business with a brand due to a bad customer experience. The document then lists 5 pain points companies commonly face regarding customer interactions: 1) providing personalized customer service is expensive and difficult, 2) concerns about data loss in a digital world, 3) customers dislike lengthy signup forms, 4) increasing risks to customer data as a company grows, and 5) difficulty servicing customers quickly through social media. It provides solutions to each pain point, such as using CRMs to access customer data and automating processes to improve the customer experience. Overall, the document stresses that customer interactions can define a company and securing data while streamlining processes is important to
The Trusted Path That Driven Big Data to Successankitbhandari32
The four D.A.T.A. questions formulated by Carsten Lund Pedersen & Thomas Ritter for big data are the following: Data, Autonomy, Technology & Accountability.
California Consumer Protection Act (CCPA) is
one such law that empowers the residents of
California, United States to have enhanced
privacy rights & consumer protection. It is the
most comprehensive US state privacy law to
date.
DataEd Slides: Getting Data Quality Right – Success StoriesDATAVERSITY
Good data is like good water: best served fresh, and ideally well-filtered. Data Management strategies can produce tremendous procedural improvements and increased profit margins across the board, but only if the data being managed is “of sufficient quality.” This program provides a useful framework guiding those approaching Data Quality challenges. Specifically, Data Quality must be approached as an engineering discipline. Data Quality engineering must be approached as a specific ROI-based discipline or it cannot effectively support business strategy. Better understanding of how to “do Data Quality right” allows for speedy identification of business problems, delineation between structural and practice-oriented defects in Data Management, and proactive prevention of future issues. Program learning objectives include:
• Vivid demonstrations of how chronic business challenges for organizations are often rooted in broader kinds of Data Quality that suggested treatments can address
• Helping you to understand foundational Data Quality concepts, guiding principles, best practices, and an improved approach to Data Quality at your organization
• The basis of a number of specific case studies illustrating the hallmarks and benefits of Data Quality success
1) There is a growing gap in capabilities and performance between companies that invest heavily in data and analytics compared to those that invest less. The capability gap is exacerbated by a shortage of analytical talent.
2) The amount of data being created is growing exponentially, estimated at 2.5 quintillion bytes per day globally. However, most organizations are not effectively using the data they already have.
3) Investing in analytics can provide significant financial benefits across industries. For example, leveraging big data in healthcare could capture $300 billion annually and increase retailers' operating margins by 60%.
This panel discussion focused on the importance of understanding a company's legal and contractual obligations and the real world best practices for a business, based on what it does and who works there. The topic was presented by a panel of experts in the legal, insurance, and accounting services: Kegler Brown attorney David Wilson, Vice President of Marsh & McLennan Agency LLC Joe Woods, Director of Information Technology Services at GBQ Doug Davidson, and Director of Breach Response Services at Beazley Alex Ricardo.
This document outlines a project plan for researching mobile technology solutions for a medium-sized law firm. It identifies key assets of the firm that need protection, such as client information, case files, employee records, and financial data. The document establishes a hypothesis that it is possible to create a secure mobile environment using cloud computing and applications while protecting confidential data. A research methodology is proposed involving examining other law firms' mobile strategies and vendor options. Risks like network failures, social engineering, and physical threats are analyzed. The timeline involves researching solutions, documenting findings, and making recommendations.
Divya Tripathi is a passionate 23-year-old law professional with over 5 years of experience in litigation, contract management, and legal analysis. She has worked as a Corporate Legal professional for SIRO Clinpharm Pvt. Ltd since 2015 and previously held the role of Associate at Thomson Reuters from 2013 to 2015. She holds a Bachelor of Laws degree and is proficient in contract and commercial laws with strong research and analytical skills.
Ethics and Security of Cloud Computing for LawyersRobert Ambrogi
Lawyers have an ethical duty to protect client confidential information and safeguard client files. Most ethics panels agree that lawyers may use cloud computing services if they take reasonable steps to minimize risks, such as understanding the technology, ensuring access to and protection of data, and verifying security measures of cloud providers. Competent use of cloud computing requires diligence in areas like company reviews, access to data, encryption, backup procedures, and network and physical security.
This document discusses why information security is now a business-critical function for law firms. It notes that law firms now rely heavily on information systems and electronic data, but this increased use of technology also brings greater risks. The document outlines five reasons why law firms need to make information security a priority: 1) the sensitive nature of legal information, 2) the large amounts of valuable data law firms store, 3) reliance on trusted information systems for business functions, 4) the widespread adoption of various systems and technologies, and 5) growing compliance requirements regarding data protection. It stresses that law firms must understand the security threats and risks in order to adequately protect their systems and client data.
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...Shawn Tuma
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss. This is a keynote speech delivered by Shawn Tuma to the Paralegal Division of the State Bar of Texas on June 17, 2016.
Everything Blockchain is a development, engineering, and services company specializing in Blockchain technologies and decentralized processing. The Company works with clients to develop custom Blockchain payment solutions settled in fiat and cryptocurrencies. Everything Blockchain also designs proprietary security measures and protocols for Blockchain technologies with overlay and licensing revenue opportunities. Utilizing tools within the Blockchain ecosystem to enhance overall performance, the Company continually evaluates new growth opportunities in mining, acquiring, and utilizing cryptocurrencies. Involved in the early-stage launch of HEX, the internet’s first cryptographic certificate of deposit, the Company has earned $5 million of tokens to date and expects to be awarded another $5 million of tokens in the coming months. Staking operations, which can earn interest of 5%-40%, provide Everything Blockchain with additional opportunities for growth and predictable revenue streams. With a highly accomplished management and board, expert team, and access to industry leaders and disruptors, Everything Blockchain is at the forefront of innovative and lead generating technologies.
Mr.Nilesh Tribhuvann is the founder and managing partner of WHITE and Brief, a Multiservice law firm headquarters in the commercial hub of Mumbai, Having a global clientele and is competently driving effective change for it's valued patrons
Legal Research Outsourcing: Our Means and Your Endsrajni_minhas
The document summarizes a presentation by Draft n Craft Law Firm on legal research outsourcing. It discusses how outsourcing has grown with globalization, litigation support services, and Draft n Craft's legal research outsourcing solutions. Draft n Craft provides comprehensive legal research, training and quality assurance for clients, while ensuring ethical standards and client confidentiality are maintained.
Preserving the Privilege during Breach ResponsePriyanka Aash
When companies hire cybersecurity consultants to investigate incidents, those professionals’ reports and emails could be used against the company in court unless a privilege applies. This session provides an overview of the attorney-client privilege for post-breach investigations, and tips for increasing the chances that the privilege will apply and the data will remain confidential.
(Source: RSA USA 2016-San Francisco)
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossShawn Tuma
Shawn Tuma is a cybersecurity lawyer with expertise in data privacy law. He is a partner at Scheef & Stone LLP, a commercial law firm in Texas. Tuma has extensive experience advising businesses on cybersecurity issues and data breaches. He serves on several boards and committees related to cybersecurity law and policy. The document provides an overview of Tuma's background and experience in cybersecurity law.
This document summarizes key points from a presentation on cloud privacy updates and what businesses need to know. It discusses the growing issue of data breaches, providing statistics on the number of breaches and records compromised in 2011. It outlines how brands can protect themselves by implementing technical security measures, conducting risk assessments, and complying with relevant privacy laws. The presentation also reviews tools and resources available to businesses to monitor their online reputation and ensure email marketing compliance.
Collaborated with a team to create a tool which sales team could use to sell the solutions and services VES provides. Chose/altered all art, copy and voice to brand standards.
This document provides an overview of a global strategic advisory and expert consulting firm that specializes in independent advice, investigations, data analytics, authoritative studies, expert testimony, and regulatory and dispute consulting. The firm employs over 700 professionals across 25 offices worldwide and has expertise in economics, finance, digital forensics, data analytics, investigations, and public policy across many industries. The firm's forensic technology team includes experts from various backgrounds such as federal prosecutors, corporate litigators, and information security specialists with numerous certifications. The firm provides services including digital forensics, eDiscovery, structured data analytics, information governance, and cyber security.
Peter Kaminsky is an attorney with over 30 years of experience negotiating and drafting technology contracts. He has worked as general counsel for HIMA, Inc. since 2007 and also operates his own law firm. Kaminsky has extensive experience negotiating and drafting agreements related to software licensing, cloud computing, consulting and more. He has worked for several large companies, negotiating agreements for Fortune 500 clients and ensuring regulatory compliance.
Legal Tech Innovators Showcase @ ABA TECHSHOWEvolve Law
Legal tech innovators were showcased at an ABA conference. The document lists various companies, speakers, and hashtags related to the event. It also includes a pitch deck for Page Vault describing their product and market opportunity capturing and storing web pages. Finally, it discusses a company called PeaceTones and how partnering with the world can help spread the rule of law through technology.
This document discusses businesses' legal obligations to protect sensitive customer data, the risks of peer-to-peer file sharing, and steps businesses should take to comply with data privacy laws and prevent data breaches. It advises creating clear data security policies, implementing controls like blocking unauthorized file sharing and remote access, training employees, and responding swiftly to any breaches while consulting legal experts. Failure to adequately protect customer information could result in fraud, identity theft, and legal liability.
Privilege and Proprietary Information in the Digital AgeNICSA
In an era of increased regulatory scrutiny and evolving technology, what is the state of attorney-client privilege in the fund management industry? Independent fund boards and those who communicate with them, find themselves in the middle of these increasing regulations—often with more questions than answers.
This webinar will educate financial professionals in the funds industry on best practices regarding communications between fund management and fund boards in a contemporary setting. After viewing the webinar, attendees will be able to:
- Characterize what is attorney-client privileged—and what is not
- Delineate what constitutes appropriate digital communications
- Enact measures to protect confidential information from cybersecurity breaches
This document summarizes a presentation on the legal and practical implications of bring your own device (BYOD) programs that allow employees to use personal mobile devices for work. The presentation discusses BYOD adoption rates and benefits, as well as privacy and security risks for organizations. It covers international privacy issues, relevant US statutes and case law, security considerations including mobile device management, and unique challenges for eDiscovery with BYOD. Implementation topics like device basics, access controls, policy design, and privacy are also summarized.
Similaire à The Winning Case for (Law Firm) Online Document Management (20)
Most law firm marketing and business development professionals believe law firm growth prospects are more promising this year than last, although competition is the top barrier to growth, according to a new survey. The study was published by LexisNexis provides peer perspective on the state of legal marketing – and more importantly benchmarks for improving overall business development strategy. Key statistics and trends on how law firms are tackling evolving challenges stemming from the survey include: More than half of those surveyed (57%) are sanguine about law firm growth this year, while about one-third expect growth to remain flat. Just 5% expressed pessimism; Competition was the single largest challenge to law firm growth according to 52% of respondents; Upwards of 90% believe there is a fairly clear distinction between “law firm marketing” and “law firm business development.”
This presentation stems from a CLE webinar on organizing, analyzing and presenting the key pieces of electronically stored information. How can you pull it all together—without pulling out your hair? Get tips, techniques and best practices at this information-packed and practical Webinar presented by three specialists in case analysis techniques and litigation technology.
A presentation stemming from a CLE webinar by Todd C. Scott of Minnesota Lawyers Mutual Insurance Company, which provides fantastic tips to minimize the risk of law firm malpractice. See the last slide for the next CLE Webinar on June 16, 2015
This is a short yet impactful piece based on three vignettes from attorenys that have started their own law firms. These address: 1) setting financial and personal goals for a law firm 2) when to hire staff and 3) setting policies and procedures.
A LexisNexis survey of legal departments found a renewed sense of optimism among U.S.-based corporate legal departments. More than 70% of survey respondents, which were mostly comprised of corporate attorneys, said this year has been better as compared to the previous year. The survey also found that corporate legal departments are planning to bring more work in-house, that compliance and operational efficiency are the top challenges, and expect legal budgets and staffing to remain flat.
A study of challenges and opportunities facing the business of small law firms in billing realization.
- More than 80% of small law firms surveyed say they experience past due client accounts at least some of the time. More than half (52.9%) say between 10% and 39% of their total client base is typically past due.
- A majority of law firms surveyed (71.2%) report providing discounts or writing off legal work even before invoicing clients. Interestingly, an analysis comparing law firms that “always” and “never” provide discounts appears to show a correlation to past due accounts: Those law firms that reported never providing discounts on legal fees also reported substantially lower percentages of clients who allowed legal invoices to become past due.
This study found that file sharing is increasingly important in law firm collaboration and while those firms are keenly aware of the consequences of IT security risks, unencrypted email – reinforced with a statement of confidentiality – remains the primary mechanism for sharing files.
This presentation covers examines the business management side of law firms, including metrics for law firm marketing, law firm technology spending and law firm profitability. It is broken into the following sections:
- Six Numbers Law Firm Stakeholders Should Know
- Investing time in your law firm
- Law practice vs. Law firm business
- Developing a roadmap
- Evaluating Clients
- Working within your budget constraints
Part 2 Deep Dive: Navigating the 2024 Slowdownjeffkluth1
Introduction
The global retail industry has weathered numerous storms, with the financial crisis of 2008 serving as a poignant reminder of the sector's resilience and adaptability. However, as we navigate the complex landscape of 2024, retailers face a unique set of challenges that demand innovative strategies and a fundamental shift in mindset. This white paper contrasts the impact of the 2008 recession on the retail sector with the current headwinds retailers are grappling with, while offering a comprehensive roadmap for success in this new paradigm.
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women MagazineCIOWomenMagazine
In this article, we will dive into the extraordinary life of Ellen Burstyn, where the curtains rise on a story that's far more attractive than any script.
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Neil Horowitz
On episode 272 of the Digital and Social Media Sports Podcast, Neil chatted with Brian Fitzsimmons, Director of Licensing and Business Development for Barstool Sports.
What follows is a collection of snippets from the podcast. To hear the full interview and more, check out the podcast on all podcast platforms and at www.dsmsports.net
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Final ank Satta Matka Dpbos Final ank Satta Matta Matka 143 Kalyan Matka Guessing Final Matka Final ank Today Matka 420 Satta Batta Satta 143 Kalyan Chart Main Bazar Chart vip Matka Guessing Dpboss 143 Guessing Kalyan night
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.AnnySerafinaLove
This letter, written by Kellen Harkins, Course Director at Full Sail University, commends Anny Love's exemplary performance in the Video Sharing Platforms class. It highlights her dedication, willingness to challenge herself, and exceptional skills in production, editing, and marketing across various video platforms like YouTube, TikTok, and Instagram.
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdfonlyfansmanagedau
In the competitive world of content creation, standing out and maximising revenue on platforms like OnlyFans can be challenging. This is where partnering with an OnlyFans agency can make a significant difference. Here are five key benefits for content creators considering this option:
Starting a business is like embarking on an unpredictable adventure. It’s a journey filled with highs and lows, victories and defeats. But what if I told you that those setbacks and failures could be the very stepping stones that lead you to fortune? Let’s explore how resilience, adaptability, and strategic thinking can transform adversity into opportunity.
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...Herman Kienhuis
Presentation by Herman Kienhuis (Curiosity VC) on developments in AI, the venture capital investment landscape and Curiosity VC's approach to investing, at the alumni event of Amsterdam Business School (University of Amsterdam) on June 13, 2024 in Amsterdam.
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...BBPMedia1
Nathalie zal delen hoe DEI en ESG een fundamentele rol kunnen spelen in je merkstrategie en je de juiste aansluiting kan creëren met je doelgroep. Door middel van voorbeelden en simpele handvatten toont ze hoe dit in jouw organisatie toegepast kan worden.
Call8328958814 satta matka Kalyan result satta guessing➑➌➋➑➒➎➑➑➊➍
Satta Matka Kalyan Main Mumbai Fastest Results
Satta Matka ❋ Sattamatka ❋ New Mumbai Ratan Satta Matka ❋ Fast Matka ❋ Milan Market ❋ Kalyan Matka Results ❋ Satta Game ❋ Matka Game ❋ Satta Matka ❋ Kalyan Satta Matka ❋ Mumbai Main ❋ Online Matka Results ❋ Satta Matka Tips ❋ Milan Chart ❋ Satta Matka Boss❋ New Star Day ❋ Satta King ❋ Live Satta Matka Results ❋ Satta Matka Company ❋ Indian Matka ❋ Satta Matka 143❋ Kalyan Night Matka..
Discover timeless style with the 2022 Vintage Roman Numerals Men's Ring. Crafted from premium stainless steel, this 6mm wide ring embodies elegance and durability. Perfect as a gift, it seamlessly blends classic Roman numeral detailing with modern sophistication, making it an ideal accessory for any occasion.
https://rb.gy/usj1a2
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Stone Art Hub
Stone Art Hub offers the best competitive Marble Pricing in Dubai, ensuring affordability without compromising quality. With a wide range of exquisite marble options to choose from, you can enhance your spaces with elegance and sophistication. For inquiries or orders, contact us at ☎ 9928909666. Experience luxury at unbeatable prices.
Best practices for project execution and deliveryCLIVE MINCHIN
A select set of project management best practices to keep your project on-track, on-cost and aligned to scope. Many firms have don't have the necessary skills, diligence, methods and oversight of their projects; this leads to slippage, higher costs and longer timeframes. Often firms have a history of projects that simply failed to move the needle. These best practices will help your firm avoid these pitfalls but they require fortitude to apply.
HR search is critical to a company's success because it ensures the correct people are in place. HR search integrates workforce capabilities with company goals by painstakingly identifying, screening, and employing qualified candidates, supporting innovation, productivity, and growth. Efficient talent acquisition improves teamwork while encouraging collaboration. Also, it reduces turnover, saves money, and ensures consistency. Furthermore, HR search discovers and develops leadership potential, resulting in a strong pipeline of future leaders. Finally, this strategic approach to recruitment enables businesses to respond to market changes, beat competitors, and achieve long-term success.
The Winning Case for (Law Firm) Online Document Management
1. CLE CODE: 23277
The Winning Case for Online
Document Management
Presented by:
Christopher T. Anderson, Esq.
Product Manager
LexisNexis Firm Manager®
Dan Barahona
VP Business Development
WatchDox
2. Christopher T. Anderson, Esq.
Product Manager, LexisNexis Firm Manager®
The proud father of a six-year old boy, avid pilot, and lawyer:
Christopher is the Product Manager for LexisNexis Firm Manager®, a
web-based practice management system that helps attorneys get and
stay organized, serve their clients better, work more productively, at any
time, from anywhere.
Mr. Anderson has authored several articles, and spoken to fellow
attorneys on a wide range of topics, including law firm management, the
ethics of cloud computing, the future of technology in law firms, etc.
Mr. Anderson has presented to Legal Tech New York, ABA TECHSHOW,
various State and Local Bar associations, National CLE conferences, etc.
Prior to working with LexisNexis, he was the managing partner of fullservice law firm in Georgia. Mr. Anderson practiced in the fields of
family law and business litigation, and nurtured his passion for bringing
technology to bear to help lawyers work smarter, serve their clients
better, and be more profitable.
Previously, he also served as an assistant district attorney in New York
City, and in Georgia. Mr. Anderson was also Associate General Counsel
and Director of Client Services for RealLegal, a legal software company.
He is a graduate of Cornell University, and received his Juris Doctorate
from the University of Georgia School of Law in 1994. Christopher
Anderson is admitted to practice in the federal and state courts of New
York and Georgia.
2
3. Dan Barahona
VP, Business Development, WatchDox, Inc.
Dan leads business development for WatchDox and is responsible for
the company’s strategic partnerships and driving new market
opportunities.
WatchDox is
Before joining WatchDox, Dan was Vice President of Business
Development at ArcSight, where he led the company’s technology
alliances and partner ecosystem, as well as ArcSight’s integration into
HP after its acquisition. Prior to ArcSight, Dan joined Sensage as one of
its first 10 employees and drove the company’s transformation into
the information security space. As the Vice President of Business
Development, Dan led Sensage’s strategic alliances, completing OEM
relationships with HP and Cerner, and partnerships with EMC, McAfee
and SAP.
Dan holds a B.S. degree in Engineering from the Rensselaer
Polytechnic Institute, a Master of Engineering degree from Cornell
University, and an MBA from the University of Michigan.
3
4. Clinging to the Past
Resources:
http://www.chubb.com/businesses/csi/chubb4629.pdf
http://www.americanbar.org/groups/professional_responsibility/services/ethicsear
ch/materials_on_client_file_retention.html
http://www2.nycbar.org/Publications/reports/show_html_new.php?rid=794
4
5. Model Rule of Professional Conduct 1.16: Terminating Representation
Upon termination of representation, a lawyer shall [surrender] papers and
property to which the client is entitled… The lawyer may retain papers relating
to the client to the extent permitted by other law.
5
9. Cloud Storage:
Is It Safe?
Model Rule of Professional Conduct 1.15:
Safekeeping Property
A lawyer shall hold property of clients or third persons
that is in a lawyer's possession in connection with a
representation separate from the lawyer's own
property. ... [P]roperty shall be identified as such and
appropriately safeguarded. Complete records of [the]
property shall be kept by the lawyer and shall be
preserved for a period of [five years] after termination
of the representation.
9
10. Model Rule of Professional Conduct
1.6: Confidentiality of Information
(a) A lawyer shall not reveal information
relating to the representation of a client
unless the client gives informed
consent…
(c) A lawyer shall make reasonable
efforts to prevent the inadvertent or
unauthorized disclosure of, or
unauthorized access to, information
relating to the representation of a client.
10
13. Data Ownership
Above all, your confidential client data belongs to your client.
Questions to ask:
•What are your contract terms/conditions?
•Policies on Government requests?
•Data return procedures?
•What happens when you cancel?
•How are third parties vetted?
•Use of my data internally?
•Is any anonymized information used?
13
14. Data Ownership
Actual Terms and Conditions from (non-legal focused) Cloud Vendors…
− BRAND X will have no responsibility for any harm to your computer
system, loss or corruption of data, or other harm that results from your
access to or use of the Services or Software
− BRAND X: If you add a file to your [Brand X] that has been previously
uploaded by you or another user, we may associate all or a portion of
the previous file with your account rather than storing a duplicate
− BRAND Y: When you upload … content to our Services, you give Brand Y
(and those we work with) a worldwide license to use, host, store,
reproduce, modify, create derivative works … communicate, publish,
publicly perform, publicly display and distribute such content.
− BRAND Y: Your domain administrator may be able to … access or retain
information stored as part of your account [and]restrict your ability to
delete or edit information… or privacy settings.
14
22. Sources
For Your Reference and Reading Pleasure
A Lawyer’s Guide to Records Management Issues, Chubb Insurance
http://www.chubb.com/businesses/csi/chubb4629.pdf
(Overall guideto Records Management Issues)
Materials On Client File Retention, American Bar Association
http://www.americanbar.org/groups/professional_responsibility/services/ethicsearch/materi
als_on_client_file_retention.html
THE ASSOCIATION OF THE BAR OF THE CITY OF NEW YORK COMMITTEE ON PROFESSIONAL
AND JUDICIAL ETHICS, Formal Opinion 2008-1:
A LAWYER’S ETHICAL OBLIGATIONS TO RETAIN AND TO PROVIDE A CLIENT WITH ELECTRONIC DOCUMENTS
RELATING TO A REPRESENTATION
http://www2.nycbar.org/Publications/reports/show_html_new.php?rid=794
22
23. CLE CODES: 23277
43411
Thank You!
The Winning Case for Online
Document Management
Presented by:
Christopher T. Anderson, Esq.
Product Manager
LexisNexis Firm Manager®
Dan Barahona
VP Business Development
WatchDox
Notes de l'éditeur
The “management of documents” has been a mainstay of lawyering since its inception. The creation, interpretation, preservation, and destruction of documents have long been the purview of attorneys. While the most important of these have been recorded with the Courts, others, including wills, contracts, indentures, instruments, and evidence have long been safeguarded … more or less effectively, by we, the legal profession.
Model Rule of Professional Conduct 1.15: Safekeeping Property:
A lawyer shall hold property of clients or third persons that is in a lawyer's possession in connection with a representation separate from the lawyer's own property. ... [P]roperty shall be identified as such and appropriately safeguarded. Complete records of [the] property shall be kept by the lawyer and shall be preserved for a period of [five years] after termination of the representation.
Anecdote – The storage unit of TW&A, and other firms. Unknown destruction of documents by pests, moisture, water, fire, etc.
For a long time, we have created, stored, shared, and transmitted documents in a variety of ways … many of which date back to much simpler times. Once upon a time it was impractical to safeguard all but the most secure documents, unthinkable to “back-up” boxes and boxes of stuff, and unimagineable to retain control of a document once it left your office. No more.
Resources:
http://www.chubb.com/businesses/csi/chubb4629.pdf – Overall gyude to Records Management Issues
http://www.americanbar.org/groups/professional_responsibility/services/ethicsearch/materials_on_client_file_retention.html - ABA Materials on Client File Retention
http://www2.nycbar.org/Publications/reports/show_html_new.php?rid=794 – On obligations around Electronic Documents
Traditionally, documents started out as paper, were copied onto paper, and were stored as paper. (After stone tablets, of course.)
Model Rule of Professional Conduct 1.16: Terminating Representation
Upon termination of representation, a lawyer shall take steps to the extent reasonably practicable to protect a client's interests, such as giving reasonable notice to the client, allowing time for employment of other counsel, surrendering papers and property to which the client is entitled and refunding any advance payment of fee or expense that has not been earned or incurred. The lawyer may retain papers relating to the client to the extent permitted by other law
Dan – evolution of digital documents
Chris – adds flavor legal industry specific
4 kinds:
Documents originally on paper – Scanned
Documents originally on paper – Scanned and OCR’d.
Documents originally electronic
Documents originally electronic, and converted to another format
Consider storage medium, and future accessability
Not limited to “documents”
Word
Excel
Audio
Video
Etc., etc.
Chris - With HIPAA laws and customers demanding more transparency, law firms are forced to make changes on how they share information with clients.
Clients are used to accessing documents where they want, when they want.
Evolving client expectations vis-à-vis how lawyers are organized (and conduct their business)
Self-help
Sophistication
Anecdotes about banking, Dr. lab reports, etc.
Dan – Add anything relevant
How to minimize risk by going digital
Chris to take and ask Dan a couple of questions specific to minimizing risk
This slide leads to risk management – point out that what they currently have today in the office to include servers is not as safe as some cloud solutions.
How traditional methods of document storage are actually less safe than online storage
Risks
Fire
Intrusion
Theft
Loss/Misfiling
Mitigation
Backups
Security
Detection/Protection/Expiration
Search
Self assessment
Client-Lawyer Relationship Rule 1.6 Confidentiality Of Information
(a) A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent, the disclosure is impliedly authorized in order to carry out the representation or the disclosure is permitted by paragraph (b).
(b) A lawyer may reveal informa tion relating to the representation of a client to the extent the lawyer reasonably believes necessary:
(1) to prevent reasonably certain death or substantial bodily harm;
(2) to prevent the client from committing a crime or fraud that is reasonably certain to result in substantial injury to the financial interests or property of another and in furtherance of which the client has used or is using the lawyer's services;
(3) to prevent, mitigate or rectify substantial injury to the financial interests or property of another that is reasonably certain to result or has resulted from the client's commission of a crime or fraud in furtherance of which the client has used the lawyer's services;
(4) to secure legal advice about the lawyer's compliance with these Rules;
(5) to establish a claim or defense on behalf of the lawyer in a controversy between the lawyer and the client, to establish a defense to a criminal charge or civil claim against the lawyer based upon conduct in which the client was involved, or to respond to allegations in any proceeding concerning the lawyer's representation of the client;
(6) to comply with other law or a court order; or
(7) to detect and resolve conflicts of interest arising from the lawyer’s change of employment or from changes in the composition or ownership of a firm, but only if the revealed information would not compromise the attorney-client privilege or otherwise prejudice the client.
(c) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.
“The only truly secure computer is the one unplugged from the wall and locked in a vault.”
At bare minimum, vendors should provide “better-than-yours” data security. Ask them about:
Encryption type?
Environmental security?
Testing methods?
Real-time intrusion monitoring?
Third party certifications?
Internal controls?
Chris takes and Dan adds to it
There are some standard credentials you should look for when shopping for a reputable vendor.
You will see reference to SAS 70 type ii attestation. This is a Statement of auditing standards developed by the AICPA, the American Institute of Certified Public Accounts, to audit and examine internal controls of service organizations. SAS70 encompasses a number of data center best practices i.e.:
Built and Constructed for Ensuring Physical Protection
Protection of the Physical Grounds
Provisioning process – someone who checks everyone entering and leaving the building
Off-boarding process – when an employee leaves – a process for removing any access
Maintenance of Vegetation – for purposes on not concealing or hiding an intruder
Security Systems and 24x7 Backup Power
Electronic Access Control systems
Alarms, Cameras, Data center security (armed guards)
Scheduled and unscheduled security inspections by internal and external parties
These are just a few of the items as must haves for SAS70 compliance
There was a blog by David Cochran () in mid-May that discussed the importance of making sure you find a provider that is SAS70/SSAE 16 certified, now he was referring to a discovery management provider but it is relevant for any cloud based solution where you have client privileged information. (see below for detailed references in the article). To sum up Mr. Cochran said “Does the provider you are about to select have the SAS70/SSAE 16 certification? If the answer is no, then move on.”
2) eTrust - An eTrust Privacy Certification indicates that your website has been reviewed by eTrust and has met our stringent privacy and data protection requirements. Having an eTrust Privacy logo on your website or obtaining this certification signifies to customers that any critical data collected, such as home addresses and phone numbers are not exchanged with third parties without their consent. This is vital in having a trustful relationship between you and your customers. eTrust Privacy Certifications need to be renewed each year, however if you change your Privacy Statement we will automatically reassess it (there is no fee for this).
3) Why should you care about where data centers are located? Not all countries have the same privacy and protection laws that the US enforces when it comes to your data and client privileged information.
4) Trustwave, TrustE and HIPAA/HiTech are also terms you want to look for. Trustwave is the leading provider of on-demand data security and payment card industry compliance management solutions to businesses and organizations ; TRUSTe ensures compliance with evolving and complex privacy requirements; HIPAA/HiTech – this is mainly meaning that we encrypt information, we secure the data with authentication, we backup the data, we virus scan the data, etc.
4) I think the other criteria you should consider when selecting a company to trust is their history and reputation in the industry. You want to be assured that the business you trust to lease mission critical software from and house your data is going to be around a year or two from now.
Re: Government requests – we have to abide by government requests, however, you own the data, we have to provide you with notice we are being asked for data
Questions to ask:
What are your contract terms/conditions?
Policies on Government requests?
Data return procedures?
What happens when you cancel?
How are third parties vetted?
Use of my data internally?
Is any anonymized information used?
X is Dropbox
Y is Google
More Dropbox:
You, and not Dropbox, are responsible for maintaining and protecting all of your stuff. Dropbox will not be liable for any loss or corruption of your stuff, or for any costs or expenses associated with backing up or restoring any of your stuff.
We may disclose to parties outside Dropbox files stored in your Dropbox and information about you that we collect when we have a good faith belief that disclosure is reasonably necessary to (a) comply with a law, regulation or compulsory legal request; (b) protect the safety of any person from death or serious bodily injury; (c) prevent fraud or abuse of Dropbox or its users; or (d) to protect Dropbox’s property rights.
Start with Dan –
Digital Rights management has been around as early as the 1960s when recordings began to be pirated. And when documents went digital, and email became the prevalent way to communicate and send documents, many problems and risks were introduced to the world of Digital Rights Management.
What it is? What it isn’t
Hand off to Chris
The 2012 ABA Legal Technology Survey showed that, although 57% of law firms offered an online (or cloud based) method of document management or storage, and 21% of lawyers use this type of service on a regular basis. It’s important to understand the professional responsibility of a lawyer and the ABA Model rules that focus on client privilege and protecting client information.
Of the ones who do, only about 1/3 bothered to read corresponding privacy policies or make sure the sites had proper encryption.
Search
There are powerful and new methods of digital document search that can save hours of wasted time
Dan talks about the trends in the document industry
Chris talks about the legal industry specific stuff
Dan will talk about encryption
Chris chimes in with legal specific stuff
Chris - How to lead the change for going digital at your firm:
With Facts and Resources … what you learn here is a good start!
By Example. Try it, learn it, teach it.
By Comparison … is it better than what you’re doing today?
Here is an example using WatchDox of the type of Saas based solutions that are affordable as they are robust.