Technology Risk Management Protocols

data lma.jpgBy Marguerite Downey and Stacy A. Smith

Special thanks to contributor Allison Brecher, Esq. Brecher is senior litigation counsel and director of information management and strategy at Marsh and McLennan Companies in New York.

In the wake of recent high-profile data breaches, many corporate legal departments and information technology leaders are tightening up network security. Here are some practical steps your law firm can take to ensure your firm is secure from predators:

  • Access to client documents should be limited to law firm personnel who are working on that client’s engagement and should be exchanged via secure channels.
  • Restrict document sharing, particularly via file-sharing websites.
  • Secure internal computer networks and protect laptops with whole disk encryption.

For the full list, check out your November / December issue of Strategies magazine, hitting your mailbox soon.

Recent Stories
Technology Risk Management Protocols

Technology and the Legal Marketer

The Care & Feeding of Difficult People