SlideShare a Scribd company logo
1 of 4
Download to read offline
BEST
PRACTICES
     Legal Information Risk
     — Action Plan and Roadmap
     A law firm has only a few principal assets: its reputation, its people, its relationships and the collective information for which it
     is responsible. Ensuring the quality of this information and protecting it from risk is critical to a firm’s viability. While many share
     responsibility for the quality of information, the CIO has the central role in handling risks that threaten its existence, accessibility,
     and security. IT’s hardware, software and services, while complex and expensive, are simply the tools that help IT deliver on
     these responsibilities. We have assembled an action plan for some of the considerations when addressing nine risks to law firm
     information and a roadmap to outline key aspects of the expected future state. While not exhaustive, it is a useful guide for CIOs,
     COOs and security directors when considering their firm’s priorities and risk tolerance.




                                                                              action plan
 Risk: Theft by External
 Parties                                                                             Risk: Theft by Internal
  Security firms have conveyed that
                                       law firms are easy                             Parties
  targets for obtaining infor mation on law firm clients;
                                         varsity team to break                       For collaboration, law firms trust
  hackers might not even bring their                                                                                   their own employees and
  in. Whether this situation  drives law firms to third-party                         provide wide access once logged
                                                                                                                         onto the IT systems.
                                         rity services or                            Headline events of associates sellin
  providers of infrastructure and secu                                                                                    g firm information for
   improves internal procedur  es is yet to be seen; in any                          profit have not yet driven most firms
                                                                                                                           to change this model
                                      responsibility that is                        (although a small number of firms
   case, security know-how is an IT                                                                                     have done so). Firms
   growing in importance. Con    siderations include:                               can take more prudent steps and
                                                                                                                        better protect sensitive
                                                                                    information by moving to a “trus
                                                                                                                      t but verify” model.
                                        rity specialist, including                  Considerations include:
     Annual audit by third-party secu
     penetration testing
                                                                                      Consistent, automated ethical walls
                                                                                                                             across major
                                          itorin   g of WAN and                       information systems (online acco
     Expert (third-party or in-house) mon                                                                                unting, business
                                                                                      intelligence reports, time entry,
     firewall security incidents                                                                                         document management,
                                                                                      file shares, intranet and search resu
                                                                                                                           lts)
                                         are patch
     Mature (consistent and fresh) softw
               ent procedures                                                         Private folders and need-to-know
     managem                                                                                                              project code names
                                                                                      for sensitive matters not subjecte
                                                                                                                         d to an ethical wall
                                            ad and other PDAs
     Secure client software for iPhone/iP
                                                                                     Rights management and/or encr
                                                                                                                    yption applied to very
                                          g you     know,                            sensitive client and firm documen
      Two-factor authentication (somethin                                                                             ts
                                      logon
      something you have) for network
                                                                                     Expiration dates on information,
                                                                                                                       e.g., the information
                                      opriate complexity and                         is purged or access is denied after
      Password policies to ensure appr                                                                                   a defined period of
               al change                                                             time
      occasion
                                        and incident response                        Automated monitoring for extra
      Clear information security design                                                                             ordinary events (e.g.,
      responsibilities, including appropriate training                               mass export or printing)

                                                                                    Secured screen savers and daily
                                                                                                                       log-out policies
Risk: loss by firm
                                                                                                                 vendors
                           cord
  Risk: Completeness of Re                                                                      Breaches and losses of informati
                                                                                                                                 on by the firm’s third-
                                   ntly, lawyers rely on the complete                           party providers are, unfortunately
  To provide legal advice compete                                                                                                 , frequent headline-
                                    er; hence, the driving need                                 makers. Considerations include:
  and up-to-date record of the matt                        cycle
  for processes and tool s that support access to and life
                                      the  moment a matter is opened:                             Up-to-date inventory of vendors
  management of information. From                                                                                                 who hold the firm’s
                                                                                                  information and the information
                                                                                                                                  each vendor holds
                                                 store, organize, protect materials
     Repositories must be in place to
                                                                                                  Assure vendor data privacy oblig
     as created or received                                                                                                        ations comply with firm
                                                                                                  policies and client obligations
                                                     t-matter number
      Materials must be classified by clien
                                                                                                 Verify actual scope and applicab
                                                                                                                                  ility of vendor security
                                                  firm and personal resources                     claims, such as ISO 27001 or SAS
      24/7 access must be available via                                                                                             70
                                          in place to prevent the
      Information-use policies must be
                                         mation, ensure the protection of
      proliferation of unclassified infor                       destruction
      confidential informati  on, and govern the appropriate
      of obsolete information
                                                  m for information life
          Alas, there is no “silver bullet” syste                business
    cycle management;     today it comprises automated new
                                        IDs   associated with the electronic
    intake to establish client-matter
                                           ent, which when broadly focused,
    repositories; document managem                                                              Risk: Re
                                        matter-related information                                       tentio
    is the repository that houses all                            documents);                                                     n and
     (including email and   attachments and transacted/filed                                     The corolla                                       disposa
                                           s information retention periods                                     ry to the n                                          l
     records management, which track                                                           the value                    eed for a
                                         il archives, which house aged,                                      of inform                  complete
     and disposition events; and ema                                                           retention                ation also
                                                                                                                                     expires an
                                                                                                                                                    record is
                                                                                                                                                                that
                                                                                                            is costly to                         d that ove
     unclassified email.                                                                        with effici                 store, ma
                                                                                                                                      nage, and               rlong
                                                                                                           ent access                             protect; in
                                                                                              the risk th                to relevan                             terferes
                                                                                                           at it will b               t informati
                                                                                              To be defe                e subject                 on; and a
                                                                                                            nsible, th              to legal h                dds to
                                                                                             dispositio                 e rules go             old and p
                                                                                                          n of inform               vern                   roduction
                                                                                             actions ta                 ation must ing the retention a                 .
                                                                                                         ken must                      be reason                 nd
                                                                                            without a                 be consist                  able and
                                                                                                         duty to p                 ent, done                  the
                                                                                            Considera                reserve at                in good fa
                                                                                                         tions inclu              the time o                ith, and
                                                                                                                       de:                    f the disp
                                    m                                                                                                                     osition.
                            y fir
                  : lo ss b                                                                   Records p
                                                                                             records a
                                                                                                           olicy that
                                                                                                                       establishe
              Risk yees                    elieve
                                                  d                                                      nd inform
                                                                                                                      ation man
                                                                                                                                    s the acco
                                                                                                                                                untabilitie
                   lo                are b                                                                                         agement                   s for
              emp         emplo
                                yees
                                       ata
                                                                                            Retention
                                                                                                          schedules
                                     rm               of d
                             s by fi l breaches                                              opinions                    based on
                                                                                                                                    laws, regu
                       losse
             t data           n actua clude:                                                                                                    lations an
                                                                                                                                                            d bar
      erten             mmo              in
Inadv e most co iderations                                      drive
                                                                      s                    Records m
       th                ns                               hard          rd                              anageme
to be ntiality. Co                            rtab le PC
                                                            on-s tanda                     and dispo
                                                                                                       sition trig
                                                                                                                     nt system
                                                                                                                                  to apply re
 co nfide                        ovid  ed po ction of n                                                              gers consi                tention p
                                                                                                                                                          eriods
                         rm-pr            dete                                                                                   stently
                 n of fi rives (and                                                        Legal hold
          yptio
     Encr B thumb           d                                                                           system to
                                                                                                                      prevent th
                                                                 fore                    informatio
     and U )
             S                                             ok be                                      n while th                   e dispositi
                                                    Outlo                                                           ere is a d
                                                                                                                               uty to pre
                                                                                                                                               on of
      dev  ices                           il from                                                                                          serve
                                   t ema                                                Destructio
                            ncryp                                    nts to
                                                                                                     n process
               bilit y to e                                   accou
                                                                                        documen
                                                                                                   t the actio
                                                                                                                   es that pre
                                                                                                                                serve con
        Capa                                           email t blocking
                                                                             )                                    n                         fidentialit
                 g                                 nal                                                                                                 y and
        s endin                         of  perso bsequen
                                g use           nd su                           r all
                        hibitin mation (a                                ies fo
                y pro             r                               abilit
          Polic              info                           e cap
                     it firm                      tion/w
                                                         ip
           transm                        e dele
                                   emot
                            and r
                      ords
             Passw
             PDAs
BEST
PRACTICES
                                                                                            Risk: Re
                                                                                                     gul
                                                                                            Non-Com atory
                                                                                                      pliance
                                                                                          Law firms
                                                                                                        are relative
                                                                                          the roles,                   ly new to
                                                                                                       education                   regulatory
  Risk: Breach of Ethical                                                                 Considera
                                                                                                       tions inclu
                                                                                                                      and proce
                                                                                                                     de:
                                                                                                                                  sses are st
                                                                                                                                                controls,
                                                                                                                                               ill develop
                                                                                                                                                            so
                                                                                                                                                            ing.
  Obligations                                                                              C-level kn
                                                                                                         owledge
                                          confidentiality to their                          HIPAA/HIT                 of the firm
  Lawyers have duties of loyalty and                                                      and ITAR,
                                                                                                         ECH, state               ’s obligati
                                                                                                                         privacy la           ons unde
  clients. In today’s vola tile market, lawyers are moving                                              as well as                  ws, EU Da             r
                                                                                          clients, su                 regulation                 ta Protect
                                       rapidity. While the 2009                                                                   s affecting                ive
  from firm to firm with increasing                                                                      ch as the
                                                                                                                    Graham-L                    the firm’s
  changes to ABA Mod      el Rule of Professional Conduct                                                                       each-Blile
                                                                                                                                            y Act
                                            est: General Rule,                           Inventory
  1.10, Imputation of Conflicts of Inter                       it                         obligation
                                                                                                      of the firm
                                                                                                                    ’s data su
  makes it easier ethic  ally for lawyers to change firms,                                             s and the                bject to th
                                                                                                                                            e above
                                             icts clearance, ethical                     well as an                data it ho
                                                                                                                               lds on be
   heightens the requirements for confl                                                  geograph
                                                                                                      understan
                                                                                                                   ding of th              half of clie
                                           icit client consent.                                                                e flow of                  nts, as
   screens, client notification and expl                                                              ic bounda
                                                                                                                  ries                     this data
                                              of unauthorized                                                                                          across
   All have implications for IT: ingestion                                              Designati
   information from later   als, ethical screens over client-                                       on of a da
                                                                                                                 ta privacy
                                        of client instructions.                                                               officer
   matter information and tracking                                                     Registrati
   Considerations inclu   de:                                                                      on with n
                                                                                                              on-U.S. d
                                                                                                                           ata prote
                                                                                      Regular co                                      ction auth
                                                                                                                                                    orities
     Lateral transfer processes                                                      their oblig
                                                                                                    mmunica
                                                                                                               tions to fi
                                                                                                   ations and               rm lawyers
                                                                                     occurs                      how to re               and staff
                                     identify ethical (and                                                                   act if a risk            on
     Conflicts clearance processes to                                                                                                       or breach
                                          track them
     busi ness) conflicts and databases to                                           Intranet si
                                                                                                 te that se
                                                                                    source fo               rves as a
                                            usive)                                             r the firm’s                complian
      Matter screens (inclusive and excl                                                                     lawyers a               ce educati
                                                                                                                                                   onal
                                                                                                                          nd staff




             Risk: loss of access
             When lawyers and firm leadership lose access to firm information
             (i.e., system downtime or disasters), it is among the highest profile
             incidents for a CIO. Considerations include:

               Ability to recover key business systems in less than an hour, even
               if certain key staff are not available

               99.98 percent uptime for core systems (equivalent to less than
               two hours downtime per year)
                                                                                                 While this action plan on
                                                                                                                            ly
               No or minimal data loss (e.g., email and document edits) when                    focuses on a few key issue
               failures do occur                                                                                             s
                                                                                                in each area, it highlights
               Recovery exercises at least twice a year (tabletop exercises —                   the multidisciplinary
               verbal rather than actual tests — are practical complements to
               actual recovery exercises)
                                                                                                nature of protecting
                                                                                                information from risk.
roadmap

      Attributes that will define the maturity of information risk
      management in the next few years include:

      Governance                                                            basic, manual risk registers (inventories of risk issues and
      CIOs cannot act in isolation when making decisions about              actions to be taken to address them). Over time, they will
      or taking action to address information risks. Law firms               be expected to dynamically inventory, monitor, assess and
      are best served by creating a risk management team to                 address information risk issues. IT departments need to
      address information risks in the broader context of the               develop the risk-savvy skill sets to use these tools.
      legal and operational risks. This team should include roles
      responsible for information risk and data breaches (not               Physical Disaggregation of Information
      likely to be the same person). Such a team provides a                 In opposition to the ongoing trend to consolidate
      check-and-balance by making information risk decisions                systems into primary datacenters, the physical locations
      separate from the IT personnel tasked with implementing               of information will grow as firms turn to vendors for
      them. Despite good intentions, a busy and cost-conscious              infrastructure or software as a service. Risk management
      IT department often compromises good risk management                  policies and audit capabilities will need to extend across
      protocol; a risk management team provides a forum for                 organizational and geographic boundaries, especially as
      determining the firm’s tolerance for risk in the context of            virtualized systems make data flowing in and out of vendors
      its business priorities.                                              more straightforward and dynamic.

      Risk Management Through Contract                                      Risk Standards
      The maturity of IT vendors and the proliferation of “as-a-            Over the past two years, law departments have increased
      service” options will drive the evolution of risk management          the depth and complexity of their risk-related questions
      skill sets from technical to legal competencies. COOs and             markedly. This trend is expected to continue accelerating,
      lawyers, who are often uncomfortable navigating technical             with multiple departments standardizing on similar risk
      risks, are already warming to managing risks through contract         expectations. As a response to these expectations, over a
      negotiations, agreed formal procedures and incident                   dozen law firms have achieved the ISO 27001 information
      responsibilities. IT will be best positioned when it can              security certification in response to now-common RFP
      address both technical and legal aspects of information risk.         requirements. Accordingly, expect growth in certifications
                                                                            and standardization.
      Self-Audit
      Many regulated companies already employ monitoring                          This action plan and roadmap should provide a
      tools, data scanning software and governance risk                     starting point to ensure good risk governance is in place.
      compliance (GRC) dashboards to understand their current               Without it, IT is inappropriately taking all the risk on its own
      state in real time and manage their progress in relation              shoulders. ILTA
      to risk initiatives. Law firms are just beginning to keep




This article was first published in ILTA’s June 2011 issue of Peer to Peer titled “Law2020TM: One Year In” and is reprinted here with permission. For
more information about ILTA, visit their website at www.iltanet.org.


                          David Cunningham is one of the original                                     Meg Block has over 25 years of experience
                          consultants of Baker Robbins & Company,                                     consulting to the legal community. A
                          helping it grow from 12 to 120 consultants and                              Managing Director, she is a senior leader
                          now part of Hildebrandt Baker Robbins. David                                in Hildebrandt Baker Robbins’ information
                          leads strategic technology assessments, cost                                management service line. Her specialties are
                          reduction and outsourcing analysis, and risk                                business process reviews and the design and
                          management assessments. He established the                                  implementation of enterprise-wide information
                          Law Firm Technology Scorecard and co-leads                                  programs in the areas records management,
                          the risk management practice. He can be                                     new business intake, conflicts of interest, IP
                          reached at dcunningham@hbrconsulting.com.                                   and litigation calendar-docket. She also teams
                                                                                                      with email and document management experts
                                                                                                      to develop practical and defendable digital
                                                                                                      records management strategies. She can be
                                                                                                      reached at mblock@hbrconsulting.com.

More Related Content

Viewers also liked

Roadmap to the Implementation of the Commercial Register in Lebanon - Salam Y...
Roadmap to the Implementation of the Commercial Register in Lebanon - Salam Y...Roadmap to the Implementation of the Commercial Register in Lebanon - Salam Y...
Roadmap to the Implementation of the Commercial Register in Lebanon - Salam Y...Corporate Registers Forum
 
Activity Diagram Templates by Creately
Activity Diagram Templates by CreatelyActivity Diagram Templates by Creately
Activity Diagram Templates by CreatelyCreately
 
2016 Trends: Plan your 2016 Marketing Roadmap
2016 Trends: Plan your 2016 Marketing Roadmap2016 Trends: Plan your 2016 Marketing Roadmap
2016 Trends: Plan your 2016 Marketing RoadmapStarmark
 
How to Be An Innovator: Your Personal Roadmap
How to Be An Innovator: Your Personal RoadmapHow to Be An Innovator: Your Personal Roadmap
How to Be An Innovator: Your Personal RoadmapSidneyeve Matrix
 
Product roadmap-guide-by-product plan
Product roadmap-guide-by-product planProduct roadmap-guide-by-product plan
Product roadmap-guide-by-product planLewis Lin 🦊
 
From idea to innovation roadmap
From idea to innovation roadmapFrom idea to innovation roadmap
From idea to innovation roadmapJamil AlKhatib
 
progressive patient care power point
progressive patient care power pointprogressive patient care power point
progressive patient care power pointAIIMS, Rishikesh
 
Nursing theories
Nursing theoriesNursing theories
Nursing theoriesMae Aguilar
 
Road Map - ITIL Implemetation
Road Map - ITIL ImplemetationRoad Map - ITIL Implemetation
Road Map - ITIL ImplemetationFernando Palma
 
Digital Banking Strategy Roadmap - 3.24.15
Digital Banking Strategy Roadmap - 3.24.15Digital Banking Strategy Roadmap - 3.24.15
Digital Banking Strategy Roadmap - 3.24.15Calvin Turner
 
Developing a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationDeveloping a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationJohn Sinke
 

Viewers also liked (13)

Roadmap to the Implementation of the Commercial Register in Lebanon - Salam Y...
Roadmap to the Implementation of the Commercial Register in Lebanon - Salam Y...Roadmap to the Implementation of the Commercial Register in Lebanon - Salam Y...
Roadmap to the Implementation of the Commercial Register in Lebanon - Salam Y...
 
Activity Diagram Templates by Creately
Activity Diagram Templates by CreatelyActivity Diagram Templates by Creately
Activity Diagram Templates by Creately
 
2016 Trends: Plan your 2016 Marketing Roadmap
2016 Trends: Plan your 2016 Marketing Roadmap2016 Trends: Plan your 2016 Marketing Roadmap
2016 Trends: Plan your 2016 Marketing Roadmap
 
Asap methodology
Asap methodologyAsap methodology
Asap methodology
 
How to Be An Innovator: Your Personal Roadmap
How to Be An Innovator: Your Personal RoadmapHow to Be An Innovator: Your Personal Roadmap
How to Be An Innovator: Your Personal Roadmap
 
Product roadmap-guide-by-product plan
Product roadmap-guide-by-product planProduct roadmap-guide-by-product plan
Product roadmap-guide-by-product plan
 
From idea to innovation roadmap
From idea to innovation roadmapFrom idea to innovation roadmap
From idea to innovation roadmap
 
progressive patient care power point
progressive patient care power pointprogressive patient care power point
progressive patient care power point
 
Nursing theories
Nursing theoriesNursing theories
Nursing theories
 
Road Map - ITIL Implemetation
Road Map - ITIL ImplemetationRoad Map - ITIL Implemetation
Road Map - ITIL Implemetation
 
Digital Banking Strategy Roadmap - 3.24.15
Digital Banking Strategy Roadmap - 3.24.15Digital Banking Strategy Roadmap - 3.24.15
Digital Banking Strategy Roadmap - 3.24.15
 
Developing a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationDeveloping a Roadmap for Digital Transformation
Developing a Roadmap for Digital Transformation
 
S&OP Implementation Roadmap
S&OP Implementation RoadmapS&OP Implementation Roadmap
S&OP Implementation Roadmap
 

More from David Cunningham

The business of data analytics and business intelligence 15 nov 2016
The business of data analytics and business intelligence   15 nov 2016The business of data analytics and business intelligence   15 nov 2016
The business of data analytics and business intelligence 15 nov 2016David Cunningham
 
CLOC Legal Project Management and Simple RFPs
CLOC Legal Project Management and Simple RFPsCLOC Legal Project Management and Simple RFPs
CLOC Legal Project Management and Simple RFPsDavid Cunningham
 
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015David Cunningham
 
ALA 2005 Outsourcing - Making a Decision that Fits by Dave Cunningham Apr 2005
ALA 2005 Outsourcing  - Making a Decision that Fits by Dave Cunningham Apr 2005ALA 2005 Outsourcing  - Making a Decision that Fits by Dave Cunningham Apr 2005
ALA 2005 Outsourcing - Making a Decision that Fits by Dave Cunningham Apr 2005David Cunningham
 
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...David Cunningham
 
Ilta06 developing and selling an enterprise risk management approach by dave ...
Ilta06 developing and selling an enterprise risk management approach by dave ...Ilta06 developing and selling an enterprise risk management approach by dave ...
Ilta06 developing and selling an enterprise risk management approach by dave ...David Cunningham
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007David Cunningham
 
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...David Cunningham
 
Lit con 2009 collaborate to mitigate panel - facilitated by dave cunningham...
Lit con 2009   collaborate to mitigate panel - facilitated by dave cunningham...Lit con 2009   collaborate to mitigate panel - facilitated by dave cunningham...
Lit con 2009 collaborate to mitigate panel - facilitated by dave cunningham...David Cunningham
 
Ilta 2009 law firm risk management can it grow profitability - panel member...
Ilta 2009 law firm risk management   can it grow profitability - panel member...Ilta 2009 law firm risk management   can it grow profitability - panel member...
Ilta 2009 law firm risk management can it grow profitability - panel member...David Cunningham
 
Out with the old it in with the new by david cunningham - sep 2009
Out with the old it in with the new   by david cunningham - sep 2009Out with the old it in with the new   by david cunningham - sep 2009
Out with the old it in with the new by david cunningham - sep 2009David Cunningham
 
Managing partner retreat using technology to streamline the practice of law...
Managing partner retreat   using technology to streamline the practice of law...Managing partner retreat   using technology to streamline the practice of law...
Managing partner retreat using technology to streamline the practice of law...David Cunningham
 
Law journal news it is dead article; long live it controlling costs while g...
Law journal news   it is dead article; long live it controlling costs while g...Law journal news   it is dead article; long live it controlling costs while g...
Law journal news it is dead article; long live it controlling costs while g...David Cunningham
 
Risk management for law firms chapter 1 ark 2009 by dave cunningham
Risk management for law firms   chapter 1 ark 2009 by dave cunninghamRisk management for law firms   chapter 1 ark 2009 by dave cunningham
Risk management for law firms chapter 1 ark 2009 by dave cunninghamDavid Cunningham
 
Risk management for law firms chapter 2 ark 2009 by meg block
Risk management for law firms   chapter 2 ark 2009 by meg blockRisk management for law firms   chapter 2 ark 2009 by meg block
Risk management for law firms chapter 2 ark 2009 by meg blockDavid Cunningham
 
Trends shaping the future of legal risk management by dave cunningham and m...
Trends shaping the future of legal risk management   by dave cunningham and m...Trends shaping the future of legal risk management   by dave cunningham and m...
Trends shaping the future of legal risk management by dave cunningham and m...David Cunningham
 
Ltn 2010 02 risk glossary by dave cunningham on page 23
Ltn 2010 02 risk glossary by dave cunningham on page 23Ltn 2010 02 risk glossary by dave cunningham on page 23
Ltn 2010 02 risk glossary by dave cunningham on page 23David Cunningham
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
Hildebrandt baker robbins presentation for coo roundtable 2010 by dave cunn...
Hildebrandt baker robbins presentation for coo roundtable 2010   by dave cunn...Hildebrandt baker robbins presentation for coo roundtable 2010   by dave cunn...
Hildebrandt baker robbins presentation for coo roundtable 2010 by dave cunn...David Cunningham
 

More from David Cunningham (20)

The business of data analytics and business intelligence 15 nov 2016
The business of data analytics and business intelligence   15 nov 2016The business of data analytics and business intelligence   15 nov 2016
The business of data analytics and business intelligence 15 nov 2016
 
50 Shades of Metrics
50 Shades of Metrics50 Shades of Metrics
50 Shades of Metrics
 
CLOC Legal Project Management and Simple RFPs
CLOC Legal Project Management and Simple RFPsCLOC Legal Project Management and Simple RFPs
CLOC Legal Project Management and Simple RFPs
 
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015
 
ALA 2005 Outsourcing - Making a Decision that Fits by Dave Cunningham Apr 2005
ALA 2005 Outsourcing  - Making a Decision that Fits by Dave Cunningham Apr 2005ALA 2005 Outsourcing  - Making a Decision that Fits by Dave Cunningham Apr 2005
ALA 2005 Outsourcing - Making a Decision that Fits by Dave Cunningham Apr 2005
 
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
 
Ilta06 developing and selling an enterprise risk management approach by dave ...
Ilta06 developing and selling an enterprise risk management approach by dave ...Ilta06 developing and selling an enterprise risk management approach by dave ...
Ilta06 developing and selling an enterprise risk management approach by dave ...
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007
 
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...
 
Lit con 2009 collaborate to mitigate panel - facilitated by dave cunningham...
Lit con 2009   collaborate to mitigate panel - facilitated by dave cunningham...Lit con 2009   collaborate to mitigate panel - facilitated by dave cunningham...
Lit con 2009 collaborate to mitigate panel - facilitated by dave cunningham...
 
Ilta 2009 law firm risk management can it grow profitability - panel member...
Ilta 2009 law firm risk management   can it grow profitability - panel member...Ilta 2009 law firm risk management   can it grow profitability - panel member...
Ilta 2009 law firm risk management can it grow profitability - panel member...
 
Out with the old it in with the new by david cunningham - sep 2009
Out with the old it in with the new   by david cunningham - sep 2009Out with the old it in with the new   by david cunningham - sep 2009
Out with the old it in with the new by david cunningham - sep 2009
 
Managing partner retreat using technology to streamline the practice of law...
Managing partner retreat   using technology to streamline the practice of law...Managing partner retreat   using technology to streamline the practice of law...
Managing partner retreat using technology to streamline the practice of law...
 
Law journal news it is dead article; long live it controlling costs while g...
Law journal news   it is dead article; long live it controlling costs while g...Law journal news   it is dead article; long live it controlling costs while g...
Law journal news it is dead article; long live it controlling costs while g...
 
Risk management for law firms chapter 1 ark 2009 by dave cunningham
Risk management for law firms   chapter 1 ark 2009 by dave cunninghamRisk management for law firms   chapter 1 ark 2009 by dave cunningham
Risk management for law firms chapter 1 ark 2009 by dave cunningham
 
Risk management for law firms chapter 2 ark 2009 by meg block
Risk management for law firms   chapter 2 ark 2009 by meg blockRisk management for law firms   chapter 2 ark 2009 by meg block
Risk management for law firms chapter 2 ark 2009 by meg block
 
Trends shaping the future of legal risk management by dave cunningham and m...
Trends shaping the future of legal risk management   by dave cunningham and m...Trends shaping the future of legal risk management   by dave cunningham and m...
Trends shaping the future of legal risk management by dave cunningham and m...
 
Ltn 2010 02 risk glossary by dave cunningham on page 23
Ltn 2010 02 risk glossary by dave cunningham on page 23Ltn 2010 02 risk glossary by dave cunningham on page 23
Ltn 2010 02 risk glossary by dave cunningham on page 23
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Hildebrandt baker robbins presentation for coo roundtable 2010 by dave cunn...
Hildebrandt baker robbins presentation for coo roundtable 2010   by dave cunn...Hildebrandt baker robbins presentation for coo roundtable 2010   by dave cunn...
Hildebrandt baker robbins presentation for coo roundtable 2010 by dave cunn...
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

2011 ilta legal information action plan and roadmap by dave cunningham and meg block

  • 1. BEST PRACTICES Legal Information Risk — Action Plan and Roadmap A law firm has only a few principal assets: its reputation, its people, its relationships and the collective information for which it is responsible. Ensuring the quality of this information and protecting it from risk is critical to a firm’s viability. While many share responsibility for the quality of information, the CIO has the central role in handling risks that threaten its existence, accessibility, and security. IT’s hardware, software and services, while complex and expensive, are simply the tools that help IT deliver on these responsibilities. We have assembled an action plan for some of the considerations when addressing nine risks to law firm information and a roadmap to outline key aspects of the expected future state. While not exhaustive, it is a useful guide for CIOs, COOs and security directors when considering their firm’s priorities and risk tolerance. action plan Risk: Theft by External Parties Risk: Theft by Internal Security firms have conveyed that law firms are easy Parties targets for obtaining infor mation on law firm clients; varsity team to break For collaboration, law firms trust hackers might not even bring their their own employees and in. Whether this situation drives law firms to third-party provide wide access once logged onto the IT systems. rity services or Headline events of associates sellin providers of infrastructure and secu g firm information for improves internal procedur es is yet to be seen; in any profit have not yet driven most firms to change this model responsibility that is (although a small number of firms case, security know-how is an IT have done so). Firms growing in importance. Con siderations include: can take more prudent steps and better protect sensitive information by moving to a “trus t but verify” model. rity specialist, including Considerations include: Annual audit by third-party secu penetration testing Consistent, automated ethical walls across major itorin g of WAN and information systems (online acco Expert (third-party or in-house) mon unting, business intelligence reports, time entry, firewall security incidents document management, file shares, intranet and search resu lts) are patch Mature (consistent and fresh) softw ent procedures Private folders and need-to-know managem project code names for sensitive matters not subjecte d to an ethical wall ad and other PDAs Secure client software for iPhone/iP Rights management and/or encr yption applied to very g you know, sensitive client and firm documen Two-factor authentication (somethin ts logon something you have) for network Expiration dates on information, e.g., the information opriate complexity and is purged or access is denied after Password policies to ensure appr a defined period of al change time occasion and incident response Automated monitoring for extra Clear information security design ordinary events (e.g., responsibilities, including appropriate training mass export or printing) Secured screen savers and daily log-out policies
  • 2. Risk: loss by firm vendors cord Risk: Completeness of Re Breaches and losses of informati on by the firm’s third- ntly, lawyers rely on the complete party providers are, unfortunately To provide legal advice compete , frequent headline- er; hence, the driving need makers. Considerations include: and up-to-date record of the matt cycle for processes and tool s that support access to and life the moment a matter is opened: Up-to-date inventory of vendors management of information. From who hold the firm’s information and the information each vendor holds store, organize, protect materials Repositories must be in place to Assure vendor data privacy oblig as created or received ations comply with firm policies and client obligations t-matter number Materials must be classified by clien Verify actual scope and applicab ility of vendor security firm and personal resources claims, such as ISO 27001 or SAS 24/7 access must be available via 70 in place to prevent the Information-use policies must be mation, ensure the protection of proliferation of unclassified infor destruction confidential informati on, and govern the appropriate of obsolete information m for information life Alas, there is no “silver bullet” syste business cycle management; today it comprises automated new IDs associated with the electronic intake to establish client-matter ent, which when broadly focused, repositories; document managem Risk: Re matter-related information tentio is the repository that houses all documents); n and (including email and attachments and transacted/filed The corolla disposa s information retention periods ry to the n l records management, which track the value eed for a il archives, which house aged, of inform complete and disposition events; and ema retention ation also expires an record is that is costly to d that ove unclassified email. with effici store, ma nage, and rlong ent access protect; in the risk th to relevan terferes at it will b t informati To be defe e subject on; and a nsible, th to legal h dds to dispositio e rules go old and p n of inform vern roduction actions ta ation must ing the retention a . ken must be reason nd without a be consist able and duty to p ent, done the Considera reserve at in good fa tions inclu the time o ith, and de: f the disp m osition. y fir : lo ss b Records p records a olicy that establishe Risk yees elieve d nd inform ation man s the acco untabilitie lo are b agement s for emp emplo yees ata Retention schedules rm of d s by fi l breaches opinions based on laws, regu losse t data n actua clude: lations an d bar erten mmo in Inadv e most co iderations drive s Records m th ns hard rd anageme to be ntiality. Co rtab le PC on-s tanda and dispo sition trig nt system to apply re co nfide ovid ed po ction of n gers consi tention p eriods rm-pr dete stently n of fi rives (and Legal hold yptio Encr B thumb d system to prevent th fore informatio and U ) S ok be n while th e dispositi Outlo ere is a d uty to pre on of dev ices il from serve t ema Destructio ncryp nts to n process bilit y to e accou documen t the actio es that pre serve con Capa email t blocking ) n fidentialit g nal y and s endin of perso bsequen g use nd su r all hibitin mation (a ies fo y pro r abilit Polic info e cap it firm tion/w ip transm e dele emot and r ords Passw PDAs
  • 3. BEST PRACTICES Risk: Re gul Non-Com atory pliance Law firms are relative the roles, ly new to education regulatory Risk: Breach of Ethical Considera tions inclu and proce de: sses are st controls, ill develop so ing. Obligations C-level kn owledge confidentiality to their HIPAA/HIT of the firm Lawyers have duties of loyalty and and ITAR, ECH, state ’s obligati privacy la ons unde clients. In today’s vola tile market, lawyers are moving as well as ws, EU Da r clients, su regulation ta Protect rapidity. While the 2009 s affecting ive from firm to firm with increasing ch as the Graham-L the firm’s changes to ABA Mod el Rule of Professional Conduct each-Blile y Act est: General Rule, Inventory 1.10, Imputation of Conflicts of Inter it obligation of the firm ’s data su makes it easier ethic ally for lawyers to change firms, s and the bject to th e above icts clearance, ethical well as an data it ho lds on be heightens the requirements for confl geograph understan ding of th half of clie icit client consent. e flow of nts, as screens, client notification and expl ic bounda ries this data of unauthorized across All have implications for IT: ingestion Designati information from later als, ethical screens over client- on of a da ta privacy of client instructions. officer matter information and tracking Registrati Considerations inclu de: on with n on-U.S. d ata prote Regular co ction auth orities Lateral transfer processes their oblig mmunica tions to fi ations and rm lawyers occurs how to re and staff identify ethical (and act if a risk on Conflicts clearance processes to or breach track them busi ness) conflicts and databases to Intranet si te that se source fo rves as a usive) r the firm’s complian Matter screens (inclusive and excl lawyers a ce educati onal nd staff Risk: loss of access When lawyers and firm leadership lose access to firm information (i.e., system downtime or disasters), it is among the highest profile incidents for a CIO. Considerations include: Ability to recover key business systems in less than an hour, even if certain key staff are not available 99.98 percent uptime for core systems (equivalent to less than two hours downtime per year) While this action plan on ly No or minimal data loss (e.g., email and document edits) when focuses on a few key issue failures do occur s in each area, it highlights Recovery exercises at least twice a year (tabletop exercises — the multidisciplinary verbal rather than actual tests — are practical complements to actual recovery exercises) nature of protecting information from risk.
  • 4. roadmap Attributes that will define the maturity of information risk management in the next few years include: Governance basic, manual risk registers (inventories of risk issues and CIOs cannot act in isolation when making decisions about actions to be taken to address them). Over time, they will or taking action to address information risks. Law firms be expected to dynamically inventory, monitor, assess and are best served by creating a risk management team to address information risk issues. IT departments need to address information risks in the broader context of the develop the risk-savvy skill sets to use these tools. legal and operational risks. This team should include roles responsible for information risk and data breaches (not Physical Disaggregation of Information likely to be the same person). Such a team provides a In opposition to the ongoing trend to consolidate check-and-balance by making information risk decisions systems into primary datacenters, the physical locations separate from the IT personnel tasked with implementing of information will grow as firms turn to vendors for them. Despite good intentions, a busy and cost-conscious infrastructure or software as a service. Risk management IT department often compromises good risk management policies and audit capabilities will need to extend across protocol; a risk management team provides a forum for organizational and geographic boundaries, especially as determining the firm’s tolerance for risk in the context of virtualized systems make data flowing in and out of vendors its business priorities. more straightforward and dynamic. Risk Management Through Contract Risk Standards The maturity of IT vendors and the proliferation of “as-a- Over the past two years, law departments have increased service” options will drive the evolution of risk management the depth and complexity of their risk-related questions skill sets from technical to legal competencies. COOs and markedly. This trend is expected to continue accelerating, lawyers, who are often uncomfortable navigating technical with multiple departments standardizing on similar risk risks, are already warming to managing risks through contract expectations. As a response to these expectations, over a negotiations, agreed formal procedures and incident dozen law firms have achieved the ISO 27001 information responsibilities. IT will be best positioned when it can security certification in response to now-common RFP address both technical and legal aspects of information risk. requirements. Accordingly, expect growth in certifications and standardization. Self-Audit Many regulated companies already employ monitoring This action plan and roadmap should provide a tools, data scanning software and governance risk starting point to ensure good risk governance is in place. compliance (GRC) dashboards to understand their current Without it, IT is inappropriately taking all the risk on its own state in real time and manage their progress in relation shoulders. ILTA to risk initiatives. Law firms are just beginning to keep This article was first published in ILTA’s June 2011 issue of Peer to Peer titled “Law2020TM: One Year In” and is reprinted here with permission. For more information about ILTA, visit their website at www.iltanet.org. David Cunningham is one of the original Meg Block has over 25 years of experience consultants of Baker Robbins & Company, consulting to the legal community. A helping it grow from 12 to 120 consultants and Managing Director, she is a senior leader now part of Hildebrandt Baker Robbins. David in Hildebrandt Baker Robbins’ information leads strategic technology assessments, cost management service line. Her specialties are reduction and outsourcing analysis, and risk business process reviews and the design and management assessments. He established the implementation of enterprise-wide information Law Firm Technology Scorecard and co-leads programs in the areas records management, the risk management practice. He can be new business intake, conflicts of interest, IP reached at dcunningham@hbrconsulting.com. and litigation calendar-docket. She also teams with email and document management experts to develop practical and defendable digital records management strategies. She can be reached at mblock@hbrconsulting.com.