Layers: Why a Law Firm Is Like an Onion
Law firms are obligated to protect their client's data, as dictated by federal and state laws as well as local jurisdictional ethics rules. You'll read and understand the relevant rules—you're a lawyer, that's basically what you do.
August 06, 2018 at 09:35 AM
5 minute read
The original version of this story was published on Pro Mid-Market
Law firms are obligated to protect their client's data, as dictated by federal and state laws as well as local jurisdictional ethics rules. You'll read and understand the relevant rules—you're a lawyer, that's basically what you do. Technical compliance, however, is where the rubber meets the road. Leaving aside the matter of data breach reporting, to focus on the preliminary issue of data protection, questions of technical compliance, at a number of levels, come to the fore.
Data hackers are relentlessly poking at systems, in order to find weaknesses. It's telling that a common technique is known as a brute force attack. Throwing everything they have in a concentrated blast at one part of the wall before moving on to the next is basic siege mechanics for hackers. So, in order to effectively track your data, it's important to protect it at all levels— and, there are a lot of layers here to look after.
Take the humble Microsoft Word document, and consider the myriad ways it might be subject to exposure. At the document level, you've got the potential for exposed metadata (essentially buried information about edits), as well as questions about restrictions on document access: Is it encrypted? Do viewers have “read-only” access, or which ones have read-only access? Can the document be forwarded, or printed? Will access to the document expire after a set time period? You can trigger basic protections like those alluded to above within Microsoft Word, or even via conversion to a PDF management program, like Adobe Acrobat; but, unless you're asking relevant questions related to data security, and acting on those, you're potentially exposing sensitive data.
But, a document does not exist in a vacuum; and, as soon as that document is available within a particular system, it is also exposed to any loopholes inherent in or created by, that system. So, consider whether the document is encrypted as it resides on the system. Does the case management system you use, for example, encrypt all data at rest, including documents? Do you trust that protection alone, or will you encrypt your documents first, before uploading them, or making them available, within a system, to add another layer of security? In terms of personnel management, do those staff persons accessing your systems only have access to the files and documents they need access to? With the availability of granular access options, including down to the document level, it pays to be thoughtful about who gets to see what, to secure your information from overexposure. If you use integrated systems—perhaps you link a document repository, like Microsoft OneDrive, to a case management system—are all of the integration points encrypted, and does each system you use apply viable security measures? If you choose to share documents with clients and colleagues, do you utilize client portals or sharing protocols within the systems you use? Do you have a single process or workflow for how you share information that all employees adhere to?
And, if you're not sharing a document within a system architecture, but prefer email as a transit method, there are other issues to address, since you can't know the security protocols for every server an email passes through. Do you consider an email encryption service, which allows you to send a document to a third party, secure inbox for access by a recipient? And, will you turn that feature on manually or use automated triggers, e.g.—the presence of information sets protected by your state's data security laws? If you decide that an email system is too costly, or that you don't send enough documents via email to justify the use of such a system, do you then encrypt documents on an ad hoc basis, using a productivity or PDF software, only when you need to?
Even at this late date, hardware has not been totally eliminated. And, even if you're not accessing documents directly via your laptop or tablet or smartphone, you're using that hardware to access the systems where you get those documents. Therefore, it's also imperative that you appropriately secure the devices you use to access the software you use to access the documents you need. This includes, for most modern law firms, the creation and maintenance of a BYOD (bring your own device) regime.
Most law firm managers, and especially law firm IT people, blanch at the sheer breadth of data security requirements in the legal environment. And, managing that effectively does require a thoughtful and systematic approach. But, the implementation strategies built around such an approach will significantly reduce any law firm's risk profile.
Jared D. Correia is the founder and CEO of Red Cave Law Firm Consulting, which offers subscription-based law firm business management consulting and technology services for solo and small law firms. Red Cave also works with legal institutions and legal-facing corporations to develop programming and content.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View All'Erroneous Rulings'?: Wilmer Asks 4th Circuit to Overturn Mosby's Criminal Convictions
3 minute readApple Files Appeal to DC Circuit Aiming to Intervene in Google Search Monopoly Case
3 minute readA Plan Is Brewing to Limit Big-Dollar Suits in Georgia—and Lawyers Have Mixed Feelings
10 minute readTrending Stories
- 1Public Notices/Calendars
- 2Wednesday Newspaper
- 3Decision of the Day: Qui Tam Relators Do Not Plausibly Claim Firm Avoided Tax Obligations Through Visa Applications, Circuit Finds
- 4Judicial Ethics Opinion 24-116
- 5Big Law Firms Sheppard Mullin, Morgan Lewis and Baker Botts Add Partners in Houston
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250