Technology Risk Management Protocols.

PositionCHECKLIST

In the wake of recent high-profile data breaches, many corporate legal departments and information technology leaders are tightening up network security. Here are six practical steps your law firm can take to ensure your firm is secure from predators.

Access to client documents should be limited to law firm personnel who are working on that client's engagement and should be exchanged via secure channels.

* Restrict document sharing, particularly via file-sharing websites.

* Secure internal computer networks and protect laptops with whole disk encryption.

* Properly dispose of all documents relating to the...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT