Balancing Transparent Access to KM with Client Security, Confidentiality, Risk and Compliance #INFO14 August 25, 2011
Speakers <ul><ul><li>Dave Cunningham  </li></ul></ul><ul><ul><ul><li>Managing Director  </li></ul></ul></ul><ul><ul><ul><l...
Agenda <ul><li>From whom are we protecting? </li></ul><ul><li>What information needs to be protected?   </li></ul><ul><li>...
From whom are knowledge managers protecting data? <ul><li>Internal </li></ul><ul><ul><li>Employees with insider trading in...
What information  may be useful to insiders? <ul><li>Document names and descriptions </li></ul><ul><li>Precedents </li></u...
How do firms protect  this information? <ul><li>Standard Tools </li></ul><ul><li>Ethical walls for known sensitive matters...
How do firms protect  this information? <ul><li>Emerging Tools </li></ul><ul><li>Document naming standards </li></ul><ul><...
How else can we protect firm  data from improper access & use?  <ul><li>Policies  </li></ul><ul><li>Ethical training and r...
Questions? <ul><li>Dave Cunningham </li></ul><ul><ul><li>[email_address] </li></ul></ul><ul><li>Browning Marean </li></ul>...
Selected Articles <ul><li>Block, Meg & David Cunningham. “Legal Information Risk – Action Plan and Roadmap,”  Peer to Peer...
Selected Resources <ul><li>Law Firm Risk Resouces (short list from 2009).  </li></ul><ul><li>http://lawfirmriskresources.w...
Upcoming SlideShare
Loading in...5
×

Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug 2011

245

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
245
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug 2011

  1. 1. Balancing Transparent Access to KM with Client Security, Confidentiality, Risk and Compliance #INFO14 August 25, 2011
  2. 2. Speakers <ul><ul><li>Dave Cunningham </li></ul></ul><ul><ul><ul><li>Managing Director </li></ul></ul></ul><ul><ul><ul><li>HBR Consulting (formerly Hildebrandt Baker Robbins) </li></ul></ul></ul><ul><li>Browning Marean </li></ul><ul><ul><li>Senior Counsel & Co-Chair of the firm’s Electronic Discovery Readiness and Response Group </li></ul></ul><ul><ul><li>DLA Piper </li></ul></ul><ul><li>Jennifer Minicucci </li></ul><ul><ul><li>Director, Information Risk and Compliance </li></ul></ul><ul><ul><li>Patton Boggs LLP </li></ul></ul>
  3. 3. Agenda <ul><li>From whom are we protecting? </li></ul><ul><li>What information needs to be protected? </li></ul><ul><li>How do firms protect this information? </li></ul><ul><ul><li>Standard tools and procedures </li></ul></ul><ul><ul><li>Emerging tools and procedures </li></ul></ul><ul><li>Beyond these forms of protection, how can firms lessen the chances that insiders will use firm data for improper purposes? </li></ul>
  4. 4. From whom are knowledge managers protecting data? <ul><li>Internal </li></ul><ul><ul><li>Employees with insider trading intentions </li></ul></ul><ul><ul><li>Employees who accidentally see confidential data </li></ul></ul><ul><ul><li>Employees who re-use content outside their expertise </li></ul></ul><ul><li>External </li></ul><ul><ul><li>Clients and third parties who may accidentally be sent confidential information </li></ul></ul>
  5. 5. What information may be useful to insiders? <ul><li>Document names and descriptions </li></ul><ul><li>Precedents </li></ul><ul><li>Active material </li></ul><ul><li>Litigation support data </li></ul><ul><li>Conflicts </li></ul><ul><li>New business intake </li></ul><ul><li>Time entry </li></ul><ul><li>Extranet sites </li></ul><ul><li>Verbal discussions </li></ul><ul><li>Records data </li></ul><ul><li>Newsletters and status reports </li></ul><ul><li>Physical war rooms </li></ul><ul><li>Travel agendas </li></ul><ul><li>Legal project management systems </li></ul>
  6. 6. How do firms protect this information? <ul><li>Standard Tools </li></ul><ul><li>Ethical walls for known sensitive matters </li></ul><ul><li>Project code names </li></ul><ul><li>Enterprise searching that recognizes folder and file security </li></ul><ul><li>Password protection for documents and spreadsheets </li></ul><ul><li>Locking and wiping of remote access devices; security software on remote device </li></ul><ul><li>Minimum password sophistication </li></ul><ul><li>Required screen saver usage </li></ul><ul><li>Two-factor authentication </li></ul><ul><li>Account auditing / monitoring </li></ul>
  7. 7. How do firms protect this information? <ul><li>Emerging Tools </li></ul><ul><li>Document naming standards </li></ul><ul><li>Matters secured by default / ethical walls for all matters </li></ul><ul><li>Knowledge Management as gatekeeper </li></ul><ul><li>Third party agreements and procedures </li></ul><ul><li>Identity management </li></ul><ul><li>Monitoring for unusual activity (users and IT) </li></ul><ul><li>Encryption (data in transit / data at rest) </li></ul><ul><li>Intelligent redaction software </li></ul><ul><li>Audience Suggestions? </li></ul>
  8. 8. How else can we protect firm data from improper access & use? <ul><li>Policies </li></ul><ul><li>Ethical training and reinforcement </li></ul>
  9. 9. Questions? <ul><li>Dave Cunningham </li></ul><ul><ul><li>[email_address] </li></ul></ul><ul><li>Browning Marean </li></ul><ul><ul><li>[email_address] </li></ul></ul><ul><li>Jennifer Minicucci </li></ul><ul><ul><li>[email_address] </li></ul></ul>
  10. 10. Selected Articles <ul><li>Block, Meg & David Cunningham. “Legal Information Risk – Action Plan and Roadmap,” Peer to Peer, June 2011 . </li></ul><ul><li>http://www.mygazines.com/issue/34686/33 </li></ul><ul><li>Harbert, Tam. “Catch Me If You Can,” Law Technology News , June 1, 2011. http://www.law.com/jsp/lawtechnologynews/PubArticleLTN.jsp?id=1202494769505&slreturn=1&hbxlogin=1 </li></ul><ul><li>Nelson, Sharon. “Your Chance of Being Hacked in Twelve Months Now a ‘Statistical Certainty,’” Ride The Lightning Electronic Evidence Blog , June 30, 2011. </li></ul><ul><li>http://ridethelightning.senseient.com/2011/06/your-chance-of-being-hacked-in-twelve-months-now-a-statistical-certainty.html </li></ul>
  11. 11. Selected Resources <ul><li>Law Firm Risk Resouces (short list from 2009). </li></ul><ul><li>http://lawfirmriskresources.wikispaces.com/ </li></ul><ul><li>Law Firm Risk Management Blog. </li></ul><ul><li>http://www.lawfirmrisk.com/ </li></ul><ul><li>InfoRiskAwareness Blog (UK focus). </li></ul><ul><li>http://inforiskawareness.co.uk/best_practice/ </li></ul><ul><li>Hildebrandt Baker Robbins Blog (selected posts). </li></ul><ul><li>http://info.hbrconsulting.com/blog/archive/2011/06/01/balancing-information-security-and-collaboration-a-knowledge-management-view.aspx and http://info.hbrconsulting.com/blog/archive/2011/05/13/risk-management-at-law-firms-a-rapidly-evolving-issue.aspx </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×