SlideShare a Scribd company logo
1 of 35
Using Technology to Reduce the  Costs and Hassle of Key Legal Business Issues Presented by David Cunningham Managing Director, Strategic Technology and Risk Practices Hildebrandt Baker Robbins Nathan Bowie Managing Director, Alternative Fee Arrangement Practice Hildebrandt Baker Robbins May 20, 2010
Challenge for Technology The key challenge for law firms in 2010 and beyond is to “shift gears” from a model premised on growth and expansion to one premised on the more efficient and cost effective delivery of legal services. The IT community must take this into consideration in planning and project delivery. You must enable lawyers to become an “enhanced practitioner” (Susskind) that blend legal skills with deal/project delivery. They need different tools for different times.
Value from Technology Efficiency  Costs Risks Data Privacy
Data Privacy HITECH / HIPAA Protected Health Information (PHI) Data Privacy Regulations State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive /  Safe Harbor Personally Identifiable Information (PII) Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information ,[object Object],[object Object],[object Object],Sensitive Data Health and Human Services and Federal Trade Commission Governing Body $100 - $50,000 per incident; $1.5M max per year. Plus potential criminal penalties Penalty February 17, 2010 Compliance Date
Data Privacy HITECH / HIPAA Protected Health Information (PHI) Data Privacy Regulations State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive /  Safe Harbor Personally Identifiable Information (PII) Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information Personal information about a resident of the Commonwealth  of Massachusetts Sensitive Data State of Massachusetts (example state) Governing Body $5,000 per incident plus costs of investigation, litigation and legal fees, plus potential civil penalties Penalty March 1, 2010 Compliance Date
Data Privacy HITECH / HIPAA Protected Health Information (PHI) Data Privacy Regulations State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive /  Safe Harbor Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information Personal information transferred to or from 27 Members States of the European Union Sensitive Data US Dept of Commerce /  Federal Trade Commission Governing Body Up to $12,000 per day for violations Penalty Voluntary  (replaces Data Transfer Agreements) Compliance Date
Data Privacy HITECH / HIPAA Protected Health Information (PHI) Data Privacy Regulations State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive /  Safe Harbor Personally Identifiable Information (PII) Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information ,[object Object],[object Object],Sensitive Data - Federal Trade Commission via Fair Credit Reporting Act  Governing Body - $2,500 - $3,500 per violation, then up to $16,000 per violation for continued non-compliance Penalty - June 1, 2010  (law firms exempt) Compliance Date
Data Privacy HITECH / HIPAA Protected Health Information (PHI) State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive /  Safe Harbor Personally Identifiable Information (PII) Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information Data Privacy Regulations “ Export of technical data and classified defense articles”, as defined by the US Munitions List Sensitive Data US Department of State Governing Body Per violation, civil fines up to $500K; criminal penalties up to $1M and 10 years imprisonment Penalty 60 days in advance of any intended sale or transfer to a foreign person of ownership or control Compliance Date
Data Privacy HITECH / HIPAA Protected Health Information (PHI) Data Privacy Regulations State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive /  Safe Harbor Personally Identifiable Information (PII) Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information Client Data Leaks Client and Case / Transaction Data Firm Data Leaks Firm and Partner Confidential Data Protection of Sensitive Data
Data Privacy HITECH / HIPAA Protected Health Information (PHI) Data Privacy Regulations State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive /  Safe Harbor Personally Identifiable Information (PII) Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information Client Data Leaks Client and Case / Transaction Data Protection of Sensitive Data Firm Data Leaks Firm and Partner Confidential Data Preservation Orders Litigation, Subpoena or Client Requests   Confidential Walls - Inclusionary Walls for Privacy and Subpoenas - Exclusionary Walls for Conflicts
Data Privacy HITECH / HIPAA Protected Health Information (PHI) Data Privacy Regulations State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive /  Safe Harbor Personally Identifiable Information (PII) Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information Client Data Leaks Client and Case / Transaction Data Protection of Sensitive Data Firm Data Leaks Firm and Partner Confidential Data Preservation Orders Litigation, Subpoena or Client Requests   Confidential Walls - Inclusionary Walls for Privacy and Subpoenas - Exclusionary Walls for Conflicts Data Standards ISO 27001 Competence in Addressing Data Confidentiality
Data Privacy Solutions
Value from Technology Efficiency  Costs Risks E-Mail Management
E-mail Management is Caught Between Competing Forces Email Compliance ,[object Object],[object Object],[object Object],Operational Effectiveness ,[object Object],[object Object],[object Object],Knowledge Sharing ,[object Object],[object Object],Discovery Preparedness ,[object Object],[object Object],[object Object]
Lessons Learned from  Successful E-Mail Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Email Lifecycle Management This workflow is realistic and easy to implement 1 2 3 File in <= 60 Days Store in  personal folder or Inbox Deleted or  Sent items Email created or received Purged by law firm >= 6 Months Life cycle retention managed via Records Management System Non-Record Limited Usefulness Convenience Materials Useful for some period Official Record Preserve Purged by law firm >= 2 Years Move to official client/matter Correspondence folder (DMS)
Auto filing -  Decisiv auto files the email based on system applied rankings Outlook Inbox Context sensitive search suggestions
Connecting Email Policy to Change
Value from Technology Efficiency  Costs Risks Alternative Fee Arrangements
Alternative Fee Arrangements: Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Alternative Fee Arrangements:  Legal Executive Briefing Survey – 150 Firms ,[object Object],[object Object],[object Object],[object Object],[object Object]
Alternative Fee Arrangements:  Our Underlying Approach ,[object Object]
Client Analysis (Relationships, Budget, Expectations, etc.) Client/Matter Risk Analysis Matter Planning for Known Matters  Determine AFA Model  (based on above and financial prerequisites) Determine AFA Management  Approach and Costs  Knowledge & Process Capability/Readiness RFP Response Development Acceptable Margin Analysis  Risk Acceptance Analysis  Cost Analysis Develop Predictive Pricing/ Profitability Models Analyze and Develop Target Client List Firm-wide AFA Guideline Development Develop Strategy for Winning Profitable AFA Work Analyze AFA Strategy and Target  Client Development Strategize Client-Specific AFA Development Dedicated AFA Administrator  (Billing, Compliance w/AFA, Analysis) Billing/eBilling Determine and apply revenue recognition policies in line w/AFA Client-Facing Financial Portal Client Matter Management System Interface Granular Matter Tagging Matter Planning for New Matters (Budget, Staffing, Timing) Matter Inception Process   (client communications and  scope acceptance) Matter Onboarding Project Management Budget/Scope Management Project and Scope Management Provide Up-to-Date Financial Measurements Implement Matter Status Process   Client Communications Client Portfolio Review and Analysis (Proactive Review of Matters/ Risks on Behalf of Client) Leveraging Knowledge Base Leveraging Staff Delivering Legal Services Achieving Client Results Deliver Meeting Client Expectations and Profitability Goals  Administer AFA Administration Measure Measuring Results Analyze profitability of total AFA arrangement to-date (and comparison to standard billing approach) Incorporate AFA pricing into published dashboards/reports Communicate total profitability to partnership/ management (separate from billable hour view) Analyze need for adjustments to AFA structure After Matter Review / Refinement
Alternative Fee Arrangements:  Proactive Planning with Margins ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Screenshot
Alternative Fee Arrangements: Project Management – Who is the PM? ,[object Object],[object Object],[object Object],[object Object]
Alternative Fee Arrangements: Project Management Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PM slides
Alternative Fee Arrangements: Example - Eversheds and Tyco
Value from Technology Efficiency  Costs Risks Cloud Computing
Cloud Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Computing ,[object Object],[object Object],[object Object],[object Object]
Cloud Computing Comparison Moderate Low Low High Hassle Moderate (privacy) High  (downtime, privacy, WAN High  (downtime, privacy, WAN) High (staff, IT design, downtime, disasters, privacy) Risks Moderate Low  to High Moderate Moderate ($4,000/user for infrastructure, $5,000 per user for IT staff) Cost High High High Moderate Scalability Aspect Traditional In-House Cloud Infrastructure (IAAS) Cloud Software (SAAS) Hybrid
Closing Comments The IT community must plan and delivery projects differently.  You must enable lawyers to become an “enhanced practitioner” (Susskind) that blend legal skills with deal/project delivery. They need different tools for different times.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPRDipanjanDey12
 
GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization  GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization Vishnuvarthanan Moorthy
 
General Data Protection Regulation for Ops
General Data Protection Regulation for OpsGeneral Data Protection Regulation for Ops
General Data Protection Regulation for OpsKamil Rextin
 
Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1rtjbond
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Zoodikers
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowHackerOne
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumConstantine Karbaliotis
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONSaurabh Pandey
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overviewJane Lambert
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill Mathew Chacko
 
General data protection
General data protectionGeneral data protection
General data protectionBrijeshR3
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protectionmeritnorthwest
 
White-Paper_Security-DBSec_EU-GDPR_06-2016
White-Paper_Security-DBSec_EU-GDPR_06-2016White-Paper_Security-DBSec_EU-GDPR_06-2016
White-Paper_Security-DBSec_EU-GDPR_06-2016stefanjung
 

What's hot (18)

Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization  GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization
 
General Data Protection Regulation for Ops
General Data Protection Regulation for OpsGeneral Data Protection Regulation for Ops
General Data Protection Regulation for Ops
 
Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATION
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
General data protection
General data protectionGeneral data protection
General data protection
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
 
GDPR
GDPRGDPR
GDPR
 
White-Paper_Security-DBSec_EU-GDPR_06-2016
White-Paper_Security-DBSec_EU-GDPR_06-2016White-Paper_Security-DBSec_EU-GDPR_06-2016
White-Paper_Security-DBSec_EU-GDPR_06-2016
 

Viewers also liked

0945 lomond jason leitch & derek feeley wi updated notes
0945 lomond jason leitch & derek feeley wi updated notes0945 lomond jason leitch & derek feeley wi updated notes
0945 lomond jason leitch & derek feeley wi updated notesPublicSectorConference
 
Out with the old it in with the new by david cunningham - sep 2009
Out with the old it in with the new   by david cunningham - sep 2009Out with the old it in with the new   by david cunningham - sep 2009
Out with the old it in with the new by david cunningham - sep 2009David Cunningham
 
Lit con 2009 collaborate to mitigate panel - facilitated by dave cunningham...
Lit con 2009   collaborate to mitigate panel - facilitated by dave cunningham...Lit con 2009   collaborate to mitigate panel - facilitated by dave cunningham...
Lit con 2009 collaborate to mitigate panel - facilitated by dave cunningham...David Cunningham
 
ALA 2005 Outsourcing - Making a Decision that Fits by Dave Cunningham Apr 2005
ALA 2005 Outsourcing  - Making a Decision that Fits by Dave Cunningham Apr 2005ALA 2005 Outsourcing  - Making a Decision that Fits by Dave Cunningham Apr 2005
ALA 2005 Outsourcing - Making a Decision that Fits by Dave Cunningham Apr 2005David Cunningham
 
4.2 enabling independence through care at home joint improvement team
4.2 enabling independence through care at home   joint improvement team4.2 enabling independence through care at home   joint improvement team
4.2 enabling independence through care at home joint improvement teamPublicSectorConference
 
Dana Yaninska, Sluntse 1879 Public Chitalishte in the town of Ihtiman
Dana Yaninska, Sluntse 1879 Public Chitalishte in the town of IhtimanDana Yaninska, Sluntse 1879 Public Chitalishte in the town of Ihtiman
Dana Yaninska, Sluntse 1879 Public Chitalishte in the town of IhtimanGlob@l Libraries - Bulgaria Program
 

Viewers also liked (10)

0945 lomond jason leitch & derek feeley wi updated notes
0945 lomond jason leitch & derek feeley wi updated notes0945 lomond jason leitch & derek feeley wi updated notes
0945 lomond jason leitch & derek feeley wi updated notes
 
50 Shades of Metrics
50 Shades of Metrics50 Shades of Metrics
50 Shades of Metrics
 
Out with the old it in with the new by david cunningham - sep 2009
Out with the old it in with the new   by david cunningham - sep 2009Out with the old it in with the new   by david cunningham - sep 2009
Out with the old it in with the new by david cunningham - sep 2009
 
Lit con 2009 collaborate to mitigate panel - facilitated by dave cunningham...
Lit con 2009   collaborate to mitigate panel - facilitated by dave cunningham...Lit con 2009   collaborate to mitigate panel - facilitated by dave cunningham...
Lit con 2009 collaborate to mitigate panel - facilitated by dave cunningham...
 
ALA 2005 Outsourcing - Making a Decision that Fits by Dave Cunningham Apr 2005
ALA 2005 Outsourcing  - Making a Decision that Fits by Dave Cunningham Apr 2005ALA 2005 Outsourcing  - Making a Decision that Fits by Dave Cunningham Apr 2005
ALA 2005 Outsourcing - Making a Decision that Fits by Dave Cunningham Apr 2005
 
4.1 care inspectorate
4.1 care inspectorate4.1 care inspectorate
4.1 care inspectorate
 
4.2 enabling independence through care at home joint improvement team
4.2 enabling independence through care at home   joint improvement team4.2 enabling independence through care at home   joint improvement team
4.2 enabling independence through care at home joint improvement team
 
Elena Andonova from the Regional Public Health Inspectorate
Elena Andonova from the Regional Public Health InspectorateElena Andonova from the Regional Public Health Inspectorate
Elena Andonova from the Regional Public Health Inspectorate
 
Mls stats nov 2011
Mls stats nov 2011Mls stats nov 2011
Mls stats nov 2011
 
Dana Yaninska, Sluntse 1879 Public Chitalishte in the town of Ihtiman
Dana Yaninska, Sluntse 1879 Public Chitalishte in the town of IhtimanDana Yaninska, Sluntse 1879 Public Chitalishte in the town of Ihtiman
Dana Yaninska, Sluntse 1879 Public Chitalishte in the town of Ihtiman
 

Similar to Hildebrandt baker robbins presentation for coo roundtable 2010 by dave cunningham and nathan bowie may 2010

Creating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookCreating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookLumension
 
Legal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorLegal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorMSpadea
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companiesRoger Royse
 
Insider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and ContractorsInsider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and ContractorsButlerRubin
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxAdarsh748147
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentBill Lisse
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
Best Practices In Corporate Privacy &amp; Information Security
Best Practices In Corporate Privacy &amp; Information SecurityBest Practices In Corporate Privacy &amp; Information Security
Best Practices In Corporate Privacy &amp; Information Securitysatyakam_biswas
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare IndustryEMMAIntl
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository XeniT Solutions nv
 
Legal challenges of big data
Legal challenges of big dataLegal challenges of big data
Legal challenges of big dataRoger Royse
 
Records Management and ediscovery as Risk
Records Management and ediscovery as RiskRecords Management and ediscovery as Risk
Records Management and ediscovery as RiskMSpadea
 
Business Issues 2009rev2
Business Issues 2009rev2Business Issues 2009rev2
Business Issues 2009rev2Victoria Wors
 
The 5 Things All In-House Counsel Need to Know about Privacy + Data Security
The 5 Things All In-House Counsel Need to Know about Privacy + Data SecurityThe 5 Things All In-House Counsel Need to Know about Privacy + Data Security
The 5 Things All In-House Counsel Need to Know about Privacy + Data SecurityKegler Brown Hill + Ritter
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...emermell
 
Cybersecurity & Data Challenges
Cybersecurity & Data ChallengesCybersecurity & Data Challenges
Cybersecurity & Data ChallengesJoão Bocas
 
Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramMSpadea
 

Similar to Hildebrandt baker robbins presentation for coo roundtable 2010 by dave cunningham and nathan bowie may 2010 (20)

Creating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookCreating Your Red Flags Rule Playbook
Creating Your Red Flags Rule Playbook
 
Legal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorLegal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services Sector
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
 
Insider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and ContractorsInsider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and Contractors
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptx
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Best Practices In Corporate Privacy &amp; Information Security
Best Practices In Corporate Privacy &amp; Information SecurityBest Practices In Corporate Privacy &amp; Information Security
Best Practices In Corporate Privacy &amp; Information Security
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository
 
Legal challenges of big data
Legal challenges of big dataLegal challenges of big data
Legal challenges of big data
 
Records Management and ediscovery as Risk
Records Management and ediscovery as RiskRecords Management and ediscovery as Risk
Records Management and ediscovery as Risk
 
Business Issues 2009rev2
Business Issues 2009rev2Business Issues 2009rev2
Business Issues 2009rev2
 
The 5 Things All In-House Counsel Need to Know about Privacy + Data Security
The 5 Things All In-House Counsel Need to Know about Privacy + Data SecurityThe 5 Things All In-House Counsel Need to Know about Privacy + Data Security
The 5 Things All In-House Counsel Need to Know about Privacy + Data Security
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Cybersecurity & Data Challenges
Cybersecurity & Data ChallengesCybersecurity & Data Challenges
Cybersecurity & Data Challenges
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy Program
 

More from David Cunningham

The business of data analytics and business intelligence 15 nov 2016
The business of data analytics and business intelligence   15 nov 2016The business of data analytics and business intelligence   15 nov 2016
The business of data analytics and business intelligence 15 nov 2016David Cunningham
 
CLOC Legal Project Management and Simple RFPs
CLOC Legal Project Management and Simple RFPsCLOC Legal Project Management and Simple RFPs
CLOC Legal Project Management and Simple RFPsDavid Cunningham
 
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015David Cunningham
 
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...David Cunningham
 
Ilta06 developing and selling an enterprise risk management approach by dave ...
Ilta06 developing and selling an enterprise risk management approach by dave ...Ilta06 developing and selling an enterprise risk management approach by dave ...
Ilta06 developing and selling an enterprise risk management approach by dave ...David Cunningham
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007David Cunningham
 
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...David Cunningham
 
Ilta 2009 law firm risk management can it grow profitability - panel member...
Ilta 2009 law firm risk management   can it grow profitability - panel member...Ilta 2009 law firm risk management   can it grow profitability - panel member...
Ilta 2009 law firm risk management can it grow profitability - panel member...David Cunningham
 
Managing partner retreat using technology to streamline the practice of law...
Managing partner retreat   using technology to streamline the practice of law...Managing partner retreat   using technology to streamline the practice of law...
Managing partner retreat using technology to streamline the practice of law...David Cunningham
 
Law journal news it is dead article; long live it controlling costs while g...
Law journal news   it is dead article; long live it controlling costs while g...Law journal news   it is dead article; long live it controlling costs while g...
Law journal news it is dead article; long live it controlling costs while g...David Cunningham
 
Risk management for law firms chapter 1 ark 2009 by dave cunningham
Risk management for law firms   chapter 1 ark 2009 by dave cunninghamRisk management for law firms   chapter 1 ark 2009 by dave cunningham
Risk management for law firms chapter 1 ark 2009 by dave cunninghamDavid Cunningham
 
Risk management for law firms chapter 2 ark 2009 by meg block
Risk management for law firms   chapter 2 ark 2009 by meg blockRisk management for law firms   chapter 2 ark 2009 by meg block
Risk management for law firms chapter 2 ark 2009 by meg blockDavid Cunningham
 
Trends shaping the future of legal risk management by dave cunningham and m...
Trends shaping the future of legal risk management   by dave cunningham and m...Trends shaping the future of legal risk management   by dave cunningham and m...
Trends shaping the future of legal risk management by dave cunningham and m...David Cunningham
 
Ltn 2010 02 risk glossary by dave cunningham on page 23
Ltn 2010 02 risk glossary by dave cunningham on page 23Ltn 2010 02 risk glossary by dave cunningham on page 23
Ltn 2010 02 risk glossary by dave cunningham on page 23David Cunningham
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
Ala 2005 rfp best practices by dave cunningham apr 2005
Ala 2005 rfp best practices by dave cunningham   apr 2005Ala 2005 rfp best practices by dave cunningham   apr 2005
Ala 2005 rfp best practices by dave cunningham apr 2005David Cunningham
 
It sourcing threat or opportunity by dave cunningham- feb 2004
It sourcing   threat or opportunity by dave cunningham- feb 2004It sourcing   threat or opportunity by dave cunningham- feb 2004
It sourcing threat or opportunity by dave cunningham- feb 2004David Cunningham
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...David Cunningham
 
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...David Cunningham
 
Law firm data privacy by dave cunningham
Law firm data privacy by dave cunninghamLaw firm data privacy by dave cunningham
Law firm data privacy by dave cunninghamDavid Cunningham
 

More from David Cunningham (20)

The business of data analytics and business intelligence 15 nov 2016
The business of data analytics and business intelligence   15 nov 2016The business of data analytics and business intelligence   15 nov 2016
The business of data analytics and business intelligence 15 nov 2016
 
CLOC Legal Project Management and Simple RFPs
CLOC Legal Project Management and Simple RFPsCLOC Legal Project Management and Simple RFPs
CLOC Legal Project Management and Simple RFPs
 
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015
 
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
 
Ilta06 developing and selling an enterprise risk management approach by dave ...
Ilta06 developing and selling an enterprise risk management approach by dave ...Ilta06 developing and selling an enterprise risk management approach by dave ...
Ilta06 developing and selling an enterprise risk management approach by dave ...
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007
 
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...
 
Ilta 2009 law firm risk management can it grow profitability - panel member...
Ilta 2009 law firm risk management   can it grow profitability - panel member...Ilta 2009 law firm risk management   can it grow profitability - panel member...
Ilta 2009 law firm risk management can it grow profitability - panel member...
 
Managing partner retreat using technology to streamline the practice of law...
Managing partner retreat   using technology to streamline the practice of law...Managing partner retreat   using technology to streamline the practice of law...
Managing partner retreat using technology to streamline the practice of law...
 
Law journal news it is dead article; long live it controlling costs while g...
Law journal news   it is dead article; long live it controlling costs while g...Law journal news   it is dead article; long live it controlling costs while g...
Law journal news it is dead article; long live it controlling costs while g...
 
Risk management for law firms chapter 1 ark 2009 by dave cunningham
Risk management for law firms   chapter 1 ark 2009 by dave cunninghamRisk management for law firms   chapter 1 ark 2009 by dave cunningham
Risk management for law firms chapter 1 ark 2009 by dave cunningham
 
Risk management for law firms chapter 2 ark 2009 by meg block
Risk management for law firms   chapter 2 ark 2009 by meg blockRisk management for law firms   chapter 2 ark 2009 by meg block
Risk management for law firms chapter 2 ark 2009 by meg block
 
Trends shaping the future of legal risk management by dave cunningham and m...
Trends shaping the future of legal risk management   by dave cunningham and m...Trends shaping the future of legal risk management   by dave cunningham and m...
Trends shaping the future of legal risk management by dave cunningham and m...
 
Ltn 2010 02 risk glossary by dave cunningham on page 23
Ltn 2010 02 risk glossary by dave cunningham on page 23Ltn 2010 02 risk glossary by dave cunningham on page 23
Ltn 2010 02 risk glossary by dave cunningham on page 23
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Ala 2005 rfp best practices by dave cunningham apr 2005
Ala 2005 rfp best practices by dave cunningham   apr 2005Ala 2005 rfp best practices by dave cunningham   apr 2005
Ala 2005 rfp best practices by dave cunningham apr 2005
 
It sourcing threat or opportunity by dave cunningham- feb 2004
It sourcing   threat or opportunity by dave cunningham- feb 2004It sourcing   threat or opportunity by dave cunningham- feb 2004
It sourcing threat or opportunity by dave cunningham- feb 2004
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
 
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
 
Law firm data privacy by dave cunningham
Law firm data privacy by dave cunninghamLaw firm data privacy by dave cunningham
Law firm data privacy by dave cunningham
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Hildebrandt baker robbins presentation for coo roundtable 2010 by dave cunningham and nathan bowie may 2010

  • 1. Using Technology to Reduce the Costs and Hassle of Key Legal Business Issues Presented by David Cunningham Managing Director, Strategic Technology and Risk Practices Hildebrandt Baker Robbins Nathan Bowie Managing Director, Alternative Fee Arrangement Practice Hildebrandt Baker Robbins May 20, 2010
  • 2. Challenge for Technology The key challenge for law firms in 2010 and beyond is to “shift gears” from a model premised on growth and expansion to one premised on the more efficient and cost effective delivery of legal services. The IT community must take this into consideration in planning and project delivery. You must enable lawyers to become an “enhanced practitioner” (Susskind) that blend legal skills with deal/project delivery. They need different tools for different times.
  • 3. Value from Technology Efficiency Costs Risks Data Privacy
  • 4.
  • 5. Data Privacy HITECH / HIPAA Protected Health Information (PHI) Data Privacy Regulations State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive / Safe Harbor Personally Identifiable Information (PII) Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information Personal information about a resident of the Commonwealth of Massachusetts Sensitive Data State of Massachusetts (example state) Governing Body $5,000 per incident plus costs of investigation, litigation and legal fees, plus potential civil penalties Penalty March 1, 2010 Compliance Date
  • 6. Data Privacy HITECH / HIPAA Protected Health Information (PHI) Data Privacy Regulations State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive / Safe Harbor Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information Personal information transferred to or from 27 Members States of the European Union Sensitive Data US Dept of Commerce / Federal Trade Commission Governing Body Up to $12,000 per day for violations Penalty Voluntary (replaces Data Transfer Agreements) Compliance Date
  • 7.
  • 8. Data Privacy HITECH / HIPAA Protected Health Information (PHI) State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive / Safe Harbor Personally Identifiable Information (PII) Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information Data Privacy Regulations “ Export of technical data and classified defense articles”, as defined by the US Munitions List Sensitive Data US Department of State Governing Body Per violation, civil fines up to $500K; criminal penalties up to $1M and 10 years imprisonment Penalty 60 days in advance of any intended sale or transfer to a foreign person of ownership or control Compliance Date
  • 9. Data Privacy HITECH / HIPAA Protected Health Information (PHI) Data Privacy Regulations State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive / Safe Harbor Personally Identifiable Information (PII) Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information Client Data Leaks Client and Case / Transaction Data Firm Data Leaks Firm and Partner Confidential Data Protection of Sensitive Data
  • 10. Data Privacy HITECH / HIPAA Protected Health Information (PHI) Data Privacy Regulations State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive / Safe Harbor Personally Identifiable Information (PII) Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information Client Data Leaks Client and Case / Transaction Data Protection of Sensitive Data Firm Data Leaks Firm and Partner Confidential Data Preservation Orders Litigation, Subpoena or Client Requests Confidential Walls - Inclusionary Walls for Privacy and Subpoenas - Exclusionary Walls for Conflicts
  • 11. Data Privacy HITECH / HIPAA Protected Health Information (PHI) Data Privacy Regulations State Privacy Laws Personally Identifiable Information (PII) EU Data Protection Directive / Safe Harbor Personally Identifiable Information (PII) Red Flag Personally Identifiable Information (PII) ITAR Classified Defense Information Client Data Leaks Client and Case / Transaction Data Protection of Sensitive Data Firm Data Leaks Firm and Partner Confidential Data Preservation Orders Litigation, Subpoena or Client Requests Confidential Walls - Inclusionary Walls for Privacy and Subpoenas - Exclusionary Walls for Conflicts Data Standards ISO 27001 Competence in Addressing Data Confidentiality
  • 13. Value from Technology Efficiency Costs Risks E-Mail Management
  • 14.
  • 15.
  • 16. Email Lifecycle Management This workflow is realistic and easy to implement 1 2 3 File in <= 60 Days Store in personal folder or Inbox Deleted or Sent items Email created or received Purged by law firm >= 6 Months Life cycle retention managed via Records Management System Non-Record Limited Usefulness Convenience Materials Useful for some period Official Record Preserve Purged by law firm >= 2 Years Move to official client/matter Correspondence folder (DMS)
  • 17. Auto filing - Decisiv auto files the email based on system applied rankings Outlook Inbox Context sensitive search suggestions
  • 19. Value from Technology Efficiency Costs Risks Alternative Fee Arrangements
  • 20.
  • 21.
  • 22.
  • 23. Client Analysis (Relationships, Budget, Expectations, etc.) Client/Matter Risk Analysis Matter Planning for Known Matters Determine AFA Model (based on above and financial prerequisites) Determine AFA Management Approach and Costs Knowledge & Process Capability/Readiness RFP Response Development Acceptable Margin Analysis Risk Acceptance Analysis Cost Analysis Develop Predictive Pricing/ Profitability Models Analyze and Develop Target Client List Firm-wide AFA Guideline Development Develop Strategy for Winning Profitable AFA Work Analyze AFA Strategy and Target Client Development Strategize Client-Specific AFA Development Dedicated AFA Administrator (Billing, Compliance w/AFA, Analysis) Billing/eBilling Determine and apply revenue recognition policies in line w/AFA Client-Facing Financial Portal Client Matter Management System Interface Granular Matter Tagging Matter Planning for New Matters (Budget, Staffing, Timing) Matter Inception Process (client communications and scope acceptance) Matter Onboarding Project Management Budget/Scope Management Project and Scope Management Provide Up-to-Date Financial Measurements Implement Matter Status Process Client Communications Client Portfolio Review and Analysis (Proactive Review of Matters/ Risks on Behalf of Client) Leveraging Knowledge Base Leveraging Staff Delivering Legal Services Achieving Client Results Deliver Meeting Client Expectations and Profitability Goals Administer AFA Administration Measure Measuring Results Analyze profitability of total AFA arrangement to-date (and comparison to standard billing approach) Incorporate AFA pricing into published dashboards/reports Communicate total profitability to partnership/ management (separate from billable hour view) Analyze need for adjustments to AFA structure After Matter Review / Refinement
  • 24.
  • 26.
  • 27.
  • 29. Alternative Fee Arrangements: Example - Eversheds and Tyco
  • 30. Value from Technology Efficiency Costs Risks Cloud Computing
  • 31.
  • 32.
  • 33. Cloud Computing Comparison Moderate Low Low High Hassle Moderate (privacy) High (downtime, privacy, WAN High (downtime, privacy, WAN) High (staff, IT design, downtime, disasters, privacy) Risks Moderate Low to High Moderate Moderate ($4,000/user for infrastructure, $5,000 per user for IT staff) Cost High High High Moderate Scalability Aspect Traditional In-House Cloud Infrastructure (IAAS) Cloud Software (SAAS) Hybrid
  • 34. Closing Comments The IT community must plan and delivery projects differently. You must enable lawyers to become an “enhanced practitioner” (Susskind) that blend legal skills with deal/project delivery. They need different tools for different times.
  • 35.

Editor's Notes

  1. Thank you and introductions
  2. As I am sure you have already been discussing, we believe there is a shift in delivery models emerging, including customized project pricing for major transactions, “unbundling” legal services, pushing work to offices where it can be most efficiently performed and developing serious project management skills. The objective is to b lend Legal Services with effective project delivery. The IT community must take this into consideration in planning and project delivery. You must enable lawyers to become an “enhanced practitioner” (Susskind) that blend legal skills with deal/project delivery. They need different tools for different times. While some of this may seem leading edge, we are generally simply following in the footsteps of large accounting and consulting firms who remain over 10 years ahead of law firms in many of the areas we’ll be addressing today. We worked with Bill to select technology topics for this session. We focused on four areas that have the most potential impact to the business and practice of law. So, I am pleased to be talking about real business issues technology can address, rather than bits and bytes. We’ll talk about data privacy, e-mail management, and alternative fee arrangements and cloud computing. Information as of Q3 2009 Contact Peter Buck | pbuck@brco.com about this presentation
  3. For each of our topics, we’ll provide a perspective of the efficiencies, cost savings, and risk reduction it offers. Our first topic is data privacy. Data privacy is simple in concept – ensuring sensitive data is seen by only the correct people. It can also be called Data Security or Data Loss Prevention. For our discussion today, we’re not going to focus on related topics of perimeter security (firewalls, etc.) or protection from viruses. Specifically, we’ll focus on data privacy regulations and the protection of firm and client confidential data. First, I will outline the issues and obligations for law firms in these areas, then provide a perspective of what we see as an emerging solution to tackle most of the needs for law firms. Information as of Q3 2009 Contact Peter Buck | pbuck@brco.com about this presentation
  4. There are three areas of focus for law firms, and a relatively new set of regulations is the first. While each regulation is unique, there are important similarities as well. The first is HIPAA which is concerned with the protection of health care information when it can be identified with a particular person. While HIPAA has been in place for a while, the more recent HITECH Act has made the protection of health information applicable to law firms and other business associates of health care organizations. All law firms have some health care information about their own employees, although the hot button is how a firm handles health information its receives from its clients and from discovery. With HITECH and others, you can see that the penalties are stiff and the compliance date has recently passed.
  5. The next three areas I’ll address are all concerned with what they call “personally identifiable information” or PII. Examples include a person’s name associated with their bank account, driver’s license (address?). Many states have created obligations to protect this information and I use Massachusetts as an example because it has set the highest bar so far. It requires protection of Massachusetts’ residents’ information whether or not you are doing business in their state, and it specifically mentions that such data should be encrypted. Other states are expected to follow Massachusetts’ lead and there is an expectation of federal law at some point in the future.
  6. Also concerned with personally identifiable information and perhaps most well known to international firms, is the EU Data Protection Directive which is applicable when transferring data to or from the 27 countries in the EU. The FTC has also established a more simple approach to be compliant with EU expectations, called the Safe Harbor. There are implications with either approach and the last time I checked Shearman &amp; Sterling was the only firm that has completed its Safe Harbor certification.
  7. The FTC’s Red Flag rule has similar concerns, with a focus on preventing identity theft. At this point, the ABA has successfully exempted law firms from this obligation but we keep it on the radar as this may change again.
  8. The final regulation is less well known but more critical to some firms. ITAR is focused on classified defense information, and requires the filing of information 60 days in advance of transfers to people who are not U.S. citizens (even if they are in the U.S.). Firms with large aviation and government clients find this very relevant. Fines are very heavy, including imprisonment in severe cases.
  9. While regulatory compliance is important on many levels, the protection of a firm’s sensitive data is more often what makes headlines and causes lawsuits and embarrassment. From law firms, there have been high profile leaks of both client data and of confidential firm data over the past year. While you’ve heard people warn that your e-mails may get published on the Wall Street Journal, now some firms are now also asking “Could someone send this information to abovethelaw.com or sell it to a third party?
  10. Preservation orders and confidential walls are more traditional areas of data privacy, so I won’t expand on these as much. The technologies to address these issues (such as those from IntApp and The Frayman Group) are relatively mature for what they do. Firms are still mixed, but there’s no reason a firm shouldn’t be able to execute preservations orders simultaneously across all its key information sources (document management, time entry, e-mail, intranet, deal rooms, etc.).
  11. Before we look at how best to address these expectations, I want to mention that there is actually a standard for those who address data confidentiality well. There is what may be a bonus for you in that, if you address the expectations and obligations I’ve raised well, you will pretty be ready to be certified on the ISO 27001 standard. It is completely optional for law firms, and I know of two law firms that made the business decision to do so and have indeed been certified for a few years now. Since many government entities are required to meet ISO 27001 standards, there is a clear benefit for those firms that pitch work to government entities and, frankly, any corporation is apt to be impressed as well. Now that I’ve created a wall of issues, let me start to describe how we can effectively break them down.
  12. This illustration shows the three aspects of tackling data privacy -- a focus on policies and procedures plus addressing the data itself (analysis plus remediation). So, no doubt this has complexities. Law firms addressing data privacy are tending to focus solely on policies and manual data cleanup or are hiring expensive corporate (non-law firm) consultants to conduct large numbers of interviews and custom develop reports and policies. We have determined that there is a better way. Our goals in framing a solution are to: Not simply address one regulation at a time, but to create a broad, professional approach that satisfies criteria across all of the regulations while also protecting the firm’s sensitive data. Creating an environment where a firm can verify its compliance with policies it creates. Reducing the effort, costs and specialists data privacy skills to do this. I won’t dwell on the policies since technology won’t diminish the real effort and attention that need to go into these. Each of the necessary procedures, however, are well suited to a straightforward workflow process. For example, users must be made aware of what data you have of theirs that is sensitive and they need to be able to opt-in or opt-out of sharing it. While the procedure is straightforward, no firm can reliably determine and manage its sensitive data to this degree. That’s where an other type of technology comes in that is largely unused by law firms today. While a traditional compliance approach has been based on annual interviews with those possibly affecte Technology called Data Loss Prevention systems can be used to seriously streamline and improve your data privacy actions. It minimizes the According to Gartner, the two leading vendors in this space are RSA and Symantec (we have focused on RSA for a number of reasons, notably its long term roadmap with Microsoft). The tools from these vendors already understand the regulatory requirements and can also be configured to address your own needs to control confidentiality. They are capable of analyzing a firm’s system to find sensitive data and to take action upon it. They can merely alert you or the user, or they can block it, encrypt it, or seek approval from a designated person. They can determine when sensitive data is going to be printed, copied or sent to a USB device. Rather than periodic and expensive interviews, the software does this analysis behind the scenes and in real time. So, the drawbacks of this approach are a firm’s need to license the software, use it properly, and monitor compliance events. Beyond the explicit costs, this tends to require skills and time that don’t exist in most firms. As we’ll also discuss in the ‘cloud computing’ section, the emerging answer to such issues is to buy Data Privacy as a service rather than for each firm to create it from scratch. Some vendors, such as Smarsh, offer aspects of this although with a focus on e-mail and not addressing the non-technical elements on this chart. We’re currently working with a group of firms to establish a more end-to-end approach that would reduce the costs and effort by sharing some of the investments. Beyond creating a library of policy examples and issues, this service would automate the necessary procedures and provide a tool like RSA on a reduced costs basis, pre-configured to meet a law firm’s specific needs. This is only one option for a firm, but is an example of taking a complex, expensive issue and making it more of a commodity that can be consumed by many. Regardless of the approach, the key message is that firms cannot continue to ignore their risks and responsibilities in this area, and this is an area where a good firm doesn’t want to be trailing the changes in the market.
  13. Information as of Q3 2009 Contact Peter Buck | pbuck@brco.com about this presentation
  14. Electronic client file is fragmented Failure to satisfy professional responsibility to maintain the client file Matter team collaboration is more difficult Operating costs mushroom to handle e-mail’s exponential growth 12% of annual technology budget spent on email Lawyer and staff productivity is undermined and forests are killed Secretaries and staff spend up to 20% of their time filing, printing or organizing e-mail, often duplicatively Lawyers file e-mail personally in Outlook (so they can find it)—again duplicatively Knowledge is trapped in personally stored e-mail Litigation hold is challenging Some firms worry… What if clients may waive privilege and require email production in response to regulatory inquiry? What if clients demand that we to conform with their e-mail retention and destruction schedules? MetaGroup : Knowledge workers spend over 50% of their day in email. IDC : Approximately 60% of business critical information is stored in messaging systems. Gartner Group : Knowledge workers send/receive an average of 130 emails daily. As much as 75% of a company’s total knowledge exchange occurs via email; often, sole source of information Hildebrandt Baker Robbins : Personal email boxes average 1.5Gb, median is 4–5Gb, and the upper fringe is in excess of 20Gb.
  15. The volume of business email is huge. section of the presentation is about what an organization can do today to address what we call the 20-million problem. Each year large firms will have to respond, process or discard up to 20 million email items. If done incorrectly or not at all, the results can be devastating. We recommend two things: Concise email policy. Practical, simple and must be achievable in the normal course of business. Lawyers cannot effectively delegate classification of business records to intermediaries. Less than 15% of law firms today have a policy that covers electronic communication; over 90% have policy governing paper. This lack of Guidance increases risk, increases potential cost of discovery, increases cost of email storage. Policy elements must address: Filing and retention guidelines Accommodate compliance obligations, privacy and confidentiality concerns, litigation readiness Reflect employee workflow and work habits Maximize the use of technology Minimize the use of manual classifications File substantive emails; they belong to the official file for client-representation and firm management correspondence File emails and attachments as a unit to preserve context File a separate copy of an attachment for drafting Implement Email Lifecycle Management (illustrated on the next slide) What needs to be filed and where E-Mail Etiquette Age-based deletion Filing and retention guidelines Accommodate compliance obligations, privacy and confidentiality concerns, litigation readiness Reflect employee workflow and work habits Maximize the use of technology Minimize the use of manual classifications File substantive emails; they belong to the official file for client-representation and firm management correspondence File emails and attachments as a unit to preserve context File a separate copy of an attachment for drafting
  16. The challenge is to provide reasonable and realistic workflows – intuitive and promote adoption key. The user community is told “You file the email in a folder, we keep it. You file the email in the client file, we keep it longer.” We recommend iManage WorkSite controls the client file. The lifecycle addresses: Classification of email as non-records, convenience records or official records Filing emails that are useful for some period of time but should not be part of the official client record into personal email folders where they’ll be purged after a period of time (typically 2 years) Emails that are not filed are purged after some period of time (typically 60 days) Filing substantive emails that belong to the official file to WorkSite   We recommend filing email into WorkSite to co-exist with all other client work product. Productivity can also be improved by creating a single official record; filing effectiveness is improved using WorkSmart tools to shave milliseconds off a processes that are repeated constantly… Our recommended lifecycle management workflow has three branches: Non records. Purged if not filed based on time. Convenience records. Foldered by client or client-matter and available for archiving and future deletion Official records. Foldered for filed directly into the official repository. Information as of Q3 2009 Contact Peter Buck | pbuck@brco.com about this presentation
  17. Information as of Q3 2009 Contact Peter Buck | pbuck@brco.com about this presentation
  18. Information as of Q3 2009 Contact Peter Buck | pbuck@brco.com about this presentation
  19. Information as of Q3 2009 Contact Peter Buck | pbuck@brco.com about this presentation