SlideShare a Scribd company logo
1 of 1
Download to read offline
The client
Judicare Group specialises
in legal services relating to
investments made in
property and land
overseas, working on
behalf of both individuals
and businesses. Providing a
smooth and cost-effective
client-focused solution to
recovering invested money
from problematic property
and land purchases abroad.
The issue
Because of the highly confidential nature of the client
data involved, Judicare recognised the need to invest in a
proactive information security programme to protect the
financial interests of its clients, irrespective of size or
nature of account. The company was also extremely
conscious of its obligations regarding data protection,
especially with so much data being contained on laptops
and smartphones often transported across numerous
foreign jurisdictions.
Octree’s approach
Judicare is reliant on portable computing and Internet
communications, as well as secure storage and archiving.
Regular and frequent contact with clients and legal
advisors in multiple jurisdictions means that email is the
primary method of communication, and all employees
routinely use the Internet.
With in-depth knowledge of the professional services
sector and the Law Society’s Practice Notes on Data
Protection, Octree is able to ensure that the
recommended systems and information security
procedures and tools are fully compliant. We have
established a robust methodology that enables us to
create an effective yet flexibly IT strategy, and for
Judicare we introduced:
• A secure online file storage, sharing and collaboration
platform.
• A secure data back-up solution with off-site storage for
added security.
• Encryption services for secure email delivery.
• A managed full disk encryption solution for all
company portable computers.
• Mobile Device Management for all smartphones
providing locator and remote wipe capabilities, as well
as policy enforcement and secure email client.
• A web filtering solution to protect against web-borne
malware and control access to inappropriate material.
• Ongoing monitoring of and proactive support for the
company’s IT systems.
Neil Heaney of Judicare says: “Because of the sensitive
nature of our business and the absolute need to protect
client confidentiality, as well as the need to comply with
our legal and regulatory compliance mandates, it was
essential that the advice and solutions provided would be
fit for purpose as well as cost effective, and proportionate
to the risks we face. Our reputation and track record have
thrust us to the forefront of investment recovery, and the
business could not risk poor security and possible data
breaches. The systems and measures Octree introduced
have fully ensured that Judicare Group is fully compliant
with the Law Society’s stringent data protection
standards.”
A new IT Strategy to support legal service providers
Legal Services
Case Study
For further information contact:
security@octree.co.uk
08456 17 18 19
www.octree.co.uk
A4 Data Sheets.qxp_Layout 1 29/10/2014 14:24 Page 4

More Related Content

What's hot

Securing edge lot systems
Securing edge lot systemsSecuring edge lot systems
Securing edge lot systemskphodel
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Jim Brashear
 
Nevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsNevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsJulia Mak
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ
 
Wearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsWearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsGiulio Coraggio
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Sagara Gunathunga
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artJames Mulhern
 
Continuous PCI and GDPR Compliance With Data-Centric Security
Continuous PCI and GDPR Compliance With Data-Centric SecurityContinuous PCI and GDPR Compliance With Data-Centric Security
Continuous PCI and GDPR Compliance With Data-Centric SecurityTokenEx
 
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Darek Czuchaj
 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...PiyushHipparkar
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018Codemotion
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Ioannis Krontiris
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoGiulio Coraggio
 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment (SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment Priyanka Aash
 
Lexis Nexis Risk Solutions O Verview
Lexis Nexis Risk Solutions O VerviewLexis Nexis Risk Solutions O Verview
Lexis Nexis Risk Solutions O VerviewJason Trego
 

What's hot (20)

Securing edge lot systems
Securing edge lot systemsSecuring edge lot systems
Securing edge lot systems
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
 
Nevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsNevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy Regulations
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Fintech & Blockchain
Fintech & BlockchainFintech & Blockchain
Fintech & Blockchain
 
Wearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsWearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rights
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Continuous PCI and GDPR Compliance With Data-Centric Security
Continuous PCI and GDPR Compliance With Data-Centric SecurityContinuous PCI and GDPR Compliance With Data-Centric Security
Continuous PCI and GDPR Compliance With Data-Centric Security
 
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeo
 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment (SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
 
Lexis Nexis Risk Solutions O Verview
Lexis Nexis Risk Solutions O VerviewLexis Nexis Risk Solutions O Verview
Lexis Nexis Risk Solutions O Verview
 

Similar to Legal Services

CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCompute Forensics
 
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...Antoniou McCollum & Co. LLC
 
ey-forensics-discovery-services.pdf
ey-forensics-discovery-services.pdfey-forensics-discovery-services.pdf
ey-forensics-discovery-services.pdfaparnamore11
 
BDO Digital Forensic
BDO Digital ForensicBDO Digital Forensic
BDO Digital ForensicBDO Indonesia
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Aspiration Software LLC
 
No matter where you are, or what time of day it is, always there for you
No matter where you are, or what time of day it is, always there for youNo matter where you are, or what time of day it is, always there for you
No matter where you are, or what time of day it is, always there for youCompany
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room BrochureEthosData
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.netethnos
 
Contingency e discovery services (class actions)
Contingency e discovery services (class actions)Contingency e discovery services (class actions)
Contingency e discovery services (class actions)Brian Spira
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
Protective Monitoring
Protective MonitoringProtective Monitoring
Protective Monitoringjohandev
 
Legal Point of View
Legal Point of ViewLegal Point of View
Legal Point of ViewLeila Kim
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trustlmgangi
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfDrysign By Exela
 

Similar to Legal Services (20)

CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
 
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
 
IT Policy
IT PolicyIT Policy
IT Policy
 
ey-forensics-discovery-services.pdf
ey-forensics-discovery-services.pdfey-forensics-discovery-services.pdf
ey-forensics-discovery-services.pdf
 
BDO Digital Forensic
BDO Digital ForensicBDO Digital Forensic
BDO Digital Forensic
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
No matter where you are, or what time of day it is, always there for you
No matter where you are, or what time of day it is, always there for youNo matter where you are, or what time of day it is, always there for you
No matter where you are, or what time of day it is, always there for you
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
Contingency e discovery services (class actions)
Contingency e discovery services (class actions)Contingency e discovery services (class actions)
Contingency e discovery services (class actions)
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Brochure-CommonwealthLegal
Brochure-CommonwealthLegalBrochure-CommonwealthLegal
Brochure-CommonwealthLegal
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Protective Monitoring
Protective MonitoringProtective Monitoring
Protective Monitoring
 
Legal Point of View
Legal Point of ViewLegal Point of View
Legal Point of View
 
Cyber
Cyber Cyber
Cyber
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdf
 

Legal Services

  • 1. The client Judicare Group specialises in legal services relating to investments made in property and land overseas, working on behalf of both individuals and businesses. Providing a smooth and cost-effective client-focused solution to recovering invested money from problematic property and land purchases abroad. The issue Because of the highly confidential nature of the client data involved, Judicare recognised the need to invest in a proactive information security programme to protect the financial interests of its clients, irrespective of size or nature of account. The company was also extremely conscious of its obligations regarding data protection, especially with so much data being contained on laptops and smartphones often transported across numerous foreign jurisdictions. Octree’s approach Judicare is reliant on portable computing and Internet communications, as well as secure storage and archiving. Regular and frequent contact with clients and legal advisors in multiple jurisdictions means that email is the primary method of communication, and all employees routinely use the Internet. With in-depth knowledge of the professional services sector and the Law Society’s Practice Notes on Data Protection, Octree is able to ensure that the recommended systems and information security procedures and tools are fully compliant. We have established a robust methodology that enables us to create an effective yet flexibly IT strategy, and for Judicare we introduced: • A secure online file storage, sharing and collaboration platform. • A secure data back-up solution with off-site storage for added security. • Encryption services for secure email delivery. • A managed full disk encryption solution for all company portable computers. • Mobile Device Management for all smartphones providing locator and remote wipe capabilities, as well as policy enforcement and secure email client. • A web filtering solution to protect against web-borne malware and control access to inappropriate material. • Ongoing monitoring of and proactive support for the company’s IT systems. Neil Heaney of Judicare says: “Because of the sensitive nature of our business and the absolute need to protect client confidentiality, as well as the need to comply with our legal and regulatory compliance mandates, it was essential that the advice and solutions provided would be fit for purpose as well as cost effective, and proportionate to the risks we face. Our reputation and track record have thrust us to the forefront of investment recovery, and the business could not risk poor security and possible data breaches. The systems and measures Octree introduced have fully ensured that Judicare Group is fully compliant with the Law Society’s stringent data protection standards.” A new IT Strategy to support legal service providers Legal Services Case Study For further information contact: security@octree.co.uk 08456 17 18 19 www.octree.co.uk A4 Data Sheets.qxp_Layout 1 29/10/2014 14:24 Page 4