SlideShare a Scribd company logo
Law Firm File Sharing in 2014
A study of attorneys and legal professionals and the IT tools used for
collaborating with clients and 3rd parties on privileged information.
1
Executive Summary
 File sharing gaining importance in privileged communications. 73% of law firms say file sharing is more important
this year than in previous years. There is an increased awareness that the electronic compromise of privileged
communications has serious consequences.
 Despite concerns, un-encrypted email most used means of collaboration. Law firms rely on email more than any
other tool to collaborate with clients and third-parties on privileged information. 89% of law firms report using email and
another 74% say they use email daily. Despite concerns over security, most firms do not use encryption. Larger firms
are more likely to have encryption or secure means to share files in place; smaller firms tend to be more lackadaisical
and therefore more vulnerable.
 Confidentiality statements are the most common shield against compromise. Most law firms include a
confidentiality statement below the body of their emails as the primary means to protect privileged communication.
Some also include confidentiality statements in an email subject line, or require clients to sign consent forms. A
minority of firms are using security technology to protect electronic communications: email encryption (22%), password
protect documents (14%), use a secure file sharing site (13%). 4% of respondents said in an open-ended answer
section they take no measures at all. Larger law firms – those with 100 or more attorneys on staff – are more likely to
use encrypted email or other IT security tools.
 Commercial free file sharing services proliferate. About half of law firms say they have used free commercial file
sharing services to transmit privileged information. Vendors that are focused on serving businesses, rather than
consumers, tend to be more attentive to the security concerns of businesses and law firms. When asked if other
employees were using free file sharing services, about one-third said “yes,” another third said, “no,” and the final third
were “unsure.’ In larger law firms, respondents were more likely to say they don’t use free commercial file sharing
services however, they said that other employees in the firm did. The data suggests free file sharing services are
probably used more often than law firms are aware.
 Top three features law firms demand in file sharing services. The ability to add a watermark to documents was the
most popular feature law firms said they wanted in a file sharing service, which identifies the sender, but provides little
security on the recipient’s end. The ability to revoke or modify access privileges after a document was sent ranked
second. The ability to also use a file sharing service for document storage ranked third.
2
File Sharing Increasingly Important, Especially for Smaller Firms
Overwhelmingly, law firms believe file sharing is becoming
increasingly important. As it often is with new
technologies, disruption flows from the client and the
increase demand for file sharing likely stems from a client
need for an easy way to access information.
A cross-tab analysis comparing solo- and duo-attorney
firms with firms employing 100+ attorneys shows file
sharing tools are a more pressing need in smaller firms
than larger firms. Seventy-five percent of small firms said
file sharing was more important, as compared with 55%
from firms with 100 or more attorneys.
3
Electronic Security Compromise has Consequences
More than 80 percent of respondents believe that a
breach – that if someone other than a client or privileged
party accessed confidential documents – would be
consequential or very consequential to the firm. For most,
this seems like common sense given the confidentiality
that surrounds legal work. However, this statistic gets
interesting when it’s compared with how law firms say
they share documents, and the mitigating measures
taken, despite potential vulnerabilities.
4
Despite Security Fears, Email Dominates Privileged Sharing
Email and the good old-fashioned telephone or postal
service top the list as the primary means for collaborating
with clients and sharing files. Eighty-nine percent of firms
reported using email – and 74% use it frequently (on a
near daily basis). Email in particular is an area of concern,
given just about one-third of law firms report use
encrypted on email, which is vulnerable to security
threats.
Again on this question, a cross-tab analysis shows smaller
firms are less likely to use sophisticated security
technology: 60% of respondents from law firms with 100+
attorneys reported using encrypted email. Within the solo-
and duo-attorney firms, that percentage plummets to 28%.
In open-ended responses to this question, about 2% of
respondents also cited in-person meetings with clients as
a means to collaborate.
5
Email Security Hinges on Words
How do law firms report secure privileged communications
in email? The majority rely on a confidentiality statement
included beneath the body of the email. Four percent of
respondents answered this question with an open-ended
answer that no precautions are taken. It’s also noteworthy
that on a previous question, 32% of law firms reported
using encrypted email as a means of collaboration – but
when asked more directly the percentage reporting email
encrypting dropped to 22% – or about a 10% difference.
The data suggests a degree of uncertainty as to whether
or not a firm email communications are in fact encrypted.
6
Half of Law Firms Use Free Sharing Services
About half of all law firms have used free sharing services
and a cross-tab analysis again shows the usage is
significantly higher among smaller firms. Fifty-three
percent of solo- and duo-attorney firms said they have
used free commercial file sharing services.
Compare this with firms 100+ attorneys on staff and just
about one-third or 30% reported using free file sharing
services. This suggests greater rigor in the IT governance
policies at larger law firms.
7
File Sharing – You Don’t Know What You Don’t Know
When asked if other attorneys or staff within a firm use
free file sharing services the answers were nearly evenly
split across all three answers. There are two benchmarks
for comparing this survey:
First, a previous study exclusively of small law firms with a
similar question found 42% said no, 31% were unsure and
just 23% said yes. Second, a cross-tab analysis of this
survey sample finds that a slightly lower number among
solo- and duo-firms, just 27% say other employees are
using free commercial file sharing services, while in larger
law firms (100+ attorneys) the numbers move in the
opposite direction with 55% saying other employees do
use file sharing services.
The data suggests there is probably far more file sharing –
perhaps using tools that could compromise security – than
senior law firm leaders are aware. This underscores the
need for clear process, policy and IT tools that support the
need.
8
Secure File Sharing Services in Law Firms
On the whole, most law firms are not using enterprise-
grade file sharing services that focus on the security and
protections designed with law firms in mind. Cross-tab
analysis shows that larger law firms do in fact invest in
secure file sharing tools – about 50% or half – of 100+
attorney firms say they are using an enterprise grade file
sharing tool. A separate cross-tab analysis across all
firms by size demonstrates the larger the firm, the more
likely it is to provide secure file sharing tools. Among firms
with 50 or more attorneys on staff, about half provide their
team with an enterprise-grade file sharing service.
9
Top Features Required in File Sharing
Respondents were asked to rank features they expect to
find in a secure file sharing tool on a scale of 1 to 5, where
5 was most important. Applying a visual water mark – a
means to authenticate the sender – was top of the list.
However, law firms are clearly thinking about the
recipients and the data shows the ability to change access
permissions after a file is sent is a high priority.
10
In Their Own Words: Law Firms on File Sharing Security
The final question of the survey was an open-ended
question. The tag cloud you see nearby represents the
words most frequently used – the larger the word, the
more often it was cited. The question was optional and of
the 282 respondents that completed the survey and 233
answered this question: What would you say is the
most important issue or concern attorneys or law
firms should keep in mind with regard to file sharing?
Word Cloud Analysis of Open Ended Responses
Verbatim Responses
11
Are you peeking behind the curtain?
There’s nothing here!
Survey Methodology and Demographics
12
Survey Demographics and Methodology
This study aimed to understand the uses and perceptions of file sharing tools by attorneys and legal
professionals working in U.S.-based law firms. The survey was conducted online from March 5 to March
19, 2014. Respondents were required to identify as a practicing attorney or a legal professional
supporting a law firm.
Two-hundred and eighty two (N=282) attorneys or legal professionals from across more than 15 different
practice areas, and representing 40 different states and two territories, including Washington, D.C.
participated in the survey. Respondents were provided an incentive – a chance to be entered in a random
drawing for one of 14 prizes – to complete the survey.
Demographics at-a-glance:
• Mostly practicing attorneys. 77% of respondents identified as a practicing attorney; paralegal (7%)
and administrative support (6%) were the next largest categories.
• Generally small law firms. 73% of respondents reported working at firms with 10 or fewer attorneys;
49% of respondents identified as a solo- or duo-firm.
• Broad practice areas represented. 17% of respondents reported working for firms focused on
litigation – the single largest category; family law (14%) and general practice (13%) were next. The
rest represented a wide diversity from across more than a dozen additional practice areas.
13
Survey Demographics: Respondents by Role
14
Survey Demographics: Respondents by Law Firm Size
15
Survey Demographics: Respondents by Practice Area
16
Survey Demographics: Top 10 States by Survey Responses
17
LexisNexis Time Matters Resources
• Download a Comprehensive Report on this Survey:
• File Sharing Survey Report and Infographic.
• Resources:
• White Paper: A Law Firm Guide to Protecting the Confidentiality of Shared Client Files (PDF)
• White Paper: Safeguarding Your Law Firm from Liability (PDF)
• Press Release: LexisNexis Introduces Secure Client Portal to Small Law Market
• Press Release: LexisNexis Time Matters Named to the TL NewsWire Top 25 Products of 2013 Awards
• Law Technology News: LexisNexis and WatchDox Launch Client Portal for Small Law Firms
• TechnoLaywer: LexisNexis Time Matters 13: Read Our Exclusive Report
• Legal IT Insider: Legal Industry Video Awards – Entry #8: LexisNexis on Time Matters
• Infographic: Malpractice Claims for Attorneys and the Risks
• Blog Post: Legal Tech Briefs: Virtues of Virtual Law with Stacey L. Romberg
• Blog Post: 3 Basics for Choosing Law Firm Practice Management Software
• Blog Post: Product Notes: Time Matters 13.1 Available for Download
• Social Media:
• Blog: Business of Law Blog
• LinkedIn: LexisNexis Time Matters LinkedIn Group
• Twitter: @Business_of_Law
• Facebook: LexisNexis Business of Law
• Google+: +businessoflawblog

More Related Content

What's hot

The Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisers
The Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisersThe Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisers
The Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisersGalit Gonen-Cohen
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011   Integration Of Legal TechnologyILTA 2011   Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technologygrudoy
 
The risk executive agenda -- A compendium of Deloitte insights
The risk executive agenda -- A compendium  of Deloitte insights The risk executive agenda -- A compendium  of Deloitte insights
The risk executive agenda -- A compendium of Deloitte insights
Deloitte United States
 
Lets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixLets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNix
FixNix Inc.,
 
Forrester GRC Q1 2016 Report
Forrester GRC Q1 2016 ReportForrester GRC Q1 2016 Report
Forrester GRC Q1 2016 ReportDaryl Resnick
 
Vc us v4.0
Vc us v4.0Vc us v4.0
Vc us v4.0
FixNix Inc.,
 
Big Data Debate in Corporate Law - Inside Counsel - August 2015
Big Data Debate in Corporate Law - Inside Counsel - August 2015Big Data Debate in Corporate Law - Inside Counsel - August 2015
Big Data Debate in Corporate Law - Inside Counsel - August 2015Rayford Davis
 
The future of regulation: Principles for regulating emerging technologies
The future of regulation: Principles for regulating emerging technologiesThe future of regulation: Principles for regulating emerging technologies
The future of regulation: Principles for regulating emerging technologies
Deloitte United States
 
EU General Data Protection Regulation: Practical steps for compliance, third ...
EU General Data Protection Regulation: Practical steps for compliance, third ...EU General Data Protection Regulation: Practical steps for compliance, third ...
EU General Data Protection Regulation: Practical steps for compliance, third ...
Deloitte United States
 
Communication Challenges in Federal Telework
Communication Challenges in Federal TeleworkCommunication Challenges in Federal Telework
Communication Challenges in Federal Telework
Gov BizCouncil
 
Closing the talent gap: Five ways government and business can team up to resk...
Closing the talent gap: Five ways government and business can team up to resk...Closing the talent gap: Five ways government and business can team up to resk...
Closing the talent gap: Five ways government and business can team up to resk...
Deloitte United States
 
Legal Entity Risk and Counter-Party Exposure April 2016
Legal Entity Risk and Counter-Party Exposure  April 2016Legal Entity Risk and Counter-Party Exposure  April 2016
Legal Entity Risk and Counter-Party Exposure April 2016bfreeman1987
 
CAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growthCAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growth
Grant Thornton LLP
 
Why Offer LegalShield As A Voluntary Benefit
Why Offer LegalShield As A Voluntary BenefitWhy Offer LegalShield As A Voluntary Benefit
Why Offer LegalShield As A Voluntary Benefit
George Petrilyak
 
Modernizing compliance: A tech lens on value protection and creation
Modernizing compliance: A tech lens on value protection and creationModernizing compliance: A tech lens on value protection and creation
Modernizing compliance: A tech lens on value protection and creation
Deloitte United States
 
Creating a Federal Innovation Process
Creating a Federal Innovation ProcessCreating a Federal Innovation Process
Creating a Federal Innovation Process
Gov BizCouncil
 
Hedge accounting: Simplifying the accounting for hedging activities
Hedge accounting: Simplifying the accounting for hedging activitiesHedge accounting: Simplifying the accounting for hedging activities
Hedge accounting: Simplifying the accounting for hedging activities
Deloitte United States
 
Talent Landscape in the Legal Sector
Talent Landscape in the Legal SectorTalent Landscape in the Legal Sector
Talent Landscape in the Legal Sector
Robert Gurry, Esq.
 
Edelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by Ponemon
Edelman
 

What's hot (20)

The Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisers
The Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisersThe Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisers
The Times 26-11-2015 Raconteur p10 - Now lawyers are strategic advisers
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011   Integration Of Legal TechnologyILTA 2011   Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technology
 
The risk executive agenda -- A compendium of Deloitte insights
The risk executive agenda -- A compendium  of Deloitte insights The risk executive agenda -- A compendium  of Deloitte insights
The risk executive agenda -- A compendium of Deloitte insights
 
Lets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixLets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNix
 
Forrester GRC Q1 2016 Report
Forrester GRC Q1 2016 ReportForrester GRC Q1 2016 Report
Forrester GRC Q1 2016 Report
 
Vc us v4.0
Vc us v4.0Vc us v4.0
Vc us v4.0
 
Big Data Debate in Corporate Law - Inside Counsel - August 2015
Big Data Debate in Corporate Law - Inside Counsel - August 2015Big Data Debate in Corporate Law - Inside Counsel - August 2015
Big Data Debate in Corporate Law - Inside Counsel - August 2015
 
The future of regulation: Principles for regulating emerging technologies
The future of regulation: Principles for regulating emerging technologiesThe future of regulation: Principles for regulating emerging technologies
The future of regulation: Principles for regulating emerging technologies
 
EU General Data Protection Regulation: Practical steps for compliance, third ...
EU General Data Protection Regulation: Practical steps for compliance, third ...EU General Data Protection Regulation: Practical steps for compliance, third ...
EU General Data Protection Regulation: Practical steps for compliance, third ...
 
Communication Challenges in Federal Telework
Communication Challenges in Federal TeleworkCommunication Challenges in Federal Telework
Communication Challenges in Federal Telework
 
Closing the talent gap: Five ways government and business can team up to resk...
Closing the talent gap: Five ways government and business can team up to resk...Closing the talent gap: Five ways government and business can team up to resk...
Closing the talent gap: Five ways government and business can team up to resk...
 
Data breaches at home and abroad
Data breaches at home and abroad Data breaches at home and abroad
Data breaches at home and abroad
 
Legal Entity Risk and Counter-Party Exposure April 2016
Legal Entity Risk and Counter-Party Exposure  April 2016Legal Entity Risk and Counter-Party Exposure  April 2016
Legal Entity Risk and Counter-Party Exposure April 2016
 
CAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growthCAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growth
 
Why Offer LegalShield As A Voluntary Benefit
Why Offer LegalShield As A Voluntary BenefitWhy Offer LegalShield As A Voluntary Benefit
Why Offer LegalShield As A Voluntary Benefit
 
Modernizing compliance: A tech lens on value protection and creation
Modernizing compliance: A tech lens on value protection and creationModernizing compliance: A tech lens on value protection and creation
Modernizing compliance: A tech lens on value protection and creation
 
Creating a Federal Innovation Process
Creating a Federal Innovation ProcessCreating a Federal Innovation Process
Creating a Federal Innovation Process
 
Hedge accounting: Simplifying the accounting for hedging activities
Hedge accounting: Simplifying the accounting for hedging activitiesHedge accounting: Simplifying the accounting for hedging activities
Hedge accounting: Simplifying the accounting for hedging activities
 
Talent Landscape in the Legal Sector
Talent Landscape in the Legal SectorTalent Landscape in the Legal Sector
Talent Landscape in the Legal Sector
 
Edelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by Ponemon
 

Viewers also liked

Software+struc+doc
Software+struc+docSoftware+struc+doc
Software+struc+docG.C Reddy
 
Project folder-structure-
Project folder-structure-Project folder-structure-
Project folder-structure-Daniel Downs
 
6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution
Nikec Solutions
 
Folder Structure and Document Naming Convention Best Practices
Folder Structure and Document Naming Convention Best PracticesFolder Structure and Document Naming Convention Best Practices
Folder Structure and Document Naming Convention Best PracticesSteve Smith
 
Law Firms in Business Development Transition
Law Firms in Business Development TransitionLaw Firms in Business Development Transition
Law Firms in Business Development Transition
LexisNexis Software Division
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacksariifuddin
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
Ivo Depoorter
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
Amit Ranjan
 

Viewers also liked (11)

Software+struc+doc
Software+struc+docSoftware+struc+doc
Software+struc+doc
 
Project folder-structure-
Project folder-structure-Project folder-structure-
Project folder-structure-
 
6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution
 
Folder Structure and Document Naming Convention Best Practices
Folder Structure and Document Naming Convention Best PracticesFolder Structure and Document Naming Convention Best Practices
Folder Structure and Document Naming Convention Best Practices
 
Law Firms in Business Development Transition
Law Firms in Business Development TransitionLaw Firms in Business Development Transition
Law Firms in Business Development Transition
 
Ch19 system administration
Ch19 system administration Ch19 system administration
Ch19 system administration
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
 

Similar to LexisNexis Survey of Law Firm File Sharing in 2014

Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Melissa Luongo
 
Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey Report
Echoworx
 
2014: The Law Cloud Poised for Dramatic Growth
2014:  The Law Cloud Poised for Dramatic Growth 2014:  The Law Cloud Poised for Dramatic Growth
2014: The Law Cloud Poised for Dramatic Growth
LexisNexis Software Division
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
LexisNexis
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
Cellebrite
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Securitysatyakam_biswas
 
2014 Year-End E-Discovery Update
2014 Year-End E-Discovery Update2014 Year-End E-Discovery Update
2014 Year-End E-Discovery UpdateGareth Evans
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Aspiration Software LLC
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
FERMA
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
Jon Gatrell
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Dr. Khaled Bakro
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
Dan Michaluk
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
PortalGuard
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
Bee_Ware
 
Ponemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAMPonemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAM
EMC
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
XeniT Solutions nv
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull.com
 

Similar to LexisNexis Survey of Law Firm File Sharing in 2014 (20)

Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
 
Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey Report
 
2014: The Law Cloud Poised for Dramatic Growth
2014:  The Law Cloud Poised for Dramatic Growth 2014:  The Law Cloud Poised for Dramatic Growth
2014: The Law Cloud Poised for Dramatic Growth
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 
2014 Year-End E-Discovery Update
2014 Year-End E-Discovery Update2014 Year-End E-Discovery Update
2014 Year-End E-Discovery Update
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
Ss
SsSs
Ss
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
 
Ponemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAMPonemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAM
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 

More from LexisNexis Software Division

Case Organization, Analysis & Presentation in the Age of eDiscovery
Case Organization, Analysis & Presentation in the Age of eDiscoveryCase Organization, Analysis & Presentation in the Age of eDiscovery
Case Organization, Analysis & Presentation in the Age of eDiscovery
LexisNexis Software Division
 
Legal Industry Scorecard
Legal Industry ScorecardLegal Industry Scorecard
Legal Industry Scorecard
LexisNexis Software Division
 
Independent Attorney Survival Guide by LexisNexis Firm Manager
Independent Attorney Survival Guide by LexisNexis Firm ManagerIndependent Attorney Survival Guide by LexisNexis Firm Manager
Independent Attorney Survival Guide by LexisNexis Firm Manager
LexisNexis Software Division
 
Legally Optimistic: A study on legal departments and legal department operations
Legally Optimistic: A study on legal departments and legal department operationsLegally Optimistic: A study on legal departments and legal department operations
Legally Optimistic: A study on legal departments and legal department operations
LexisNexis Software Division
 
ILTA 2014: LexisNexis Software Company Update
ILTA 2014:  LexisNexis Software Company UpdateILTA 2014:  LexisNexis Software Company Update
ILTA 2014: LexisNexis Software Company Update
LexisNexis Software Division
 
Cornerstones of CASL Compliance
Cornerstones of CASL ComplianceCornerstones of CASL Compliance
Cornerstones of CASL Compliance
LexisNexis Software Division
 
LexisNexis Moneyball for Lawyers
LexisNexis Moneyball for LawyersLexisNexis Moneyball for Lawyers
LexisNexis Moneyball for Lawyers
LexisNexis Software Division
 
The Winning Case for (Law Firm) Online Document Management
The Winning Case for (Law Firm) Online Document Management The Winning Case for (Law Firm) Online Document Management
The Winning Case for (Law Firm) Online Document Management
LexisNexis Software Division
 

More from LexisNexis Software Division (8)

Case Organization, Analysis & Presentation in the Age of eDiscovery
Case Organization, Analysis & Presentation in the Age of eDiscoveryCase Organization, Analysis & Presentation in the Age of eDiscovery
Case Organization, Analysis & Presentation in the Age of eDiscovery
 
Legal Industry Scorecard
Legal Industry ScorecardLegal Industry Scorecard
Legal Industry Scorecard
 
Independent Attorney Survival Guide by LexisNexis Firm Manager
Independent Attorney Survival Guide by LexisNexis Firm ManagerIndependent Attorney Survival Guide by LexisNexis Firm Manager
Independent Attorney Survival Guide by LexisNexis Firm Manager
 
Legally Optimistic: A study on legal departments and legal department operations
Legally Optimistic: A study on legal departments and legal department operationsLegally Optimistic: A study on legal departments and legal department operations
Legally Optimistic: A study on legal departments and legal department operations
 
ILTA 2014: LexisNexis Software Company Update
ILTA 2014:  LexisNexis Software Company UpdateILTA 2014:  LexisNexis Software Company Update
ILTA 2014: LexisNexis Software Company Update
 
Cornerstones of CASL Compliance
Cornerstones of CASL ComplianceCornerstones of CASL Compliance
Cornerstones of CASL Compliance
 
LexisNexis Moneyball for Lawyers
LexisNexis Moneyball for LawyersLexisNexis Moneyball for Lawyers
LexisNexis Moneyball for Lawyers
 
The Winning Case for (Law Firm) Online Document Management
The Winning Case for (Law Firm) Online Document Management The Winning Case for (Law Firm) Online Document Management
The Winning Case for (Law Firm) Online Document Management
 

Recently uploaded

Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 

Recently uploaded (20)

Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 

LexisNexis Survey of Law Firm File Sharing in 2014

  • 1. Law Firm File Sharing in 2014 A study of attorneys and legal professionals and the IT tools used for collaborating with clients and 3rd parties on privileged information.
  • 2. 1 Executive Summary  File sharing gaining importance in privileged communications. 73% of law firms say file sharing is more important this year than in previous years. There is an increased awareness that the electronic compromise of privileged communications has serious consequences.  Despite concerns, un-encrypted email most used means of collaboration. Law firms rely on email more than any other tool to collaborate with clients and third-parties on privileged information. 89% of law firms report using email and another 74% say they use email daily. Despite concerns over security, most firms do not use encryption. Larger firms are more likely to have encryption or secure means to share files in place; smaller firms tend to be more lackadaisical and therefore more vulnerable.  Confidentiality statements are the most common shield against compromise. Most law firms include a confidentiality statement below the body of their emails as the primary means to protect privileged communication. Some also include confidentiality statements in an email subject line, or require clients to sign consent forms. A minority of firms are using security technology to protect electronic communications: email encryption (22%), password protect documents (14%), use a secure file sharing site (13%). 4% of respondents said in an open-ended answer section they take no measures at all. Larger law firms – those with 100 or more attorneys on staff – are more likely to use encrypted email or other IT security tools.  Commercial free file sharing services proliferate. About half of law firms say they have used free commercial file sharing services to transmit privileged information. Vendors that are focused on serving businesses, rather than consumers, tend to be more attentive to the security concerns of businesses and law firms. When asked if other employees were using free file sharing services, about one-third said “yes,” another third said, “no,” and the final third were “unsure.’ In larger law firms, respondents were more likely to say they don’t use free commercial file sharing services however, they said that other employees in the firm did. The data suggests free file sharing services are probably used more often than law firms are aware.  Top three features law firms demand in file sharing services. The ability to add a watermark to documents was the most popular feature law firms said they wanted in a file sharing service, which identifies the sender, but provides little security on the recipient’s end. The ability to revoke or modify access privileges after a document was sent ranked second. The ability to also use a file sharing service for document storage ranked third.
  • 3. 2 File Sharing Increasingly Important, Especially for Smaller Firms Overwhelmingly, law firms believe file sharing is becoming increasingly important. As it often is with new technologies, disruption flows from the client and the increase demand for file sharing likely stems from a client need for an easy way to access information. A cross-tab analysis comparing solo- and duo-attorney firms with firms employing 100+ attorneys shows file sharing tools are a more pressing need in smaller firms than larger firms. Seventy-five percent of small firms said file sharing was more important, as compared with 55% from firms with 100 or more attorneys.
  • 4. 3 Electronic Security Compromise has Consequences More than 80 percent of respondents believe that a breach – that if someone other than a client or privileged party accessed confidential documents – would be consequential or very consequential to the firm. For most, this seems like common sense given the confidentiality that surrounds legal work. However, this statistic gets interesting when it’s compared with how law firms say they share documents, and the mitigating measures taken, despite potential vulnerabilities.
  • 5. 4 Despite Security Fears, Email Dominates Privileged Sharing Email and the good old-fashioned telephone or postal service top the list as the primary means for collaborating with clients and sharing files. Eighty-nine percent of firms reported using email – and 74% use it frequently (on a near daily basis). Email in particular is an area of concern, given just about one-third of law firms report use encrypted on email, which is vulnerable to security threats. Again on this question, a cross-tab analysis shows smaller firms are less likely to use sophisticated security technology: 60% of respondents from law firms with 100+ attorneys reported using encrypted email. Within the solo- and duo-attorney firms, that percentage plummets to 28%. In open-ended responses to this question, about 2% of respondents also cited in-person meetings with clients as a means to collaborate.
  • 6. 5 Email Security Hinges on Words How do law firms report secure privileged communications in email? The majority rely on a confidentiality statement included beneath the body of the email. Four percent of respondents answered this question with an open-ended answer that no precautions are taken. It’s also noteworthy that on a previous question, 32% of law firms reported using encrypted email as a means of collaboration – but when asked more directly the percentage reporting email encrypting dropped to 22% – or about a 10% difference. The data suggests a degree of uncertainty as to whether or not a firm email communications are in fact encrypted.
  • 7. 6 Half of Law Firms Use Free Sharing Services About half of all law firms have used free sharing services and a cross-tab analysis again shows the usage is significantly higher among smaller firms. Fifty-three percent of solo- and duo-attorney firms said they have used free commercial file sharing services. Compare this with firms 100+ attorneys on staff and just about one-third or 30% reported using free file sharing services. This suggests greater rigor in the IT governance policies at larger law firms.
  • 8. 7 File Sharing – You Don’t Know What You Don’t Know When asked if other attorneys or staff within a firm use free file sharing services the answers were nearly evenly split across all three answers. There are two benchmarks for comparing this survey: First, a previous study exclusively of small law firms with a similar question found 42% said no, 31% were unsure and just 23% said yes. Second, a cross-tab analysis of this survey sample finds that a slightly lower number among solo- and duo-firms, just 27% say other employees are using free commercial file sharing services, while in larger law firms (100+ attorneys) the numbers move in the opposite direction with 55% saying other employees do use file sharing services. The data suggests there is probably far more file sharing – perhaps using tools that could compromise security – than senior law firm leaders are aware. This underscores the need for clear process, policy and IT tools that support the need.
  • 9. 8 Secure File Sharing Services in Law Firms On the whole, most law firms are not using enterprise- grade file sharing services that focus on the security and protections designed with law firms in mind. Cross-tab analysis shows that larger law firms do in fact invest in secure file sharing tools – about 50% or half – of 100+ attorney firms say they are using an enterprise grade file sharing tool. A separate cross-tab analysis across all firms by size demonstrates the larger the firm, the more likely it is to provide secure file sharing tools. Among firms with 50 or more attorneys on staff, about half provide their team with an enterprise-grade file sharing service.
  • 10. 9 Top Features Required in File Sharing Respondents were asked to rank features they expect to find in a secure file sharing tool on a scale of 1 to 5, where 5 was most important. Applying a visual water mark – a means to authenticate the sender – was top of the list. However, law firms are clearly thinking about the recipients and the data shows the ability to change access permissions after a file is sent is a high priority.
  • 11. 10 In Their Own Words: Law Firms on File Sharing Security The final question of the survey was an open-ended question. The tag cloud you see nearby represents the words most frequently used – the larger the word, the more often it was cited. The question was optional and of the 282 respondents that completed the survey and 233 answered this question: What would you say is the most important issue or concern attorneys or law firms should keep in mind with regard to file sharing? Word Cloud Analysis of Open Ended Responses Verbatim Responses
  • 12. 11 Are you peeking behind the curtain? There’s nothing here! Survey Methodology and Demographics
  • 13. 12 Survey Demographics and Methodology This study aimed to understand the uses and perceptions of file sharing tools by attorneys and legal professionals working in U.S.-based law firms. The survey was conducted online from March 5 to March 19, 2014. Respondents were required to identify as a practicing attorney or a legal professional supporting a law firm. Two-hundred and eighty two (N=282) attorneys or legal professionals from across more than 15 different practice areas, and representing 40 different states and two territories, including Washington, D.C. participated in the survey. Respondents were provided an incentive – a chance to be entered in a random drawing for one of 14 prizes – to complete the survey. Demographics at-a-glance: • Mostly practicing attorneys. 77% of respondents identified as a practicing attorney; paralegal (7%) and administrative support (6%) were the next largest categories. • Generally small law firms. 73% of respondents reported working at firms with 10 or fewer attorneys; 49% of respondents identified as a solo- or duo-firm. • Broad practice areas represented. 17% of respondents reported working for firms focused on litigation – the single largest category; family law (14%) and general practice (13%) were next. The rest represented a wide diversity from across more than a dozen additional practice areas.
  • 17. 16 Survey Demographics: Top 10 States by Survey Responses
  • 18. 17 LexisNexis Time Matters Resources • Download a Comprehensive Report on this Survey: • File Sharing Survey Report and Infographic. • Resources: • White Paper: A Law Firm Guide to Protecting the Confidentiality of Shared Client Files (PDF) • White Paper: Safeguarding Your Law Firm from Liability (PDF) • Press Release: LexisNexis Introduces Secure Client Portal to Small Law Market • Press Release: LexisNexis Time Matters Named to the TL NewsWire Top 25 Products of 2013 Awards • Law Technology News: LexisNexis and WatchDox Launch Client Portal for Small Law Firms • TechnoLaywer: LexisNexis Time Matters 13: Read Our Exclusive Report • Legal IT Insider: Legal Industry Video Awards – Entry #8: LexisNexis on Time Matters • Infographic: Malpractice Claims for Attorneys and the Risks • Blog Post: Legal Tech Briefs: Virtues of Virtual Law with Stacey L. Romberg • Blog Post: 3 Basics for Choosing Law Firm Practice Management Software • Blog Post: Product Notes: Time Matters 13.1 Available for Download • Social Media: • Blog: Business of Law Blog • LinkedIn: LexisNexis Time Matters LinkedIn Group • Twitter: @Business_of_Law • Facebook: LexisNexis Business of Law • Google+: +businessoflawblog