SlideShare a Scribd company logo
#ClioWeb
Security by Design forLaw Firms
A Clio& NextpointWebinar
Joshua Lenon & Fiona Finn – Clio
Julianne Walsh - Nextpoint
#ClioWeb
• Legal Marketing Specialist at Clio
• Bachelor of Civil Law & Masters of
Laws (LLM)
• @FionaFinn
Instructors
Joshua Lenon
• Lawyer in Residence at Clio
• Attorney Admitted in New York
• @JoshuaLenon
Fiona Finn
#ClioWeb
Instructors
Julianne Walsh
• Attorney in Residence at
Nextpoint
• Attorney Admitted in Illinois
• jwalsh@nextpoint.com
#ClioWeb
Agenda
• Securityby Design (5 minutes)
• FTC’s regulationof cybersecurity(10 minutes)
• 10 Tips for protectingclient datain the cloud (35 minutes)
• LegalTechnology SecurityEvolves(5 minutes)
• Questions(5 minutes)
#ClioWeb
SECURITY BY DESIGN
#ClioWeb
Security by Design
Formalizesaccountdesign, automatessecurity controls, andstreamlines
auditing
Phase 1 – Understandyourrequirements.
Phase 2 – Build a “secure environment”thatfitsyourrequirementsand
implementation.
Phase 3 – Enforce the use of the templates.
Phase 4 – Performvalidationactivities.
#ClioWeb
FTC’S REGULATION OF CYBERSECURITY
#ClioWeb
FTC & Cybersecurity
FederalTradeCommission(FTC)
• Establishedin 1914 by the FederalTradeCommissionAct
• Section 5 of the FederalTradeCommissionAct, 15 U.S.C. §
45 grants the FTC powerto investigateand preventunfairor
deceptivetrade practices (UDAP Authority)
• 50 cybersecurityenforcementactions since 2002
#ClioWeb
Federal Trade Commission v. Wyndham
Worldwide Corp., 799 F.3d 236, (3d Cir. 2015)
#ClioWeb
FTC’sStandardof Care
Take “reasonableand
necessarymeasures”to
protect consumer data
#ClioWeb
LawyerEthical Requirementsfor Security
Rule 1.6 Confidentiality
• (a) A lawyer shallnot reveal information
relating to the representation of a client
unlessthe client gives informed consent, the
disclosureisimpliedlyauthorized inorder to
carry out the representation…
• [Comment 18]
– ...inadvertent or unauthorized
disclosure of information relating
to the representation of a client
does not constitute a violation if
the lawyer has made reasonable
efforts to prevent the access or
disclosure.
#ClioWeb
10 TIPS FOR PROTECTING CLIENT DATA
IN THE CLOUD
#ClioWeb
1. Start with Security
2. Control Access to Data Sensibly
3. Require Secure Passwords and
Authentication
4. Store Sensitive Personal Information
Securely and Protect it During
Transmission
5. Segment Your Network and Try to
Monitor Who is Trying to Get in and
Out
6. Secure Remote Accessto Your
Network
7. Apply Sound Security Practices
When Developing New Products
8. Make Sure Your Service Providers
Implement Reasonable Security
Measures
9. Put Proceduresin Place to Keep Your
Security Current and Address
Vulnerabilities That May Arise
10. Secure Paper, Physical Media, and
Devices
Source:	Start	with	Security,	Federal	
Trade	Commission
#ClioWeb
1. Start with Security
Don’tcollectpersonalinformationyoudon’tneed.
No one can stealwhatyoudon’thave.
• Collectinformationinstages: potentialclient, client, ex-client
Hold onto informationonlyas longas youhave a legitimate
businessneed.
Securely dispose personalinformationonce there’slongerhada
legitimate needforit.
• Returnclientfiles at the endof engagements
Don’tuse personalinformationwhenit’snotnecessary.
#ClioWeb
2. Control Access to DataSensibly
Restrictaccesstosensitivedata.
Implementpropercontrolsto ensure thatonly authorizedemployeeswith
a businessneedhave access
• Use job rolesand permissionsto controlaccess
• MRPC Rule 1.10ImputationOfConflictsOfInterest
Limit administrativeaccess.
Tailoradministrative controlsto jobneeds.
• Administrative accessis requiredforchanging users& permissions
#ClioWeb
2. Control Access to DataSensibly
#ClioWeb
2. Control Access to DataSensibly
#ClioWeb
3. Require Secure Passwords & Authentication
Use a strong password.
Your passwordshouldcontain atleast three of the four followingtypes of characters,and
preferably all four:
Upper case,lower case,numbers and special characters (includingspace)
Store passwordssecurely.
Don’tmake it easy for passwords tobe accessed.
•Havepolicies andprocedures in place to storecredentials securely.
Change passwordsregularly.
A passwordchangeis recommended every 90 days.
•Donot usethe same passwordfor multiple sites.
Preventbrute force attacks.
Lock outaccounts after a defined number of incorrectpasswordattempts.
Protectagainstauthenticationbypass.
Address vulnerabilities in authentication mechanisms.
#ClioWeb
#ClioWeb
4. Store & Transmit Sensitive
Personal Information Securely
Keep sensitive informationsecure through its lifecycle.
Data does not stay in oneplace.
• Client information shouldbe protected fromcollection through transmission,useanddestruction.
Use industry-tested and accepted and methods.
All of the certifications listed are usedto gain confidenceandplace trust in a service
organization’s systems.
• Type 2 SOC 2 certification
• ISO 27001 certification
• ISO 27018 certification
Ensure properconfiguration.
Technology is notenough.
• Makesureencryption technologies areproperly configured,deployed andupdated or they may be ineffective.
#ClioWeb
#ClioWeb
5. Segment & Monitor Your Network
Segmentyour network.
Notevery computerinyoursystemneedsto be able to
communicate withevery otherone.
• Protect particularly sensitive client data by housing it in a separate
secure place onyournetwork.
Monitor access.
Knowwho is accessingyournetwork.
#ClioWeb
#ClioWeb
#ClioWeb
6. Secure Remote Access to Your Network
Ensureendpointsecurity.
• Access your& yourclients’security setup
• Use ClientPortalsto minimize risks
– ABA Formal Ethics Opinion 11-459 – Duty to Protect the Confidentiality of Email
Communications with One’s Client
Putsensibleaccesslimitsin place.
• Only share whatyouneedto withclientsand others
#ClioWeb
#ClioWeb
7. Apply Sound Security Practices
When DevelopingNew Products
Trainyour engineersinsecurecoding.
Followplatformguidelinesfor security.
Verify thatprivacyandsecurityfeatureswork.
• Trust butverify. Don’ttake security forgranted
Testfor commonvulnerabilities.
#ClioWeb
#ClioWeb
8. Make Sure Your Service Providers
Implement Reasonable Security Measures
Put it in writing.
Insist that appropriate security standards are part of your contracts.
• The Service Agreement should include terms to abide by attorney-client
confidentiality in the Privacy Policy, thereby ensuring that the online data storage
provider has an enforceable obligation to preserve confidentiality and security.
Verify compliance.
Security can’t be a “take our word for it” thing
• The Service Agreement should include your right to audit performance records and
access daily service quality statistics.
#ClioWeb
www.legalcloudcomputingassociation.org
#ClioWeb
#ClioWeb
9. Proceduresto Keep Your Security Current
Update and patch third-party software.
Outdated software undermines security.
• Compromising software for lawyers: InternetExplorer
• Prioritize patches, incorporate updates into standard compliance practice.
Heed credible security warnings and move quickly to x them.
Have a process in place to address security vulnerability reports.
• Identify and assess vulnerability reports.
• Align combatting team and assets
• Notify clients and maintain open flow of information via a clearly publicized
and accessible channel.
#ClioWeb
9. Proceduresto Keep Your Security Current
Think sharedresponsibility
betweenusersandvendors,
and a consistentapproachof
updatingand awareness-
there’s no once off solution to
ensurefull securityof
sensitiveinformation.
#ClioWeb
10. SecurePaper,Physical Media, and Devices
Securely store sensitive files.
If it is necessary to retain important paperwork, take steps to keep it secure.
• ABA Model Rules ofProfessional Conduct 1.15(a) – Safekeeping Property
Protect devices that store personal information.
Keep safety standards in place when data is en route.
• Limit the instances when attorneys need to be out and about with sensitive data in their possession.
Dispose of sensitive data securely.
• Use available technology to wipe devices that are not in use.
#ClioWeb
#ClioWeb
LEGAL TECHNOLOGY SECURITY EVOLVES
#ClioWeb
www.legalcloudcomputingassociation.org
#ClioWeb
http://www.legalcloudcomputingassociation.org/standards/
#ClioWeb
QUESTIONS?
#ClioWeb
Thank You
JoshuaLenon
joshua@clio.com
@JoshuaLenon
Linkedin.com/in/joshualenon

More Related Content

What's hot

Advanced client intake for modern law firms
Advanced client intake for modern law firms Advanced client intake for modern law firms
Advanced client intake for modern law firms
Clio - Cloud-Based Legal Technology
 
Trust Accounting Technology for Law Firms
Trust Accounting Technology for Law FirmsTrust Accounting Technology for Law Firms
Trust Accounting Technology for Law Firms
Clio - Cloud-Based Legal Technology
 
Tools to improve billing & payment workflows
Tools to improve billing & payment workflowsTools to improve billing & payment workflows
Tools to improve billing & payment workflows
Clio - Cloud-Based Legal Technology
 
Clio for Family Law Firms
Clio for Family Law FirmsClio for Family Law Firms
Clio for Family Law Firms
Clio - Cloud-Based Legal Technology
 
Clio for Criminal Law Attorneys
Clio for Criminal Law AttorneysClio for Criminal Law Attorneys
Clio for Criminal Law Attorneys
Clio - Cloud-Based Legal Technology
 
Money matters for law firms
Money matters for law firmsMoney matters for law firms
Money matters for law firms
Clio - Cloud-Based Legal Technology
 
DevOps and Audit
DevOps and AuditDevOps and Audit
DevOps and Audit
Jeff Gallimore
 
Cybersecurity as MIS
Cybersecurity as MISCybersecurity as MIS
Cybersecurity as MIS
College Development Network
 
Metrics and the Modern Law Firm
Metrics and the Modern Law FirmMetrics and the Modern Law Firm
Metrics and the Modern Law Firm
Clio - Cloud-Based Legal Technology
 
Making Digital Governance Work (JBoye)
Making Digital Governance Work (JBoye)Making Digital Governance Work (JBoye)
Making Digital Governance Work (JBoye)
Shane Diffily
 

What's hot (10)

Advanced client intake for modern law firms
Advanced client intake for modern law firms Advanced client intake for modern law firms
Advanced client intake for modern law firms
 
Trust Accounting Technology for Law Firms
Trust Accounting Technology for Law FirmsTrust Accounting Technology for Law Firms
Trust Accounting Technology for Law Firms
 
Tools to improve billing & payment workflows
Tools to improve billing & payment workflowsTools to improve billing & payment workflows
Tools to improve billing & payment workflows
 
Clio for Family Law Firms
Clio for Family Law FirmsClio for Family Law Firms
Clio for Family Law Firms
 
Clio for Criminal Law Attorneys
Clio for Criminal Law AttorneysClio for Criminal Law Attorneys
Clio for Criminal Law Attorneys
 
Money matters for law firms
Money matters for law firmsMoney matters for law firms
Money matters for law firms
 
DevOps and Audit
DevOps and AuditDevOps and Audit
DevOps and Audit
 
Cybersecurity as MIS
Cybersecurity as MISCybersecurity as MIS
Cybersecurity as MIS
 
Metrics and the Modern Law Firm
Metrics and the Modern Law FirmMetrics and the Modern Law Firm
Metrics and the Modern Law Firm
 
Making Digital Governance Work (JBoye)
Making Digital Governance Work (JBoye)Making Digital Governance Work (JBoye)
Making Digital Governance Work (JBoye)
 

Similar to Security by Design for Law Firms

Cybersecurity for law firms handouts
Cybersecurity for law firms   handoutsCybersecurity for law firms   handouts
Cybersecurity for law firms handouts
Clio - Cloud-Based Legal Technology
 
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA PresentationAddressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Kareo
 
Ensuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote DevelopersEnsuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote Developers
Acquaint Softtech Private Limited
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
Misha Hanin
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
Cognic Systems Pvt Ltd
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
Nikec Solutions
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
JMS Secure Data
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
JMS Secure Data
 
Addressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based SoftwareAddressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based Software
Kareo
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
Kristyn Greenwood
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
Michael O'Phelan
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealthInvest
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
Jennifer Mary
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
Ernest Staats
 

Similar to Security by Design for Law Firms (20)

Cybersecurity for law firms handouts
Cybersecurity for law firms   handoutsCybersecurity for law firms   handouts
Cybersecurity for law firms handouts
 
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA PresentationAddressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
 
Ensuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote DevelopersEnsuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote Developers
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Addressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based SoftwareAddressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based Software
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 

More from Clio - Cloud-Based Legal Technology

Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Clio - Cloud-Based Legal Technology
 
How Automating Client Intake Increases Client Confidence
How Automating Client Intake Increases Client ConfidenceHow Automating Client Intake Increases Client Confidence
How Automating Client Intake Increases Client Confidence
Clio - Cloud-Based Legal Technology
 
How Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client IntakeHow Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
Clio - Cloud-Based Legal Technology
 
2023 Legal Trends for Solo Law Firms
2023 Legal Trends for Solo Law Firms2023 Legal Trends for Solo Law Firms
2023 Legal Trends for Solo Law Firms
Clio - Cloud-Based Legal Technology
 
Increase Your Profits While Reducing Burnout
Increase Your Profits While Reducing BurnoutIncrease Your Profits While Reducing Burnout
Increase Your Profits While Reducing Burnout
Clio - Cloud-Based Legal Technology
 
90-Day Goal Setting for Legal Professionals
90-Day Goal Setting for Legal Professionals90-Day Goal Setting for Legal Professionals
90-Day Goal Setting for Legal Professionals
Clio - Cloud-Based Legal Technology
 
Insights from the 2022 Legal Trends Report - Slides.pdf
Insights from the 2022 Legal Trends Report - Slides.pdfInsights from the 2022 Legal Trends Report - Slides.pdf
Insights from the 2022 Legal Trends Report - Slides.pdf
Clio - Cloud-Based Legal Technology
 
How to Refine Your Law Firm Business Model
How to Refine Your Law Firm Business ModelHow to Refine Your Law Firm Business Model
How to Refine Your Law Firm Business Model
Clio - Cloud-Based Legal Technology
 
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
Clio - Cloud-Based Legal Technology
 
2022 in Review: What's Working for Your Firm and What Isn't
2022 in Review: What's Working for Your Firm and What Isn't2022 in Review: What's Working for Your Firm and What Isn't
2022 in Review: What's Working for Your Firm and What Isn't
Clio - Cloud-Based Legal Technology
 
Watch How Family Lawyers Use Clio
Watch How Family Lawyers Use ClioWatch How Family Lawyers Use Clio
Watch How Family Lawyers Use Clio
Clio - Cloud-Based Legal Technology
 
Reclaim Your Time in 2023 with Clio’s Newest Features
Reclaim Your Time in 2023 with Clio’s Newest FeaturesReclaim Your Time in 2023 with Clio’s Newest Features
Reclaim Your Time in 2023 with Clio’s Newest Features
Clio - Cloud-Based Legal Technology
 
How to Grow a Law Firm_ From Startup to Success
How to Grow a Law Firm_ From Startup to SuccessHow to Grow a Law Firm_ From Startup to Success
How to Grow a Law Firm_ From Startup to Success
Clio - Cloud-Based Legal Technology
 
Customer Research: How to Gauge Client Satisfaction
Customer Research: How to Gauge Client SatisfactionCustomer Research: How to Gauge Client Satisfaction
Customer Research: How to Gauge Client Satisfaction
Clio - Cloud-Based Legal Technology
 
Cloud Software: The Key to Staff Success and Satisfaction
Cloud Software: The Key to Staff Success and SatisfactionCloud Software: The Key to Staff Success and Satisfaction
Cloud Software: The Key to Staff Success and Satisfaction
Clio - Cloud-Based Legal Technology
 
How to Generate New Business With Client Reviews
How to Generate New Business With Client ReviewsHow to Generate New Business With Client Reviews
How to Generate New Business With Client Reviews
Clio - Cloud-Based Legal Technology
 
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio - Cloud-Based Legal Technology
 
Key Insights from the 2022 Legal Trends Report
Key Insights from the 2022 Legal Trends ReportKey Insights from the 2022 Legal Trends Report
Key Insights from the 2022 Legal Trends Report
Clio - Cloud-Based Legal Technology
 
Billing Week Stress to Collections Success Webinar.pdf
Billing Week Stress to Collections Success Webinar.pdfBilling Week Stress to Collections Success Webinar.pdf
Billing Week Stress to Collections Success Webinar.pdf
Clio - Cloud-Based Legal Technology
 
Streamline Your Court Interactions With Technology
Streamline Your Court Interactions With TechnologyStreamline Your Court Interactions With Technology
Streamline Your Court Interactions With Technology
Clio - Cloud-Based Legal Technology
 

More from Clio - Cloud-Based Legal Technology (20)

Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
Webinar Slide Deck_ How To Use Google’s Local Services Ads_ The Most Cost-Eff...
 
How Automating Client Intake Increases Client Confidence
How Automating Client Intake Increases Client ConfidenceHow Automating Client Intake Increases Client Confidence
How Automating Client Intake Increases Client Confidence
 
How Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client IntakeHow Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
How Clio Customers Take a Stress-Free Summer: Streamlining Client Intake
 
2023 Legal Trends for Solo Law Firms
2023 Legal Trends for Solo Law Firms2023 Legal Trends for Solo Law Firms
2023 Legal Trends for Solo Law Firms
 
Increase Your Profits While Reducing Burnout
Increase Your Profits While Reducing BurnoutIncrease Your Profits While Reducing Burnout
Increase Your Profits While Reducing Burnout
 
90-Day Goal Setting for Legal Professionals
90-Day Goal Setting for Legal Professionals90-Day Goal Setting for Legal Professionals
90-Day Goal Setting for Legal Professionals
 
Insights from the 2022 Legal Trends Report - Slides.pdf
Insights from the 2022 Legal Trends Report - Slides.pdfInsights from the 2022 Legal Trends Report - Slides.pdf
Insights from the 2022 Legal Trends Report - Slides.pdf
 
How to Refine Your Law Firm Business Model
How to Refine Your Law Firm Business ModelHow to Refine Your Law Firm Business Model
How to Refine Your Law Firm Business Model
 
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
Legal Tech Roundup: Tools and Services Your Firm Needs in 2023
 
2022 in Review: What's Working for Your Firm and What Isn't
2022 in Review: What's Working for Your Firm and What Isn't2022 in Review: What's Working for Your Firm and What Isn't
2022 in Review: What's Working for Your Firm and What Isn't
 
Watch How Family Lawyers Use Clio
Watch How Family Lawyers Use ClioWatch How Family Lawyers Use Clio
Watch How Family Lawyers Use Clio
 
Reclaim Your Time in 2023 with Clio’s Newest Features
Reclaim Your Time in 2023 with Clio’s Newest FeaturesReclaim Your Time in 2023 with Clio’s Newest Features
Reclaim Your Time in 2023 with Clio’s Newest Features
 
How to Grow a Law Firm_ From Startup to Success
How to Grow a Law Firm_ From Startup to SuccessHow to Grow a Law Firm_ From Startup to Success
How to Grow a Law Firm_ From Startup to Success
 
Customer Research: How to Gauge Client Satisfaction
Customer Research: How to Gauge Client SatisfactionCustomer Research: How to Gauge Client Satisfaction
Customer Research: How to Gauge Client Satisfaction
 
Cloud Software: The Key to Staff Success and Satisfaction
Cloud Software: The Key to Staff Success and SatisfactionCloud Software: The Key to Staff Success and Satisfaction
Cloud Software: The Key to Staff Success and Satisfaction
 
How to Generate New Business With Client Reviews
How to Generate New Business With Client ReviewsHow to Generate New Business With Client Reviews
How to Generate New Business With Client Reviews
 
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
Clio App Spotlight: How Clio and Klyant integrate to provide a compliant and ...
 
Key Insights from the 2022 Legal Trends Report
Key Insights from the 2022 Legal Trends ReportKey Insights from the 2022 Legal Trends Report
Key Insights from the 2022 Legal Trends Report
 
Billing Week Stress to Collections Success Webinar.pdf
Billing Week Stress to Collections Success Webinar.pdfBilling Week Stress to Collections Success Webinar.pdf
Billing Week Stress to Collections Success Webinar.pdf
 
Streamline Your Court Interactions With Technology
Streamline Your Court Interactions With TechnologyStreamline Your Court Interactions With Technology
Streamline Your Court Interactions With Technology
 

Recently uploaded

fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
Milind Agarwal
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
USDAReapgrants.com
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 

Recently uploaded (20)

fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 

Security by Design for Law Firms

  • 1. #ClioWeb Security by Design forLaw Firms A Clio& NextpointWebinar Joshua Lenon & Fiona Finn – Clio Julianne Walsh - Nextpoint
  • 2. #ClioWeb • Legal Marketing Specialist at Clio • Bachelor of Civil Law & Masters of Laws (LLM) • @FionaFinn Instructors Joshua Lenon • Lawyer in Residence at Clio • Attorney Admitted in New York • @JoshuaLenon Fiona Finn
  • 3. #ClioWeb Instructors Julianne Walsh • Attorney in Residence at Nextpoint • Attorney Admitted in Illinois • jwalsh@nextpoint.com
  • 4. #ClioWeb Agenda • Securityby Design (5 minutes) • FTC’s regulationof cybersecurity(10 minutes) • 10 Tips for protectingclient datain the cloud (35 minutes) • LegalTechnology SecurityEvolves(5 minutes) • Questions(5 minutes)
  • 6. #ClioWeb Security by Design Formalizesaccountdesign, automatessecurity controls, andstreamlines auditing Phase 1 – Understandyourrequirements. Phase 2 – Build a “secure environment”thatfitsyourrequirementsand implementation. Phase 3 – Enforce the use of the templates. Phase 4 – Performvalidationactivities.
  • 8. #ClioWeb FTC & Cybersecurity FederalTradeCommission(FTC) • Establishedin 1914 by the FederalTradeCommissionAct • Section 5 of the FederalTradeCommissionAct, 15 U.S.C. § 45 grants the FTC powerto investigateand preventunfairor deceptivetrade practices (UDAP Authority) • 50 cybersecurityenforcementactions since 2002
  • 9. #ClioWeb Federal Trade Commission v. Wyndham Worldwide Corp., 799 F.3d 236, (3d Cir. 2015)
  • 11. #ClioWeb LawyerEthical Requirementsfor Security Rule 1.6 Confidentiality • (a) A lawyer shallnot reveal information relating to the representation of a client unlessthe client gives informed consent, the disclosureisimpliedlyauthorized inorder to carry out the representation… • [Comment 18] – ...inadvertent or unauthorized disclosure of information relating to the representation of a client does not constitute a violation if the lawyer has made reasonable efforts to prevent the access or disclosure.
  • 12. #ClioWeb 10 TIPS FOR PROTECTING CLIENT DATA IN THE CLOUD
  • 13. #ClioWeb 1. Start with Security 2. Control Access to Data Sensibly 3. Require Secure Passwords and Authentication 4. Store Sensitive Personal Information Securely and Protect it During Transmission 5. Segment Your Network and Try to Monitor Who is Trying to Get in and Out 6. Secure Remote Accessto Your Network 7. Apply Sound Security Practices When Developing New Products 8. Make Sure Your Service Providers Implement Reasonable Security Measures 9. Put Proceduresin Place to Keep Your Security Current and Address Vulnerabilities That May Arise 10. Secure Paper, Physical Media, and Devices Source: Start with Security, Federal Trade Commission
  • 14. #ClioWeb 1. Start with Security Don’tcollectpersonalinformationyoudon’tneed. No one can stealwhatyoudon’thave. • Collectinformationinstages: potentialclient, client, ex-client Hold onto informationonlyas longas youhave a legitimate businessneed. Securely dispose personalinformationonce there’slongerhada legitimate needforit. • Returnclientfiles at the endof engagements Don’tuse personalinformationwhenit’snotnecessary.
  • 15. #ClioWeb 2. Control Access to DataSensibly Restrictaccesstosensitivedata. Implementpropercontrolsto ensure thatonly authorizedemployeeswith a businessneedhave access • Use job rolesand permissionsto controlaccess • MRPC Rule 1.10ImputationOfConflictsOfInterest Limit administrativeaccess. Tailoradministrative controlsto jobneeds. • Administrative accessis requiredforchanging users& permissions
  • 16. #ClioWeb 2. Control Access to DataSensibly
  • 17. #ClioWeb 2. Control Access to DataSensibly
  • 18. #ClioWeb 3. Require Secure Passwords & Authentication Use a strong password. Your passwordshouldcontain atleast three of the four followingtypes of characters,and preferably all four: Upper case,lower case,numbers and special characters (includingspace) Store passwordssecurely. Don’tmake it easy for passwords tobe accessed. •Havepolicies andprocedures in place to storecredentials securely. Change passwordsregularly. A passwordchangeis recommended every 90 days. •Donot usethe same passwordfor multiple sites. Preventbrute force attacks. Lock outaccounts after a defined number of incorrectpasswordattempts. Protectagainstauthenticationbypass. Address vulnerabilities in authentication mechanisms.
  • 20. #ClioWeb 4. Store & Transmit Sensitive Personal Information Securely Keep sensitive informationsecure through its lifecycle. Data does not stay in oneplace. • Client information shouldbe protected fromcollection through transmission,useanddestruction. Use industry-tested and accepted and methods. All of the certifications listed are usedto gain confidenceandplace trust in a service organization’s systems. • Type 2 SOC 2 certification • ISO 27001 certification • ISO 27018 certification Ensure properconfiguration. Technology is notenough. • Makesureencryption technologies areproperly configured,deployed andupdated or they may be ineffective.
  • 22. #ClioWeb 5. Segment & Monitor Your Network Segmentyour network. Notevery computerinyoursystemneedsto be able to communicate withevery otherone. • Protect particularly sensitive client data by housing it in a separate secure place onyournetwork. Monitor access. Knowwho is accessingyournetwork.
  • 25. #ClioWeb 6. Secure Remote Access to Your Network Ensureendpointsecurity. • Access your& yourclients’security setup • Use ClientPortalsto minimize risks – ABA Formal Ethics Opinion 11-459 – Duty to Protect the Confidentiality of Email Communications with One’s Client Putsensibleaccesslimitsin place. • Only share whatyouneedto withclientsand others
  • 27. #ClioWeb 7. Apply Sound Security Practices When DevelopingNew Products Trainyour engineersinsecurecoding. Followplatformguidelinesfor security. Verify thatprivacyandsecurityfeatureswork. • Trust butverify. Don’ttake security forgranted Testfor commonvulnerabilities.
  • 29. #ClioWeb 8. Make Sure Your Service Providers Implement Reasonable Security Measures Put it in writing. Insist that appropriate security standards are part of your contracts. • The Service Agreement should include terms to abide by attorney-client confidentiality in the Privacy Policy, thereby ensuring that the online data storage provider has an enforceable obligation to preserve confidentiality and security. Verify compliance. Security can’t be a “take our word for it” thing • The Service Agreement should include your right to audit performance records and access daily service quality statistics.
  • 32. #ClioWeb 9. Proceduresto Keep Your Security Current Update and patch third-party software. Outdated software undermines security. • Compromising software for lawyers: InternetExplorer • Prioritize patches, incorporate updates into standard compliance practice. Heed credible security warnings and move quickly to x them. Have a process in place to address security vulnerability reports. • Identify and assess vulnerability reports. • Align combatting team and assets • Notify clients and maintain open flow of information via a clearly publicized and accessible channel.
  • 33. #ClioWeb 9. Proceduresto Keep Your Security Current Think sharedresponsibility betweenusersandvendors, and a consistentapproachof updatingand awareness- there’s no once off solution to ensurefull securityof sensitiveinformation.
  • 34. #ClioWeb 10. SecurePaper,Physical Media, and Devices Securely store sensitive files. If it is necessary to retain important paperwork, take steps to keep it secure. • ABA Model Rules ofProfessional Conduct 1.15(a) – Safekeeping Property Protect devices that store personal information. Keep safety standards in place when data is en route. • Limit the instances when attorneys need to be out and about with sensitive data in their possession. Dispose of sensitive data securely. • Use available technology to wipe devices that are not in use.