Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protect Your Information Lateral & Internal Threats- it’s Not Just Hackers!

Similar presentations


Presentation on theme: "Protect Your Information Lateral & Internal Threats- it’s Not Just Hackers!"— Presentation transcript:

1 Protect Your Information Lateral & Internal Threats- it’s Not Just Hackers!

2 Who am I? Alexander Campbell Records Manager for Cohen & Gresser LLP At the end, be sure to live tweet us at #internalthreatsILTA

3 Monitoring movement of information in to and out of your firm is a key element of information security. No magic bullet technology Lateral hires/departures present an opportunity Why are we here? At the end, be sure to live tweet us at #internalthreatsILTA

4 Notification General considerations for intake of lateral hires Records specific considerations for intake of lateral hires General considerations for lawyer departures Records specific considerations for lawyer departures What We Will Cover At the end, be sure to live tweet us at #internalthreatsILTA

5 July 3, 2014 VIA MESSENGER Mr. Big Wig Lawyer Big Law Firm 100 Wall Street New York, NY Re: Client File Transfer (Electronic & Physical Files): Client Name- Client Number Dear Mr. Big Wig: In accordance with your request, we are turning over our physical and electronic files for the above entitled matter(s). This is to confirm that xyz boxes and (1) hard drive will be sent to you via messenger. After the files are delivered, please confirm receipt by signing and dating one copy of this letter and returning it to me via scanned email. Please return the letter to youremail. Sincerely, Records Manager Enclosures (1) I hereby acknowledge receipt of all files detailed on the enclosed index. Name: __________________________________________ Date:_________________________ [Big Wig] Notification: The File Transfer Letter

6 Law school hire Lateral Hire Merger or Acquisition Key Considerations: Intake (Hiring) At the end, be sure to live tweet us at #internalthreatsILTA

7 Conflict and Client/Matter Opening File Integration Training Key Considerations: Intake (continued) At the end, be sure to live tweet us at #internalthreatsILTA

8 Intake Workflow Candidate Lawyer Records Meet with lawyer to discuss file transfer Contact RM at lateral’s former firm Request and receive client authorization letters Receive C/M Number from Conflicts Transport, receive and review lateral files Organize, index & relabel files Storage of personal files allowed Yes Transfer stored files to firm’s offsite vendor Circulate files or shelve in Records Center Index personal files under administrative number No End Assist with opening personal warehouse account End

9 Three key reports for departing lawyer: Originating lawyer client-matter list File check out report for departing lawyer A report of personal matter files Key Considerations: Departure At the end, be sure to live tweet us at #internalthreatsILTA

10 Departure Workflow Departing Lawyer Records Produce and review list of files to departing attorney Identify clients that will leave the firm Obtain release letters from clients Receive letters and pack onsite files. Retrieve offsite files. Identify new responsible attorney for remaining clients Facilitate physical relocation of files to new responsible lawyer. Update databases. End Partner review of file for work product and confidential info Partner authorizes release End

11 Key Considerations for Intake of new lawyers Workflow for intake of new lawyers Key considerations for lawyer departures Workflow for attorney departures What We Covered At the end, be sure to live tweet us at #internalthreatsILTA

12 Lawyer mobility is here to stay! Information security is a process NOT a technology! Have a plan and stick to it! Final Analysis At the end, be sure to live tweet us at #internalthreatsILTA

13 T A Bonus Recipe for World’s Best French Toast 1.¾ cup of milk 2.Two eggs 3.Pinch of vanilla extract 4.Pinch of salt 5.Stir 6.Six slices of challah bread 7.Soak each side of bread 8.Cook on skillet with a bit of veggie oil until brown on each side. 9.Serve with Vermont Maple syrup and voila best French Toast ever At the end, be sure to live tweet us at #internalthreatsILTA


Download ppt "Protect Your Information Lateral & Internal Threats- it’s Not Just Hackers!"

Similar presentations


Ads by Google