Hybrid Security Model - Prosperoware · • Slideshare: Rethinking Matter Centricity •...
Transcript of Hybrid Security Model - Prosperoware · • Slideshare: Rethinking Matter Centricity •...
Hybrid Security Model
The first step to better
security and confidentiality
It’s the perfect storm
Law firms possess incredibly valuable information
The Internet fuels the growing threat by hackers
80 major law
firms were
hacked in 2011
Clearly, we are
not doing enough
to secure our
electronic files.
If you’re a
typical law firm
Only 10 matters
out of 5,000 are
walled off from
the general firm
for confidentiality
purposes
Which means that . . .
Hackers potentially have access
to most of the firm’s content
Including valuable trade secrets
Making every
file confidential
is too big a first
step
Why the pushback? Making matters confidential
Breaks down the document
production process
Hampers knowledge
management
Introducing the Hybrid Security Model
Public: work-in-process (firm-authored content)
Confidential: third-party documents and email
Hybrid Security ModelBalances
The firm’s need to mitigate risk
The professional’s need to work effectively
To make the
Hybrid Security
Model work
You need to
remove the IT
bottleneck
Designate an
owner for every
matter
Put ownership of the
electronic file into the
hands of the people who
know the matter best
Responsible lawyer
and staff
• Paralegal
• Secretary
• Clerk
Enable users to
easily secure a
folder to the entire
matter team
Support privacy laws and
confidentiality policies
without IT support
LEARN MORE
• Printable brief: Hybrid Security Model
• Slideshare: Rethinking Matter Centricity
• Slideshare: Understanding the Legal Content Lifecycle