Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Much ink has been spilled in recent years about information security, hacker exploits and hardware and software products used to thwart hackers. Not a single day goes by without news pertaining to the discovery of vulnerabilities in the software we use and cherish, and to hacker exploits affecting the companies we use in our daily lives. Compromises at JP Morgan Chase, Target, Home Depot, Ebay, Adobe and Apple, to name a few, have led to the leakage of hundreds of millions of records. These infractions lead to billions of dollars of aggregated losses and can be financially devastating to an organization. A 2014 study by the Ponemon Institute, for example, puts the cost of the average data breach at $5.9 million dollars and the cost per record of a breach in the U.S. at over $200. See, “2014 Cost of Data Breach Study: United States (May 2014).”'
The legal industry has been a late comer to the information security frenzy, but the situation has changed over the last 18 months, driven by corporations' realization that law firms and the legal ecosystem orbiting around them has access to some of their most sensitive data. This realization triggered a series of security audits targeting law firms and, in some cases, e-discovery vendors. Corporations spend millions of dollars on information security to build a defensive dome around their data (JP Morgan, for example, announced to its shareholders that it spent $250 million on information security in 2014), and their angst about the safety of that data when it resides on third-party networks is therefore understandable.
The one discipline that is increasingly under the microscope of Chief Information Security Officers (CISO) is e-discovery, where terabytes of some of the most sensitive corporate communications leave the relative safety of the corporation's defensive perimeter and are touched by myriad legal services providers spanning the EDRM continuum. Providing the tightest security possible to every step of this process is no longer optional. Service providers must implement stringent security protocols or risk losing their largest corporate clients.
This article will focus on the key factors to effectively maintain data security during the document review phase of e-discovery, and in particular, securing document review centers against malicious and inadvertent data leaks.
The Inherent Risks in Document Review Centers
Document review centers raise unique security concerns for several reasons, including, but not limited to the following.
Large numbers of personnel accessing the data.
Document review projects may employ hundreds of (often) transient attorneys, and each individual poses a potential insider threat through the voluntary or accidental disclosure of data. The well-publicized data leaks caused by Pfc. Bradley Manning and Edward Snowden serve as ominous warnings of the potential damage caused by insider threats. This situation can be further exacerbated by the fact that temporary employees may not feel the same obligation to protect their employers' data, nor will they likely face the same negative consequences of doing so (harm to reputation and career growth) as permanent, longer-tenured employees.
Hundreds of endpoints accessing the data.
Document review centers are equipped with hundreds of “endpoints” (in this context, a computing hardware device that is capable of communicating on a data network, such as desktop or laptop computers, smart phones, tablets, thin clients and printers) used by attorneys and other review staff to perform their work. Each one of these endpoints constitutes a potential data tap allowing for the extrusion of the data being accessed. The larger the number of endpoints, the higher the likelihood of a breach.
Lack of funding for cybersecurity.
The document review industry is becoming increasingly competitive, and profit margins are often razor thin. This translates into a reluctance to invest in anything not deemed absolutely necessary for conducting the review. Information security is often the first victim of this lack of funding, making document review centers an easy target for breaches.
Practical Defensive Measures
In order to mitigate the security risks inherent in document review centers, a number of measures can be taken that, if properly implemented, will significantly reduce the risks of data leakage. It is important to note that these measures are in many ways interdependent and must be implemented systemically in order to create the proper security shield.
The following is a look at the critical aspects of security: personnel, physical location, end-point, network and software applications.
Personnel Security
In order to mitigate the risk of insiders (document reviewers and other support staff) serving as the source of willful or inadvertent security leaks, the following steps should be taken.
First, conduct extensive background checks, including criminal, educational, employment and references, utilizing both the internal HR department and a reputable outside agency in order to identify past occurrences of unethical behavior and assess the employee's potential for engaging in subsequent offenses. Such checks, while necessary, do not guarantee the integrity of the personnel. It is worth noting that both Pfc. Manning and contractor Snowden had elevated government security clearances that were achieved through (presumably) thorough checks.
Second, mandate that all personnel sign enforceable confidentiality agreements. Such agreements serve as a moderate deterrent and, perhaps more importantly, as a reminder of the employee's confidentiality obligations.
Third, implement information security awareness training conducted by qualified personnel with the goal to prevent personnel from being an unwitting contributor to a security breach.
Physical Security
Physical security helps prevent data breaches through physical means, or through a combination of physical and other technical means. When establishing a document review center, a data security team should:
Endpoint Security
The endpoint, which typically consists of a PC, is one of the most utilized vectors for data breaches. It is therefore essential to protect a review center's endpoints through a wide variety of measures, including:
Network Security
Since the network is the most commonly used conduit of malware and data exfiltration, it is a vector that must be carefully secured and monitored. The following measures should be considered:
Application Security
The application layer is the final layer of security that must be properly configured and protected. The following measures will ensure a secure application layer and complete the shield defending the document review center:
Security Audits
Once these security measures are in place, they must be regularly audited to ensure their efficacy. A robust audit program will consist of frequent internal audits by an audit group that is both qualified and distinct from the team that implemented the security measures, in order to prevent potential conflicts of interest when identifying lapses in adherence to security protocols. Best practice dictates a separate reporting structure for the security audit group and IT.
Additionally, periodic third-party audits that include vulnerability assessments and penetration tests (VAPT) provide a non-vested opinion of the review center's security posture. Rotating the third-party conducting the audits will reinforce the benefits of such exercises.
Conclusion
The above measures, if properly implemented, will go a long way in securing any document review center and will provide peace of mind to the clients who are entrusting some of their most sensitive data to the document review service provider. The measures described above are onerous, especially to smaller organizations, both in terms of capital and operational expenses, but they are essential in providing corporate data the level of security needed when it is being accessed outside of the relative
Much ink has been spilled in recent years about information security, hacker exploits and hardware and software products used to thwart hackers. Not a single day goes by without news pertaining to the discovery of vulnerabilities in the software we use and cherish, and to hacker exploits affecting the companies we use in our daily lives. Compromises at
The legal industry has been a late comer to the information security frenzy, but the situation has changed over the last 18 months, driven by corporations' realization that law firms and the legal ecosystem orbiting around them has access to some of their most sensitive data. This realization triggered a series of security audits targeting law firms and, in some cases, e-discovery vendors. Corporations spend millions of dollars on information security to build a defensive dome around their data (
The one discipline that is increasingly under the microscope of Chief Information Security Officers (CISO) is e-discovery, where terabytes of some of the most sensitive corporate communications leave the relative safety of the corporation's defensive perimeter and are touched by myriad legal services providers spanning the EDRM continuum. Providing the tightest security possible to every step of this process is no longer optional. Service providers must implement stringent security protocols or risk losing their largest corporate clients.
This article will focus on the key factors to effectively maintain data security during the document review phase of e-discovery, and in particular, securing document review centers against malicious and inadvertent data leaks.
The Inherent Risks in Document Review Centers
Document review centers raise unique security concerns for several reasons, including, but not limited to the following.
Large numbers of personnel accessing the data.
Document review projects may employ hundreds of (often) transient attorneys, and each individual poses a potential insider threat through the voluntary or accidental disclosure of data. The well-publicized data leaks caused by Pfc. Bradley Manning and Edward Snowden serve as ominous warnings of the potential damage caused by insider threats. This situation can be further exacerbated by the fact that temporary employees may not feel the same obligation to protect their employers' data, nor will they likely face the same negative consequences of doing so (harm to reputation and career growth) as permanent, longer-tenured employees.
Hundreds of endpoints accessing the data.
Document review centers are equipped with hundreds of “endpoints” (in this context, a computing hardware device that is capable of communicating on a data network, such as desktop or laptop computers, smart phones, tablets, thin clients and printers) used by attorneys and other review staff to perform their work. Each one of these endpoints constitutes a potential data tap allowing for the extrusion of the data being accessed. The larger the number of endpoints, the higher the likelihood of a breach.
Lack of funding for cybersecurity.
The document review industry is becoming increasingly competitive, and profit margins are often razor thin. This translates into a reluctance to invest in anything not deemed absolutely necessary for conducting the review. Information security is often the first victim of this lack of funding, making document review centers an easy target for breaches.
Practical Defensive Measures
In order to mitigate the security risks inherent in document review centers, a number of measures can be taken that, if properly implemented, will significantly reduce the risks of data leakage. It is important to note that these measures are in many ways interdependent and must be implemented systemically in order to create the proper security shield.
The following is a look at the critical aspects of security: personnel, physical location, end-point, network and software applications.
Personnel Security
In order to mitigate the risk of insiders (document reviewers and other support staff) serving as the source of willful or inadvertent security leaks, the following steps should be taken.
First, conduct extensive background checks, including criminal, educational, employment and references, utilizing both the internal HR department and a reputable outside agency in order to identify past occurrences of unethical behavior and assess the employee's potential for engaging in subsequent offenses. Such checks, while necessary, do not guarantee the integrity of the personnel. It is worth noting that both Pfc. Manning and contractor Snowden had elevated government security clearances that were achieved through (presumably) thorough checks.
Second, mandate that all personnel sign enforceable confidentiality agreements. Such agreements serve as a moderate deterrent and, perhaps more importantly, as a reminder of the employee's confidentiality obligations.
Third, implement information security awareness training conducted by qualified personnel with the goal to prevent personnel from being an unwitting contributor to a security breach.
Physical Security
Physical security helps prevent data breaches through physical means, or through a combination of physical and other technical means. When establishing a document review center, a data security team should:
Endpoint Security
The endpoint, which typically consists of a PC, is one of the most utilized vectors for data breaches. It is therefore essential to protect a review center's endpoints through a wide variety of measures, including:
Network Security
Since the network is the most commonly used conduit of malware and data exfiltration, it is a vector that must be carefully secured and monitored. The following measures should be considered:
Application Security
The application layer is the final layer of security that must be properly configured and protected. The following measures will ensure a secure application layer and complete the shield defending the document review center:
Security Audits
Once these security measures are in place, they must be regularly audited to ensure their efficacy. A robust audit program will consist of frequent internal audits by an audit group that is both qualified and distinct from the team that implemented the security measures, in order to prevent potential conflicts of interest when identifying lapses in adherence to security protocols. Best practice dictates a separate reporting structure for the security audit group and IT.
Additionally, periodic third-party audits that include vulnerability assessments and penetration tests (VAPT) provide a non-vested opinion of the review center's security posture. Rotating the third-party conducting the audits will reinforce the benefits of such exercises.
Conclusion
The above measures, if properly implemented, will go a long way in securing any document review center and will provide peace of mind to the clients who are entrusting some of their most sensitive data to the document review service provider. The measures described above are onerous, especially to smaller organizations, both in terms of capital and operational expenses, but they are essential in providing corporate data the level of security needed when it is being accessed outside of the relative
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
Latham & Watkins helped the largest U.S. commercial real estate research company prevail in a breach-of-contract dispute in District of Columbia federal court.