From Progressive Law Practice:
Since legal matters necessarily involve the client sharing sensitive financial and personal information with their lawyer and support staff, the attorney should ensure the client understands:
- Who from the firm may communicate with the client to obtain the information
- Appropriate methods for disseminating information to the law firm
- The steps the lawyer expects the client to take to ensure they do their part to protect the data
- That they should immediately inform the attorney if, somehow, the confidential data was inadvertently or improperly shared with outsiders
Steps Lawyers Can Take to Protect Client Data
Recently, Internet giant Yahoo! announced that millions of its users had their accounts hacked. Despite the multitude of precautions Yahoo! puts in place to prevent such infiltrations, cyber hackers still succeeded at infiltrating Yahoo’s database. However, that reality doesn’t necessarily mean lawyers are helpless when it comes to protecting their client’s sensitive information.
According to Craig Petronella, an IT Cybersecurity Expert and namesake of Petronella Computer of Raleigh, North Carolina, there are steps members of the legal community can take to thwart cyber-hackers.
They include:
- Using as many forms of encryption as possible
- Installing and using keystroke encryption
- Providing ongoing staff security awareness training and testing
Moreover, despite the constant interaction a law firm’s administrative team has with private client information, they aren’t accountable to retain that data privately as is the lawyer. The Rules of Professional Conduct clearly state the lawyer must “oversee and ensure the staff is practicing the same level of confidentiality” as the attorney does, Lenon says.
One method to accomplish that is for the lawyer to use security software that monitors and tracks access to the confidential information, Petronella suggests.
Clio’s ‘Firm Feed’ software tracks changes made to a case file so the managing partner can easily track and review amendments made to it, Lenon says. The software also details who has been accessing and viewing data contained within a file, another way to ensure that prying eyes haven’t gained improper access.
A law firm can be proactive at protecting confidential client data and educate their clients about doing their part to ensure private information stays that way, but then blow it all by what Lenon calls “giving away the keys.” An example of that is writing passwords on post-it notes and sticking them on computer monitors where anyone can see them, he says.
Another ways lawyers let their guard down when it comes to protecting client data is by using their smartphones to communicate confidential information. “Did you know your smartphone stores every keystroke you’ve ever typed?” poses Petronella.
And, he notes, that memory bank is not being created by a sinister Trojan virus or nefarious key logger. Instead, it is simply the database the phone relies on to supply AutoComplete results, he says.
“You can’t dig in and see the keystrokes yourself, but external software (malicious apps) can read back that database and thus read out every text or email you’ve sent and, more importantly, every password you’ve ever typed,” Petronella says.