Peer to Peer Magazine

Winter 2016

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/765798

Contents of this Issue

Navigation

Page 24 of 83

26 PEER TO PEER: THE QUARTERLY MAGAZINE OF ILTA | WINTER 2016 BEST PRACTICES Skills You Need To Climb the Mountain of Data Challenges Skills You Need To Climb the Mountain of Data Challenges depends on creating an inclusive team that reaches far beyond the legal and IT departments. Establishing appropriate policies and controls can be complicated by the requirements of various regulations, large data volumes, the number of individuals accessing records, new data types and the varied applications found within most organizations. Any legal professional looking to work toward proactive IG must first have the initiative to secure buy-in across IT, information security, risk and business stakeholders and to foster a collaborative cross- department team that can work collectively on building IG goals and programs. Once stakeholders are on board, geing these programs off the ground becomes much more realistic. Involving the board and senior management is key to securing resources and funding. An understanding of security vulnerabilities and how to address them. Figuring out where data breaches happen is critical to preventing them. Employee negligence, a mobile workforce and hacking are the top causes for breaches. One third of all known breaches come from loss of personal devices –– and consider how much easier it is for a criminal to steal a device rather than penetrate an organization's network. Counsel must be aware of the range of risks and work with other IG stakeholders within the organization to manage employees and ensure they understand their dynamic role in maintaining data security. An ongoing program that includes regular training and awareness campaigns is key to educating employees on current threats and how they can modify their behavior to reduce the possibility of a breach. The ability to manage change. Change is difficult for many people, especially for aorneys rooted in traditional methods and resistant to adopting unknown technologies. Understanding how to effectively manage and enable change is essential for anyone looking to drive IG. Writing a data security policy is one thing, but the ability to translate security requirements into operations requires a holistic approach involving people, process and technology. To do this, ensure that business executives are represented on the program's steering commiee, and have metrics and accountability visible at the board level. Sometimes this requires engaging risk First, though, it is important to know what skills aorneys need to get these programs off the ground and how to bolster their abilities to ensure successful projects. Here are some of the skills needed to address data challenges: The initiative to secure collaboration across departments and among key stakeholders. IG initiatives require approval and implementation from stakeholders across the organization; their success by Sonia Cheng Sound information governance (IG) procedures are critical to broader legal, compliance and IT strategies. IG helps maintain compliance, reduce e-discovery costs, streamline large data volumes and bolster cybersecurity. Strategic and documented IG can also be helpful in defending data retention practices against motions for sanctions during litigation.

Articles in this issue

Archives of this issue

view archives of Peer to Peer Magazine - Winter 2016