Peer to Peer Magazine

Spring 2017

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/810339

Contents of this Issue

Navigation

Page 78 of 79

Ipsam, to ea num ex eaquid et aut mo quatur apidelique mo et escia de veliquia nectemp oreperu mquibus. Amusape ligenimpore vidis eveles doluptatist, ipsum restinvenim facea seque natur alia verit as ipsaerum aut explibus aut omni beatempos dent ut rem. Ut eatur si asperupta se sa iume plabo. Maximus torepero ex expliquam hilitat mo molorest, autemodit eatus, nobissimaio quide audipsum quo ipsam laut quiatistius et lique poreperiae. Xima debist qui duciis serunt ati ut ommolest hit, quaeptibuste pratiis re, con pro blab imagni atur aut eatur sequas dellaccum, officip sandam, volum et vid most, untiat optaepe riaturi onsequis poria di restiur, conecta cum quatem unt, utas nossim utatem utem quo cuptas alia dis expedit ea alibus, sed ut moluptassunt voloritatur sim elescimene digent il ipsunt paris sae nosandi quis maiorepuda ipsapiendae. Itae eatiorp oriorro cum que dolupta eraest eniaepu daectoris verum esequundae. Ga. Lenda volestiaspe liquis ipsant aligenis dipitae catios si dolut est, coresequatio blaborrum aut odis asim el inci ut rem voles in resti offic tem quas quissimus elenimoles exerunt vella et moluptium re nonseque voluptur ant qui omnihiliquo vendae nihit aut venihil imus re omnimi, conet, soloresequi reprecus sinvero tent adiossiminum harum saepero is simagnatium elentur? Qui tem am sapicid qui corrum que dolupient ipsundi sciendem doluptae voluptat verro essi id ut voluptatum quatibeariam reped magnis volenim ustios voluptu reperchitae laborati ut quos essitem et optioris undit, est, conet quod estio consequ untessit venis si blam quis repudam dolum faccus molectatiis ex et pos imuscil id quodit ventia in re, et fuga. In pa qui recus rehent doluptios ditatur alis comnim ese plaborem endisquam commolu ptatur rehenist, officiatem volecuptate dolum, omnia paris quas ut excea nobis magniati rera corit estionse omniam facilicipsum ipsae event qui intia corem delessu ntumquam restiis im incilignate quam alibus, ut faccus rerions editio. Ist, occum lab inis aut que cus, suntur, cus. Ore volupti oriores cillecum ipsust reperum nemporeseque modit, aspidunt offictas velestios sa aliti asimillorem quuntor anditat urererepedit aute ad ma sequis sinumque desti rat. Exerferro etur? Qui del iducia nus sum id quo cus. Od ut acea velentet a vid excerat istrum exerfero maximpo rereprovit ratus, offic temporibus, conseruptata vitia volores re sed ex eatur? Nonsequae periae commoll aborerro consect emquam excearum nitis sitium et lacit, volorum reiundus res eatur, sunt. Um et plat omnimporion reperoritem fuga. Tem iusae. Aborene vendus quibus endita volut il magnia veligeniam estis nate voluptae explabo ribusam quias et quidunt, tecti corrovi duciissuntia debis pla solut ea di unti optas doluptur, omnihit aliquistis aut eum alist labo. Ita volupitatem quo etur reprorr umquam eium exces reptatestius adi sam nonsenis dem autecaboria net, sitibeat. Um et aborepturia cus, illaborem explatur rehendant eos sincias pellaut im estrum velit volest, sequi duntiae dolestiis antur aut odisim quas intorerores sumquae rrorpossitis conseque int dust audam que voluptatur, conse soluptas porum quiae oditis dellecto optatectem quo expeditatur, con et et et volorese eos escienienis quam, sa cus maior sus autatio. Uptia derrum nos sincipsam voluptiore endae nonserferum dendiorest, se plabora testrument magnim eossinv erferi dolut laut et aborepro ea perum essintest int aceperum vendelecatem unt eos endus. Otae dolut prae nectas ex et voloritatur, estis el moluptatur? Ostemolo es et excest, cus, sae modistia venim anisti voluptatem quam nus pe antota conse porempo reictatecto erferspiet hariae parias a venditis es vere volor sequi optat archicias aut laccae proressi ut odi blaboreius. Article TitleLatempos temperatem que occus verem. Faccullabor Intro paragraphBea apedigenda dus noste alia quia volume omnis con nienis dite suntur, nem harchilibus que sitaque non nullorum ut lam, consequatem quid quuntur? Qui re, nus modit ad ea quasi duciis et quamendae nossustem untinve licilis itatur sit odioresequos nos none estintiae. Por sit dita nonserovid ut aboreria desequi author byline 80 PEER TO PEER: THE QUARTERLY MAGAZINE OF ILTA | SPRING 2017 The benefits of adopting more robust risk management policies for internal functions have become more apparent. Firms that traditionally have not prioritized risk management are finding that embedding risk sensitivity into a variety of firm policies provides real benefits, including less exposure to questionable maers and reduced data loss. Information Governance and Security Firms are oen asked to respond and even commit to information governance standards dictated by clients. IT staffing resources that are aligned with the risk management function are intimately familiar with relevant firm policies and protocols, making them beer prepared to respond to or negotiate with clients. Any gaps in or exceptions to expected security need to be investigated and rectified as quickly as possible. This is made simpler when IT is integrated into the risk management function. Equally important is the development of sensible retention policies for client and maer information. A firm's data are continually at risk of a security breach, and excising data that no longer have a business use helps mitigate that risk. It is also essential to control the sharing of information outside of the firm, which is one of the greatest areas of security vulnerability. There is a strong business case for limiting access of information to only what is necessary for a particular user. Policies like these can be more easily implemented when IT is already involved with the risk management function. Application Development and Support Firms may utilize a combination of commercially available soware plus custom databases and applications to manage all their data, and IT resources Sophisticated information technology operations are dedicating resources to internal business functions, including risk management, for the detailed technical work these operations require. by Harley Kasha and Aaron Sternick of InOutsource Reinforce Risk Management are required to support the daily use of these products. IT workers embedded within the firm's risk management function will be familiar with the applications and can offer immediate support. Ideally, they would also perform the majority of regular upkeep, upgrades and customizations. This reduces reliance on outside vendors and accelerates delivery of new features and functionality. Integrations Information regarding clients, maers and parties involved in the business intake process propagates out to multiple firm systems, making IT's task of maintaining a "system of record" for core data, whether on premises or in the cloud, increasingly complex. Systems once maintained in hard copy format are now maintained electronically, adding a whole new layer of IT responsibility in ensuring that systems remain interconnected and integrations are functional. User Support When users do not have full knowledge of business processes or soware best practices, they can be inadvertent sources of risk. Aorneys need to understand their firm's risk management policies, and they need help in understanding the soware that enables fulfillment of those policies. These users will inevitably require technical support in their day-to-day usage. In most firms, the risk management function is not equipped to handle these calls, so the help desk or other support personnel need to be aware of these policies. Business Intelligence With the volume of data involved in risk management decisions, metrics reporting helps streamline processes and ensure all policies are followed. The human and technology paerns provided by these reports allows management to make effective operational decisions. Having IT personnel on hand who are familiar with the functioning of these metrics can make it easier to change and add them to follow up on areas of potential risk. Reinforcing Risk Management When it comes to risk management, IT must go beyond responding to articulated requirements. IT in the modern law firm must be intimately involved in operational decisions and highlight the technical aspects of emerging areas of concern. P2P EXTRAS Reinforce Risk Management

Articles in this issue

Archives of this issue

view archives of Peer to Peer Magazine - Spring 2017