Digital White Papers

2014 April: Enterprise Content Management

publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/306297

Contents of this Issue

Navigation

Page 27 of 35

also encrypts the data stored on it. Although this is the least secure method, as there are no controls over how a user handles enterprise content, your firm might conclude it is an acceptable solution for exposing content that presents a relatively low level of risk if compromised. For example, if you provide access only to static information in a format that cannot be readily emailed or is unusable without your enterprise applications — such as hours recorded, static IP docket information or non-editable contact management system information — your firm might conclude the benefits of access outweigh the risk of unauthorized appropriation. • Client Concerns: As previously mentioned, learn what your clients require with respect to mobile devices. Some clients specifically prohibit content in their matters being made available on any device not owned or otherwise under the direct control of the firm. • International Considerations: Mobile devices used in certain regions could face malicious penetration risks much greater than devices used only within the U.S. Depending on the practice mix of your firm, you might have to develop separate policies based on region of use. For example, devices used in susceptible regions could have only containerized apps made available, with highly complex passcodes required. Some firms provide single-use "burner" devices for persons traveling to certain jurisdictions; in such situations, you might determine to expose no enterprise content on those devices. 9. SCHEDULE PERIODIC TRAINING Training is a component of any new software deployment, and your mobile enterprise content initiative is no different. It's important to develop a plan for periodic training on the applications you deployed and how they can benefit the firm. It can be difficult to focus on periodic training when you have moved on to the next project or initiative, but your clients' or firm's security requirements might force the issue for you. Many privacy and security programs require periodic retraining; leverage that to your benefit. Trainers should be able to provide the following information in 15- or 30-minute presentations (live, webinar or podcast): • New Features Associated with App Updates: You might be surprised how many people do not update their apps, and not doing so might expose security holes if you do not push down automatic app updates. Providing an update on an app's new features can influence users to update the app. • New or Updated Client Requirements: Let people know if there have been changes related to the access to and use of enterprise content on mobile devices. • Tips and Tricks: Everyone likes to know how to do things better and faster, so share effective uses of the apps. • Success Stories: Report how use of the mobile tools supported a business goal or provided a concrete benefit to the firm (new client, cost reduction, client satisfaction, etc.). 10. PUBLICIZE YOUR INITIATIVE! The effective use of smartphones and tablets is perceived as progressive, so publicize your initiative and the benefits it brings to the firm. It is always wise to demonstrate the value of your technology, and an enterprise content mobility project provides a highly visible solution that's literally in your users' hands. There are many creative ways to show the value of your initiative without appearing self- promoting. Use the mobility tools during meetings, leverage selected user support calls to suggest tasks that be can handled on mobile devices, or circulate a monthly tip highlighting a feature of your apps. By keeping your initiative in front of all users, not just decision-makers and funders, you can show the true business value of your efforts. ILTA WHITE PAPER: APRIL 2014 WWW.ILTANET.ORG 28 10 STEPS TO AN EFFECTIVE MOBILE ENTERPRISE CONTENT STRATEGY

Articles in this issue

Links on this page

Archives of this issue

view archives of Digital White Papers - 2014 April: Enterprise Content Management