Peer to Peer Magazine

Fall 2015

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/588021

Contents of this Issue

Navigation

Page 34 of 79

PEER TO PEER: THE QUARTERLY MAGA ZINE OF ILTA 36 • Surface the Most Relevant Information: A Google-like search experience that's based on context • Offer Just-In-Time Information: Videos, downloadable documents and mini-courses that highlight a concept or solve a specific problem • Trigger Exploration and Discovery: Suggestions on topics you might like based on previously accessed information Firms are also leveraging mobile learning as an extension of end-user support. Having small, mobile-ready tutorials, videos and quick references available right from the mobile device ties the technology directly to performance support. One firm reported that they were seeing lawyers "more likely to engage in learning if it's available right on the device." As mobile learning introduces new use cases for imbedded performance support and informal learning via social media and collaboration channels, firms need to rethink the role of the learning management system. It must evolve from a course repository and classroom administration tool into an integrated learning portal that captures and reacts to requirements for a truly personalized learning experience. SECURE THE DEVICE AND DATA Establishing policies regarding the treatment of a lost or stolen device and how devices are to be managed when an employee leaves the firm should be integral in the firm's mobile strategy. "In the past, all devices were provided by the firm. Our typical protocol for dealing with such events was to remotely perform a reset or data wipe on the device," one firm reported. Whether provided by the firm or the employee, most mobile devices contain a mix of personal and business data. Businesses do not own or have complete control over all data on personally owned devices. With mobile applications, sensitive data are at risk of being uploaded and stored in unapproved, unsecure applications. Security is critical not only with device loss or theft but also in terms of what data are being transmitted over the air. While data encryption can provide some means of protection, it cannot prevent users from unintentionally or maliciously posting sensitive data to locations outside the firm's control. Given these risks, most firms now leverage mobile device management (MDM) software and the capabilities provided by "secure containers" to manage firm-specific data such as email, calendar and contacts. "We've implemented an MDM, and everyone must be enrolled in order to use their device for any type of work, including access to email," reported one firm. IT departments must carefully select a mobility solution that allows them to: • Remotely manage or destroy ONLY firm data. Even with a "hold harmless agreement" signed by the employee, deleting or damaging employee data through a remote full device wipe puts the firm at risk. • Separate firm data from personal data through containerization. This includes contacts, calendar, email and browsing or intranet access. Comingling of data should always be prevented through a combination of mobile technology and firm policies. • Enforce secure access to firm documents, resources and legacy applications. One firm noted, "We provide instructions for mobile device setup and publish a weekly mobility-focused newsletter with tips for using the device, including settings to extend battery life and the use of SIRI and voice recognition on the device." Balancing personal freedom, flexibility and firm liability is difficult. It requires consideration of firm policies and standards for accessing firm resources, and mobile device management software is a must-have to ensure secure access. While there is no single solution for deploying a BYOD or COPE program, all firms agreed that advances in wireless networking protocols and location technologies have made mobile access more secure, more private and a critical enabler to today's mobile workforce. We've implemented an MDM, and everyone must be enrolled in order to use their device for any type of work, including access to email. FEATURES

Articles in this issue

Archives of this issue

view archives of Peer to Peer Magazine - Fall 2015