The quarterly publication of the International Legal Technology Association
Issue link: https://epubs.iltanet.org/i/80353
best practices transfer platform. These workspaces are typically positioned as a secure alternative to consumer-based file-sharing services and support the need for attorneys to collaborate with clients and outside counsel to share and exchange matter-related documents over an extended period of time. Capabilities include procedures for inviting participants and assigning access permissions, document versioning, and sharing notes and comments. Cloud Service Gateways A cloud service gateway (CSG) offers a different approach. This gateway enables firms to share their internal IT resources and networks beyond their firewalls in a controlled and secure manner. Rather than having to deploy different individual apps on a mobile device to support various applications, CSGs provide a single point of access to all business applications — whether they reside in a data center or in the cloud — on any wired or wireless device. The CSG authenticates users before providing access to authorized applications. And since a CSG provides access to enterprise resources and controls the distribution of networking and computing resources, it can also be a single point of delivery for new security measures, such as distributed policies, virus protection and remote access. Making BYOD Management Work While technology and individual firms' policies will play a key role in effective control and management of mobile device deployment in the legal environment, the critical success factor remains education to ensure responsible use by attorneys and staff. Silas McCullough, mindSHIFT's General Manager of Legal Professional Services, offers a unique insight based on BYOD issues: "While some of our customers are early adopters and are taking proactive steps to plan and deploy mobile device management strategies, the majority have yet to address BYOD in a controlled and comprehensive manner. Some have a wait-and-see attitude. Others are taking a piecemeal approach, provisioning selected mobile device applications and supporting specific mobile devices. There is also a third group that will only support firm-supplied devices. However, the demands of the attorneys to support their own devices will trump any efforts by legal IT to dictate policy or technology. And, beyond technology, the ultimate success of any mobile device strategy will hinge on support of strong policy education and enforcement at the senior management level. Something as simple as educating mobile device users regarding steps to be taken when their device is lost or stolen can mean the difference between sensitive client data being protected or compromised." Looking for a macro package that doesn't contain a lot of unnecessary features? The issue of managing all mobile devices, both user-owned Key Features and Functionalities • LawSuite is easy to customize, quick to install and simple to learn • Offers an affordable pricing structure and simplified licensing model • Drastically reduce document production hours with our coordinated set of tools • Templates, shortcuts, document ID stamps, document cleanup tools, styles and numbering, table of contents, table of authorities, and more • Complimentary training plus generous support and upgrade plan • Access to library of MS Word training videos for all LawSuite users • LawSuite community resources including newsletter, webinars and technical assistance "…we just love LawSuite. Best decision we ever made." IT Manager, Buffalo, NY Contact us for a Demonstration of LawSuite: Email: rich@lawsuitemacros.com or Call: 720-260-5868. The Quadrant Building Denver Technological Center 5445 DTC Parkway, Penthouse 4-25 Greenwood Village, CO 80111 Web: LawsuiteMacros.com Charlie Magliato, the Legal Program Director for Biscom, is a seasoned IT professional with more than 30 years of experience in application development, IT project management, business development, and channel and direct sales. He can be contacted at cmagliato@biscom.com. and firm-supplied, is clearly one that extends beyond tracking inventory and basic security. It requires a comprehensive plan that starts at the top with management buy-in to firmwide policies relating to usage, sanctioned apps, access to corporate data, and auditable procedures to protect sensitive client data in the event of stolen or lost devices. Regardless of the technology used, these strategies will be less than successful without a formal process to educate users regarding appropriate use of mobile devices and their responsibility to act in the best interest of the firm and its clients. LawSuiteAd.indd 1 26 Peer to Peer 7/28/12 10:55 AM