Law office technology aiding data privacy, document security efforts

Law office technology aiding data privacy, document security efforts

Date: Jul 24, 2012

Call it Law & Order: IT Unit. With mounting concerns in the legal field over data privacy and document security, some CIOs are turning to targeted law office technologies to regulate risk and increase cost efficiencies.

In this video interview, filmed at the Fusion 2012 CEO-CIO Symposium in Madison Wis., Site Editor Wendy Schuchart sits down with William Caraher, CIO at von Briesen & Roper, s.c., in Milwaukee, Wis., to discuss the challenges he's faced in implementing legal technologies at his company.

Caraher stresses that law office technology gurus should invest in data security and privacy services in order to protect confidential information concerning legal cases and enhance trust in client relationships. Caraher also discusses how his firm is using technologies such as open source software and enterprise social media to further its legal-aid efforts.

Read a partial transcript from this interview below, and watch the video to learn more about how a strategic approach to law office technology is benefiting Caraher's firm.

Wendy Schuchart: Are there things that a CIO at a legal firm needs to be aware of that other CIOs at different types of companies might not have to worry about?

William Caraher: Yes. At a law firm, there are many other issues that a lot of CIOs don't have to worry about -- mainly, privacy of our client data and client relationships. It's not only for good client service, but it also could break the law if our attorneys divulge information about our clients, about their data, about their cases. So it's really important to keep data privacy paramount in our organization.

What kind of things have you been doing towards that end for data privacy?

In a law firm, we have specialized document management systems, so that even when you do a keyword search across the enterprise for a contract or a firm name, we have restrictions in place so that average users can't stumble upon protected data. So specialized document management systems and then even courtroom technology is very important as well. A lot of times, attorneys are going face-to-face with other attorneys who are equally knowledgeable about the law and about the case at hand. But what we have found is that technology has allowed them to put on a better presentation to a jury or to a judge. It's easier to digest the information when it's presented in a graphical way or if it's a presentation mode instead of just handing them copies of paper with evidence. So, we found that many of our attorneys embrace our technology and use it in the courtroom and have been very successful in it.

You've recently moved [your firm's] intranet to an open source platform. What were your key learnings from the experience?

When we set out to re-do our intranet, we had a really specific design in mind. I went to the market to say that I wanted to look at the universe of options for intranets, and I pretty much narrowed it down to four choices. So it was SharePoint, which most people go to; or developing a custom intranet solution from the ground up; or open source; and then the idea of a hosted solution, so something like ThoughtFarmer, where you would actually take your intranet and host it on a separate server and then all of your employees would connect to that.

Let us know what you think about the story; email Wendy Schuchart, Site Editor. For midmarket IT news and updates throughout the week, follow us on Twitter @ciomidmarket.

More on Security and risk management for Small Business

  • canderson

    BYOD and security: A checklist for mobile democratization, deployment

    VIDEO - `Is your organization squarely at the intersection of BYOD and security? In this webcast, analyst Jack Gold provides a checklist for mastering mobile.
  • canderson

    Seven steps to enterprise mobility security

    VIDEO - In this webcast, analyst Jack Gold provides a plan for CIOs looking to protect endpoints and shore up enterprise mobility security management.
  • canderson

    What is endpoint security, and how do you shore up the weakest links?

    VIDEO - Why is endpoint security so important to today's CIO? In this webcast, consultant Jack Gold discusses shoring up the weakest links in an organization.
  • operating system (OS)

    Definition - What is an operating system? An operating system (sometimes abbreviated as "OS") is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer.
  • Is it time to revamp your disaster recovery management program?

    Quiz - Disasters of all stripes -- from hurricanes to data leaks -- are bound to happen, and happen often, so a solid disaster recovery management program is a must. Take this quiz to find out if your DR plan is up to the task.
  • Cloud ERP to the rescue for fast-growing startups

    News - Two rising startups in the craft brewery business reap tangible rewards when they move from ad hoc processes to cloud ERP.

    ( Jun 23, 2014 )

  • limitation of liability clause

    Definition - A limitation of liability clause is the section in a service-level agreement (SLA) that specifies the amounts and types of damages that each party will be obliged to provide to the other in particular circumstances. In a legal context, a liability is generally a responsibility to compensate for some failure to perform according to an established or agreed-upon stipulation.
  • How to prevent spyware on mobile devices

    Answer - Security expert Michael Cobb offers suggestions to prevent spyware from infiltrating mobile devices.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: