Elevate the power of your work
Get a FREE consultation today!
Discover a cohesive process for law firms to respond to, and deliver on, client requirements for governing and managing information.
For years, many clients have provided their outside counsel with guidelines that must be followed in order to obtain, or retain, their business. More recently, these guidelines include instructions on how law firms are expected to manage and protect client data - either because organizations are more conscious of security risks, or because they are being forced to do so by regulatory bodies. In some instances, they may feel the need to stringently audit service partners, including legal providers.
Unfortunately, these guidelines are often not communicated to the legal teams providing service to the client, a fact often brought to light when clients conduct an audit to confirm the protocols are in place. Moreover, implementation of such requirements can, at times, create a financial burden for the firm, conflict with the firm’s established organizational culture or even conflict with requirements provided by other clients.
This report provides practical guidance for the creation of a cohesive process with which law firms can respond to, and deliver on, client requirements for the governance and management of their information. It addresses steps for gathering requirements along with their analysis, communication, implementation and maintenance, including suggestions for responsible roles.
The number of requirements found in protective orders, business associate agreements (BAA), outside counsel guidelines (OCG), client security questionnaires and similar documents are not likely to diminish anytime soon. In response, firms can better position themselves to proactively address such situations by identifying and establishing a process and team to review these information governance (IG) requirements. After the review, firms can educate the case teams and staff, making them aware of what was agreed upon and how it is being implemented. They can ensure the client’s requirements align with the firm’s own initiatives and environment, and address any contradicting requirements. Furthermore, they can determine what policies and procedures need to be created or modified in order to fulfill what the client is requesting.
These, of course, are just the initial steps of what must be a “lifelong” process throughout the client relationship. Firms must establish procedures and internal control processes to ensure that systems, policies and procedures, and personnel remain in compliance. Firms must consider what technology is available to assist them in complying with client requirements, and whether the projected revenues from the client relationship outweigh the costs of investing in these tools. Eventually, firms may want to optimize their position by considering certifications, aggregating standard audit responses to more efficiently respond to questionnaires/ onsite inspections, and ultimately leveraging their security protocols as a means to market their business.
Two years ago, the Law Firm Information Governance (LFIG) Symposium produced a paper called Outside Counsel Guidelines Management: An Information Governance Issue. That paper discussed the management of the Outside Counsel Guidelines (OCGs) as an IG issue. This paper addresses the data management and security requirements found in those OCGs, in addition to other engagement contracts, governmental regulations and court orders. It explores ways in which the law firm can gather and review requirements, as well as implement controls to satisfy the IG requirements with the end result of putting the law firm in a better position to manage information in accordance with agreed upon IG requirements.
A CIGR is any IG requirement the firm must meet to manage client data. There are several possible sources that might contain CIGRs. Examples include:
For purposes of this paper, CIGR is used as an overarching term to reference all of these sources that may contain IG requirements.
There should be a well-defined entry point and distribution process within the firm to ensure consistency and accuracy when responding to CIGRs. While there are many methods that can accomplish this goal, most are categorized as either a decentralized or centralized approach. As explained more fully below, this task force recommends a centralized process whenever possible. Regardless, as many CIGRs contain requirements that impact many functional areas within the firm, representatives from these areas described below must be accounted for in the distribution process.
Information Technology:Enterprise architects, database administrators and others with comprehensive knowledge of the firm’s data map can be very useful in assembling accurate responses.
Information Security:Information security professionals with knowledge of the firm’s overall security policy, practices for meeting the specific security controls referenced in the requirements and the necessary protocols for granting exceptions to the policy.
Legal/Risk: General Counsel, risk director or manager, or equivalent may be the authority to weigh in on conflicts provisions and other requirements often found in CIGRs.
Facility Security: Facility management or physical security managers can provide information regarding physical access controls and surveillance of sensitive facility assets (file rooms, server rooms) and general facility perimeters.
Records Management/IG:Records Management and/or IG director or manager can be the authority to review client retention schedules to determine alignment with the firm’s own schedule. They can also assist in identifying data ownership, workflows and security.
Human Resources: Director, manager or other HR professional can respond to client requirements about demographics and diversity of legal teams as well as hiring procedures such as background checks and training.
Accounting/Finance: Pricing specialists and/or billers familiar with firm billing guidelines which are often addressed in CIGRs.
Marketing/Business Development: Marketing managers and others responsible for preparation of materials for client RFPs are logical recipients of client requirements as part of new business pitches.
Practice Group Management: Practice group support specialists assisting with the implementation of protocols related to the representation processes that support IG, such as methods of ingesting, storing and sharing client data, redaction of draft documents and sharing client feedback with the appropriate team members.
Procurement / Contract Reviewers: Some firms have designated contract reviewers to review all firm contracts before final approval and execution. These procurement / contract reviewers may be able to identify additional IG requirements from eDiscovery or other third party vendors.
In addition to the identification of members of the response team, firms should also consider, and incorporate, departments and roles which are natural collection points for intake of client requirements. These areas can also act as a backstop by flagging documents that may have bypassed the standard approval process. For example, marketing is often the first area to receive requirements as part of the sales process for new business to a potential client. Information technology may receive security audits directly from a client rather than through an attorney. Similarly, accounting may receive requirements from the client directly in response to an invoice, or just as the point of contact for billing matters. These collection points, typically in a responder role, should also serve to initiate the process under such circumstances.
In a decentralized approach, CIGRs are sent directly from the point of intake to those with the knowledge to respond to the requirements. A decentralized approach places more responsibility on the attorney or other original points of intake to not only track down and collect responses, but also to ensure the agreed upon process is followed. As such, all possible entry points must be educated as to the necessary steps to ensure a complete and accurate response. Appendix A includes an example checklist to assist attorneys and others in meeting all process requirements. Each attorney, as a potential point of intake, needs to know who else should review the CIGRs.
Because this approach is less likely to efficiently produce consistent results, a decentralized approach is generally less desirable. However, depending on the size of firm and/or the number of CIGRs received, a decentralized approach using one of the following models, buttressed by a strong education component, may be sufficient:
A centralized approach attempts to reduce the effort required by the point of intake to respond to CIGRs, while ensuring an efficient, timely and accurate response. This approach provides the point(s) of intake with a single contact who is responsible for CIGR distribution and follow up. As the point of intake is often the matter-responsible or client attorney, the centralized approach can reduce the amount of otherwise billable time an attorney may expend tracking the progress of CIGR responses across multiple individuals or departments. A centralized process also helps facilitate collective analysis of CIGRs to identify opportunities for standardized responses, potentially leading to faster and more efficient processing.
The centralized process is accomplished in several ways:
Section II of this paper details possible approaches for building a repository of CIGRs and responses.
Stay on top of your practice—and ahead of your competition—with the Iron Mountain advantage
More than 100 information governance experts are ready to help grow your program with a comprehensive approach
Iron Mountain established the Law Firm Information Governance Symposium (Symposium) in 2012, as a platform for the legal industry to create an information governance (IG) roadmap unique to law firms.
Get a FREE consultation today!