A recent survey found that almost half of IT specialists do not know how to manage compliance data and would rather outsource the task to managed service providers than handle it internally.
Stefanie Mosca, InsideCounsel
The phrase “work smarter, not harder” is becoming easier to comply with as technology and cloud-based platforms help to simplify our day-to-day roles. Even people in the IT industry would rather outsource complex tasks that are more cost-effective to handle externally than within their own company.
A recent Six Degrees Group study surveyed IT professionals and found that 43 percent of individuals in IT roles do not have a clear understanding of how to manage compliance legislation data. Given the complexity of an IT professional’s job, one would think that they would be knowledgeable in that area; however, 52 percent of IT specialists admitted they would rather utilize a managed service provider (MSP) to manage data compliance than to do so internally. (read the article)
A conversation with John Ansbach of General Datatech.
Peter Vogel, Law Technology News
Contracting for cloud computing services is not new—since 1964 businesses have relied on remote computing. Of course, 50 years ago the services were on mainframes and over telephone lines; today the cloud services are on servers across the Internet.
All kinds of businesses depend on cloud services, but departments often sign the cloud agreements without bothering to consult the organization’s IT department, much less management. As a result, management may not realize the importance of the cloud contracts until the contract ends and the customer cannot get its data, or get the data in the format it expects.
To learn more about what to expect, I asked John Ansbach, general counsel of GDT (General Datatech)
Peter Vogel: Cloud services offer service level agreements, but this is somewhat confusing because the cloud contract is an agreement between the customer and provider. Can you explain what SLA means? (read the article)
Dropbox Gets Down to Business: ‘The Internet Filing System’
Chief executive Drew Houston is banking on fans of his cloud-based service Dropbox to bring it to work as he attempts to corner the business market for online storage.
Angela Hunt, Law Technology News
Dropbox first grew popular among college students who used it to store documents and access updated versions via the cloud, anywhere and from any device. After building a base of 200 million accounts, Houston is using the service’s mass appeal to market “Dropbox for Business” and compete with the likes of Google and Box, according to Jessica Guynn for the Los Angeles Times.
Guynn calls the initiative an “ambitious gambit,” but it may be a hot sell to companies whose employees already subscribe to the service for their personal use. Roughly 4 million businesses already use Dropbox, including 97 percent of the Fortune 500, according to their chief executive, Drew Houston. Dropbox for Business gives users two folders—one for personal data and one for business, according to Guynn. The new service also allows companies to remotely wipe clean certain folders, say from an employee who has left the company, writes Guynn. (read the article)
Transferring data to the cloud can poke holes in a company’s compliance and security controls. A free e-book from SearchCompliance.org offers some useful advice for patching them up.
Angela Hunt, Law Technology News
It’s tempting for firms and in-house counsel to entrust the cloud with their data—but can the cloud handle data according to compliance and security guidelines? That’s the question Ben Cole of SearchCompliance.com asks in a new handbook that examines how organizations can adapt information governance processes to the cloud to reduce data-related risk and stay in compliance with laws, regulations and industry standards.
The free e-book is worth a look, but if you feel like skimming, here are a few takeaways.
GETTING STARTED IN THE CLOUD
Data should reside in-house and extend to cloud-based repositories to satisfy the information governance needs of most organizations, according to Marilyn Bier, CEO of ARMA International, a trade association for record keepers. (read the article)
Our tech survey finds benefits — and security risks — in the BYOD movement.
Alan Cohen, Law Technology News
Bright spots among the survey results include a healthy uptick in IT budgets for a sizable number of law departments. Fully 20 percent of respondents saw their IT capital budget rise by more than 10 percent over the prior year, while less than 3 percent saw it decrease more than 10 percent. In all, capital budgets rose for 26 percent of law departments, remained stable for 60 percent, and decreased for 14 percent (operating budgets saw a similar pattern, increasing for 34 percent of respondents, while remaining flat for 49 percent and decreasing for 17 percent). (read the post)
David Hechler, Corporate Counsel
Note to Big Law: When you’re working with Wall Street, don’t BYOD. At least not until the devices are configured to secure data.
That’s the anti-Bring Your Own Device message the country’s biggest banks and financial institutions are trying to convey to their law firms, according to the global chief operating officer of Goldman Sachs’s legal department.
Actually, Goldman’s Jeffrey Isaacs doesn’t care if the outside lawyers his department hires have personal smartphones in their pockets—he just doesn’t want them to use the same devices for business. (read the article)
Ari Kaplan, Reinventing Professional Services
I spoke with Eric Hunter, the Director of Knowledge, Innovation & Technology Strategies at California-based Bradford & Barthel, as well as the Executive Director of Spherical Models, a business model innovation consultancy.
We discussed his firm’s transformation to a completely Google Apps environment and his team’s efforts to create a social media-like atmosphere the leveraged internal champions to motivate this shift by 100 lawyers and over 250 users. He recommends developing a clear workflow and to give users time to adapt. Hunter also discussed how his success at Bradford & Barthel fueled the creation of Spherical Models. (listen to the interview)
Tomer Teller, Forbes
The door is closing on 2012, and it’s time to look ahead to next year. As you round out your 2013 business and IT plans, cybercriminals are resolving to implement increasingly sophisticated threats targeting specific computer systems and organizations big and small.
In the past year, businesses have seen several serious hacks and breaches. As the arms race between attackers and businesses continues to evolve in 2013, IT departments and security professionals will need to stay on top of the changing tactics and approaches used by criminal hackers in order to protect their organizations. What are nefarious hackers’ top resolutions and the greatest security threats to businesses in 2013? (read the article)
Legal IT Professionals publishes results of Global Legal IT Cloud survey
Legal IT Professionals
The tide has turned and the cloud is here – A free report by Legal IT Professionals
Cloud computing is a hot topic. We at Legal IT Professionals brush away the hype and take a look beyond marketing, to find out what the global legal services sector really think and what their plans are for 2013 and beyond. In September 2012, we asked our international readership to complete a short survey. Our free report ‘The tide has turned and the cloud is here’ summarises the results. (read the post)
John Cowling, Daniel Nelson, InsideCounsel
In part one of this series, we discussed the issues of security, interoperability and vendor lock-in issues in cloud computing contracts. In this installment, we will discuss the five issues of regulatory compliance, reliability, complexity, privacy and pricing.
1. Regulatory compliance
Compliance touches on many issues, depending on the industry and requirements of the customer. Compliance is an issue that, along with security and privacy, often inhibits the adoption of cloud computing. In many cases, however, these issues can be addressed with a combination of contract provisions, careful vetting of vendors, the adoption of granular security procedures and, to some extent, insurance protections. (read the article)