Firms are under the pressure from cybersecurity risk, regulators, and client demands to secure non-public data and limit access to those who need to know. Unlike ethical walls and information barriers which are dictated by the conflicts or risk process of new matter intake, access levels such as need-to-know are typically determined by the lawyer who ‘owns’ or is responsible for a matter. For inclusionary walls, the conflicts team determines who can have access, whereas in need-to-know security, the partner, or delegate can make that decision. As matter content is stored across multiple systems, managing access becomes more complex; best practice dictates that end users have the ability to request and grant access to matters or individual documents as appropriate. Service desks should be able to support the process.
Ability to enable pessimistic matter security with minimal impact to the firm
Improved and clear process for handling client security requests
Reduced risk of data exposure from cyber breach
Easier tracking of inappropriate user behaviour
Enhanced data security and privacy
Compliance with industry regulations and client demands
Read more about CAM from our product brochure.