Cobra Legal Solutions:

Size: px
Start display at page:

Download "Cobra Legal Solutions:"

Transcription

1 Cobra Legal Solutions: Cobra Legal Solutions response to ABA Commission on Ethics 20/20 Legal Process Outsourcing (Domestic and International) Call for Comments: C. For providers of legal process outsourcing services: 1. Where do your workers work? Cobra Legal Solutions offshore operational facility is located in Chennai, India. Chennai (formerly Madras) is the capital city of the Indian state of Tamil Nadu and is the fifth-largest city in India by population. Chennai has a broad-based economy predominated by the automotive, healthcare, hardware manufacturing, software and financial services industries. Chennai is India's second-largest exporter of software, information technology and IT-enabled services. The city has long been a major center for the outsourcing industry, and Cobra capitalizes on the modern, spacious facilities and proven, state-of-the-art technology and connectivity (telecom and transport) infrastructures that are in place. Numerous universities and educational institutions in Chennai graduate global talent and foster a highly skilled labor pool from which Cobra draws. Our employees work in Ascendas IT Park, in a state-of-the-art facility, which boasts a world class Data Center and up to date audio-video conferencing facilities. Our facilities conform to the highest and most stringent security measures, including ISO standards, biometric access, access card, CCTV monitoring, and round the clock physical security. 2. Are the workers who perform the outsourced tasks educated and licensed as lawyers somewhere? If some are and some are not educated and licensed as lawyers somewhere, what is the proportion of lawyer to non-lawyer? All employees performing outsourced legal work are Indian educated/licensed attorneys. Our Managing Director Litigation, an attorney trained and licensed in the United States, is on-site for the daily oversight, supervision, and management of Cobra s team of lawyers. He works directly with clients and outside counsel to facilitate the smooth running of a project. 3. What proportion of lawyer workers are educated and licensed in the jurisdiction where they sit, educated and licensed in the jurisdiction whose law governs or educated and licensed in the U.S? All of our reviewing attorneys (currently 54) are educated in India and are licensed to practice throughout the country. Our Managing Director Litigation, Kevin Clark, is a U.S. trained and licensed attorney. Mr. Clark is a member of the Bars of the District of Columbia and the State of Illinois. He is admitted to practice before the United States Supreme

2 Court, United States Courts of Appeal for the 7th, 10th, Federal, Veterans Claims, and District of Columbia Circuits, and the United States Court of International Trade. Mr. Clark is also a licensed Solicitor before the Supreme Court of England and Wales. 4. For non-u.s. based providers do you have a staffed physical presence in the U.S? Who staffs it (e.g., U.S. licensed lawyers) and what is done there? Cobra maintains its headquarters at 1501 Broadway in New York City. From this strategic location our CEO and Managing Director (both non-lawyers) are best able to manage client relationships with fast and easy access to clients throughout the United States and the United Kingdom. Corporate administration and litigation technology consulting services are also provided from our New York location. Cobra does not have review facilities in the United States. 5. How do you decide which individuals should work on which matters? Cobra Legal Solutions seeks to staff projects with the most appropriate personnel available. Staffing is based on past performance and training evaluations. Cobra s training team provides feedback on each employee, based on evaluative exercises conducted for each activity. This feedback is sent to HR and management on a regular basis. A resulting performance matrix highlights each employee s skill sets. Work is assigned to individuals based on the performance matrix. 6. What do you do to help your employees understand the U.S. rules of professional conduct and who provides this education or training? Cobra has an exclusive training team that educates new recruits on U.S. rules of professional conduct and ethics. A comparative study of Indian laws and U.S. standards on professional conduct and ethics reinforces our Indian attorneys understanding of the U.S. rules on professional responsibility. The main purpose behind our training is to help employees understand the importance of professional conduct and ethics and their role in the context of the LPO industry. Our team of lawyers is kept up-to-date on the latest events in the industry, specifically in reference to views and opinions within the U.S. legal establishment regarding the issues of professional conduct and ethics within the legal outsourcing industry. Additionally, each time an employee is deployed on a project, he or she signs a confidentiality agreement and a conflicts check form which act as constant reminders to an employees adherence to some of the most important rules of professional ethics. The Cobra Training team, along with Kevin Clark, Managing Director - Litigation, provides training to our lawyers. Mr. Clark has extensive experience

3 as a litigation attorney supervising document reviews and other areas of discovery services. He has developed sophisticated best practices for quality control that have been repeatedly praised by our clients, and allow them, as they attain a comfort level with our work product, to avoid spending unnecessary (and billable) time reviewing and modifying things prior to a document production. 7. How do you do train and assess the competence of your workers and assess and verify the quality of the work done? Our employees undergo an intensive training program during which they are evaluated to determine their competence. Cobra provides both induction training and continual training. Induction training provides our newly hired employees with the knowledge and information required to understand the nature of the document review/research and writing process. Our induction training is a twelve-week course that includes: U.S. Federal Rules of Civil Procedure with a focus on Discovery; E-Discovery basics using the EDRM Model to ensure best practices; Litigation application training (Case Central); Document review training on the dummy database; Introduction to U.S. legal research and writing (Bluebook, citations, sources, and style); and Introduction to the U.K. legal system (focus on laws of England and Wales). Continual training is given to existing employees to address specific client- and project-based requirements (i.e., contracts, intellectual property rights, legal research and writing). In addition, English language training is also provided, covering the basic rules of English, the appropriate usage of the rules, the differences between American and British English, and terms and phrases used in the United States. Our continuing legal education activities include, but are not limited to: Introduction to document review software tools; Dummy database training and simulation of real time scenarios; Intellectual Property training; Contract Management training; Advanced legal research and drafting techniques;

4 Daily reading and comprehension exercises based on current events in U.S. legal and business fields (Wall Street Journal, New York Times, and Washington Post); and Training in U.S. grammar and idioms. The quality of work performed by our employees is assessed and verified by our Project Management Team, led by the Managing Director Litigation. Error Tracker Reports and additional feedback is sent to them in real time. Cobra also has comprehensive Quality Control and Quality Assurance procedures in place. These procedures are based on Six Sigma principles and refined project management and process management processes. We are currently being certified for ISO 9001 for Quality Management. Assessing and verifying the quality of work is an on-going process that is always being improved upon. 8. What types of security systems to you have in place to ensure data integrity and compliance with confidentiality requirements of those who hire you? At Cobra, we take a holistic approach to security and confidentiality. We address security and confidentiality through network/data security, premises security, and employment policies. In addition, a Business Continuity Plan and Disaster Recovery Plan are in place. Network/Data Security Cobra s operations facility utilizes ISO compliant information security management systems and practices. Data is delivered to and maintained by a hosting company selected by the client. Data files are never bulk transferred to Cobra. Cobra only sees images of folders and documents. Terminal and Citrix servers are used to connect our U.S. server with the client s server. By this methodology, the client s data is secure and cannot be downloaded to Cobra s local system. We do a full backup and a differential backup daily for all servers and user folders based on the criticality of files being backed up. In case of any failure, the backup will be restored as per the documented procedure. Transmission of data is secured over 128-bit SSL protocols. We use secured VPN connectivity, to encrypt or decrypt data for maximum security. A VLAN is in place to prevent merging one client s information with that of another. All incoming and outgoing data is routed through Antivirus servers. Virus definitions are updated daily.

5 Upon completion of a project, we use third-party software to securely purge our hard disks of the client s documents and data. All s are monitored through a third-party application. s sent to outside domains are immediately blocked and an alert is sent to the administrator. Application and device control blocks all USB, CD/DVD drives, floppy drives, Bluetooth, and optical devices. Unified theft management devices are used to monitor and track all incoming and outgoing packets. Premises Security Fencing surrounds our tech park with manned gated entry points. ID checks are issued upon entry to the building. Card access is required for building elevator banks. A security guard is present 24/7 at the single entry point to our offices. Group access is restricted. Biometric (thumbprint) access controls entry to our data center. Audits are performed to analyze unauthorized access to the data center. 16 high resolution CCTVs inside the data center monitor unauthorized access. Card access to our separate, secure IT control room is limited to our IT team and senior management. APC UPS with 80 KVA centralized UPS system/30 KVA centralized UPS system for data center. We conduct periodic security workshops and regular internal compliance audits. We have dedicated customer workspace. Our facility has segregated, secure project rooms for specific clients and no information can be taken out of the locked, dedicated rooms. Employment Policies Cobra team members have monitored and restricted Internet access. The Managing Director Litigation, a trained and barred U.S. attorney, handles all correspondence between clients and Cobra. Copiers and printers are not available to the review staff. Printer rights are limited to the printing of management reports and training materials. Read/write drives are not available on the same machines used for review by the review staff.

6 We do not create hard copies of review manuals, counsel lists, and other sensitive material. Only a limited number of people who have worked on the live project for a client and have signed the Non-Disclosure Agreement (NDA) have access to the electronic copies of these documents during the project. Access is revoked immediately after the project wraps up. Scheduled and random audits are performed regularly to ensure adherence to all principles and procedures. We do not employ temporary staff. Cobra does not use subcontractors to provide our services. All of our employees are screened as per the BS7858 standards. An independent firm conducts background checks of Cobra s U.S. executives. The results include education verification, past employment verification and references (including gap analysis), character reference checks, financial history (including credit reports), and criminal history checks. The Board of Directors also conduct its own independent background checks and due diligence, by back channels, such as checking their references and making industry inquiries. a. If there is a difference in security systems for work performed inside and work done outside the U.S., please explain. Our U.S. headquarters does not provide legal services. Security measures described above pertain to our offshore facility only. 9. What types of systems do you have in place to avoid conflicts of interest regarding those who hire you? Our employees undergo a series of background checks before and during employment. All Cobra employees and attorneys sign a confidentiality agreement to protect the client s information. Potential conflicts are verified before every engagement by adhering to the ABA Model Rule 1.7. All information regarding parties currently and previously engaged by Cobra review attorneys are continuously updated. If there are potential conflicts based on the ongoing reviews, those potential conflicts are immediately disclosed. In addition, we have a conflicts of interest process we utilize when engaging a new client or a new project with an existing client. This consists of a conflicts check with regards to our other clients and our employees. 10. Are you regulated? In what way and by whom? Are there competing regulations and regulators? Cobra supports the creation a self-regulating body that would work hand-inhand with the ABA to set minimum thresholds for companies in the LPO industry, and provide a set of principles and guidelines to ensure the proper

7 development of this market. At present the LPO industry does not have a regulatory body. However, in India, LPO industry players are in talks to form an association of LPO companies. Further, the leading LPO companies are in discussion with Nasscom, CII and PHDCCI to form a regulatory body. This would help the LPO industry set up standards as well as win the confidence of clients abroad. The association will work towards creating standards for quality service similar to those adopted by the software industry. It also plans to provide standardized training procedures for lawyers who intend to join LPO companies. Such an institute or industry body would provide basic training to lawyers and would familiarize them with international legal issues. Cobra Legal Solutions, and other LPO companies that only hire lawyers, are educated in international legal issues. We abide by the ethical opinions given by the American Bar Associations on the Ethics of Legal Outsourcing. We, along with the ABA board, would like to take the initiative to formulate a set of common regulations for the LPO industry that would help to create a fair playing field for all LPO service players, stakeholders, and legal departments. We are open to abide by the policies and regulations on legal outsourcing of countries other than the U.S.

How To Handle A Legal Outsourcing Situation

How To Handle A Legal Outsourcing Situation LEGAL PROCESS OUTSOURCING COMMENTS & SUMMARIES TABLE OF CONTENTS CCBE (Conseil des Barreaux Européens/Council of Bars and Law.p. 5-6 Societies of Europe) CCBE provides a copy of the CCBE guidelines on

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Cyber Security Best Practices

Cyber Security Best Practices Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters

More information

Freelance Lawyers. The industry's best kept secret. Christopher Kozlowski

Freelance Lawyers. The industry's best kept secret. Christopher Kozlowski Freelance Lawyers The industry's best kept secret. Christopher Kozlowski About Me Co-founder and partner of Streamline Litigation, which I started while I was still in law school at Villanova University

More information

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014 Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology

More information

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access

More information

Print4 Solutions fully comply with all HIPAA regulations

Print4 Solutions fully comply with all HIPAA regulations HIPAA Compliance Print4 Solutions fully comply with all HIPAA regulations Print4 solutions do not access, store, process, monitor, or manage any patient information. Print4 manages and optimize printer

More information

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide

More information

RESEARCH SUMMARY: Security and Data Privacy Best Practices in Offshoring By neoit

RESEARCH SUMMARY: Security and Data Privacy Best Practices in Offshoring By neoit Offshore Insights White Paper www.neoit.com September 2003 Issue 12 RESEARCH SUMMARY: By neoit How can you mitigate security risks while offshoring? How will a third party security organization help in

More information

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1 HIPAA COMPLIANCE AND DATA PROTECTION sales@eaglenetworks.it +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps

More information

SERVICE ORGANIZATION CONTROL 3 REPORT

SERVICE ORGANIZATION CONTROL 3 REPORT SERVICE ORGANIZATION CONTROL 3 REPORT Digital Certificate Solutions, Comodo Certificate Manager (CCM), and Comodo Two Factor Authentication (Comodo TF) Services For the period April 1, 2013 through March

More information

White Paper. BD Assurity Linc Software Security. Overview

White Paper. BD Assurity Linc Software Security. Overview Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about

More information

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Xerox Litigation Services In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Your Highest Priority is also Your Greatest Challenge Data breaches are not just

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

IBM Connections Cloud Security

IBM Connections Cloud Security IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application

More information

Lauren Hamill, Information Governance Officer. Version Release Author/Reviewer Date Changes (Please identify page no.) 1.0 L.

Lauren Hamill, Information Governance Officer. Version Release Author/Reviewer Date Changes (Please identify page no.) 1.0 L. Document No: IG10d Version: 1.1 Name of Procedure: Third Party Due Diligence Assessment Author: Release Date: Review Date: Lauren Hamill, Information Governance Officer Version Control Version Release

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

CloudDesk - Security in the Cloud INFORMATION

CloudDesk - Security in the Cloud INFORMATION CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES

More information

General Computer Controls

General Computer Controls 1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems

More information

VishaSoft ITES Services

VishaSoft ITES Services VishaSoft ITES Services Service Offerings Data Preparation, Conversion & Digitisation Services Text / Data Entry Data extraction / Online data retrieval from web Word Processing Scanning Services File

More information

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and

More information

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually

More information

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed

More information

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Introduction Patient privacy continues to be a chief topic of concern as technology continues to evolve. Now that the majority

More information

OPINION 21-12 APPLICABILITY OF RULE 49 TO DISCOVERY SERVICES COMPANIES. Issued January 12, 2012

OPINION 21-12 APPLICABILITY OF RULE 49 TO DISCOVERY SERVICES COMPANIES. Issued January 12, 2012 OPINION 21-12 APPLICABILITY OF RULE 49 TO DISCOVERY SERVICES COMPANIES Issued January 12, 2012 Pursuant to District of Columbia Court of Appeals Rule 49, and specifically its section 49(d)(3)(G), the District

More information

CONTENTS. Security Policy

CONTENTS. Security Policy CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

An organization properly establishes and operates its control over risks regarding the information system to fulfill the following objectives:

An organization properly establishes and operates its control over risks regarding the information system to fulfill the following objectives: p. 1 System Management Standards Proposed on October 8, 2004 Preface Today, the information system of an organization works as an important infrastructure of the organization to implement its management

More information

DATA SECURITY POLICY. Data Security Policy

DATA SECURITY POLICY. Data Security Policy Data Security Policy Contents 1. Introduction 3 2. Purpose 4 3. Data Protection 4 4. Customer Authentication 4 5. Physical Security 5 6. Access Control 6 7. Network Security 6 8. Software Security 7 9.

More information

Built by the clients, for the clients. Utilizing Contract Attorneys for Document Review

Built by the clients, for the clients. Utilizing Contract Attorneys for Document Review Built by the clients, for the clients Utilizing Contract Attorneys for Document Review Ashish Prasad, Esq. October 27, 2014 Table of Contents Introduction... 3 Ethical Issues... 3 Staffing of Reviewers...

More information

The Lien Resource. Why Outsource Medical Liens & Healthcare Reimbursement?

The Lien Resource. Why Outsource Medical Liens & Healthcare Reimbursement? 1 2 The Lien Resource Why Outsource Medical Liens & Healthcare Reimbursement? Eliminate the cost and time-drain of resolving liens in-house at no additional cost to your firm; Increase the likelihood of

More information

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy June 10, 2015 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT

More information

Data Privacy and Security: A Primer for Law Firms

Data Privacy and Security: A Primer for Law Firms Data Privacy and Security: A Primer for Law Firms All We Do Is Work. Workplace Law. In four time zones and 46 major locations coast to coast. www.jacksonlewis.com JACKSON LEWIS SERVING THE DIVERSE NEEDS

More information

Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies.

Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies. Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies. Data Sheet: Symantec.cloud Email Compliance Redefined Our new and improved version of redefines

More information

Virtual Data Room. www.millnet.co.uk/vdr. From Deal Making to Due Diligence

Virtual Data Room. www.millnet.co.uk/vdr. From Deal Making to Due Diligence Virtual Data Room From Deal Making to Due Diligence Built with the leading Investment Banks and Law Firms, our revolutionary technology is used by tens of thousands of professionals all over the world.

More information

An Introduction to HIPAA and how it relates to docstar

An Introduction to HIPAA and how it relates to docstar Disclaimer An Introduction to HIPAA and how it relates to docstar This document is provided by docstar to our partners and customers in an attempt to answer some of the questions and clear up some of the

More information

white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations

white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations WWW.EPIQSYSTEMS.COM 800 314 5550 Mitigate Risk in Handling ediscovery Data Subject to the U.S.

More information

Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About

Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About Kelly H Twigger, Esq. Oil and Gas Symposium Arkansas Law Review October 16-17, 2014 Overview In the last two decades, business

More information

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices

More information

HIPAA COMPLIANCE AND

HIPAA COMPLIANCE AND INTRONIS CLOUD BACKUP & RECOVERY HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction 3 The HIPAA Security Rule 4 The HIPAA Omnibus Rule 6 HIPAA Compliance and Intronis Cloud Backup and Recovery

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

Endless opportunities

Endless opportunities Endless opportunities Gaining a Competitive Advantage through Outsourcing Outsourcing has become one of the most successful tools for large corporations to remain competitive in the 21st century. The advantages,

More information

ETHICS for Lawyers and Law Firms Using Cloud Technology

ETHICS for Lawyers and Law Firms Using Cloud Technology ETHICS for Lawyers and Law Firms Using Cloud Technology Donna Kirk Seyle ~ Legal Tech Advisor: Law Practice Strategy 108 MONTESANO ST SANTA CRUZ, CA 95062 (831) 332-2243 Donna Seyle is an attorney, author,

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

Security Control Standard

Security Control Standard Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0 WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of

More information

Company Overview. History

Company Overview. History Company Overview Key Concepts is an India based software outsourcing company that focuses on highly qualitative, timely delivered and cost-effective offshore software development, e-commerce solutions,

More information

On-Site Computer Solutions values these technologies as part of an overall security plan:

On-Site Computer Solutions values these technologies as part of an overall security plan: Network Security Best Practices On-Site Computer Solutions Brian McMurtry Version 1.2 Revised June 23, 2008 In a business world where data privacy, integrity, and security are paramount, the small and

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

White Paper. Support for the HIPAA Security Rule PowerScribe 360

White Paper. Support for the HIPAA Security Rule PowerScribe 360 White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Introduction Patient privacy has become a major topic of concern over the past several years. With the majority of

More information

PCI DSS COMPLIANCE DATA

PCI DSS COMPLIANCE DATA PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

High Availability of VistA EHR in Cloud. ViSolve Inc. White Paper February 2015. www.visolve.com

High Availability of VistA EHR in Cloud. ViSolve Inc. White Paper February 2015. www.visolve.com High Availability of VistA EHR in Cloud ViSolve Inc. White Paper February 2015 1 Abstract Inspite of the accelerating migration to cloud computing in the Healthcare Industry, high availability and uptime

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

Veritas AdvisorMail. Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies

Veritas AdvisorMail. Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies Veritas AdvisorMail Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies Email compliance redefined Our new and improved version of redefines

More information

Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations

Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations 11/2010 This document includes the following topics: About this guide (page 2) TeamViewer remote desktop support

More information

Computers and Society: Security and Privacy

Computers and Society: Security and Privacy 1 Chapter 12 Computers and Society: Security and Privacy 2 Chapter 12 Objectives 3 Computer Security: Risks and Safeguards What is a computer security risk? 4 Computer Security: Risks and Safeguards 1

More information

Outsourcing Legal Research and Writing Projects

Outsourcing Legal Research and Writing Projects Outsourcing Legal Research and Writing Projects by Lisa Solomon 6 Why Outsource Your Legal Research and Writing Projects Lawyers outsource legal research and writing projects for a variety of reasons.

More information

Unit 6 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

Unit 6 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D. Running head: UNIT 6 RESEARCH PROJECT 1 Unit 6 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/28/2014 UNIT 6 RESEARCH PROJECT 2

More information

Securing Content: The Core Currency of Your Business. Brian Davis President, Net Generation

Securing Content: The Core Currency of Your Business. Brian Davis President, Net Generation Box Security Whitepaper Box: Redefining Security for the Cloud Securing Content: The Core Currency of Your Business We know that your content is the core currency of your business. Product requirements,

More information

Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services

Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services Page 2 of 8 Introduction Patient privacy has become a major topic of concern over the past several years. With the majority

More information

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights

More information

SNAP WEBHOST SECURITY POLICY

SNAP WEBHOST SECURITY POLICY SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

ADEC GROUP INFORMaTiON SecURiTY AND CONTROLS

ADEC GROUP INFORMaTiON SecURiTY AND CONTROLS ADEC GROUP INFORMaTiON SecURiTY AND CONTROLS Rising To Global Information Challenges Information is your most valuable commodity today. As a global enterprise servicing a wide range of businesses, ADEC

More information

Security Overview. BlackBerry Corporate Infrastructure

Security Overview. BlackBerry Corporate Infrastructure Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security

More information

Faster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions

Faster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions Faster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions Table of Contents Introduction... 3 1. Data Backup: The Most Critical Part of any IT Strategy...

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Legal Process Outsourcing & Offshore Law Services

Legal Process Outsourcing & Offshore Law Services Legal Process Outsourcing & Offshore Law Services Trustman & Co. http://trustman.org March 20, 2014 Copyright2010 Trustman&Co. 1 About Us Established in 1998, Trustman & Co., is a full service law firm

More information

Internet Banking Internal Control Questionnaire

Internet Banking Internal Control Questionnaire Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?

More information

Virtual Data Room Security 2. Service 3. Simplicity 4. Speed 5. Cost Certainty

Virtual Data Room Security 2. Service 3. Simplicity 4. Speed 5. Cost Certainty Virtual Data Room Transactions are becoming increasingly more complicated. Deals involve numerous participants who need access to an increasing number of documents at all stages of the deal. This creates

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

Protection of Computer Data and Software

Protection of Computer Data and Software April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

THE TRANSFORMATION IN LEGAL MIDDLE OFFICE SERVICES

THE TRANSFORMATION IN LEGAL MIDDLE OFFICE SERVICES THE TRANSFORMATION IN LEGAL MIDDLE OFFICE SERVICES BY MICHELLE ROSEN Within law firms, administrative functions have undergone a dramatic evolution. While the need for traditional word processing has been

More information

GREAT EASTERN TECHNOLOGY BPO / ITES

GREAT EASTERN TECHNOLOGY BPO / ITES GREAT EASTERN TECHNOLOGY BPO / ITES BPO/ITES About Great Eastern Technology 1 IT Enabled Services 2 Outsourcing to Great Eastern Technology 3 Core Values & Differen ators 4 BPO Por olio 5 Physical & Data

More information

Level I - Public. Technical Portfolio. Revised: July 2015

Level I - Public. Technical Portfolio. Revised: July 2015 Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center

More information

Security Framework and Best Practices in Offshore Outsourcing

Security Framework and Best Practices in Offshore Outsourcing February 2008 Security Framework and Best Practices in Offshore Outsourcing By Indy Banerjee, Director Bindu Sudhir, Senior Research Analyst Prabhash Thakur, Senior Advisor CONTENTS 2. Introduction 2.

More information

WHY you should. choose a. CERTIFIED FINANCIAL PLANNER TM practitioner

WHY you should. choose a. CERTIFIED FINANCIAL PLANNER TM practitioner WHY you should choose a CERTIFIED FINANCIAL PLANNER TM practitioner Choosing a financial planner may be one of the most important decisions you make for yourself and your loved ones. Financial planners

More information

IT OUTSOURCING SECURITY

IT OUTSOURCING SECURITY IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

This is not your grandfather s litigation. BUT. ediscovery Services are not legal services.

This is not your grandfather s litigation. BUT. ediscovery Services are not legal services. This is not your grandfather s litigation. BUT ediscovery Services are not legal services. TYPES OF ETHICAL ISSUES THAT MIGHT ARISE IN THE CONTEXT OF ediscovery: Document collection Privacy issues Inadvertent

More information

Eliminate the Paper Chase

Eliminate the Paper Chase Eliminate the Paper Chase with V-Rooms Virtual Data Rooms V-Rooms is an Internet-based, ondemand hosted service designed to speed the completion of financial transactions which may involve hundreds of

More information

Cybersecurity Health Check At A Glance

Cybersecurity Health Check At A Glance This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not

More information

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW

More information

Preparing for the Outsourcing Challenge: Legal Due Diligence to Ensure a Winning Service Provider Relationship

Preparing for the Outsourcing Challenge: Legal Due Diligence to Ensure a Winning Service Provider Relationship THE 4 TH NATIONAL CONFERENCE ON OUTSOURCING IN FINANCIAL SERVICES NEGOTIATING, MANAGING & TERMINATING OUTSOURCING RELATIONSHIPS WHILE ENSURING REGULATORY COMPLIANCE Renaissance Mayflower, Washington, DC

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

TRUSTMAN LEGAL SERVICES PVT. LTD. FIRM PROFILE

TRUSTMAN LEGAL SERVICES PVT. LTD. FIRM PROFILE TRUSTMAN LEGAL SERVICES PVT. LTD. FIRM PROFILE ABOUT US Trurstman Legal Services Pvt. Ltd, a leading Indian Law firm, with offices in Delhi and Mumbai, was established in 1998. Apart from its own offices,

More information

Ashley Clarke Hosted Desktop. Business Name

Ashley Clarke Hosted Desktop. Business Name Ashley Clarke Hosted Desktop Business Name Our Partner s Technology Partner Ashley Clarke s Hosted Desktop is a full featured Windows 8 style experience delivered from the cloud. One of the key advantages

More information