Cobra Legal Solutions:
|
|
- Benjamin McBride
- 8 years ago
- Views:
Transcription
1 Cobra Legal Solutions: Cobra Legal Solutions response to ABA Commission on Ethics 20/20 Legal Process Outsourcing (Domestic and International) Call for Comments: C. For providers of legal process outsourcing services: 1. Where do your workers work? Cobra Legal Solutions offshore operational facility is located in Chennai, India. Chennai (formerly Madras) is the capital city of the Indian state of Tamil Nadu and is the fifth-largest city in India by population. Chennai has a broad-based economy predominated by the automotive, healthcare, hardware manufacturing, software and financial services industries. Chennai is India's second-largest exporter of software, information technology and IT-enabled services. The city has long been a major center for the outsourcing industry, and Cobra capitalizes on the modern, spacious facilities and proven, state-of-the-art technology and connectivity (telecom and transport) infrastructures that are in place. Numerous universities and educational institutions in Chennai graduate global talent and foster a highly skilled labor pool from which Cobra draws. Our employees work in Ascendas IT Park, in a state-of-the-art facility, which boasts a world class Data Center and up to date audio-video conferencing facilities. Our facilities conform to the highest and most stringent security measures, including ISO standards, biometric access, access card, CCTV monitoring, and round the clock physical security. 2. Are the workers who perform the outsourced tasks educated and licensed as lawyers somewhere? If some are and some are not educated and licensed as lawyers somewhere, what is the proportion of lawyer to non-lawyer? All employees performing outsourced legal work are Indian educated/licensed attorneys. Our Managing Director Litigation, an attorney trained and licensed in the United States, is on-site for the daily oversight, supervision, and management of Cobra s team of lawyers. He works directly with clients and outside counsel to facilitate the smooth running of a project. 3. What proportion of lawyer workers are educated and licensed in the jurisdiction where they sit, educated and licensed in the jurisdiction whose law governs or educated and licensed in the U.S? All of our reviewing attorneys (currently 54) are educated in India and are licensed to practice throughout the country. Our Managing Director Litigation, Kevin Clark, is a U.S. trained and licensed attorney. Mr. Clark is a member of the Bars of the District of Columbia and the State of Illinois. He is admitted to practice before the United States Supreme
2 Court, United States Courts of Appeal for the 7th, 10th, Federal, Veterans Claims, and District of Columbia Circuits, and the United States Court of International Trade. Mr. Clark is also a licensed Solicitor before the Supreme Court of England and Wales. 4. For non-u.s. based providers do you have a staffed physical presence in the U.S? Who staffs it (e.g., U.S. licensed lawyers) and what is done there? Cobra maintains its headquarters at 1501 Broadway in New York City. From this strategic location our CEO and Managing Director (both non-lawyers) are best able to manage client relationships with fast and easy access to clients throughout the United States and the United Kingdom. Corporate administration and litigation technology consulting services are also provided from our New York location. Cobra does not have review facilities in the United States. 5. How do you decide which individuals should work on which matters? Cobra Legal Solutions seeks to staff projects with the most appropriate personnel available. Staffing is based on past performance and training evaluations. Cobra s training team provides feedback on each employee, based on evaluative exercises conducted for each activity. This feedback is sent to HR and management on a regular basis. A resulting performance matrix highlights each employee s skill sets. Work is assigned to individuals based on the performance matrix. 6. What do you do to help your employees understand the U.S. rules of professional conduct and who provides this education or training? Cobra has an exclusive training team that educates new recruits on U.S. rules of professional conduct and ethics. A comparative study of Indian laws and U.S. standards on professional conduct and ethics reinforces our Indian attorneys understanding of the U.S. rules on professional responsibility. The main purpose behind our training is to help employees understand the importance of professional conduct and ethics and their role in the context of the LPO industry. Our team of lawyers is kept up-to-date on the latest events in the industry, specifically in reference to views and opinions within the U.S. legal establishment regarding the issues of professional conduct and ethics within the legal outsourcing industry. Additionally, each time an employee is deployed on a project, he or she signs a confidentiality agreement and a conflicts check form which act as constant reminders to an employees adherence to some of the most important rules of professional ethics. The Cobra Training team, along with Kevin Clark, Managing Director - Litigation, provides training to our lawyers. Mr. Clark has extensive experience
3 as a litigation attorney supervising document reviews and other areas of discovery services. He has developed sophisticated best practices for quality control that have been repeatedly praised by our clients, and allow them, as they attain a comfort level with our work product, to avoid spending unnecessary (and billable) time reviewing and modifying things prior to a document production. 7. How do you do train and assess the competence of your workers and assess and verify the quality of the work done? Our employees undergo an intensive training program during which they are evaluated to determine their competence. Cobra provides both induction training and continual training. Induction training provides our newly hired employees with the knowledge and information required to understand the nature of the document review/research and writing process. Our induction training is a twelve-week course that includes: U.S. Federal Rules of Civil Procedure with a focus on Discovery; E-Discovery basics using the EDRM Model to ensure best practices; Litigation application training (Case Central); Document review training on the dummy database; Introduction to U.S. legal research and writing (Bluebook, citations, sources, and style); and Introduction to the U.K. legal system (focus on laws of England and Wales). Continual training is given to existing employees to address specific client- and project-based requirements (i.e., contracts, intellectual property rights, legal research and writing). In addition, English language training is also provided, covering the basic rules of English, the appropriate usage of the rules, the differences between American and British English, and terms and phrases used in the United States. Our continuing legal education activities include, but are not limited to: Introduction to document review software tools; Dummy database training and simulation of real time scenarios; Intellectual Property training; Contract Management training; Advanced legal research and drafting techniques;
4 Daily reading and comprehension exercises based on current events in U.S. legal and business fields (Wall Street Journal, New York Times, and Washington Post); and Training in U.S. grammar and idioms. The quality of work performed by our employees is assessed and verified by our Project Management Team, led by the Managing Director Litigation. Error Tracker Reports and additional feedback is sent to them in real time. Cobra also has comprehensive Quality Control and Quality Assurance procedures in place. These procedures are based on Six Sigma principles and refined project management and process management processes. We are currently being certified for ISO 9001 for Quality Management. Assessing and verifying the quality of work is an on-going process that is always being improved upon. 8. What types of security systems to you have in place to ensure data integrity and compliance with confidentiality requirements of those who hire you? At Cobra, we take a holistic approach to security and confidentiality. We address security and confidentiality through network/data security, premises security, and employment policies. In addition, a Business Continuity Plan and Disaster Recovery Plan are in place. Network/Data Security Cobra s operations facility utilizes ISO compliant information security management systems and practices. Data is delivered to and maintained by a hosting company selected by the client. Data files are never bulk transferred to Cobra. Cobra only sees images of folders and documents. Terminal and Citrix servers are used to connect our U.S. server with the client s server. By this methodology, the client s data is secure and cannot be downloaded to Cobra s local system. We do a full backup and a differential backup daily for all servers and user folders based on the criticality of files being backed up. In case of any failure, the backup will be restored as per the documented procedure. Transmission of data is secured over 128-bit SSL protocols. We use secured VPN connectivity, to encrypt or decrypt data for maximum security. A VLAN is in place to prevent merging one client s information with that of another. All incoming and outgoing data is routed through Antivirus servers. Virus definitions are updated daily.
5 Upon completion of a project, we use third-party software to securely purge our hard disks of the client s documents and data. All s are monitored through a third-party application. s sent to outside domains are immediately blocked and an alert is sent to the administrator. Application and device control blocks all USB, CD/DVD drives, floppy drives, Bluetooth, and optical devices. Unified theft management devices are used to monitor and track all incoming and outgoing packets. Premises Security Fencing surrounds our tech park with manned gated entry points. ID checks are issued upon entry to the building. Card access is required for building elevator banks. A security guard is present 24/7 at the single entry point to our offices. Group access is restricted. Biometric (thumbprint) access controls entry to our data center. Audits are performed to analyze unauthorized access to the data center. 16 high resolution CCTVs inside the data center monitor unauthorized access. Card access to our separate, secure IT control room is limited to our IT team and senior management. APC UPS with 80 KVA centralized UPS system/30 KVA centralized UPS system for data center. We conduct periodic security workshops and regular internal compliance audits. We have dedicated customer workspace. Our facility has segregated, secure project rooms for specific clients and no information can be taken out of the locked, dedicated rooms. Employment Policies Cobra team members have monitored and restricted Internet access. The Managing Director Litigation, a trained and barred U.S. attorney, handles all correspondence between clients and Cobra. Copiers and printers are not available to the review staff. Printer rights are limited to the printing of management reports and training materials. Read/write drives are not available on the same machines used for review by the review staff.
6 We do not create hard copies of review manuals, counsel lists, and other sensitive material. Only a limited number of people who have worked on the live project for a client and have signed the Non-Disclosure Agreement (NDA) have access to the electronic copies of these documents during the project. Access is revoked immediately after the project wraps up. Scheduled and random audits are performed regularly to ensure adherence to all principles and procedures. We do not employ temporary staff. Cobra does not use subcontractors to provide our services. All of our employees are screened as per the BS7858 standards. An independent firm conducts background checks of Cobra s U.S. executives. The results include education verification, past employment verification and references (including gap analysis), character reference checks, financial history (including credit reports), and criminal history checks. The Board of Directors also conduct its own independent background checks and due diligence, by back channels, such as checking their references and making industry inquiries. a. If there is a difference in security systems for work performed inside and work done outside the U.S., please explain. Our U.S. headquarters does not provide legal services. Security measures described above pertain to our offshore facility only. 9. What types of systems do you have in place to avoid conflicts of interest regarding those who hire you? Our employees undergo a series of background checks before and during employment. All Cobra employees and attorneys sign a confidentiality agreement to protect the client s information. Potential conflicts are verified before every engagement by adhering to the ABA Model Rule 1.7. All information regarding parties currently and previously engaged by Cobra review attorneys are continuously updated. If there are potential conflicts based on the ongoing reviews, those potential conflicts are immediately disclosed. In addition, we have a conflicts of interest process we utilize when engaging a new client or a new project with an existing client. This consists of a conflicts check with regards to our other clients and our employees. 10. Are you regulated? In what way and by whom? Are there competing regulations and regulators? Cobra supports the creation a self-regulating body that would work hand-inhand with the ABA to set minimum thresholds for companies in the LPO industry, and provide a set of principles and guidelines to ensure the proper
7 development of this market. At present the LPO industry does not have a regulatory body. However, in India, LPO industry players are in talks to form an association of LPO companies. Further, the leading LPO companies are in discussion with Nasscom, CII and PHDCCI to form a regulatory body. This would help the LPO industry set up standards as well as win the confidence of clients abroad. The association will work towards creating standards for quality service similar to those adopted by the software industry. It also plans to provide standardized training procedures for lawyers who intend to join LPO companies. Such an institute or industry body would provide basic training to lawyers and would familiarize them with international legal issues. Cobra Legal Solutions, and other LPO companies that only hire lawyers, are educated in international legal issues. We abide by the ethical opinions given by the American Bar Associations on the Ethics of Legal Outsourcing. We, along with the ABA board, would like to take the initiative to formulate a set of common regulations for the LPO industry that would help to create a fair playing field for all LPO service players, stakeholders, and legal departments. We are open to abide by the policies and regulations on legal outsourcing of countries other than the U.S.
How To Handle A Legal Outsourcing Situation
LEGAL PROCESS OUTSOURCING COMMENTS & SUMMARIES TABLE OF CONTENTS CCBE (Conseil des Barreaux Européens/Council of Bars and Law.p. 5-6 Societies of Europe) CCBE provides a copy of the CCBE guidelines on
More informationMAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
More informationISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
More informationVMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
More informationISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
More informationCyber Security Best Practices
Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters
More informationFreelance Lawyers. The industry's best kept secret. Christopher Kozlowski
Freelance Lawyers The industry's best kept secret. Christopher Kozlowski About Me Co-founder and partner of Streamline Litigation, which I started while I was still in law school at Villanova University
More informationTenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014
Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology
More informationLAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)
CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access
More informationPrint4 Solutions fully comply with all HIPAA regulations
HIPAA Compliance Print4 Solutions fully comply with all HIPAA regulations Print4 solutions do not access, store, process, monitor, or manage any patient information. Print4 manages and optimize printer
More informationBOLDCHAT ARCHITECTURE & APPLICATION CONTROL
ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide
More informationRESEARCH SUMMARY: Security and Data Privacy Best Practices in Offshoring By neoit
Offshore Insights White Paper www.neoit.com September 2003 Issue 12 RESEARCH SUMMARY: By neoit How can you mitigate security risks while offshoring? How will a third party security organization help in
More informationHIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION sales@eaglenetworks.it +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
More informationSERVICE ORGANIZATION CONTROL 3 REPORT
SERVICE ORGANIZATION CONTROL 3 REPORT Digital Certificate Solutions, Comodo Certificate Manager (CCM), and Comodo Two Factor Authentication (Comodo TF) Services For the period April 1, 2013 through March
More informationWhite Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
More informationXerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk
Xerox Litigation Services In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Your Highest Priority is also Your Greatest Challenge Data breaches are not just
More informationSupplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
More informationLas Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
More informationIBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
More informationLauren Hamill, Information Governance Officer. Version Release Author/Reviewer Date Changes (Please identify page no.) 1.0 L.
Document No: IG10d Version: 1.1 Name of Procedure: Third Party Due Diligence Assessment Author: Release Date: Review Date: Lauren Hamill, Information Governance Officer Version Control Version Release
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationCloudDesk - Security in the Cloud INFORMATION
CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES
More informationGeneral Computer Controls
1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems
More informationVishaSoft ITES Services
VishaSoft ITES Services Service Offerings Data Preparation, Conversion & Digitisation Services Text / Data Entry Data extraction / Online data retrieval from web Word Processing Scanning Services File
More informationEnsuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and
More informationHeather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
More informationWHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery
WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed
More informationEnsuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services
Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Introduction Patient privacy continues to be a chief topic of concern as technology continues to evolve. Now that the majority
More informationOPINION 21-12 APPLICABILITY OF RULE 49 TO DISCOVERY SERVICES COMPANIES. Issued January 12, 2012
OPINION 21-12 APPLICABILITY OF RULE 49 TO DISCOVERY SERVICES COMPANIES Issued January 12, 2012 Pursuant to District of Columbia Court of Appeals Rule 49, and specifically its section 49(d)(3)(G), the District
More informationCONTENTS. Security Policy
CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER
More informationInformation security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
More informationAn organization properly establishes and operates its control over risks regarding the information system to fulfill the following objectives:
p. 1 System Management Standards Proposed on October 8, 2004 Preface Today, the information system of an organization works as an important infrastructure of the organization to implement its management
More informationDATA SECURITY POLICY. Data Security Policy
Data Security Policy Contents 1. Introduction 3 2. Purpose 4 3. Data Protection 4 4. Customer Authentication 4 5. Physical Security 5 6. Access Control 6 7. Network Security 6 8. Software Security 7 9.
More informationBuilt by the clients, for the clients. Utilizing Contract Attorneys for Document Review
Built by the clients, for the clients Utilizing Contract Attorneys for Document Review Ashish Prasad, Esq. October 27, 2014 Table of Contents Introduction... 3 Ethical Issues... 3 Staffing of Reviewers...
More informationThe Lien Resource. Why Outsource Medical Liens & Healthcare Reimbursement?
1 2 The Lien Resource Why Outsource Medical Liens & Healthcare Reimbursement? Eliminate the cost and time-drain of resolving liens in-house at no additional cost to your firm; Increase the likelihood of
More informationby: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy
Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy June 10, 2015 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT
More informationData Privacy and Security: A Primer for Law Firms
Data Privacy and Security: A Primer for Law Firms All We Do Is Work. Workplace Law. In four time zones and 46 major locations coast to coast. www.jacksonlewis.com JACKSON LEWIS SERVING THE DIVERSE NEEDS
More informationEmail archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies.
Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies. Data Sheet: Symantec.cloud Email Compliance Redefined Our new and improved version of redefines
More informationVirtual Data Room. www.millnet.co.uk/vdr. From Deal Making to Due Diligence
Virtual Data Room From Deal Making to Due Diligence Built with the leading Investment Banks and Law Firms, our revolutionary technology is used by tens of thousands of professionals all over the world.
More informationAn Introduction to HIPAA and how it relates to docstar
Disclaimer An Introduction to HIPAA and how it relates to docstar This document is provided by docstar to our partners and customers in an attempt to answer some of the questions and clear up some of the
More informationwhite paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations
white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations WWW.EPIQSYSTEMS.COM 800 314 5550 Mitigate Risk in Handling ediscovery Data Subject to the U.S.
More informationEthics in Technology and ediscovery Stuff You Know, But Aren t Thinking About
Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About Kelly H Twigger, Esq. Oil and Gas Symposium Arkansas Law Review October 16-17, 2014 Overview In the last two decades, business
More informationCyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s
Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices
More informationHIPAA COMPLIANCE AND
INTRONIS CLOUD BACKUP & RECOVERY HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction 3 The HIPAA Security Rule 4 The HIPAA Omnibus Rule 6 HIPAA Compliance and Intronis Cloud Backup and Recovery
More informationInformation Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
More informationEndless opportunities
Endless opportunities Gaining a Competitive Advantage through Outsourcing Outsourcing has become one of the most successful tools for large corporations to remain competitive in the 21st century. The advantages,
More informationETHICS for Lawyers and Law Firms Using Cloud Technology
ETHICS for Lawyers and Law Firms Using Cloud Technology Donna Kirk Seyle ~ Legal Tech Advisor: Law Practice Strategy 108 MONTESANO ST SANTA CRUZ, CA 95062 (831) 332-2243 Donna Seyle is an attorney, author,
More informationMIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
More informationSecurity Control Standard
Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the
More informationA Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
More informationWHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0
WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of
More informationCompany Overview. History
Company Overview Key Concepts is an India based software outsourcing company that focuses on highly qualitative, timely delivered and cost-effective offshore software development, e-commerce solutions,
More informationOn-Site Computer Solutions values these technologies as part of an overall security plan:
Network Security Best Practices On-Site Computer Solutions Brian McMurtry Version 1.2 Revised June 23, 2008 In a business world where data privacy, integrity, and security are paramount, the small and
More informationEstate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
More informationNine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
More informationWhite Paper. Support for the HIPAA Security Rule PowerScribe 360
White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as
More informationUsing Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
More informationEnsuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Introduction Patient privacy has become a major topic of concern over the past several years. With the majority of
More informationPCI DSS COMPLIANCE DATA
PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities
More informationA Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
More informationNewcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
More informationSUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
More informationGuardian365. Managed IT Support Services Suite
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
More informationHigh Availability of VistA EHR in Cloud. ViSolve Inc. White Paper February 2015. www.visolve.com
High Availability of VistA EHR in Cloud ViSolve Inc. White Paper February 2015 1 Abstract Inspite of the accelerating migration to cloud computing in the Healthcare Industry, high availability and uptime
More informationCHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
More informationVeritas AdvisorMail. Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies
Veritas AdvisorMail Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies Email compliance redefined Our new and improved version of redefines
More informationSecurity Guide for the BD Remote Instrument Support Solution BD Biosciences workstations
Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations 11/2010 This document includes the following topics: About this guide (page 2) TeamViewer remote desktop support
More informationComputers and Society: Security and Privacy
1 Chapter 12 Computers and Society: Security and Privacy 2 Chapter 12 Objectives 3 Computer Security: Risks and Safeguards What is a computer security risk? 4 Computer Security: Risks and Safeguards 1
More informationOutsourcing Legal Research and Writing Projects
Outsourcing Legal Research and Writing Projects by Lisa Solomon 6 Why Outsource Your Legal Research and Writing Projects Lawyers outsource legal research and writing projects for a variety of reasons.
More informationUnit 6 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.
Running head: UNIT 6 RESEARCH PROJECT 1 Unit 6 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/28/2014 UNIT 6 RESEARCH PROJECT 2
More informationSecuring Content: The Core Currency of Your Business. Brian Davis President, Net Generation
Box Security Whitepaper Box: Redefining Security for the Cloud Securing Content: The Core Currency of Your Business We know that your content is the core currency of your business. Product requirements,
More informationEnsuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services Page 2 of 8 Introduction Patient privacy has become a major topic of concern over the past several years. With the majority
More informationWHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery
WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights
More informationSNAP WEBHOST SECURITY POLICY
SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one
More informationIBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
More informationADEC GROUP INFORMaTiON SecURiTY AND CONTROLS
ADEC GROUP INFORMaTiON SecURiTY AND CONTROLS Rising To Global Information Challenges Information is your most valuable commodity today. As a global enterprise servicing a wide range of businesses, ADEC
More informationSecurity Overview. BlackBerry Corporate Infrastructure
Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security
More informationFaster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions
Faster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions Table of Contents Introduction... 3 1. Data Backup: The Most Critical Part of any IT Strategy...
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationLegal Process Outsourcing & Offshore Law Services
Legal Process Outsourcing & Offshore Law Services Trustman & Co. http://trustman.org March 20, 2014 Copyright2010 Trustman&Co. 1 About Us Established in 1998, Trustman & Co., is a full service law firm
More informationInternet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
More informationVirtual Data Room Security 2. Service 3. Simplicity 4. Speed 5. Cost Certainty
Virtual Data Room Transactions are becoming increasingly more complicated. Deals involve numerous participants who need access to an increasing number of documents at all stages of the deal. This creates
More informationDraft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
More informationProtection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
More informationPolicy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
More informationTHE TRANSFORMATION IN LEGAL MIDDLE OFFICE SERVICES
THE TRANSFORMATION IN LEGAL MIDDLE OFFICE SERVICES BY MICHELLE ROSEN Within law firms, administrative functions have undergone a dramatic evolution. While the need for traditional word processing has been
More informationGREAT EASTERN TECHNOLOGY BPO / ITES
GREAT EASTERN TECHNOLOGY BPO / ITES BPO/ITES About Great Eastern Technology 1 IT Enabled Services 2 Outsourcing to Great Eastern Technology 3 Core Values & Differen ators 4 BPO Por olio 5 Physical & Data
More informationLevel I - Public. Technical Portfolio. Revised: July 2015
Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center
More informationSecurity Framework and Best Practices in Offshore Outsourcing
February 2008 Security Framework and Best Practices in Offshore Outsourcing By Indy Banerjee, Director Bindu Sudhir, Senior Research Analyst Prabhash Thakur, Senior Advisor CONTENTS 2. Introduction 2.
More informationWHY you should. choose a. CERTIFIED FINANCIAL PLANNER TM practitioner
WHY you should choose a CERTIFIED FINANCIAL PLANNER TM practitioner Choosing a financial planner may be one of the most important decisions you make for yourself and your loved ones. Financial planners
More informationIT OUTSOURCING SECURITY
IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationplantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
More informationThis is not your grandfather s litigation. BUT. ediscovery Services are not legal services.
This is not your grandfather s litigation. BUT ediscovery Services are not legal services. TYPES OF ETHICAL ISSUES THAT MIGHT ARISE IN THE CONTEXT OF ediscovery: Document collection Privacy issues Inadvertent
More informationEliminate the Paper Chase
Eliminate the Paper Chase with V-Rooms Virtual Data Rooms V-Rooms is an Internet-based, ondemand hosted service designed to speed the completion of financial transactions which may involve hundreds of
More informationCybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
More informationINFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW
More informationPreparing for the Outsourcing Challenge: Legal Due Diligence to Ensure a Winning Service Provider Relationship
THE 4 TH NATIONAL CONFERENCE ON OUTSOURCING IN FINANCIAL SERVICES NEGOTIATING, MANAGING & TERMINATING OUTSOURCING RELATIONSHIPS WHILE ENSURING REGULATORY COMPLIANCE Renaissance Mayflower, Washington, DC
More informationHIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
More informationTRUSTMAN LEGAL SERVICES PVT. LTD. FIRM PROFILE
TRUSTMAN LEGAL SERVICES PVT. LTD. FIRM PROFILE ABOUT US Trurstman Legal Services Pvt. Ltd, a leading Indian Law firm, with offices in Delhi and Mumbai, was established in 1998. Apart from its own offices,
More informationAshley Clarke Hosted Desktop. Business Name
Ashley Clarke Hosted Desktop Business Name Our Partner s Technology Partner Ashley Clarke s Hosted Desktop is a full featured Windows 8 style experience delivered from the cloud. One of the key advantages
More information