Bring It On
Transcription
Bring It On
legal management VoLume 32 The magazine of The associaTion of LegaL adminisTraTors 40 BYOD SeCURItY anD SUPPORt training, policy and tools for law firms navigating new tech management models June 2013 number 4 • OM 40 W W W. A L A N E T. O R G BRING IT ON EIGHT TIPS FOR TACKLING BYOD SECURITY AND SUPPORT BY MARY K ATE SHERIDAN When it comes to modern technology, employees may no longer be asking what your firm can give them but rather what they can contribute. Welcome to consumerization and the Bring Your Own Device (BYOD) movement. With newer, faster, more innovative gadgets constantly emerging – and no doubt luring your attorneys and staff with their bells and whistles – your firm is hardly immune from this phenomenon. In fact, according to the International Legal Technology Association’s 2012 Technology Survey – which polled 487 small, mid-sized and large law firms – attorneys at more than 40 percent of the responding firms are buying their own devices. BYOD is more than a passing fad within the legal industry, with law firms themselves anticipating its significant future impact. More than a quarter of respondents in ILTA’s 2012 Legal Technology Survey believe that BYOD/ Consumerization/Mobile Devices “will create significant change or be a major factor in the legal technology profession” during the next three to five years. LEGAL MANAGEMENT J U N E 2 0 13 41 Natalie Lambert, Director of Product Marketing, Citrix Systems “Enterprise mobility management is all about being able to secure and manage the mobile device, the mobile applications and the mobile data and [being] able to do this in a way in which you can ensure ... the flexibility of users to access all of this content.” Adopting BYOD isn’t as simple as turning over the mobile-technology reins to employees, though. Firms must consider how BYOD affects critical issues like client confidentiality, privilege, records management and general security – a challenging task given that the practice is still evolving. As your firm ventures into the BYOD world, consider the following tips for developing your security and support strategies. 1. ESTABLISH A POLICY. Allowing attorneys and staff to use their own smart phones, tablets, laptops and other devices may seem like a technology “Wild West.” That’s precisely why firms offering BYOD should create a formal policy. “It’s very important to have a BYOD policy,” said Silas McCullough, mindSHIFT Technologies General Manager, Legal Professional Services. McCullough suggests that firms include five key points in a BYOD policy: 1. device security; 2. device support; 3. who controls the device; 4. which applications are permissible; and 5. data backup. A clear policy will give users an understanding of their responsibilities and potential consequences if things go awry with the device, as well as delineate the firm’s expectations and the level of support it will offer. Even if your firm eschews BYOD as a formal program, you should still address use of personal devices in the firm policies, said Kathryn Ossian, Principal at Miller Canfield. The firm doesn’t want to be unprepared if a defiant employee uses a personal device for firm matters. When creating its BYOD policy, a firm should consult with legal counsel to ensure that its BYOD standards and procedures (including all of the areas discussed below) comply with the law and properly protect employee privacy. 2. PROVIDE BYOD TRAINING. Thorough training is essential for ensuring that attorneys and staff understand the firm’s policy and why 42 W W W. A L A N E T. O R G responsible use of the devices is critical. Firms should offer in-person training or some type of virtual session and provide users with an agreement, “so that everyone understands what the rules are and what the policy requires and they’re not going to be surprised then when something happens,” said Ossian. Central to any training or intranet materials should be proper security habits and safe computing, said Shane Swacus, Manager at HBR Consulting. Swacus recommends that firms train users on the importance of applying password protection, securing devices correctly and not using software that isn’t firm approved. Explaining the significance of such measures and how missteps may compromise security can encourage users to think more deeply about their technological actions. 3. EMBRACE ENTERPRISE MOBILITY MANAGEMENT. Securing and supporting various types, brands and styles of devices is a daunting task, especially when such devices are controlled by the users, not the firm. One set of tools that allows firms to balance firm security and support with users’ personal experience is enterprise mobility management (EMM). EMM encompasses mobile device management (MDM), mobile application management (MAM), and enterprise file synchronization and sharing (EFSS). “Enterprise mobility management is all about being able to secure and manage the mobile device, the mobile applications and the mobile data and [being] able to do this in a way in which you can ensure ... the flexibility of users to access all of this content,” said Natalie Lambert, Director of Product Marketing, Citrix Systems. • M obile Device Management MDM provides firms with the capability to secure the device itself. “At the end of the day, MDM is there to provide a security line to any device,” said Lambert. “It gives the administrators the ability to manage and control all of the different devices and how they act Silas McCullough, mindSHIFT Technologies General Manager, Legal Professional Services “You have to think about this as a close partnership between the person using the device and the firm itself. Be clear and say, ‘If you lose the device, these are the steps you should take.’” when they connect to corporate resources.” Among the security measures possible through MDM are: • Remotely wiping the device • Detecting jailbroken devices and restricting their access • Restricting access to devices that lack the required antivirus protection • Enabling data encryption • Gaining visibility of the devices connecting. “A good BYOD policy and, in my opinion, a strong MDM platform go hand-in-hand,” said Swacus. “It’s a lot of work up front [and] a lot of money up front, but the benefits far outweigh that.” • Mobile Application Management Firms shouldn’t focus solely on protecting the physical device, however; they should also strive to safeguard firm content by managing the applications on the device. Lambert advises against blanket prohibitions on applications. Instead, firms can use MAM to concentrate on the applications used for firm data, while users maintain control over their personal applications. One MAM tool, known as “wrapping,” allows firms to put an application in a container and assign rules to it, said Lambert. For example, firms can designate how applications interact or can require data encryption within a specific application. Users will complete work-related tasks through these firm-controlled applications but will also have personal-use applications without such controls. • Enterprise File Synchronization and Sharing The final piece of an EMM strategy is to manage firm data on a device through EFSS. With an EFSS tool, firms can control how users access and share firm-related data and also can manage storage of such data. WHEN BYOD IS TOO PERSONAL While some of your attorneys and staff may be clamoring for the latest technology and pushing to use their own high-tech devices, others may be satisfied with any functional device. In fact, some may prefer to segregate their work and personal technology. Or some employees may not be comfortable exposing their personal devices to the firm’s security and support measures, even if those measures are executed through EMM. Firms that adopt a BYOD practice may still want to offer firm-owned devices to those employees who prefer not to use personal devices for firm matters. LEGAL MANAGEMENT J U N E 2 0 13 43 Shane Swacus, Manager, HBR Consulting “A good BYOD policy and, in my opinion, a strong MDM platform go hand-in-hand. It’s a lot of work up front [and] a lot of money up front, but the benefits far outweigh that.” • Beware of Sidesteppers While firms can limit how firm content is sent, used and stored on the device through EMM, firms must also prepare for employees who circumvent the system (e.g. an employee who sends a firm document to his or her personal email and then uses personal applications to complete work). Even with a well-developed EMM strategy, the firm’s BYOD policy and training remain critical in educating users on the importance of security and their actions. 4. SET SECURITY STANDARDS. Whatever services and methods the firm employs to secure and support personal devices, it should establish basic security standards to protect confidential firm data and the firm’s network. Some of the security measures that McCullough and Swacus suggest include: • Requiring passwords on all devices • Implementing two-factor verification on the devices, with a pin and a rotating token • Encryption • Ensuring the device can be remotely locked and wiped • Identifying which applications are permitted for workrelated tasks. 5. P REPARE FOR MISSING DEVICES. One downside of portability is that devices may be easily lost or stolen. Firms should outline the procedure for missing devices in the BYOD policy and training. “You have to think about this as a close partnership between the person using the device and the firm itself,” said McCullough. “Be clear and say, ‘If you lose the device, these are the steps you should take.’” And when it comes to lost or stolen devices, the first step that firms should require is notification, said Ossian. Once notified, firms may decide to wipe or lock the device. Firms using EMM may have the ability to wipe only the firm-specific data. But wiping the device can be 44 W W W. A L A N E T. O R G a delicate matter if the firm decides to wipe everything, including the user’s personal data. “This is definitely one of those grey areas that firms struggle with: to what degree do you force on them wiping or getting that material off the machine?” said McCullough. 6. DON’T FORGET: THIS IS PERSONAL. Typically, with firm-owned devices, departing employees turn in the technology on their way out the door. But with BYOD, those devices will be hitting the exits with the employees, and firms must determine how to clear them of all firm-related data: wiping firm-related data, wiping the entire device, asking the user to clear firm data, or some other method. In the end, it all goes back to the firm’s policy: “It’s got to be addressed in the policy itself and that way there’s no doubt or question about what’s going to happen,” said Ossian. 7. MANAGE THE DATA. One area that is likely at the top of every firm’s BYOD agenda is records management. McCullough recommends that firms leverage the records management tools they already have. As with all aspects of BYOD, firms should outline how records management will work in the policy so users understand their obligations and the extent of the firm’s support. Intersecting with records management is the issue of litigation holds. If the firm already controls all firmrelated data through EMM or has an organized records management system in place, preservation may be straightforward. But if users control some or all of the data or if a firm is concerned that data has somehow been saved outside of its EMM controls, preserving data may become more cumbersome. “There has to be an agreement by the employee and as part of the policy ... that any content that’s on the phone that relates to firm business is owned by the firm and that the employee is certainly obligated to take any direction that the firm imposes ...” said Ossian. “In the event of a litigation hold, it may mean that they turn their phone in.” Of course, firms must be wary of privacy concerns and any other legal obligations when dealing with employees’ personal information and should consult counsel when developing their strategy. important is the understanding that issues can arise 24 hours a day, said McCullough. Firms with fewer resources may seek outside help to ensure appropriate security. “One thing that I think is effective is that they outsource not only the MDM but the management,” said McCullough, who urges firms to “set the right expectations.” g About the author 8. UNDERSTAND YOUR CAPABILITIES. When it comes to security, the last thing you want is to have insufficient resources. Firms that embrace a BYOD program should assess the security and support needed not only to successfully manage BYOD but also to tackle any issues or crises that materialize. Particularly BREAKING Mary Kate Sheridan is a writer, editor, blogger and attorney. She received her JD from Columbia Law School and her bachelor’s degree in English from Mary Washington College. Contact her at mk@marykatesheridan.com. THE GOLDEN RULE OF SHARING With all of the interactive offerings that modern devices provide, it’s easy to see why users may frequently share their devices with others, whether they’re letting their kids play games, asking someone to take photos, paying for their lattes, scanning their airline boarding passes or showing a friend the latest headline. From the firm’s perspective, however, these devices aren’t merely personal toys; they contain confidential firm data for the user’s eyes only. Firms must consider what guidelines are appropriate in these circumstances and include such standards in their policy. Silas McCullough, mindSHIFT Technologies General Manager, Legal Professional Services, has seen two approaches: one in which firms place the responsibility on the attorney to preserve confidentiality and another in which the firm specifically restricts device users to the attorney only. When placing any restrictions on personal use, however, the firm should consult counsel to ensure it is in compliance with the law. LEGAL MANAGEMENT J U N E 2 0 13 45