Hardly a week goes by when we don’t hear of a data breach. We recently heard about LinkedIn, a popular business social network, being hacked into (not for the first time). Many data breaches today are targeted at databases that contain collections of valuable data ripe for the taking (just ask Anonymous or Wikileaks).
There is a huge treasure trove of sensitive corporate documents sitting on litigation review platforms around the world. The convenience of logging into a review platform from anywhere makes these repositories attractive targets for corporate espionage, IP theft, and cyber gangs wanting to create mischief or embarrass a company.
When sensitive IP leaves the firewall of an organization, there are both ethical and legal obligations to zealously protect client confidences, trade secrets, personal information and, more generally, confidential information.
If the information is considered a high value target, the bad guys will work hard to try and find a way to get it. Very often, you will not even know of a data breach until long after the damage is done.
Best practices requires in house counsel, with help from their IT people, to always review the security of a hosted review environment, and perhaps consult with a security expert when dealing with highly sensitive corporate data to make sure it remains secure during review.
Wortzman Nickle has vetted the security of many hosted environments. If you have any questions or concerns, call us.