Loyalty, the Law and the Cloud
As the use of cloud computing and managed IT services increases, law firms face important questions about the loyalty of IT services providers and the security of their data.
We all value loyalty. A loyal person treats the other person as he/she would want to be treated and looks out for their interests.
In business, companies seek to develop customer loyalty, a characteristic that goes beyond the mere dollars and cents of the relationship. We all have our favorite brands, such as Microsoft, HP, Martindale-Hubbell or eMazzanti Technologies.
In corporate law, The Duty of Loyalty means that corporate directors have a legal responsibility to avoid conflicts of interest. In essence, the directors must put the corporation’s interests above their own.
In a law practice, attorneys have a duty of loyalty to both their employers and to clients. They must exercise loyalty and independent judgment in the client relationship, getting informed consent when conflicts of interest are identified.
As information technology advances and more law firms are moving data and services to the cloud, the question of loyalty arises. The traditional vendor/ customer relationship is one-to-one. Products and services are usually delivered separately to individual customers.
Being a shared service, cloud security is usually shared as well. In some cases practice data may be well-protected from outside threats but not as well from other customers on the same cloud server. Some cloud users have been able to read another customer’s files or access them by mistake. Of course, this creates concerns for law firms.
Other security concerns:
These are excellent questions and could each merit a detailed discussion. But, there is an overriding principal that is the point of this article – loyalty and trust matter as much as technology.
In 14 years of helping customers secure their valuable business assets eMazzanti Technologies has found that the weakest link in data security is the human element. Very often, data is lost or compromised because someone did not live up to the trust that was placed in them. They were either negligent or disloyal to the organization, and the result was costly.
Having data and programs on the cloud means that firms are potentially giving the staff of their cloud provider the key to their intellectual property and other confidential information. The same applies to IT managed services providers (MSPs).
The issues are loss of control and loss of ownership. Who has control of the data, who has access, and who really owns the data? As you can imagine, financial and compliance concerns for law firms abound.
A cloud or IT services provider who is loyal to his customers puts the firm’s interests first. They have got the firm covered with regard to these issues, because it matters to them. They see the relationship as a long-term partnership.
Working with a cloud provider or MSP that is loyal to the customer, one that can be trusted, should be the primary consideration. Because, in spite of all of the security technology provided with the firm’s network or cloud, it still comes down to the weakest link, the people. Can they be trusted with sensitive data?
Trust is earned over time. The relationship is built with multiple transactions and interpersonal contact that attorneys, by experience, have a feel for. One can imagine that the question, ‘Can we trust them?’ is often posed in discussions within the firm.
Though it takes time for an MSP to earn your trust, you have to start somewhere. When you are considering a new MSP or cloud provider, here are a few questions that are good indicators of loyalty:
You will have other questions to ask, but the point is, do you trust them? Having up-to-date technology is important, but so is loyalty and trust. The technology is only as good as those that stand behind it.
In today’s fast-paced digital landscape, businesses cannot thrive without effective collaboration. Microsoft continues its unwavering…
An email signature accomplishes much more than simply telling readers who you are and how…
Cyber security professionals work hard to safeguard companies’ information. But with criminals constantly changing their…
Domain-Based Message Authentication, Reporting, and Conformance (DMARC) is an e-mail security protocol designed to validate…
My job is to manage my law office’s cloud servers here at Justice Freaks. As…
My worst nightmare would be to date someone who isn’t who they say they are.…