Here is the synopsis of our sample research paper on Ensuring Security in a Small Firm. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 3 page paper provides an overview of the major views regarding how to ensure security in a small law firm. This paper considers the use of technology and the implications. Bibliography lists 3 sources.
Page Count:
3 pages (~225 words per page)
File: MH11_MHitlawfir.doc
Buy This Term Paper »
 
Unformatted sample text from the term paper:
advancements have made it possible to discuss case information in real time, send and receive data with expediency, and transfer information in a timely manner in order to support efforts
for the best service for the client. Data security and confidentiality of documents are essential to the operation of the law firm and become increasingly complex in the presence
of advanced technologies. Relating the concerns, rational and recommendations for a security plan for a small law firm is based on the need to ensure client confidentiality and protect
the security of records in the law office. Concerns Increasing use of technology-based communications and research devices have led to questions of overall security in law offices (Goldman, 2010).
Confidentiality of documents that are sent and received in electronic format, confidentiality of discussions that occur via electronic communication devices and the need to protect access to computer systems to
protect the rights and information security for clients is essential in the changing business environment (Goldman, 2010). Security protocols are often developed because of concerns over the administration and
management of IT systems, the security of individual workstations, and the unauthorized access to client information (SANS Institute, 2007). The concern for the security of client information relates directly
to the legal responsibility of lawyers to provide for the confidentiality of their clients and to "preserve inviolate the secrets" of the individual client (ABA, 2010). Justification
and Explanation The justification for a plan that outlines security measures even for small firms is based on the growing use of Internet-based functions, increasing use of email and online
collaboration, and the belief that security breaches can result in the violation of client privilege that protects the confidentiality of legal communications. IT security measures protect everything
...