What should in your policy plus downloadable Word templates for these policies: Working Remotely; Information Security Program; Data Handling; Vendor Management
What your cybersecurity firm policy should contain
". . . another way a [firm] may address the risks associated with human factor is by elaborating a comprehensive policy that informs [lawyers and] employees on how to deal with the [firm's] technology, its devices, its web applications (including email) and its electronic information as well as any personal devices that come into contact with the [firm's] IT infrastructure. In elaborating such a policy, [firm leadership] may consider:
- using language that is easily understood by all [lawyers and] employees – not only technology or security specialists;
- specifying what constitutes intellectual property, confidential information, sensitive business information, and other assets which the policy seeks to protect;
- emphasizing the importance of cybersecurity and explaining the potential risks to allow [lawyers and] employees to understand what is “at stake” by using real life examples to which employees can relate to;
- specifying what can or cannot be done with the business’ technology, devices, web applications (including email) and electronic information;
- specifying who is responsible for the policy specifically or cybersecurity generally;
- specifying the hierarchy of who to contact if there are any questions or incidents as well as how to contact such persons; and
- specifying the costs and consequences to the business and individual employees who fail to respect the policy.
In order to ensure that such policy is an effective tool, a [firm] may consider regularly reinforcing its application through information sessions and internal communications (i.e. emails, videos, portal) and its compliance through proper audit and monitoring."
Adapted from: Vanessa Coiteux, Cyber-attacks: why any business may be at risk and five possible ways to address the risks, MARCH 8, 2016
Attachments: