Dealing with top-secret transactions and inventions on a daily basis means we have to take security seriously. At Fenwick, we go to great lengths to ensure that our clients’ data is private and secure. With input from some of the world’s top security experts, we have designed and implemented sophisticated systems to mitigate security risks, and developed formal policies and protocols to safeguard our clients’ data around the world.
Because data security is so critical to how we conduct business, our internal security team reports directly to the firm’s senior management and is accountable to outside data security auditors. Our data security system includes:
Attesting to our industry leadership in law firm security, Fenwick was one of the earliest members invited to join the Legal Services Information Sharing and Analysis Organization (LS-ISAO). The LS-ISAO is an industry security group combining law firm and financial services participants. It develops best practices and quickly disseminates physical and cyber threat alerts. Participation in LS-ISAO is one example of the many ways Fenwick has prepared to respond to cyber and physical threats, vulnerabilities and incidents.
Our systems and controls cover our physical and virtual handling of confidential client information, including records management, electronic communications, forensic data collection and analysis, IT data handling, and IT physical and virtual security. We have also designed specific protocols for our work in geographic regions around the world where security issues carry greater risk and unpredictability.
Our formal business continuity and network security plans cover normal operating parameters as well as emergency response procedures. We conduct regular drills on our business continuity plan and, twice a week, meetings are held between security officers and network support staff to review security procedures, patch status and security protocols for all computers on the firm’s network. Twice a year we review our network security plan with a national expert on network security who has handled security audits for the U.S. Congress and is one of the very few quadruple Cisco Certified Information Experts (CCIE) in the world.
Our data continuity protocols also feature the following:
We have invested heavily in technology to protect our clients’ information and have assembled a team of IT professionals that are not only leaders among law firms, but leaders in their field. Members of our IT staff are regular speakers at national and international security and records management conferences, and the firm and our IT staff have won numerous awards for their innovative approach to IT infrastructure.
Our Data Security team meets regularly with our clients’ legal and IT teams to ensure best practices in data security. Contact Matt Kesner at (650) 428-4488 or email@example.com. to learn how we can help ensure your data is secure, wherever it resides.