Whitepaper

Conquering information retention and disposition

2Website hero images - edited - 3200x1482

We're seeing a growing realization among law firms that unchecked data proliferation has become too risk-laden and costly not to be tackled. Yet firms are often overwhelmed by the scale of the effort required to find, classify and minimize vast volumes of content. In this article, Chris Giles highlights the issues and walks you through the five steps that are helping firms conquer their information retention and disposition requirements..

We know that data is everywhere in law firms. Some of it aging. Some of it sensitive. Some of it in strange, inacces­ sible formats, or on forgotten legacy systems. Everyone feels an instinctive need to "clean house", but where to start? It's all too tempting to put it off and wait for someone else to take ownership. Yet while you're waiting for that to happen, your data mountain is growing and getting harder to scale.

More useful, at this point, is to develop a sense of urgen­ cy. Historically, records retention and disposition have been relegated to the second tier of information govern­ ance priority, with data security and anything that con­ tributes to revenue earning and collection taking prece­ dence. As this article explains, that needs to change. For four good reasons, information retention and disposition should be promoted to a top priority.

Reduce your vulnerability

The first reason is that bloated content repositories increase the firm's exposure to hackers because they promise juicier pickings for professional and determined criminals.

The second is that the costs of data storage are rising. This is particularly noticeable as firms increasingly migrate their data onto cloud-based document management systems or adopt Office 365 and tools like Microsoft Teams and SharePoint. The costs of enterprise data storage start to become really significant.
 
The third reason is that carrying excess data is a drag on firm productivity. It slows down and congests systems.

Fourth, excess data mitigates against consistently main­ taining compliance, both with a growing legion of data privacy regulations (see below), and with outside counsel guidelines (OCGs) that increasingly include stipulations around managing and destroying content on set time­ lines. This is further underscored with ISO accreditation requirements to implement consistent information governance policies and processes.

It's all leading firms to be increasingly conscious that retention and disposition do require action. In a recent LegalRM poll we found that 55°/o of respondents were motivated by concerns around data security and the fear of being hacked; 24°/o hoped to achieve cost savings; 13°/o were concerned to maintain regulatory or OCG compli­ ance; and a further 5°/o aspired to achieve and maintain infosec certifications, typically to ISO/IEC 27001, as clients start to mandate such accreditations or because they felt it gives them a competitive advantage when pitching for new business, but ultimately also reduces their vulnerability to cyberattack.

 

filing cabinet

Cautionary tales

Tackling the data mountain is also made more urgent by the fact that for many firms their IT estate is beginning to get away from them. This is because IT is far from new at this point. It's not unusual for firms to have legacy systems holding electronic records that are over 20 years old.

These can easily be so old that data is on unsupported platforms, meaning patches are no longer being issued, making them particularly vulnerable to cyberattack, and even more concerning is that often the firm may not even know what's on these older systems due to staff turnover.

For instance, we know an AMLAW 50 firm that stumbled upon a business intake and conflict resolution system that was superseded by a newer product more than ten years ago. At the time of the switchover, the old system was maintained because it was needed to consult earlier decisions for audit purposes. But time passed and it was never taken down. This system was full of person­ ally identifiable and other highly sensitive information, unsupported, and eminently hackable. Had the firm not found it, it would have gone on presenting a substantial, yet hidden, hazard.

A certain prominent UK criminal law firm was not so lucky. In 2022 the firm was heavily fined by the UK regulator (the Information Commissioner's Office) for breaching the UK's version of GDPR. The firm had failed to adequately secure data held on an older archive serv­ er. A ransomware attack encrypted 972,191 individual files on this server, of which nearly 25,000 were court bundles that included medical files, witness statements, names and addresses of witnesses and victims, and the alleged crimes of individuals. The attackers proceeded to publish 60 of these bundles on the dark web.

As it goes, this firm had a records retention policy, but hadn't applied it to this particular server. Consequently, the ICO found the firm was storing court bundles after the 7-year retention period had elapsed, causing the regulator to note: "A failure to adhere to or to justify departure from its retention practices creates concerns about compliance with Article S(l)(e) GDPR, which requires personal data to be "kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed.1"

But that's not even the worst that can happen when information governance fails. In March 2022 a 150-year­ old London Stock Exchange-listed law firm, Inee & Co, was the victim of a major cyberattack in which personal data was stolen and held to ransom. Thirteen months later, on 12 April 2023, the firm announced it had gone into administration following an irreversible slump triggered by the attack. 2 3

buuldings

Five step plan

To confront and mitigate the risks of excess information retention and haphazard disposition, it's time for firms to act coherently and systematically. This will decrease the likelihood of falling foul of regulators, hackers and clients (in relation to OCG breaches), increase the efficiency of systems, and save money on storage costs.

It may seem overwhelming, especially if you have dec­ ades-worth of different types of data, in diverse physical and electronic systems, in different practice areas, in need of different treatments and residing in different jurisdictions. But the journey of a thousand miles starts with one step. Accordingly, we recommend that firms embark on a logical, efficient and pragmatic five-step approach.

These steps are:

  • Identify and build a committee
  • Understand what data you have and where it is
  • Develop a retention and disposition policy
  • Execute the policy
  • Get destruction decisions across the line

3Website copy images - 1500x1500

Proceed iteratively

Finally, note that when we talk of five steps, it's not necessary to complete them sequentially. Rather firms should proceed iteratively on the basis of doing what they can do. It's true you shouldn't destroy data until you have the policy in place. But you needn't wait for the policy to be finalized before data mapping starts. It's a question of making progress wherever possible.

In tandem, firms should focus on the low hanging fruit by tackling what's easiest and nearest at hand first. That way it's simpler to get going and to achieve some "quick wins". Low hanging fruit might, for example, be the resur­ rection of an existing information retention and disposi­ tion policy or looking to reduce your OMS footprint before or as part of a migration to the cloud.

It's also sensible to think about where your highest risks are and tackle these early. Where in the firm is data most exposed and/or where is the most sensitive data concentrated? Typically, the data that will get firms into trouble with regulators is PII. But also, what commercially sensitive data do you hold? Mergers and acquisitions can be a rich seam for hackers who want to extort money via ransomware. Or does the firm have certain clients with very particular OCG requirements in relation to data; or who are higher profile and more likely to attract hackers or even hacktivists? It follows that there may be certain practice areas, clients or systems that should be given priority in your data retention project. So, think about your order of play.

2Website copy images - 1500x1500

Phone a friend

A further consideration is that the firm needn't do the all the work of data retention and disposition on its own. Quite the contrary, because there are commercial software tools such as iCompli that take much of the
burden off your hands by, for example, automating how a retention and disposition policy is systematically applied to mapped data. To make the most of these tools, it's wise to begin a conversation with software vendors early in the process. That way you'll minimize redundant effort and maximize the efficiency of your information retention and disposition project from day one.

Records retention and disposition is a big task, but not an insurmountable one, especially when you deploy tools that automate key processes. There are a lot of moving parts, but once you understand what you have, and what you're going to do with it, this fundamental obligation - broken down into bite-sized pieces - will not be as hard to conquer as you think.

Website copy images - 1500x1500