
We're seeing a growing realization among law firms that unchecked data proliferation has become too risk-laden and costly not to be tackled. Yet firms are often overwhelmed by the scale of the effort required to find, classify and minimize vast volumes of content. In this article, Chris Giles highlights the issues and walks you through the five steps that are helping firms conquer their information retention and disposition requirements..
We know that data is everywhere in law firms. Some of it aging. Some of it sensitive. Some of it in strange, inacces sible formats, or on forgotten legacy systems. Everyone feels an instinctive need to "clean house", but where to start? It's all too tempting to put it off and wait for someone else to take ownership. Yet while you're waiting for that to happen, your data mountain is growing and getting harder to scale.
More useful, at this point, is to develop a sense of urgen cy. Historically, records retention and disposition have been relegated to the second tier of information govern ance priority, with data security and anything that con tributes to revenue earning and collection taking prece dence. As this article explains, that needs to change. For four good reasons, information retention and disposition should be promoted to a top priority.
Reduce your vulnerability
The first reason is that bloated content repositories increase the firm's exposure to hackers because they promise juicier pickings for professional and determined criminals.
The second is that the costs of data storage are rising. This is particularly noticeable as firms increasingly migrate their data onto cloud-based document management systems or adopt Office 365 and tools like Microsoft Teams and SharePoint. The costs of enterprise data storage start to become really significant.
The third reason is that carrying excess data is a drag on firm productivity. It slows down and congests systems.
Fourth, excess data mitigates against consistently main taining compliance, both with a growing legion of data privacy regulations (see below), and with outside counsel guidelines (OCGs) that increasingly include stipulations around managing and destroying content on set time lines. This is further underscored with ISO accreditation requirements to implement consistent information governance policies and processes.
It's all leading firms to be increasingly conscious that retention and disposition do require action. In a recent LegalRM poll we found that 55°/o of respondents were motivated by concerns around data security and the fear of being hacked; 24°/o hoped to achieve cost savings; 13°/o were concerned to maintain regulatory or OCG compli ance; and a further 5°/o aspired to achieve and maintain infosec certifications, typically to ISO/IEC 27001, as clients start to mandate such accreditations or because they felt it gives them a competitive advantage when pitching for new business, but ultimately also reduces their vulnerability to cyberattack.

Cautionary tales
Tackling the data mountain is also made more urgent by the fact that for many firms their IT estate is beginning to get away from them. This is because IT is far from new at this point. It's not unusual for firms to have legacy systems holding electronic records that are over 20 years old.
These can easily be so old that data is on unsupported platforms, meaning patches are no longer being issued, making them particularly vulnerable to cyberattack, and even more concerning is that often the firm may not even know what's on these older systems due to staff turnover.
For instance, we know an AMLAW 50 firm that stumbled upon a business intake and conflict resolution system that was superseded by a newer product more than ten years ago. At the time of the switchover, the old system was maintained because it was needed to consult earlier decisions for audit purposes. But time passed and it was never taken down. This system was full of person ally identifiable and other highly sensitive information, unsupported, and eminently hackable. Had the firm not found it, it would have gone on presenting a substantial, yet hidden, hazard.
A certain prominent UK criminal law firm was not so lucky. In 2022 the firm was heavily fined by the UK regulator (the Information Commissioner's Office) for breaching the UK's version of GDPR. The firm had failed to adequately secure data held on an older archive serv er. A ransomware attack encrypted 972,191 individual files on this server, of which nearly 25,000 were court bundles that included medical files, witness statements, names and addresses of witnesses and victims, and the alleged crimes of individuals. The attackers proceeded to publish 60 of these bundles on the dark web.
As it goes, this firm had a records retention policy, but hadn't applied it to this particular server. Consequently, the ICO found the firm was storing court bundles after the 7-year retention period had elapsed, causing the regulator to note: "A failure to adhere to or to justify departure from its retention practices creates concerns about compliance with Article S(l)(e) GDPR, which requires personal data to be "kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed.1"
But that's not even the worst that can happen when information governance fails. In March 2022 a 150-year old London Stock Exchange-listed law firm, Inee & Co, was the victim of a major cyberattack in which personal data was stolen and held to ransom. Thirteen months later, on 12 April 2023, the firm announced it had gone into administration following an irreversible slump triggered by the attack. 2 3

Five step plan
To confront and mitigate the risks of excess information retention and haphazard disposition, it's time for firms to act coherently and systematically. This will decrease the likelihood of falling foul of regulators, hackers and clients (in relation to OCG breaches), increase the efficiency of systems, and save money on storage costs.
It may seem overwhelming, especially if you have dec ades-worth of different types of data, in diverse physical and electronic systems, in different practice areas, in need of different treatments and residing in different jurisdictions. But the journey of a thousand miles starts with one step. Accordingly, we recommend that firms embark on a logical, efficient and pragmatic five-step approach.
These steps are:
- Identify and build a committee
- Understand what data you have and where it is
- Develop a retention and disposition policy
- Execute the policy
- Get destruction decisions across the line

-
To achieve systematic and consistently successful data minimization, the bottom line is that you need buy-in and cooperation from across the firm. This requires cross-departmental engagement from key stakeholders - hence the need to convene a representative data steering committee.
To get the appropriate coverage this should include heads of departments or practice groups, the CIO, CISO, General Counsel, DPO and, of course, the Director of Information Governance. The committee is the reference point for all subsequent activity. Moreover, when commit tee members understand the issues and are on-board, they will take those messages to the wider firm and articulate and advocate for the actions that need to be taken to effect lasting change. -
Step 2 is understanding the data held and where it is. This means making an inventory of all the systems in which data is held. This isn't straightforward. We've already alluded to the old IT systems that have been superseded or replaced. There are also back-up systems to think about.
Another potential complication is shadow IT. This can be understood as what happens when individual lawyers do work beyond the boundaries of the firm's sanctioned and provisioned IT infrastructure and systems or where such usage is not fully communicated to the information governance team. It's a problem because any advice given to the client should be part of the matter record, but if the activity was done, say, on the client's system instead of on the firm's, the firm has lost control of that record.
Understandably, the pandemic caused a huge increase in shadow IT. As clients scrambled to get advice from their lawyers and their lawyers scrambled to give it, work was done on personally owned devices, emails were exchanged using personal email addresses and files were saved on a range of personal systems. Shadow IT holds records that need to be brought into the light.You must also remember that work product isn't the only data you need to worry about. The firm will also hold administrative records including HR files and financial information that needs to be part of your retention and disposition planning.
-
Once you know what systems or content repositories exist, you must refine your knowledge further by conducting a data mapping exercise. This will catego rize and classify data in terms of the different types of documents and file types, as well as the type of infor mation: is it personally identifiable information (PII), is it confidential, is it commercially sensitive? In addition, the data will need to be classified in terms of practice group, department, office or jurisdiction, where these have a bearing on retention and disposition; and in terms of client engagement requirements, taking those OCGs into account that impact on retention and disposition.
One approach to data mapping is to create a process diagram that will help you see the different datasets and systems you have. By mapping data, you can really begin to tame a seemingly unruly mass of records.
Each category of data can be tackled one by one, in an order that makes sense, to bring them into an informa tion retention and disposition framework that reflects your policy objectives. -
When data is mapped, or even before mapping is fully completed, it's time for Step 3, which is to draw up a retention and disposition policy. This document will be the reference point for all subsequent activities, and it articulates the commitments the firm is making. The ideal situation is that everyone signs off on this early in the process. This creates understanding, agreement and momentum as well as an early opportunity for an aware ness campaign within your firm.
Procedures and controls will also need to be drawn up to ensure the policy is enforced conscientiously and consist ently. On that note, it will expose the firm to potential in vestigation and liability if an agreed policy isn't enforced, or is selectively enforced: e.g. some documents man dated for destruction are destroyed, while others aren't.
Procedures, such as the destruction process for electron ic records, should be documented and agreed, as should the controls, e.g. that destruction details are logged.
A critical component of the overarching records reten tion and disposition policy is the retention review date calculation and the "event" from which such dates are calculated. Retention review dates may be determined by jurisdiction, practice group, client, matter, even document type. The retention period for matter material may be seven, ten, twenty or a hundred years even. Whilst this should be pinned down, so must the dates from which these retention periods commence. Is it 10 years after the matter closes, or 10 years from when the firm no longer
worked with the client, or 10 years after billing activity ceased even if the matter remains open? You need to make a clear decision on this so that policy has clarity and ensure all content can sit within the policy.
Care needs to be taken over exceptions to the standard rules on destruction. Some documents, like wills, trust deeds, etc. clearly need to be kept in perpetuity. Alter nately some records may need to be destroyed sooner because of some overriding OCG requirement, or because of something stipulated in the original terms of engagement. There may be especially confidential documents which need to be managed differently, including documents that require additional levels of approval before destruction. Consideration needs to
be given to the records that may need to be kept as evidence for longer than standard because there's the possibility of some future action or litigation. -
Step 4 is execution of the policy mandated processes, procedures and controls, which is straightforward - in as much as you just do what's mandated in your policy.
Yet it can feel overwhelming, especially at the beginning, when you're dealing with the largest volume of data. It's about taking it one step at a time.
In the US the task of offering to return matter materials to the client can be complicated by not being able to find the client anymore. If it's verified that they're no longer around it becomes a matter of tracking down their beneficiaries. Likewise, if the lawyers who handled a matter have left the firm, it's also harder to assess if any litigation might arise. It's also difficult to get senior law yers to take on the unrewarding task of reviewing long lists of material to ensure the right decisions are being made. That's why it's necessary to pay attention to Step 5 which is getting data destruction decisions over the line.
This can be tough because some lawyers are instinctively conservative and would rather keep all data than destroy any. Notwithstanding the firm has to keep its eyes on the prize. The whole exercise is aimed at minimizing data and all your effort will be in vain if the final step isn't taken.
It follows that firms should do everything possible to help lawyers with appropriate guidance (hence the importance of an information governance committee and an aware ness campaign) and also ensure all the information the lawyer needs at the point of decision making is available and easy to follow. Software can help here by arranging everything in a simple interface so the deciding lawyer can see, for example, that no fees are outstanding, and the date on which all the firm's criteria for a closed matter have been met.
The final act is to follow the preordained destruction procedure, which ensures that destruction means destruction: so paper needs to be shredded or pulverized, and electronic files are deleted beyond retrieval
or reconstruction.
Proceed iteratively
Finally, note that when we talk of five steps, it's not necessary to complete them sequentially. Rather firms should proceed iteratively on the basis of doing what they can do. It's true you shouldn't destroy data until you have the policy in place. But you needn't wait for the policy to be finalized before data mapping starts. It's a question of making progress wherever possible.
In tandem, firms should focus on the low hanging fruit by tackling what's easiest and nearest at hand first. That way it's simpler to get going and to achieve some "quick wins". Low hanging fruit might, for example, be the resur rection of an existing information retention and disposi tion policy or looking to reduce your OMS footprint before or as part of a migration to the cloud.
It's also sensible to think about where your highest risks are and tackle these early. Where in the firm is data most exposed and/or where is the most sensitive data concentrated? Typically, the data that will get firms into trouble with regulators is PII. But also, what commercially sensitive data do you hold? Mergers and acquisitions can be a rich seam for hackers who want to extort money via ransomware. Or does the firm have certain clients with very particular OCG requirements in relation to data; or who are higher profile and more likely to attract hackers or even hacktivists? It follows that there may be certain practice areas, clients or systems that should be given priority in your data retention project. So, think about your order of play.

Phone a friend
A further consideration is that the firm needn't do the all the work of data retention and disposition on its own. Quite the contrary, because there are commercial software tools such as iCompli that take much of the
burden off your hands by, for example, automating how a retention and disposition policy is systematically applied to mapped data. To make the most of these tools, it's wise to begin a conversation with software vendors early in the process. That way you'll minimize redundant effort and maximize the efficiency of your information retention and disposition project from day one.
Records retention and disposition is a big task, but not an insurmountable one, especially when you deploy tools that automate key processes. There are a lot of moving parts, but once you understand what you have, and what you're going to do with it, this fundamental obligation - broken down into bite-sized pieces - will not be as hard to conquer as you think.
