LegalSoft has been a channel partner for my company since 2008. From their executive leadership to their attorneys, they've been responsive and accessible. The consistent effort to provide a high quality of service has assisted me in serving my clients at a high level.  -Partner of a Florida Based Law FirmMore »

Information Security

Information security is the biggest concern of businesses considering outsourcing of legal processes. LegalSoft has employed sophisticated technologies and time-tested processes to ensure that information remains secure all throughout the outsourcing engagement and beyond. Information security remains at the core of the work culture within LegalSoft. Security has been addressed at HR Level, Physical Access level, System Level and Network Level.

Human Resource Department has defined various processes that include background check to ensure that only reliable individuals are recruited. Once recruited, the aspect of information security is stressed during the induction training as well as regular ongoing training programs. Also exit processes ensure that information security is maintained even after the employee leaves the organization.

On the physical level, round the clock physical manned security, biometric access control, camera surveillance etc are employed at the office premises.

On the systems and network level more than 30 controls are in place to prevent unauthorized access and unauthorized copying of data. They include several levels of passwords, password policies, restrictions on mobile phones, instant messaging applications, removable media and printing, firewalls, anti-virus and anti spam software.

Access to information is strictly on a need to know basis. There is also a security incident reporting and investigation system. Regular audits are also conducted.

Request Callback

 

Resources

Information security is the biggest concern of businesses considering outsourcing of legal processes. LegalSoft has employed sophisticated technologies and time-tested processes to ensure that information remains secure all throughout the outsourcing engagement and beyond. More »