IT security is now of immense value to firms and there is a list of rules which must be adhered to, says Simon Dawson
Most companies now retain nearly all their confidential, sensitive and business critical information in electronic form. This usually resides on corporate servers and on the internal drives of corporate desktop and laptop computers used by employees and contractors of the company. This information can take the form of corporate strategy documents, business plans, employee files, customer lists, financial records, management accounts, client files and building security data. The list is potentially huge.
This premium content is reserved for
Legal Week Subscribers.
Subscribe today and get 10% off.
A PREMIUM SUBSCRIPTION PROVIDES:
- Trusted insight, news and analysis from the UK and across the globe
- Connections to senior business lawyers within the leading law firms and legal departments
- Unique access to ALM's unrivalled, market-leading reporting in the US and Asia and cutting-edge research, including Legal Week's UK Top 50 and Global 100 rankings
- The Legal Week Daily News Alert, Editor's Highlights, and Breaking News digital newsletters and more, plus a choice of over 70 ALM newsletters
- Optimized access on all of your devices: desktop, tablet and mobile
- Complete access to the site's full archive of more than 56,000 articles
Already have an account? Sign In Now
For enterprise-wide or corporate enquiries, please contact Paul Reeves on Preeves@alm.com or call on +44 (0) 203 875 0651