Cloud still too dark for legal information

Other jurisdictions may expose sensitive data

Law In Order director, Paul Gooderick

Law In Order director, Paul Gooderick

Moving proprietary legal information to public cloud services is too risky for one services firm, which believes many unanswered questions about how the data is managed remain.

Director of Sydney-based document solutions company Law In Order, Paul Gooderick, says it would not be a “smart decision” at this time to move to a public cloud.

“There are issues around where the documents are, how they can be controlled and how many instances of the documents there are,” Gooderick said.

Law In Order manages its own data centre operations in Sydney, Melbourne and Brisbane.

Gooderick says there are also jurisdictional issues around public cloud services.

“Lawyers may be able to access sensitive case information in the cloud by going through the jurisdiction it is hosted in,” he said.

“Big legal cases have so many documents and we are an evidence processing organisation.”

The company bought its first servers from Dell and now has 40, of which about half are virtualised in a private cloud.

Gooderick says staff are still doing a lot of manual processing for its cloud infrastructure.

“We are running it all on Hyper-V which was a risk a few years ago, but it has worked out well,” he said.

“However, we pay for a Dell machine and the Microsoft licenses are three times the cost.”

To help with its asset management requirements, Law In Order is using Dell’s Kace software which helps process its evidence information “with one click”.

“We use Kace for asset management as our software licensing was getting out of control,” Gooderick said.

“The other use is deployment. Our servers are re-imaged every day and even with something like an upgrade to .Net 4.0 we had to bring everything to a baseline and re-image it.”

With Kace, Gooderick wants to automate future software updates.

Rodney Gedda is Deputy Editor of CIO Australia. Follow Rodney on Twitter at @rodneygedda. Rodney's e-mail address is Follow CIO Australia on Twitter at @CIO_Australia.

Join the CSO newsletter!

Error: Please check your email address.

Tags private cloudsDellsecuritylegalhyper-vKACEcloud computingprivacyAsset Management

More about DellDell ComputerMicrosoft

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Rodney Gedda

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts