Call Us

MODERN FAMILY LAW

Security
Profile

MODERN FAMILY LAW

Security
Profile

Security Profile

 

Modern Family Law utilizes SaaS for our technology infrastructure.  Each vendor is evaluated continuously on security policy and how they react to the changing security environment.  Authentication methods employed by these vendors must include Multi-Factor-Authentication.  Modern Family Law also utilizes Apple’s ecosystem of security where authentication involves two devices minimum to authenticate.

 

It is the responsibility of every employee at Modern Family Law to secure and protect all information that resides within our infrastructure.  As Guardians of client data, Modern Family Law employees practice and follow the MFL Data Governance policy where the location of data is always known, kept at a minimum, and placed in our data vault.  Each employee is trained and informed of the latest procedure to ensure client information is secure.   Any time information is suspected of being malformed or breached, the issue is escalated for a full investigation.  A summary of the investigation is shared at the executive level.  Any breach of data is shared with the client immediately, with remediation.

Security Profile

Modern Family Law utilizes SaaS for our technology infrastructure.  Each vendor is evaluated continuously on security policy and how they react to the changing security environment.  Authentication methods employed by these vendors must include Multi-Factor-Authentication.  Modern Family Law also utilizes Apple’s ecosystem of security where authentication involves two devices minimum to authenticate.

 

It is the responsibility of every employee at Modern Family Law to secure and protect all information that resides within our infrastructure.  As Guardians of client data, Modern Family Law employees practice and follow the MFL Data Governance policy where the location of data is always known, kept at a minimum, and placed in our data vault.  Each employee is trained and informed of the latest procedure to ensure client information is secure.   Any time information is suspected of being malformed or breached, the issue is escalated for a full investigation.  A summary of the investigation is shared at the executive level.  Any breach of data is shared with the client immediately, with remediation.