Top Divorce and Family Law Attorneys

Security Policies

Learn how we stay secure

Privacy and security practices are always evolving. Our team is committed to continue making improvements as technology advances and updated privacy and security options become available to us.


Services

Ryder & Phelps utilizes various software to provide user-friendly and accessible services to our clients. The most frequent software is listed below:


Timesolv and Lawpay



Billing and payment ​softwares.

Microsoft, Adobe, Dropbox (phasing out), and IntakeQ


File sharing, data collection, ​and ​database.

Zoom and Mailchimp



Communication ​platforms. ​

Se​cured Information

The firm utilizes password protection and ​encryption across various softwares and comm​unications. This ensures that confidential a​nd sensitiinformation is being sent securely a​nd onl​y​ the correct people can open them.


Our firm d​etermines when a sensitive document requ​ires password protection. Sensitive docum​ents are those containing financial i​n​formation and non-public records.


·Timesolv employs a physical security team

·Network security to prevent hackers

·Encryption

·Privacy practices on collected data


• Level 1 Service Provider

• LawPay encrypts specific payment details, preventing   ​sensitive banking information from being exposed

• Secure receipt methods

• Annual audit performed by Qualified Security ​Assessors

Microsoft

Machine learning, artificial intelligence, and other ​technologies that drive Microsoft security ​processes

• All files are encrypted and use secure socket ​layers

• Regularly tested for security vulnerabilities

• 2-step-verification is available to clients

• Public files are only viewable by people who ​have a unique link to the files

• File encryption

• HIPAA Certified

• Adopted the GDPR (General Data ​Protection Regulation)

• Certified by SOC II reports

• Account data is mirrored and regularly backed up

• Machine learning, artificial intelligence, and other ​technologies that drive security process


• “Adobe Secure Product Lifecycle”

  • Encryption
  • Unique passwords to individual users
  • Remove guests and lock meetings
  • Recognized by security organizations like SOC II, ​FedRAMP, and Privacy Shield