Security Awareness
Professional standards for protecting client data, case strategy, and firm systems.
Aligned with UAE Labour Law (Decree-Law No. 33 of 2021) and Cabinet Resolution No. 1 of 2022.
Aligned with UAE Labour Law (Decree-Law No. 33 of 2021) and Cabinet Resolution No. 1 of 2022.
Passwords & MFA
- Use a password manager; never reuse passwords.
- Enable MFA on all firm and cloud accounts.
- Do not share credentials—ever.
- Change passwords immediately if compromise is suspected.
Phishing & Social Engineering
- Verify sender, domain, and link destination before clicking.
- Beware of urgency, invoices, case updates, or “password reset” prompts.
- When in doubt, report via the firm’s phishing button or to IT.
Devices & Apps
- Use only firm-approved devices and software; keep them updated.
- Encrypt laptops and phones; enable screen lock.
- Report lost or stolen devices immediately.
Data Handling
- Store client data only in approved repositories (DMS/ERP).
- Apply least-privilege access; share on a need-to-know basis.
- Use secure transfer (SFTP/firm portal); avoid personal email.
Travel & Remote Work
- Use firm VPN on untrusted networks; avoid public computers.
- Do not discuss matters in public spaces; protect screens.
- Secure documents during transit; shred when appropriate.
Incident Response
- Report suspected incidents within 15 minutes to IT/HR.
- Do not delete or alter evidence; disconnect from the network if necessary.
- Follow the escalation playbook—speed matters.
Incident Escalation Playbook (Quick Reference)
- Detect: Stop work; preserve screen. Do not click further or delete evidence.
- Isolate: Disconnect Wi-Fi/network; keep the device powered on.
- Notify (≤15 min): Email/phone IT & HR. Include screenshots, timestamps, sender/URL.
- Secure data: Move client files to approved DMS; revoke any shared links.
- Triage: IT validates scope, resets credentials, forces MFA, checks logs.
- Report: If client data is impacted, Legal prepares notifications (as required by engagement).
- Recover: Patch, restore clean copies, re-onboard device.
- Learn: Post-incident review; update controls and training.
Full document: Cyber-Incident Escalation Playbook (PDF)
Security Awareness PolicyFull policy (PDF)
IT Device Usage PolicyRequirements for laptops & phones
Confidentiality (NDA)Obligations & scope
Note: Do not store or send client files via personal email, public drives, or messaging apps.
Use approved firm systems only (ERP/DMS/secure portal). When in doubt, escalate per the playbook.
Assessment (12 questions)
Pass mark: 80%. Answers reflect firm policy and industry best practice.