Kiersted has announced that it has achieved ISO/IEC 27001 certification of its information security management system (ISMS) supporting all systems, processes, procedures and technology involved in e-discovery data processing, online document review with Relativity and iConect, consulting, and forensic data collection, and in accordance with the statement of applicability version 3.0, October 2013. This credible third-party authentication represents Kiersted’s ongoing commitment to keeping its clients’ data secure and confidential.
“Kiersted has always held itself to the highest standards when it comes protecting our clients’ sensitive information, from investing in the best security and technology, to implementing systems and processes in order to safeguard confidential data,” said Kiersted President George Kiersted. “Now, we have taken the next step by achieving verifiable certification of our ISMS against the industry’s most respected family of standards.”
ISO/IEC 27001 is a globally recognized standard for the establishment and certification of an ISMS. The standard specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented ISMS within the context of the organization’s overall business risks. It sets forth a risk-based approach that focuses on adequate and proportionate security controls that protect information assets and give confidence to interested parties.
In order to achieve this certification, Kiersted underwent a rigorous testing and evaluation process, demonstrating that its systems for secure information management meet the stringent standards set forth by ISO/IEC 27001. The certification was performed by BrightLine, an ANAB accredited certification body based in the United States. The details of Kiersted's ISMS certification are publicly available at https://www.brightline.com/certificate-directory/j5fXVLhBA1nw/.
“Information security is critical to every business, and it is especially important in the increasingly interconnected business environment, where information is now exposed to a growing number and a wider variety of threats and vulnerabilities. Causes of damage such as malicious code, computer hacking, and denial of service attacks have become more common, more ambitious, and increasingly sophisticated,” said Robert Harris, vice president of technology at Kiersted. “By choosing an e-discovery partner who adheres to ISO/IEC standards in the protection of their data, corporations, law firms and legal departments can gain an added degree of security. We are proud to have met these standards in providing a highly secure environment, to the benefit of our clients.”