skip to Main Content

The business of law requires data that is secure, fast, and accessible online client service and information. Technology is a key in creating the processes that differentiate Matthews & Jones, LLP from its competitors.

According to firm’s Business Director Steve Sametz, “No one is immune to data security threats.  We always strive to be technologically forward to achieve best practices and deliver optimal client service.  We provide the tools our lawyers need to achieve a greater standard of control for the numerous matters they handle every day.”

Database Security

Matthews & Jones chose  ProCirrus Technologies to host all of our program applications and data and to maintain our serves in a cloud based environment. The security is a fully integrated and multilayered strategy of system services, managed devices and best practices that combine to ensure the highest levels of client security. ProCirrus undergoes annual SSAE16 Type II SOC1 and SOC2 audits to validate our internal practices and procedures. Additional information is available upon request.

ProCirrus is an important link in the regulatory compliance and client security required by our firm and we have robust internal policies in concert with ProCirrus services.

Physical Security

  • Data centers’ access is monitored, tracked and strictly limited through 2-factor bio metric authentication (finger print and iris scan)
  • Redundant security features including 24/7/365 motion, video and electronic intrusion monitoring.
  • Closed circuit video cameras cover the interior and exterior of the building.
  • Secure and low-profile facilities with Security fence surrounds perimeter of property.
  • Armed Security guards on-site 24x7x365 with Active patrol both inside and outside facility.
  • Redundant UPS systems and Generator Power Backup to ensure constant power.
  • Power: Electrical redundancy is achieved via two (2) feeds from separate substations that power three (3) on-site 40MVA transformers.
  • All power cabling below floors is installed in either conduit or seal tight flexible conduit with approved connectors to all equipment.
  • Fire Suppression, powered by Waterless Fire Suppression System.
  • Cooling: N+1 configuration for chiller, pumps and cooling towers.
  • Cooling: Over 600 CRAH units (30-ton and 70-ton), provide air flow to raised floor space
  • 100% of data stored in continental United States on ProCirrus managed equipment.

Network security

  • Gateway anti-virus, anti-spyware, intrusion detection and prevention with application intelligence controls for real-time network protection against sophisticated attacks.
  • Remote backup services utilize up to a 448 Bit encryption key for a military level of data protection.
  • OVAL based vulnerability scanning for internal audit and enforcement-(OVAL is the security standard endorsed by the US Computer Emergency Readiness Team and Homeland Security).
  • SCAP based vulnerability management, measurement, and FDCC, FISMA, and/or DoD 8500.2/8510 policy compliance.
  • Lumension’s Digital Fingerprint technology to reliably assess and remediate software vulnerabilities.
  • Daily third party intrusion testing and remediation.
  • Restrictive Firewall management limiting access to approved transactions only.
  • Redundant, high volume, internet service pathways to ensure uninterrupted service from data centers.
  • Data center servers, storage, gateway and software redundancy that can sustain multiple unlikely failures without service interruption.
  • Data is encrypted at rest.
  • Data is encrypted when transmitted.

System security

  • Best practice system patching to provide ongoing protection from exploitation in near real-time.
  • Next-Generation Anti-virus + EDR protects all running processes and applications with advanced predictive models to analyze complete endpoint data and uncover malicious behavior to stop all types of attacks before they compromise a  system (malware, advanced malware, non-malware attacks and ransomware.)
  • All data is protected by real-time, simultaneous and redundant storage- guarding against unlikely multiple drive and array failures.
  •  Optimized operating systems limit necessary services required to run an application, thus limiting the potential exposure points.
  • Dedicated firewall and VPN services to prevent unauthorized system access.
  • Least access policies limit access to files, services and applications to authorized users only
  • All data center storage devices are AES 256 bit encrypted at rest
  • Extended Validation Certs that utilize AES SHA256 bit SSL encryption with RSA 2048 Keys
  • All applications are presented through a secure, 256 bit encrypted user portal throughout entire session
  • Dedicated intrusion detection devices provide an additional layer of protection against unauthorized system access.
  • Automated data backup including daily recovery points for the most recent seven (7) days and one weekly recovery point for each of the three weeks prior to the seven daily recovery points.
  • ProCirrus requires all associates to pass federal and local background checks and execute a comprehensive confidentiality agreement acknowledging the Economic Espionage Act, 18 U.S.C. § 1831 et seq. (“EEA”)
  • ProCirrus requires all third parties to execute non-disclosure agreements.
  • Secure data destruction policies comply with 17 standards including: DoD 5220.22-M; NAVSO P-5239-26 (RLL) & (MFM).
  • Server-side configuration settings which are user-side independent, mandate user security adherence.
  • Best practice generation, transmission and storage of system passwords.
  • End-user guidance in developing client-side compliance with regulations like GLBA and HIPAA.
  • 100% US based user support via Chat, Email, Support Site Tickets and Phone.
  • Fully documented SDLC, change management and business continuity and disaster recovery policies.
  • Creation of and adherence to best practices as defined by governing bodies and industry leaders.
  • Real-time redundant data storage protection from physical device failure
  • 100% of data stored in continental United States on ProCirrus equipment.

Trust Accounts

The firm maintains a Trust Account Plan in compliance with Rule 5-1.2, Rules Regulating the Florida Bar.  Electronic wire transfers require 2 departmental levels of approval within the firm, Multi-Factor Authentication for wire approval, and 3rd party bank voice verification for the release of the funds wired.

For real estate closing transactions our clients are issued a unique PIN number for use in initiating any wire transfers of funds from our trust accounts and must confirm funds transfer verbally using the assigned PIN number.

Real Estate Title Services

Mathews & Jones L.L.P. is an Authorized Service Provider for Alliant National Title Insurance Company. This designation requires audited compliance with New Agent Approval Process, On-Site Quality Assurance Reviews, Agent Review Process, Action Management System, and Corporate Systems Audit.


In addition to maintaining a broad based business and E&O insurance policy, Matthews & Jones additionally carries a separate 2 Million dollar Coalition Cyber insurance policy which covers the following threats; Third party liability which would include network and information Security, regulatory defense and penalties, and multimedia content.  First party liability which would include breach response, crisis management, cyber extortion, digital asset restoration and funds transfer fraud.

Matthews & Jones - Technology
Back To Top