Lexcel: Deconstructing Your Information Management and Security Policy

George Ryan
|
Consultant at URM
|
|
PUBLISHED on
16
June
2025

If you’re in the legal sector, you are likely to have encountered the Lexcel Practice Management Standard (Lexcel), introduced by the Law Society of England and Wales.  Certifying to the Standard is a precondition for a law practice to hold a legal aid contract with the Legal Aid Agency.

Lexcel is the legal practice quality standard that focuses on client care, compliance, and effective practice management, encompassing the following areas:

  • Information management
  • Risk management
  • Client care
  • People management
  • Structure and strategy
  • Financial management
  • File and case management.

Section 3.2 of the Standard specifies that practices must have an information management and security policy, and that they should be certified to the Cyber Essentials scheme.*  It also states that a compliant information management and security policy must contain the following controls:

  1. A register of relevant information assets of both the practice and clients
  2. Procedures for the protection and security of the information assets
  3. Procedures for the retention and disposal of information
  4. The use of firewalls
  5. Procedures for the secure configuration of network devices
  6. Procedures to manage user accounts
  7. Procedures to detect and remove malicious software
  8. A register of all software used by the practice
  9. Training for personnel on information security
  10. A plan for the updating and monitoring of software.

In this blog, URM addresses each control and how it needs to feature as part of your firm’s information management and security policy, as well as explaining how you can meet additional, related Lexcel requirements.

*To learn more about Lexcel and Cyber Essentials, read our blog Understanding Lexcel and the Specialist Quality Mark (SQM): How Cyber Essentials Can Benefit Your Practice.

Information Management and Security Policy

A register of relevant information assets of both the practice and clients

This control requires you to create and maintain an asset register, which details information held about both the practice and clients of the practice, such as client engagement materials and legal documents.  Ideally, your asset register needs to include:

  • Asset type
  • Asset owner
  • Asset classification
  • Asset location
  • Impact levels of threats to the asset in relation to confidentiality, integrity and availability (CIA).

To maximise efficiency, you should also include software used by your practice in this register.  This will enable you to simultaneously adhere to Control j, which requires ‘a register of all software used by the practice’, without the need for an additional document.

Procedures for the protection and security of the information assets

This requirement is fairly vague, as it does not define which procedures you are expected to implement. However, it does note that these procedures need to be focused on maintaining CIA and accessibility.  Typically, they would cover areas such as:

  • Data encryption
  • Access controls
  • Data backup and recovery
  • Supplier risk management
  • Risk assessment and treatment
  • Incident management
  • Other procedures noted below (e.g., firewalls).

Procedures for the retention and disposal of information

To meet the requirements of this control, your firm will need to have a procedure in place that defines how information, in both electronic and physical forms, is retained in compliance with relevant regulations and legislation (e.g., the General Data Protection Regulation or ‘GDPR’), and how it is disposed of effectively.  As part of this procedure, your practice needs to identify any legislative or regulatory requirements around retention and disposal that must be met, for example in relation to client due diligence records.  It is also beneficial to ensure that disposal of hardware is Waste Electrical and Electronic Equipment (WEEE) certified, and that devices are wiped before being sent for disposal.

The use of firewalls

The use of firewalls simply refers to the implementation of firewalls, whether software or hardware-based, in the corporate environment.  URM recommends that as part of this implementation, your practice ensures that firewalls used are not approaching end-of-life (EOL), and that firewall rules are configured and regularly reviewed to ensure that no unnecessary ports are open.  Procedures need to clearly define how passwords are changed on the firewall, and system-generated passwords always need to be changed as soon as the firewalls are first used.

Procedures for the secure configuration of network devices

The procedures your practice defines for this control are required to cover a number of areas; you will need to implement procedures that require default passwords on network devices to be changed, and ensure configurations are checked and confirmed to be correct and applicable.  There will also need to be procedures that address the regular update of firmware and software, the network’s isolation of any sensitive data, and the use of secure protocols.

These procedures, along with guidance for firewalls, need to be formally documented to ensure they are carried out consistently.

Procedures to manage user accounts

Here, you will need to consider how user accounts within your practice are created, modified and deleted, as well as how appropriate permissions are applied and maintained.  As part of this, you need to formally define a joiners, movers and leavers process (if your firm does not already have one) that ensures permissions are correctly applied, adapted and revoked when relevant.

You will also need to apply the principle of least privilege and implement role-based access control (RBAC), access control matrixes and separate administrative and daily user accounts.

Procedures to detect and remove malicious software

This control requires you to have an established method of both detecting and subsequently removing malicious software.  You can achieve this by ensuring that anti-malware software is installed on all devices, and that the anti-malware you install has a function which allows for the removal of such malware.

Training for personnel on information security

Lexcel states that training needs to be delivered at least annually and be appropriate to the roles performed. Key topics such as cyber hygiene and phishing awareness must be covered by this training, and your information management and security policy needs to specify how often training is delivered.

A plan for the updating and monitoring of software

The focus of this control is ensuring software does not become out of date and therefore vulnerable to exploitation.  The software asset register mentioned previously allows your firm to track the software in use, and apply updates when necessary or remove software that is no longer supported.  You may find it beneficial to align with Cyber Essentials’ requirements for ensuring high and critical-risk patches are applied within a 14-day period.

Email Policy

Lexcel requires you to create and implement an email policy, which can be included within your overarching information management and security policy.  Whilst the email policy is a separate requirement and, therefore, does not need to be part of the information management and security policy, combining the two will streamline reviews and updates.  The email policy must include the following mandatory content:

  1. The scope of permitted and prohibited use
  2. Procedures for monitoring personnel using email
  3. Procedures for the storage and destruction of emails.

The storage and destruction of emails needs to feature as part of the procedure for retention.

General

In addition to the controls themselves, Lexcel also requires you to maintain a register of each plan, policy and procedure that is contained within the Standard.  For each, you will also need to:

  • Appoint a named person who is responsible for the document (i.e., a document owner)
  • Establish a procedure for review.

How Can URM Help?

With our extensive experience supporting organisations’ conformance to a range of information security standards and frameworks (such as ISO 27001, SOC 2, and the Payment Card Industry Data Security Standard or ‘PCI DSS’), URM is ideally positioned to help your firm develop a fully Lexcel-compliant information security and management policy.  URM’s large team of information security consultants can support the production of a policy that both covers all of the security controls required by the Standard, as well as being tailored to your firm’s unique working practices, culture and needs.

As an accredited certification body, URM can also guide and facilitate your firm’s certification to the Cyber Essentials scheme, as per Lexcel’s recommendation.  Our team can offer a range of services to ensure your Cyber Essentials certification is as seamless and successful as possible.  These include conducting a gap analysis of your firm’s existing security practices against the scheme’s requirements, and providing a Cyber Essentials application review service, where we review your completed questionnaire for compliance before formal submission.  

If your firm is looking to develop its information security programme further, URM can assist your practice to implement an information security management system (ISMS) that is fully conformant to ISO 27001, the International Standard for ISMS’.  Having led over 400 ISO 27001 certification projects (without a single failure), URM can provide expert, end-to-end information security consultancy throughout the entire implementation process. This includes conducting gap analyses, supporting risk assessment, helping you draft and refine required policies and processes, conducting internal audits, and more.  Whether your objective is formal certification or simply alignment with best practice, URM will tailor its support to ensure your practice’s ISMS is both practical and sustainable.

Control Area

Action

A register of relevant information assets of both the practice and clients

Establish and maintain an asset register

Procedures for the protection and security of the information assets

Incorporate and document:

  • the encryption of data
  • incident management processes
  • backup and recovery processes
  • supplier risk management
  • other risk management and treatment

Procedures for the retention and disposal of information

Understand retention and disposal obligations and document these

Use of firewalls

Outline how firewalls are to be used, checked and passwords for them changed

Procedures for the secure configuration of network devices

Incorporate and document:

  • secure protocols used
  • password changes
  • software and firmware updates
  • segmentation (if relevant)

Procedures to manage user accounts

  • Outline a procedure that accounts for joiners, movers and leavers
  • Document an access control matrix
  • Incorporate principle of least privilege or role-based access control

Procedures to detect and remove malicious software

Ensure anti-malware tool with removal function is used and this is documented

A register of all software used by the practice

Add to asset register

Training for personnel on information security

Perform regular, at least annual, information security training

A plan for the updating and monitoring of software

Document how you will ensure software is monitored and updated

Email Policy

Add to information management and security policy and cover storage and destruction with retention

George Ryan
Consultant at URM
George Ryan is a Consultant at URM, working predominantly with ISO 27001. He is an IASME certified Cyber Essentials and Cyber Essentials Plus Assessor.
Read more

Get practical guidance on preventing common cyber-attacks

Get practical guidance on how to prepare for and achieve Cyber Essentials and Cyber Essentials Plus certification, and protect your organisation against these attacks.
Thumbnail of the Blog Illustration
Cyber Security
Published on
12/7/2024
Access Control, Administrative Accounts and Password-Based Authentication in the Cyber Essentials SAQ

URM’s blog offers advice on answering questions in the Cyber Essentials SAQ which relate to access control, admin accounts and authentication methods.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
6/6/2025
Understanding Lexcel and the Specialist Quality Mark (SQM): How Cyber Essentials Can Benefit Your Practice

URM’s blog explores how Cyber Essentials can help your legal practice enhance its security posture and achieve/maintain its SQM or Lexcel accreditation.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
14/11/2024
Cyber Essentials – What’s Changing in 2025?

URM’s blog discusses upcoming changes to Cyber Essentials, including the changes seen in the Willow Question Set and how they may impact your organisation.

Read more
Cyber Essentials has provided a very good base level for our cyber security and has had wide-ranging impact across systems and environments.
Non-profit Organisation
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.