If you’re in the legal sector, you are likely to have encountered the Lexcel Practice Management Standard (Lexcel), introduced by the Law Society of England and Wales. Certifying to the Standard is a precondition for a law practice to hold a legal aid contract with the Legal Aid Agency.
Lexcel is the legal practice quality standard that focuses on client care, compliance, and effective practice management, encompassing the following areas:
- Information management
- Risk management
- Client care
- People management
- Structure and strategy
- Financial management
- File and case management.
Section 3.2 of the Standard specifies that practices must have an information management and security policy, and that they should be certified to the Cyber Essentials scheme.* It also states that a compliant information management and security policy must contain the following controls:
- A register of relevant information assets of both the practice and clients
- Procedures for the protection and security of the information assets
- Procedures for the retention and disposal of information
- The use of firewalls
- Procedures for the secure configuration of network devices
- Procedures to manage user accounts
- Procedures to detect and remove malicious software
- A register of all software used by the practice
- Training for personnel on information security
- A plan for the updating and monitoring of software.
In this blog, URM addresses each control and how it needs to feature as part of your firm’s information management and security policy, as well as explaining how you can meet additional, related Lexcel requirements.
*To learn more about Lexcel and Cyber Essentials, read our blog Understanding Lexcel and the Specialist Quality Mark (SQM): How Cyber Essentials Can Benefit Your Practice.
Information Management and Security Policy
A register of relevant information assets of both the practice and clients
This control requires you to create and maintain an asset register, which details information held about both the practice and clients of the practice, such as client engagement materials and legal documents. Ideally, your asset register needs to include:
- Asset type
- Asset owner
- Asset classification
- Asset location
- Impact levels of threats to the asset in relation to confidentiality, integrity and availability (CIA).
To maximise efficiency, you should also include software used by your practice in this register. This will enable you to simultaneously adhere to Control j, which requires ‘a register of all software used by the practice’, without the need for an additional document.
Procedures for the protection and security of the information assets
This requirement is fairly vague, as it does not define which procedures you are expected to implement. However, it does note that these procedures need to be focused on maintaining CIA and accessibility. Typically, they would cover areas such as:
- Data encryption
- Access controls
- Data backup and recovery
- Supplier risk management
- Risk assessment and treatment
- Incident management
- Other procedures noted below (e.g., firewalls).
Procedures for the retention and disposal of information
To meet the requirements of this control, your firm will need to have a procedure in place that defines how information, in both electronic and physical forms, is retained in compliance with relevant regulations and legislation (e.g., the General Data Protection Regulation or ‘GDPR’), and how it is disposed of effectively. As part of this procedure, your practice needs to identify any legislative or regulatory requirements around retention and disposal that must be met, for example in relation to client due diligence records. It is also beneficial to ensure that disposal of hardware is Waste Electrical and Electronic Equipment (WEEE) certified, and that devices are wiped before being sent for disposal.
The use of firewalls
The use of firewalls simply refers to the implementation of firewalls, whether software or hardware-based, in the corporate environment. URM recommends that as part of this implementation, your practice ensures that firewalls used are not approaching end-of-life (EOL), and that firewall rules are configured and regularly reviewed to ensure that no unnecessary ports are open. Procedures need to clearly define how passwords are changed on the firewall, and system-generated passwords always need to be changed as soon as the firewalls are first used.
Procedures for the secure configuration of network devices
The procedures your practice defines for this control are required to cover a number of areas; you will need to implement procedures that require default passwords on network devices to be changed, and ensure configurations are checked and confirmed to be correct and applicable. There will also need to be procedures that address the regular update of firmware and software, the network’s isolation of any sensitive data, and the use of secure protocols.
These procedures, along with guidance for firewalls, need to be formally documented to ensure they are carried out consistently.
Procedures to manage user accounts
Here, you will need to consider how user accounts within your practice are created, modified and deleted, as well as how appropriate permissions are applied and maintained. As part of this, you need to formally define a joiners, movers and leavers process (if your firm does not already have one) that ensures permissions are correctly applied, adapted and revoked when relevant.
You will also need to apply the principle of least privilege and implement role-based access control (RBAC), access control matrixes and separate administrative and daily user accounts.
Procedures to detect and remove malicious software
This control requires you to have an established method of both detecting and subsequently removing malicious software. You can achieve this by ensuring that anti-malware software is installed on all devices, and that the anti-malware you install has a function which allows for the removal of such malware.
Training for personnel on information security
Lexcel states that training needs to be delivered at least annually and be appropriate to the roles performed. Key topics such as cyber hygiene and phishing awareness must be covered by this training, and your information management and security policy needs to specify how often training is delivered.
A plan for the updating and monitoring of software
The focus of this control is ensuring software does not become out of date and therefore vulnerable to exploitation. The software asset register mentioned previously allows your firm to track the software in use, and apply updates when necessary or remove software that is no longer supported. You may find it beneficial to align with Cyber Essentials’ requirements for ensuring high and critical-risk patches are applied within a 14-day period.

Email Policy
Lexcel requires you to create and implement an email policy, which can be included within your overarching information management and security policy. Whilst the email policy is a separate requirement and, therefore, does not need to be part of the information management and security policy, combining the two will streamline reviews and updates. The email policy must include the following mandatory content:
- The scope of permitted and prohibited use
- Procedures for monitoring personnel using email
- Procedures for the storage and destruction of emails.
The storage and destruction of emails needs to feature as part of the procedure for retention.
General
In addition to the controls themselves, Lexcel also requires you to maintain a register of each plan, policy and procedure that is contained within the Standard. For each, you will also need to:
- Appoint a named person who is responsible for the document (i.e., a document owner)
- Establish a procedure for review.
How Can URM Help?
With our extensive experience supporting organisations’ conformance to a range of information security standards and frameworks (such as ISO 27001, SOC 2, and the Payment Card Industry Data Security Standard or ‘PCI DSS’), URM is ideally positioned to help your firm develop a fully Lexcel-compliant information security and management policy. URM’s large team of information security consultants can support the production of a policy that both covers all of the security controls required by the Standard, as well as being tailored to your firm’s unique working practices, culture and needs.
As an accredited certification body, URM can also guide and facilitate your firm’s certification to the Cyber Essentials scheme, as per Lexcel’s recommendation. Our team can offer a range of services to ensure your Cyber Essentials certification is as seamless and successful as possible. These include conducting a gap analysis of your firm’s existing security practices against the scheme’s requirements, and providing a Cyber Essentials application review service, where we review your completed questionnaire for compliance before formal submission.
If your firm is looking to develop its information security programme further, URM can assist your practice to implement an information security management system (ISMS) that is fully conformant to ISO 27001, the International Standard for ISMS’. Having led over 400 ISO 27001 certification projects (without a single failure), URM can provide expert, end-to-end information security consultancy throughout the entire implementation process. This includes conducting gap analyses, supporting risk assessment, helping you draft and refine required policies and processes, conducting internal audits, and more. Whether your objective is formal certification or simply alignment with best practice, URM will tailor its support to ensure your practice’s ISMS is both practical and sustainable.
URM is pleased to provide a FREE 30 minute consultation on penetration testing for any UK-based organisation.
If you are unsure, URM can perform CREST-accredited internal and external penetration testing against all IP addresses associated with your organisation, location, or service.
Designed to assess the architecture, design and configuration of web applications, our web application pen tests use industry standard methodologies to identify vulnerabilities.

URM’s blog offers advice on answering questions in the Cyber Essentials SAQ which relate to access control, admin accounts and authentication methods.

URM’s blog explores how Cyber Essentials can help your legal practice enhance its security posture and achieve/maintain its SQM or Lexcel accreditation.

URM’s blog discusses upcoming changes to Cyber Essentials, including the changes seen in the Willow Question Set and how they may impact your organisation.