Whitepaper: 7 Tips for Securing Client Data in the Age of Cybercrime

Whitepaper: 7 Tips for Securing Client Data in the Age of Cybercrime

What would you do if a burglar broke into your office, stole every single client folder, and dumped them indiscriminately out the top floor window onto the city streets below?

That’s a nightmare scenario with which law firms all over the world are having to come to grips, only the folders are voluminous electronic records and the street is the Internet. These are the days of Target, of Sony, of Home Depot, of Ashley Madison and -- most recently and most startlingly for firms and their corporate clients -- for Cravath, Swaine & Moore and Weil Gotshal & Manges.

Cybercrime poses among the most daunting challenges for law firms today. It presents an existential threat, where any firm -- no matter the depth of its reputation or the breadth of its clientele -- can literally come face to face with its own extinction overnight. What would happen, for example, if a firm handling sensitive source code for a Silicon Valley titan in a global IP battle exposed that information to breach?

The answer is swift client backlash, a wave of negative publicity and lawsuits for attorney malpractice.

It is not just for the well-being of the law firm, its lawyers and its employees that attorneys should implement security-first practices. It is fact an ethical duty to ensure sound cybersecurity. The ABA Model Rules state that, barring certain circumstances:

“A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent (or) the disclosure is impliedly authorized in order to carry out the representation….”

Other rules are more forceful. The California Business Code, for examples, states that attorneys have a duty “to maintain inviolate the confidence, and at every peril to himself or herself to preserve the secrets, of his or her client."

As the volume and complexity of client data proliferates, and the barriers to access that information through nefarious means lower, upholding that duty only becomes harder. In this Logikcull whitepaper, we recommend best practices to safeguard seven critical areas of vulnerability.


4,500+ legal professionals love our newsletter, where they get the latest tech and discovery news, case law, best practices, and more!
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Follow Logikcull on social media

Logikcull + MS365

Logikcull integrates seamlessly with Office 365 for incredibly fast, always reliable cloud-to-cloud eDiscovery.

logikcull + ms365

Related articles

How to Set Up a Modern In-House Legal Department
The Results Are In! Announcing the Winners of the 2022 Culler Awards
Subject Access Requests (SAR) in the UK: A Complete Overview