Data Breaches: Adding a New Layer to the Risk of Legal Malpractice
Attorneys have an ethical duty to have reasonable safeguards in place to protect and respond to a data breach. The failure to do so has resulted in professional malpractice lawsuits.
January 24, 2020 at 10:30 AM
9 minute read
The news these days is filled with reports of significant data breaches. In fact, most experts opine that it is not a matter of "if" but "when," as to whether an entity will fall victim to a cyber-attack. Unfortunately, those in the legal profession are not immune to a data breach. What's more, ethical obligations put lawyers and law firms at even greater risk for significant business, financial and reputational harm should they experience a cyber-attack. More firms are falling prey to schemes as simple as "phishing" tactics or as sophisticated as a coordinated cyber-attack, exposing client data that could include sensitive financial information, market-influencing mergers and acquisitions intelligence, and intellectual property from a patent filing. As a result, attorneys have both an ethical and legal duty to take reasonable steps to protect their clients' personal sensitive data against a cyber-attack, or face serious ramifications.
|Why Law Firms Are Prime Targets
Law firms are a soft target to hackers as they possess a large volume of critical data. For example, an attorney involved in a highly sensitive business transaction has access to information ranging from a client's personally identifiable information (PII), to details of a business' confidential transactions. Moreover, through discovery and the litigation process, law firms gain access to, among other items, their clients' as well as adversaries' PII, personal health information (PHI), and confidential financial information. Everything from trade secrets, to sensitive market-moving information about a company's finances, to a client's PHI occupies a law firm's files and servers. Additionally, because attorneys tend to identify and isolate this information, hackers are able to quickly and efficiently locate this highly sensitive data. As such, by targeting law firms, cyber criminals have the ability to access a plethora of valuable information located in one place.
Moreover, law firms tend to employ fewer resources toward implementing strong cybersecurity controls, making them more susceptible to an attack. According to the American Bar Association Legal Technology Resource Center's 2019 Legal Technology Survey Report, 26% of respondents report that their firms have experienced some sort of security breach (ranging from hacker activity and website exploits, to more mundane incidents such as lost or stolen laptops). Although the 26% figure is notable, also eye-catching is the 19% of respondents who reported that they do not know whether their firm has ever experienced a security breach. Moreover, the survey found that only 31% of the respondents had an incident response plan. Additionally, only 44% of the respondents use file encryption, 38% use email encryption, and 22% use whole/full disk encryption.
It is evident that heading into the new decade, law firms will continue to be ripe targets for a cyber-attack, and must take steps to add additional layers of protection to safeguard their clients' information, and to reduce the possibility of a malpractice claim.
|Legal and Ethical Consequences of a Breach
The ethics rules require attorneys to be competent and take reasonable measures to safeguard information relating to clients (ABA Model Rules 1.1 and 1.6 and comments). The comments to ABA Model Rule 1.1 state that "[t]o maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject."
In June 2017, the ABA Standing Committee on Ethics and Professional Responsibility issued Formal Opinion 477R on the subject of a lawyer's ethical obligations to secure communication of protected client information. The Opinion took a fresh look at advances in technology and ever-increasing cybersecurity threats, and provided guidance as to when enhanced security measures are appropriate when transmitting protected client information. The Opinion stated that it is not always reasonable to rely on the use of unencrypted email, thus, lawyers must, on a case-by-case basis, constantly analyze how they communicate electronically about client matters to determine what effort is reasonable.
The Committee recommended the following steps lawyers should take to guard against disclosures, including: understanding the nature of the threat; understanding how client confidential information is transmitted and where it is stored; understanding and using reasonable electronic security measures; determining how electronic communications about clients' matters should be protected; labeling client confidential information; training lawyers and nonlawyer assistants in technology and information security; and conducting due diligence on vendors providing communication technology.
Over a year later, on Oct. 17, 2018, the American Bar Association Standing Committee on Ethics and Professional Responsibility issued Formal Opinion 483, detailing a lawyer's obligations after an electronic data breach or cyber-attack. The ABA Committee recognized that "[a]s custodians of highly sensitive information, law firms are inviting targets for hackers." The Opinion outlined certain reasonable steps that the Committee believed lawyers should take in the event that a data breach occurs. In doing so, the Committee addressed an attorney's obligation to monitor for a breach, to stop a discovered breach and restore systems, to determine what information was compromised, to evaluate notice obligations, and to determine what information must be provided to clients and former clients in the event of a breach. The ABA Committee further recognized that an attorney's obligation in the event of a data breach or cyber-attack necessarily touches upon Model Rules 1.1, 1.4, 1.6, 5.1, and 5.2, which address, among other things, an attorney's duty to his or her client while using technology.
Accordingly, attorneys have an ethical duty not only to be competent when it comes to the use of technology, but to have reasonable safeguards in place to protect and respond to a data breach. The failure to do so has resulted in lawsuits being filed, sounding in professional malpractice. For example, in Millard v. Doran, No. 153262/2016 (Sup. Ct. N.Y. Cty.), a malpractice suit was brought against an attorney for allegedly permitting cybercriminals to hack into the firm's email system and to read and intercept communications held within. This resulted in the plaintiff fraudulently wiring $1.9 million to the cybercriminals. An example on a larger scale occurred in 2017, when a class action was commenced against the law firm Johnson & Bell not for any actual breach, but rather for having inadequate data security measures in place. As to damages, the class sought injunctive relief, the requirement that the firm inform its clients that its computer systems are not secure and undergo a security audit, the forfeit of fees and profits the firm allegedly diverted from having been spent on cybersecurity, attorney fees and expenses, and pre- and post-judgment interest.
To the extent law firms continue to ignore their ethical and legal obligations to guard against a cyber-attack, it is expected that even more professional malpractice lawsuits will be filed.
|Avoiding Malpractice Claims
Cybersecurity is everyone's responsibility in a law firm. Buy-in must flow from the top down to ensure a culture of security in the organization. Law firms should create a cross-organizational committee, which includes not only management but human resources, procurement, finance and IT, to develop and implement a risk management plan for preventing a data breach. Moreover, many law firms are now using a Chief Technology or Privacy Officer to oversee the firm's data security and privacy, as well as technology infrastructure to ensure that the policies and procedures are consistent with the security plan and technology. Using resources like the National Institute of Standards and Technology (NIST) as guidance for implementing a data security program is a good start. It is a comprehensive and flexible template for managing risk. The five pillars of NIST include: Identify, Protect, Detect, Respond and Remediate. Thirty percent of U.S. companies currently use the NIST framework to manage their cyber risk. By 2020, the number of companies is expected to increase to 50%.
In addition, a law firm should conduct an inventory of its software systems and data, and assign ownership and categorization of risk; the higher the sensitivity of the information, the stronger the security protections and access control must be. Furthermore, the IT department or an outside vendor should conduct third-party vulnerability scans, penetration tests, and malware scans to protect against potential breaches. The use of antivirus software is simply not enough to detect sophisticated attacks that sometimes go undetected for an average of 300 days.
Most importantly, after setting the tone from the top, law firms must train employees so that they are aware of the company's security protocol, and protected against the potential for accidentally exposing a client's personal, confidential information with the click of a button. This also includes having all employees create strong and unique passwords to protect their computers and mobile devices in conjunction with a password management utility. In addition to implementing the use of secure account credentials, other commonly deployed methods and tools used to keep data safe include encryption, as well as physical securities. Clearly, the use of encryption for emails is a must-have tool for attorneys. Encryption apps are very easy to use and protect clients' data and privacy when sending sensitive emails and attachments.
The new digital age imposes a greater ethical and legal responsibility on the legal profession to protect the confidentiality, integrity and availability of a client's data. With the increased threat of cybersecurity-related malpractice claims, it is imperative that attorneys comport their practice to evolve with today's changes in technology.
Karen Painter Randall is the Chair of the Cybersecurity and Data Privacy Group, and Steven A. Kroll is an Associate in the Group, at Connell Foley LLP in Roseland.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllAppellate Div. Follows Fed Reasoning on Recusal for Legislator-Turned-Judge
4 minute readChiesa Shahinian Bolsters Corporate Practice With 5 From Newark Boutique
5 minute read'A Mockery' of Deposition Rules: Walgreens Wins Sanctions Dispute Over Corporate Witness Allegedly Unfamiliar With Company
Trending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250