Law Firms Must Be Proactive to Prevent Cyberattacks
In the past few years, major law firms, including Cravath Swaine & Moore and Weil Gotshal & Manges, were victims of cyberattacks. In addition, more than 11.5 million files from Mossack Fonseca, the world's fourth largest offshore law firm, were stolen because the firm failed to take the necessary steps to protect its confidential data, including updating the security of its web servers.
April 26, 2018 at 02:25 PM
9 minute read
Pop quiz. How many of the following items are you familiar with?
- Back door/trap door
- Cracks
- DNS poisoning
- Eavesdropping
- Hackers
- IP spoofing
- Malware
- Man-in-the-middle spoofing
- Network sniffing
- Password cracking
- Phishing
- Ransomware
- Replay attacks
- Social engineering
- Spam
- Spyware
- System penetration
- System tampering
- TCP/IP hijacking
- Trojan
- Tunneling
- Viruses
- Website defacement
- Worms
When lecturing about or assisting law firms with cybersecurity issues, I ask them to tell me what each of these items is, and not surprisingly, no one has ever gotten a perfect score. In fact, no one has ever come close to receiving a passing grade. Of course not, lawyers aren't trained to be cybersecurity experts. Yet cybersecurity—which is the process of protecting a computer or computer network against the criminal or unauthorized use of electronic data—is something every law firm needs to know about and to protect against.
In the past few years, major law firms, including Cravath Swaine & Moore and Weil Gotshal & Manges, were victims of cyberattacks. In addition, more than 11.5 million files from Mossack Fonseca, the world's fourth largest offshore law firm, were stolen because the firm failed to take the necessary steps to protect its confidential data, including updating the security of its web servers.
In most cases, data breaches can be avoided. Yes, your firm can hire a consultant to help, but you need to know more, and to take additional steps. Why? Because there are legal and ethical considerations that you should understand.
Under the Pennsylvania Rules of Professional Conduct, lawyers have a duty to protect confidential client information, and to respect the rights (including sensitive information) of third persons. For example, Rule of Professional Conduct 1.6(d) requires that “A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.” In other words, you can't leave your computer network unprotected against hacking or ransomware. Comment 25 to this rule explains that “a lawyer [must] act competently to safeguard information relating to the representation of a client against unauthorized access by third parties and against inadvertent or unauthorized disclosure by the lawyer or other persons who are participating in the representation of the client or who are subject to the lawyer's supervision.” In other words, when it comes to data on your computers, cellphones and servers, you must take appropriate security measures.
This comment further explains that lawyers “may be required to take additional steps to safeguard a client's information to comply with other law, such as state and federal laws that govern data privacy or that impose notification requirements upon the loss of, or unauthorized access to, electronic information.” In other words, a law firm may have to comply with data breach notification laws and other statutes.
In addition. Rule 4.4(1) requires lawyers to respect the rights of third persons. While this rule states that lawyers should avoid taking actions that would embarrass a third party, its import in the realm of cybersecurity is becoming evident. In the past, lawyers filed documents electronically that contained personal information (such as Social Security numbers and financial account numbers), or confidential information (such as medical records with sensitive information) without considering what would happen if another person—such as the “nosy neighbor”—went online, read it, and disseminated it. Consider how your 12-year-old son would feel if his medical records revealed his chronic bed wetting, and those records were available online as part of the file in a custody action. That happened.
Now, lawyers must redact sensitive information under Pennsylvania's Public Access Policy; numerous other states have enacted similar measures, all intended to prevent the disclosure of the types of personal information that we would all agree should not be freely available to a “nosy neighbor,” the press, or anyone other than the parties in the case.
Attorneys need to consider these obligations, as well as broader cybersecurity issues. At its core, cybersecurity always begins with physical security, in other words, preventing unauthorized access to your office network, cellphones, and any other electronic devices that contain confidential or sensitive information.
So, what should firms do? And is the task so daunting that solo, small and midsized firms should just throw in the towel? The answer is that every firm of every size should plan and take reasonable efforts to protect the interests of their clients and their firms. You must apply the same standard that has always applied to protecting paper files to your digital ones. You wouldn't think of leaving client files in your lobby for anyone to see, so why would you leave your digital files vulnerable to anyone with the right technological knowhow to view?
In many cases, smaller law firms have advantages over larger entities because they don't have the internal bureaucracy common to larger firms and can take proactive measures quickly. So, what are the steps firms should take to prevent cyberattacks?
First, firms should conduct a risk assessment, focusing on assessing potential threats. The assessment will consider how much data firms must protect, and areas must vulnerable to attack.
Second, firms should consider whether certain data should be isolated/segregated from other data. If your firm, for example, has the secret recipe for Coca-Cola, then that information should be handled differently from other data. There are many ways to do this, including storing certain data on servers that are not accessible through the internet to limiting who internally can access the data and the way access is controlled. These cybersecurity measures are practical, and do not generally costs considerable sums.
Third, firms must consider whether state or federal laws require additional protective measures. In those case, the applicable law, such as HIPAA, will govern how the data is stored. If a firm fails to store such data properly, they may find themselves subject to liability in the event of a security breach.
Fourth, remember to employ the basic cybersecurity measures that all computer users should take. These include installing anti-malware and antivirus software on all computers and mobile devices (including smartphones). Critical to these efforts is the need to regularly update the programs thatt should be installed in a company's computers, and these programs must be updated regularly.
When the “WannaCrypt” software virus spread globally in May 2017, blocking customers from using data unless they paid a ransom using Bitcoin, Microsoft reminded its customers that it had released a security update to patch this vulnerability and to protect its customers. Microsoft issued a statement outlining the need for consumers to proactively maintain the security of their computers: “… this attack demonstrates the degree to which cybersecurity has become a shared responsibility between tech companies and customers.”
“The fact that so many computers remained vulnerable two months after the release of a patch illustrates this aspect. As cybercriminals become more sophisticated, there is simply no way for customers to protect themselves against threats unless they update their systems,” Microsoft said, continuing, “Otherwise they're literally fighting the problems of the present with tools from the past. This attack is a powerful reminder that information technology basics like keeping computers current and patched are a high responsibility for everyone, and it's something every top executive should support.”
In addition to installing anti-malware and antivirus, businesses that use a wireless network should protect them with a secure password, and the network encryption should be updated regularly to guard against attacks by hackers who prey on inadequately protected networks. Similarly, firms who allow access to data through their websites should require all users to have secure passwords, and should require users to log out of and close the webpage when their activity is concluded. Of course, this is like a business requiring staff to lock the doors when they leave the building.
These efforts require that staff be educated about a firm's security requirements, as well as the reasons for them. Firms should require staff to report any suspicious activity, and should develop a Cybersecurity Breach Response Plan so that there are procedures in place to deal with concerns, whether it is a lost smartphone or unauthorized access to the firm's servers.
Finally, because most legal malpractice insurance policies do not provide coverage for data breaches, and do not pay for such common breach remedies as identity protection monitoring, firms should purchase cyberinsurance. Comprehensive cyberinsurance covers a wide range of losses, including losses from damage to or corruption of a firm's electronic data; business interruption protection; notification costs to persons whose data was accessed; payment of fines and statutory penalties; reimbursement for ransomware costs; legal liability for breaches of HIPAA and other state and federal privacy protection laws, and more.
The goal of cybersecurity is to protect law firms against foreseeable threats. While no one can guarantee that a firm will not be subject of a cyberattack, it remains incumbent on firms to plan for these situations by implementing measures that reduce the risk that a hacker will access confidential data or other information.
Daniel J. Siegel, principal of the Law Offices of Daniel J. Siegel, provides ethical guidance and Disciplinary Board representation for attorneys and law firms; he is the editor of “Fee Agreements in Pennsylvania (6th Edition)” and author of “Leaving a Law Practice: Practical and Ethical Issues for Lawyers and Law Firms (Second Edition),” published by the Pennsylvania Bar Institute. Contact him at [email protected].
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllSuperior Court Directs Western Pa. Judge to Recuse From Case Over Business Ties to Defendant
3 minute readSeven Rules of the Road for Managing Referrals To/From Other Attorneys, Part 2
6 minute readLitigating the Written Word: Parol Evidence Rule and the Gist of the Action Doctrine in Fraud Claims
6 minute readTrending Stories
- 1Departing Attorneys Sue Their Former Law Firm
- 2Pa. High Court: Concrete Proof Not Needed to Weigh Grounds for Preliminary Injunction Order
- 3'Something Else Is Coming': DOGE Established, but With Limited Scope
- 4Polsinelli Picks Up Corporate Health Care Partner From Greenberg Traurig in LA
- 5Kirkland Lands in Phila., but Rate Pressure May Limit the High-Flying Firm's Growth Prospects
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250