Privilege Audit · Workspace edition

Six questions on how your firm communicates and stores matter files. We'll show you whether the privilege claim is defensible at the cryptography layer — or only at the policy layer.

Answer each question with the option that best matches your firm's current workflow. We'll grade the privilege defensibility of the answers — not the firm.

0 / 8
  1. 01

    Where do you currently store client matter files?

    Files include intake forms, retainer agreements, evidence, drafts, correspondence.

  2. 02

    How do you share documents with co-counsel at other firms?

    Co-counsel relationships often involve sharing privileged work product across firm boundaries.

  3. 03

    Where do you draft sensitive memos (settlement, M&A, board materials)?

    Working drafts often contain the most candid attorney analysis — and the most damaging if exposed.

  4. 04

    How do you communicate with clients about pending matters?

    Attorney-client communications must remain privileged at the cryptography layer, not just the policy layer.

  5. 05

    Who at your firm's workspace vendor has admin access to your data?

    Vendor-side admin access is the structural answer to "could a vendor employee read this?"

  6. 06

    If a discovery motion targets your workspace vendor directly, what could the vendor produce?

    Discovery counterparties have served subpoenas on Google, Microsoft, Slack, etc. seeking attorney-client communications. The vendor's response capacity is the test.

  7. 07

    When an associate, paralegal, or contractor leaves the firm, what access do they retain?

    Departing personnel are the highest-frequency source of accidental privilege exposure.

  8. 08

    If your firm's workspace vendor announces a breach tomorrow, what's exposed?

    Every major workspace vendor will be breached eventually. The question is what an attacker walks away with.

Answer all 8 questions to see your grade.