Six questions on how your firm communicates and stores matter files. We'll show you whether the privilege claim is defensible at the cryptography layer — or only at the policy layer.
Answer each question with the option that best matches your firm's current workflow. We'll grade the privilege defensibility of the answers — not the firm.
- 01
Where do you currently store client matter files?
Files include intake forms, retainer agreements, evidence, drafts, correspondence.
- 02
How do you share documents with co-counsel at other firms?
Co-counsel relationships often involve sharing privileged work product across firm boundaries.
- 03
Where do you draft sensitive memos (settlement, M&A, board materials)?
Working drafts often contain the most candid attorney analysis — and the most damaging if exposed.
- 04
How do you communicate with clients about pending matters?
Attorney-client communications must remain privileged at the cryptography layer, not just the policy layer.
- 05
Who at your firm's workspace vendor has admin access to your data?
Vendor-side admin access is the structural answer to "could a vendor employee read this?"
- 06
If a discovery motion targets your workspace vendor directly, what could the vendor produce?
Discovery counterparties have served subpoenas on Google, Microsoft, Slack, etc. seeking attorney-client communications. The vendor's response capacity is the test.
- 07
When an associate, paralegal, or contractor leaves the firm, what access do they retain?
Departing personnel are the highest-frequency source of accidental privilege exposure.
- 08
If your firm's workspace vendor announces a breach tomorrow, what's exposed?
Every major workspace vendor will be breached eventually. The question is what an attacker walks away with.
Answer all 8 questions to see your grade.