Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Back to Guides
Legalintermediate

Privileged Communications: Physical Protection

Legal professional privilege is absolute in UK law. But privilege can be waived through inadequate protection of privileged material. When privileged documents are stored on connected systems, every breach creates a potential waiver argument.

11 min read
Share

Privilege Is Binary

Legal professional privilege in England and Wales is one of the strongest protections in the common law system. It prevents compelled disclosure of communications between a client and their legal adviser made for the purpose of obtaining or giving legal advice.

But privilege is binary. It exists absolutely, or it does not exist at all. And one of the ways privilege can be lost is through inadequate steps to maintain confidentiality. If privileged material is stored on systems that are subsequently breached, the question of whether privilege has been waived becomes a genuine legal risk.

The Digital Privilege Problem

Modern legal practice generates privileged material digitally. Legal advice, investigation reports, litigation strategy documents, and settlement negotiations all exist as digital files stored on connected systems.

When those systems are breached, several problems emerge:

  • Exposure risk: Privileged material may have been accessed or exfiltrated by the attacker
  • Waiver arguments: Opposing parties may argue that inadequate security measures constituted a failure to maintain confidentiality
  • Disclosure obligations: Organisations may face obligations to disclose that privileged material was potentially compromised
  • Insurance implications: Privilege waiver can affect the organisation's ability to resist disclosure in related litigation

The SRA and Professional Standards

The Solicitors Regulation Authority (SRA) requires law firms to take reasonable steps to protect client confidentiality. The Bar Standards Board imposes similar obligations on barristers. In-house legal teams are subject to the same professional standards through their individual practising obligations.

What constitutes "reasonable steps" evolves with the threat landscape. As cyber attacks become more prevalent and sophisticated, the standard of reasonable protection rises accordingly. Physical controls for the most sensitive privileged material represent the current highest standard.

What Privileged Material Belongs Offline

  • Internal investigation reports: Legal advice on potential misconduct, regulatory breaches, or litigation risk
  • Litigation strategy documents: Case assessments, settlement authorities, and tactical planning
  • Board legal briefings: Legal advice to the board on significant transactions, disputes, or regulatory matters
  • M&A legal analysis: Due diligence findings, risk assessments, and deal structure advice
  • Regulatory response materials: Legal advice on regulatory investigations, enforcement actions, or compliance reviews

How OSS Protects Privilege

Offline secure storage provides the physical protection that privilege demands:

  • No remote access: Privileged material in physically disconnected storage cannot be accessed through any network-based attack
  • Identity-verified access: Every access to privileged material requires physical presence and identity verification, creating an audit trail of who accessed what and when
  • Demonstrable protection: Physical disconnection provides evidence of "reasonable steps" that satisfies professional obligations and resists waiver arguments
  • Breach scope exclusion: Data stored offline is excluded from breach impact assessments, preserving privilege even when connected systems are compromised

The Evidential Advantage

In litigation or regulatory proceedings, an organisation that can demonstrate privileged material was stored in physically disconnected storage with identity-verified access holds a significantly stronger position than one whose privileged material was on a server that was breached. The physical control demonstrates the intent and effort to maintain confidentiality that privilege requires.

Conclusion

Legal privilege is too important to entrust to software controls alone. Physical disconnection through OSS provides the level of protection that privilege demands, the evidence of reasonable steps that professional obligations require, and the certainty that privileged material survives cyber incidents with its protected status intact.

Mark Fermor
David Bailey
Kenny Phipps
Online Now
Concierge

Put this guide into practice

Ready to apply what you have learned? Explore how Firevault delivers the offline protection covered in this guide.

Takes about 2 minutes. No account needed.

Free2 minsNo sign-up

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy