Yet Another Inexcusable Breach of Client Confidentiality Reported As Chinese Hack Law Firms
Nashua, NH – December 28, 2016 – Lawyers have an ethical duty to secure all electronic communications and documents covered by the attorney-client privilege. In this day and age, that means not merely computer passwords and privacy warnings. Instead, all available means that will not just make stealing this documents inconvenient, but make theft impossible, must be employed.
The admonition to use best practices to prevent loss of attorney-client material is oft repeated, yet again we see public reports that numerous law firms have been hacked and insider trading information stolen by foreign nationals for trading advantages. Read Full USA Today Article.
As a company dedicated to securing confidential communications and documents, RegDOX Solutions provides protected electronic data rooms and encrypted email and messaging communication solutions that enable law firms to protect their client’s secret information, while not just enabling, but enhancing their ability to negotiate and close deals. As William O’Brien, RegDOX’s President and CEO, said in response to this latest incident,
“The time has long passed where law firms can stand by as innocent victims when their computer networks are hacked and confidential communications and documents stolen. Solutions such as those provided by RegDOX are coming to define what it means for lawyers to meet their ethical duty to secure their work product and client communications.”
RegDOX Solutions is a market-leading provider of highly intuitive SaaS (Software-as-a-Service) solutions enabling customers to securely manage and collaborate on confidential and regulated documents and information, whether inside or outside of their IT environments. Our enterprise customers, comprising of numerous industries, count on our software’s regulatory and corporate compliance, collaboration and process capabilities as well as its complete portfolio of security features.
RegDOX’s secure solutions look at the entire information protection issue in a holistic and integrated way to better protect the way businesses operate today. We go beyond common security measures to provide full 256-bit encryption, tamper-proof audit trail, two-factor authentication, provider and administrator shielding, and, when needed, ITAR (International Traffic in Arms Regulations), EAR (Export Administration Regulations) and DFARS (Defense Federal Acquisition Regulations) compliance, all through an easy to use interface.