Attorney-Client Privilege at Risk: The Hidden Danger in Digital Intake Forms

January 12, 2026

Camilo Artiga-Purcell flags up some of the cybersecurity, data protection and privilege risks associated with client-intake forms.

Solicitors and barristers across England and Wales have embraced digital transformation, adopting sophisticated case management systems, e-discovery platforms, and document automation tools. Yet many overlook a critical vulnerability: the web forms used to collect confidential client and prospective client information. These intake forms streamline client onboarding and reduce administrative burden, but frequently lack the encryption standards, audit capabilities, and jurisdictional controls necessary to protect solicitor-client privilege and satisfy Solicitors Regulation Authority requirements.

The consequences extend beyond theoretical risk. Recent enforcement actions demonstrate regulators’ willingness to impose substantial penalties for inadequate security measures. The Information Commissioner’s Office fined Liverpool-based DPP Law £60,000 after a ransomware attack exposed sensitive client data, including DNA testing results, details about children and victims of sexual offences, and confidential legal advice. The firm failed to implement multi-factor authentication and took 43 days to notify the ICO, substantially exceeding the mandatory 72-hour reporting period.

For general counsel, compliance officers, and law firm partners, the question is how quickly they can implement adequate controls before an incident occurs.

Understanding the Privilege Exposure

Solicitor-client privilege depends fundamentally on maintaining confidentiality. English courts recently confirmed there’s no clear bright-line test for when privilege waiver occurs. In PCP Capital Partners LLP v Barclays Bank plc, the High Court found that references to legal advice in support of a case waived privilege in that advice. The crucial question is whether a party has sought to rely upon references to legal advice to advance its case.

When legal departments collect sensitive information through insecure channels, they risk creating an argument that reasonable measures to protect confidentiality were not taken. Courts scrutinise whether organisations have implemented appropriate security controls to preserve privilege claims.

Consider what flows through digital intake forms: litigation strategies, settlement positions, witness statements, financial details, and communications about legal advice. Each submission represents potentially privileged material. If these communications traverse systems without proper encryption, lack audit trails, or are stored in jurisdictions that don’t recognise privilege protections, the privilege may be compromised.

The SRA Code of Conduct mandates that solicitors keep client affairs confidential unless disclosure is required or permitted by law. Paragraph 6.3 establishes this duty arises before a formal retainer, continues after the retainer ends, and even persists after the client’s death. Rule 4.2 requires safeguarding money and assets entrusted by clients, encompassing data protection. The Code further requires effective systems and controls to identify risks to client confidentiality and mitigate those risks.

The specific risks with inadequate digital intake form security include inadequate encryption during transmission and storage, insufficient audit trails to demonstrate limited access, unclear data residency creating jurisdictional complications, and vendor access policies that may allow providers to view privileged communications.

The Escalating Threat Landscape

The UK legal sector faces an unprecedented cybersecurity crisis. Successful cyber attacks against UK law firms surged by 77% in 2024, rising from 538 incidents to 954. Between Q3 2023 and Q2 2024, reported legal sector data breaches increased by 39%, with 2,284 incidents, up from 1,633 in the previous period. A substantial 65% of UK law firms have experienced a cyber incident, with phishing representing the dominant threat vector affecting 84% of businesses that experienced breaches.

PwC’s 2024 Law Firms’ Survey found that 90% of the top 100 UK firms cite cyber as the top threat to achieving their business objectives. The National Cyber Security Centre handled 429 incidents in the preceding 12 months, with 204 classified as “nationally significant.” For law firms, these aren’t abstract statistics, they represent immediate operational threats.

Over £4 million of client money was stolen from just 23 UK law firms that reported suffering cyber attacks. Beyond direct financial losses, firms face business disruption, notification compliance expenses, credit monitoring services, crisis management costs, and investigatory expenses.

Despite these escalating threats, preparedness remains inadequate. As of 2023, 35% of UK law firms still did not have a cyber mitigation plan in place. The Law Society of England and Wales revealed that 72% of firms have not purchased cyber insurance. The SRA’s thematic work has highlighted persistent gaps in basic preparedness, from absent disaster recovery plans to poor patching and weak controls over removable media.

UK GDPR and Regulatory Compliance

Legal practitioners face stringent data protection requirements under UK GDPR and the Data Protection Act 2018. Article 5(1)(f) requires personal data be processed in a manner ensuring appropriate security, including protection against unauthorised or unlawful processing and accidental loss, destruction, or damage.

The 72-hour breach notification requirement creates particular challenges. Under Article 33(1), data controllers must report personal data breaches to the ICO without undue delay and, where feasible, not later than 72 hours after becoming aware of it. This strict timeline requires robust incident response plans that can be activated immediately upon breach discovery.

If a breach is likely to result in high risk to individuals’ rights and freedoms, firms must inform those concerned directly and without undue delay. This threshold is higher than for notifying the ICO. Sensitive medical or legal advice data that has been lost or compromised will have higher risk to individuals than loss of an email address.

The DPP Law case illustrates enforcement consequences. Beyond the £60,000 penalty, the firm received several potential professional negligence claims related to the cyber incident. One affected client who had been accused of sexually abusing a child was informed by police that details of this allegation had been published online as a result of the ransomware attack. The firm’s market reputation suffered significant damage.

Andy Curry, ICO’s interim director of enforcement and investigations, stated: “Data protection is not optional. It is a legal obligation, and this penalty should serve as a clear message: failure to protect the information people entrust to you carries serious monetary and reputational consequences.”

The ICO operates a two-tier fining regime under UK GDPR, with maximum penalties of up to 2% or 4% of global turnover (or £8.7 million / £17.5 million, whichever is higher), depending on the seriousness of the infringement. These substantial penalty provisions underscore the regulatory importance of adequate security measures and timely breach notification.

Mandatory Cyber Essentials Certification

From October 2025, all law firms in England and Wales holding Criminal Legal Aid contracts must have valid Cyber Essentials certification. Failing to comply will put eligibility for future Legal Aid contracts − and potentially renewals of existing ones − at serious risk.

Cyber Essentials is a government-backed certification scheme developed as part of the UK Government’s National Cyber Security Strategy. It provides a framework of technical controls across five basic areas: firewalls and boundary security, secure configuration of systems, access control and user privileges, malware protection, and patch management and security updates.

The scheme aims to help organisations implement basic levels of protection against cyber attack, demonstrating to clients they take cyber security seriously. Cyber Essentials certification protects against approximately 80% of common cyber threats.

For practices seeking additional validation, Cyber Essentials Plus involves a technical audit conducted by a qualified external assessor to verify effective implementation of controls. The certification body conducts internal and external vulnerability scans and tests malware protection on a sample of devices.

Cyber Essentials certification includes automatic cyber liability insurance for any UK organisation that certifies their whole organisation and has less than £100 million in revenue.

Lexcel Accreditation and Information Security

Under Lexcel England and Wales v6.1, Section 3.2 mandates that practices must have an information management and security policy in place. More significantly, it strongly recommends that firms gain Cyber Essentials certification.

While not yet mandatory under Lexcel, the emphasis placed on Cyber Essentials signals a clear direction of travel. Firms looking to maintain Lexcel accreditation are increasingly expected to demonstrate implementation of baseline cybersecurity controls. Practices that choose not to gain Cyber Essentials accreditation may be asked by auditors to explain why they have decided against it.

Lexcel Edition 7 will likely require demonstrable cyber risk management, possibly including audits, staff training, and a move to required (not just recommended) cybersecurity certification.

International Data Sovereignty Requirements

The EU GDPR restricts transfers of EU residents’ personal data outside the European Economic Area unless specific conditions are met, such as an adequacy decision, Standard Contractual Clauses, or other appropriate safeguards. Forms collecting European client information must account for lawfulness, fairness, and transparency in data processing; purpose limitation and data minimisation; breach notification within 72 hours of identification; and data subject rights including access, correction, erasure, and portability.

China’s Personal Information Protection Law (PIPL), effective November 2021, creates extensive data sovereignty requirements for legal services handling Chinese client data. The law requires data localisation for critical information infrastructure operators and large-scale data processing; separate, explicit consent for processing sensitive personal information, which includes financial account information; personal information impact assessments for cross-border transfers; appointment of a Data Protection Officer for organisations meeting certain processing thresholds; and immediate breach notification (versus 72 hours under GDPR).

Brazil’s Lei Geral de Proteção de Dados (LGPD) establishes comprehensive data protection requirements with fines up to 2% of a company’s revenue in Brazil, with a maximum of 50 million reais (approximately £9 million) per violation.

Client Security Requirements

Corporate clients increasingly require outside counsel to demonstrate specific security controls through detailed questionnaires. The Bar Council and Law Society have developed a standardised cybersecurity questionnaire to help law firms better assess the cybersecurity arrangements of chambers and barristers they instruct.

Version 2, published in May 2024, includes enhanced requirements for disaster recovery planning, business continuity arrangements, incident management procedures, data and device management protocols, and standalone questions on phishing protection, vulnerability testing, and penetration testing.

Nick Emmerson, president of the Law Society of England and Wales, stated: “Law firms and chambers are targets for the ever-growing threats from cyber criminals. We know that no one tool can offer complete protection against cyber threats, but this updated questionnaire will help reassure clients that data is kept as secure as possible.”

Common requirements in legal RFPs include data encryption standards, single sign-on and multi-factor authentication, physical facility access restrictions, intrusion detection and anti-virus/anti-spyware protection, policies covering administrative, technical, and physical safeguards, documentation of security practices and vendor evaluation processes, and cyber liability insurance with minimum £10 million coverage.

Implementing Effective Controls

Addressing these risks requires systematic treatment of digital intake forms with the same security rigour applied to other confidential communications.

Legal departments should identify every system collecting client information and evaluate whether it meets security, compliance, and privilege protection requirements. This audit should examine encryption implementation for data in transit and at rest, audit trail capabilities for privilege disputes, data residency controls and jurisdictional compliance, vendor access policies and restrictions, security certifications (Cyber Essentials, SOC 2, ISO 27001), and breach notification procedures and timelines.

Digital intake forms collecting confidential client information must implement stringent security controls. Legal-specific intake tools should employ conditional logic to limit access to named individuals based on the type of matter or specific form selections. These restrictions should seamlessly integrate with matter management and document management systems, replicating permissions and access controls across platforms.

Robust security features must include end-to-end encryption and two-factor authentication to protect sensitive, confidential, or privileged information. Data must remain encrypted both in transit during submission and at rest during storage.

Comprehensive logging of form activity, data access attempts, and user actions enables security monitoring, compliance demonstration, and privilege dispute resolution.

Forms should collect only essential information required, reducing breach risks and improving user experience. Use conditional logic to hide or reveal fields based on previous answers, streamlining the process and ensuring relevance.

Vendor Selection and Due Diligence

Rather than selecting solutions based primarily on functionality or cost, legal departments should establish security and compliance as threshold requirements. Key evaluation questions include:

  • Does the vendor hold ISO 27001, SOC 2, or Cyber Essentials certifications? Can they provide recent audit results and security assessment reports?
  • Where is data stored? On-premises, cloud, or hybrid? Can the organisation control storage location to meet data sovereignty requirements?
  • Who has access to client information? What policies govern access rights? How are permissions managed when personnel change or matters close?
  • Does the vendor conduct regular penetration testing and vulnerability assessments? Are these performed by independent third parties?
  • What breach notification procedures exist? How quickly will the vendor notify the organisation? What support is provided for breach response?
Board-Level Responsibility and Training

The SRA review recommends designating a high-profile leader responsible for all aspects of cyber security who will ensure the importance of the issue remains front of mind company-wide and that correct protections and procedures are in place. Responsibility for protecting firms from cyberattacks is a board-level matter.

In larger organisations, IT teams usually lead on cyber security, but senior leaders are responsible for embedding cyber security in the organisation’s risk management processes and governance.

Human error remains the biggest cybersecurity vulnerability for most law firms, with an estimated 95% of cyber-attacks succeeding due to human error encompassing actions like clicking phishing links, using weak passwords, or misconfiguring systems.

Staff training should enable understanding of how to follow response plans if there is a cyber attack; create secure passwords and implement multi-factor authentication; recognise common cyber attacks, particularly phishing attempts; safely store and dispose of confidential documents; and understand added risks of working outside the office, including connecting to public Wi-Fi that may not be secure or having conversations that can be overheard.

The SRA emphasises coordinating staff training as a core responsibility of cyber security leads. Quarterly staff training on policy changes and technology risks should be tied to continuing professional development requirements and annual employee acknowledgements.

Incident Response Planning

Firms must have a plan in place for cyber attacks. The plan should include who staff should alert if there is an attack (likely the IT team or cyber security leads); actions to take to stop the attack if it is still happening; how to reduce damage afterwards; containment strategies; notification procedures (both to ICO and affected individuals); and mitigation measures.

A plan only helps if it is short, printed, and tested. Use one side of A4 to capture who declares an incident, how to isolate compromised accounts or devices, which clients and insurers to notify, and how to run the practice on paper if systems are unavailable.

When reporting a breach to the ICO, notifications must include description of the nature of the personal data breach; name and contact details of the data protection officer or other contact point; likely consequences of the personal data breach; and measures taken or proposed to address the breach.

A Governance and Technology Imperative

Protecting solicitor-client privilege has evolved beyond avoiding inadvertent disclosures or maintaining physical security over paper files. Modern legal practice requires privilege protection to extend to digital systems, including web forms collecting client information.

The convergence of escalating cyber threats (77% surge in attacks), stringent SRA obligations, complex UK GDPR requirements, mandatory Cyber Essentials certification for Legal Aid contracts, and demanding Lexcel accreditation standards creates an exceptionally challenging environment for digital intake form security in the UK legal sector.

UK solicitors and barristers can no longer treat digital intake forms as simple convenience tools—they require the same rigorous security analysis applied to other confidential communication channels.

Organisations that proactively address intake form security through Cyber Essentials certification, comprehensive vendor evaluation aligned with the Bar Council/Law Society cybersecurity questionnaire, robust technical controls including end-to-end encryption, clear policies documenting board-level governance, staff training programmes, and 72-hour breach notification procedures position themselves to protect solicitor-client privilege, satisfy SRA Code of Conduct obligations, meet UK GDPR requirements, maintain Lexcel accreditation, and preserve competitive advantage in an increasingly security-conscious market.

Those deferring these evaluations expose themselves to privilege waiver risks through inadequate confidentiality protections, ICO enforcement actions with fines up to 4% of global turnover, SRA regulatory scrutiny, professional negligence claims, and client relationship damage that eliminates whatever convenience generic form solutions provided.

With 90% of the top 100 UK firms citing cyber as their top business threat and nation-state actors intensifying attacks, the question is no longer whether to implement comprehensive intake form security, but how quickly firms can achieve compliance before an incident occurs.

For general counsel, compliance officers, and law firm partners, the path forward involves treating digital intake forms with appropriate security rigour. This means conducting thorough audits of existing tools, establishing clear security requirements for new implementations, documenting compliance measures, and ensuring vendor relationships include verifiable security commitments.

The professional and ethical obligations applying to traditional solicitor-client communications extend equally to digital channels. Organisations recognising this reality and acting accordingly protect both their clients and themselves.

profile image of camilo artiga purcell of kiteworks

Camilo Artiga-Purcell is general counsel at Kiteworks, where he leads legal strategy and governance initiatives for secure content communications and collaboration. With extensive experience in data privacy, cybersecurity and emerging technology law, he advises organisations on managing AI-related risks whilst maintaining competitive advantage.