| ABA Model Rule 1.6 | Reasonable efforts to prevent unauthorized disclosure of client information. Interpreted to require encryption, MFA, and documented security practices. | All firms in all states. Most states have adopted equivalent rules. |
| State Bar Rules | Many state bars (NY, CA, FL, TX, and others) have issued cybersecurity guidance or formal opinions specifying what 'reasonable efforts' means in practice. | All firms. Requirements vary by state and practice area. |
| State Breach Notification Laws | All 50 states require notification to affected individuals when personal information is compromised in a breach. Timelines range from 30 to 90 days. Some states require notifying the state AG. | All firms handling personal information about individuals, which is virtually every firm. |
| NY SHIELD Act | Requires any business handling data of New York residents to implement reasonable cybersecurity safeguards, regardless of where the firm is located. | Firms with New York clients or New York-based individuals in their files. |
| California CCPA / CPRA | Grants California residents rights over their personal data and requires businesses above certain thresholds to implement data security and respond to consumer requests. | Firms with California clients meeting revenue or data volume thresholds. |
| HIPAA (Flows from Clients) | Firms representing healthcare clients who receive or handle protected health information (PHI) may be Business Associates under HIPAA: requiring a BAA and security controls. | Firms serving hospitals, clinics, health plans, or other covered entities. |
| FTC Safeguards Rule (Flows from Practice) | Law firms providing certain financial services: tax planning, estate planning involving financial products: may qualify as financial institutions under GLBA. | Firms with financial services practice areas. |
| ITAR / CUI (Flows from Clients) | Firms representing defense contractors or handling export-controlled or Controlled Unclassified Information may be subject to ITAR or CMMC-adjacent requirements. | Firms serving defense industry or government contractor clients. |
| Cyber Insurance Requirements | Insurers now require MFA, EDR, encrypted backups, and incident response plans as conditions of coverage. Firms that cannot demonstrate these controls face higher premiums or coverage denial. | All firms carrying cyber liability insurance, which should be every firm. |