Sign In
    Wisconsin Lawyer
    July 29, 2022

    Responding to a Data Breach

    Law firms and lawyers experiencing cybersecurity incidents have both legal and ethical obligations to protect client data and inform clients of potential exposure. Here are tips to help you navigate a cybersecurity breach.

    Katharine Heitman Campbell & Christopher Cody Shattuck

    digital warning about data leak

    Not only are lawyers and law firms not immune from experiencing cybersecurity incidents but they are also in a distinctive position: Such incidents might subject them to legal and ethical obligations.

    Whether a “breach” occurs is typically a legal determination. In general though, a data breach occurs when there is unauthorized access or acquisition of personal information. Although different states and other countries might have varying definitions of a data breach, a breach can occur when a person steals, gains access to, or uses information or, in some cases, exceeds their authority to access information without permission. The two most common types of cybersecurity incidents that law firms experience are ransomware attacks and business email compromises. Such incidents must be taken seriously and investigated properly to determine whether a data breach occurred and what reporting obligations the incident may have triggered under state statutes and ethical rules.

    An Overview of the Data Breach Response Process

    When a cybersecurity incident occurs, a law firm should first identify whether there is an insurance policy in place that will cover the incident and, if there is one, contact the insurance company. The insurance company might provide the firm with a list of approved service providers, such as law firms that specialize in data breaches and forensic providers with which the firm can work.

    Regardless of insurance coverage, the firm’s next call should be to a lawyer (hereinafter data breach counsel) who can help the firm navigate the incident and, to the extent possible, provide attorney-client privilege protections during the investigation. Data breach counsel can work with the firm’s internal IT team or help the firm find and engage a forensic IT company that can assist in removing the threat actor from the network, restoring computer systems, and determining which information was accessed or acquired. In the case of ransomware incidents, the forensic company might also engage in negotiations with threat actors responsible for deploying the ransomware and demanding payments.

    After determining the extent of the incident, data breach counsel can work with the firm to determine the firm’s legal notification obligations. Such a determination involves reviewing laws for the state or states where the persons affected by the data breach reside. Data breach counsel will also work with the firm to determine notification obligations to clients invoked by applicable ethical rules. A third party can also assist with notification letters and offer credit monitoring services as may be required by law or otherwise recommended by data breach counsel.

    Ransomware and Business Email Compromises Explained

    Ransomware. Ransomware attacks occur when a threat actor delivers malicious software, typically referred to as malware, that locks and encrypts a user’s files and systems. To get access to those files and systems, a user will have to use a decryption key, which the threat actor will provide once a ransom is paid. A user will typically receive a ransom demand and detailed instructions about how to pay the ransom. These ransoms sometimes can be negotiated, and a forensic company with expertise in negotiations is the best party to assist in such negotiations.

    Kate Campbell Kate Campbell, Univ. of Southern California School of Law 2008, an attorney at Godfrey & Kahn, Milwaukee, is a member of the firm’s Data Privacy & Cybersecurity and Tech & Digital Business practice groups. Get to know the author: Check out Q&A below.

    Christopher C. Shattuck Christopher C. Shattuck, Univ. of La Verne College of Law 2009, M.B.A. U.W.-Oshkosh 2015, is manager of Practice411, the State Bar’s law practice assistance program. If you have questions about the business aspects of your practice, call (800) 957-4670.

    Negotiating with a threat actor may seem counterintuitive. How can the threat actor be trusted to deliver the decryption key once the firm pays the ransom? How can the target of the attack know that the threat actor won’t leak information obtained during the attack? However, ransomware gangs know that they must do what they say they will do; otherwise, there will be no reason for any victim to pay.

    Forensic providers have a lot of insight into ransomware gangs and are experienced negotiators. Data breach counsel, the forensic provider, and the law firm can work together to determine whether the ransom should be paid. Even if a law firm has backed up all its data, there might be reason to pay the ransom. Threat actors use double and triple extortion methods to get victims to pay. To encourage payment of the ransom, the threat actors might tell the law firm they are going to release firm data online or put it up for sale on the dark web or might even contact clients whose data was stolen to inform the clients of the breach.

    Some factors to keep in mind when considering whether to pay the ransom include 1) whether the threat actors are individuals or entities that appear on government sanctions lists, thus making it a federal crime to conduct business with them;1 and 2) that purchasing the stolen data on the dark web may also violate federal criminal laws, even if law firms are buying back their own stolen data.2 Data breach counsel can help guide firms through the stress of an investigation and decision-making during and after a ransomware incident.

    Business Email Compromises. Business email compromises occur when a threat actor gains access to a user’s email account, through exposing a vulnerability in the email system or through guessing or knowing a user’s password. Once in the user’s email account, threat actors have access to all the user’s email and can send those emails to an account controlled by the threat actor. A threat actor can also send malicious email attachments to a user’s contacts, in the hope that the contacts will trust emails coming from the user and download attachments or click on the links in the email, causing that contact’s computer to become infected.

    Business email compromises often are used to commit wire fraud. Lawyers and law firms handling real estate transactions need to be especially aware of this risk. A threat actor can sit in a lawyer’s email undetected and wait for the right time to strike. Once it is clear a wire transaction is scheduled to occur, the threat actor can send an email from the lawyer’s inbox with a change in wiring instructions. The wire will now be directed into the threat actor’s account. The threat actor can set up rules for the inbox so any emails about that change in instructions are automatically deleted, and the lawyer is none the wiser. The prevalence of wire-fraud incidents emphasizes the need for all parties in a real estate transaction to make sure to have steps in place to counter any such attempts – for example, requiring oral confirmation (by telephone or in person) when wiring money or if a change is proposed.

    Ask Us!

    Questions about ethics or practice management? Confidential assistance is a phone call or click away:

    Ethics Hotline: (800) 254-9154, or (608) 229-2017
    9 a.m. to 4 p.m., Monday through Friday.

    Practice411: (800) 957-4670, or

    Notification Requirements under Wis. Stat. Section 134.98

    There are legal obligations to consider if a data breach has occurred. Law firms in Wisconsin will likely have personal information involving Wisconsin residents that were affected by such a breach. Accordingly, the law firm should understand the obligations outlined in Wis. Stat. section 134.98 concerning the notice of unauthorized acquisition of personal information.

    Personal information is defined in Wis. Stat. section 134.98 as an individual’s last name and the individual’s first name or first initial, in combination with and linked to any of the following elements (if the element is not publicly available information and is not encrypted, redacted, or altered in a manner that renders the element unreadable):

    1. The individual’s Social Security number;

    2. The individual’s driver’s license number or state identification number;

    3. The individual’s financial account number, including a credit or debit card account number, or any security code, access code, or password that would permit access to the individual’s financial account;

    4. The individual’s deoxyribonucleic acid profile, as defined in Wis. Stat. section 939.74(2d)(a); or

    5. The individual’s unique biometric data, including fingerprint, voice print, retina or iris image, or any other unique physical representation.3

    Wis. Stat. section 134.98 requires notification of a data breach when “an entity whose principal place of business is located in this state … knows that personal information in the entity’s possession has been acquired by a person whom the entity has not authorized to acquire the personal information”4 and there has been a material risk of identity theft or fraud to the subject of the personal information.5 The statute contains requirements for a single data breach involving more than 1,000 people,6 timing of and manner of notice requirements,7 entity exceptions,8 and exceptions in situations in which law enforcement agency request9 or federal legislation is involved.10

    The two most common types of cybersecurity incidents that law firms experience are ransomware attacks and business email compromises.

    Ethical Notification Requirements under Wisconsin Supreme Court Rules

    In addition to complying with statutory obligations, law firms and lawyers also must address whether the cybersecurity incident triggers any ethical obligations.

    Wisconsin Supreme Court Rule (SCR) 20:1.4(a)(3) and (a)(4) states that a lawyer must keep the client reasonably informed about the status of the matter and promptly comply with reasonable requests by the client for information. According to an American Bar Association (ABA) ethics opinion, which cites a rule on which SCR 20:1.4 is based, “When a data breach occurs involving, or having a substantial likelihood of involving, material client confidential information a lawyer has a duty to notify the client of the breach.”11 Although this statement applies only to current clients, the opinion also provides guidance regarding former clients:

    “Lawyers should recognize that in the event of a data breach involving former client information, data privacy laws, common law duties of care, or contractual arrangements with the former client relating to records retention, may mandate notice to former clients of a data breach.”12 This means that a firm should look to engagement letters or any other arrangements made with former clients to evaluate whether there is an obligation to notify these individuals about the incident.

    The differing language in state statutes and in ethical rules and guidelines means that legal and ethical obligations likely are not identical. State law might not require a law firm to notify clients about potential or actual data breaches, but ethics rules might impose a notification obligation. Additionally, if a past client contacts a law firm to discuss a data breach, SCR 20:8.4(c) requires the law firm to truthfully respond to the past client’s questions. Among other factors to consider in determining what type of notice is appropriate for former clients is the reputation of the firm. Data breach counsel can help a law firm navigate these complicated waters.

    An additional, independent obligation might exist when there has been a breach of a law firm’s third-party provider’s services (for example, cloud storage, case management, or email), which typically occurs when threat actors attack a provider directly and compromise the provider’s systems. “If there has been a breach of the provider’s security that affects the confidentiality or security of the client’s information, SCR 20:1.4(a)(3) and SCR 20:1.4(b) require the lawyer to inform the client of the breach.”13 Therefore, lawyers must also stay up to date on the security of the providers they use and notify clients when client information has been compromised as a result of a provider incident.


    Data breaches must be taken seriously by attorneys. It is not enough for firms or individual lawyers to declare to clients that you have been hacked or that email recipients should not open messages from you. Lawyers have statutory and ethical obligations to investigate data breaches and notify clients accordingly. Outside counsel, forensic information technology companies, and credit monitoring services can assist with responding to incidents. Prevention and recovery strategies should be implemented, reviewed on an annual basis, and regularly updated to help thwart cyberattacks.

    Also of Interest: Cybersecurity Resources for Lawyers

    If you are looking for a cybersecurity company to help protect your firm, cyber insurance, and other tools to prevent or recover from data breaches, the State Bar of Wisconsin has got you covered:

    BobaGuard offers turnkey cybersecurity solutions for lawyers, including cybersecurity training; phishing simulations; IT security policies; dark-web monitoring; team-based password vault and process documentation tool; proactive monitoring, maintenance, and patching for Mac and PC with antivirus and web protection; and much more. For more information, visit

    HSB Total Cyber Policy provides cybersecurity insurance options for lawyers in Wisconsin. You can read more by visiting If you want to better understand the need for multiple insurance policies, read Once Upon a Cybercrime: Are You Covered? (Wisconsin Lawyer, July 2019).

    The Wisconsin Law Firm Self-Assessment is a complimentary tool that includes 10 different modules for training law firm staff on ethical obligations, implementing data policies and procedures, and creating incident response plans. It is available at

    Do Not Let Ransomware Win: Back Up Your Data (Wisconsin Lawyer, July 2021) discusses the importance of identifying data storage locations, reviewing and properly archiving data, backing up and mapping data points, and testing backup systems.

    In Encrypting Your Law Firm (Wisconsin Lawyer, May 2022), lawyers are provided with a roadmap and DIY solutions for encrypting many of the common methods used to store or transmit client information.

    Meet Our Contributors

    What is your favorite place in Wisconsin?

    Kate CampbellBoulder Junction. I attended and worked at summer camp up there and vacation every summer in Boulder Junction with my family. There is nothing like the smell of the pine trees and the lake views up north!

    Kate Campbell, Godfrey & Kahn, Milwaukee

    What do you read for fun?

    Christopher C. ShattuckBelieve it or not, I love reading the news. And not just world, politics, and business news, I also enjoy reading pop culture and celebrity gossip columns. For some reason, likely due to all the legal and technology reading and writing I do for work, my brain enjoys soaking up all sorts of knowledge. It has not always been this way, as I used to devote all my reading time to case law, legal publications, and other sources that would help me win cases. Somewhere along the way, I realized the importance of maintaining a good work-life balance and making a concerted effort to take time to read for fun.

    Christopher C. Shattuck, State Bar of Wisconsin, Madison


    Become a contributor! Are you working on an interesting case? Have a practice tip to share? There are several ways to contribute to Wisconsin Lawyer. To discuss a topic idea, contact Managing Editor Karlé Lester at (800) 444-9404, ext. 6127, or email Check out our writing and submission guidelines.


    1 See U.S. Dep’t of Treasury, Updated Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments (Sept. 21, 2021),

    2 See U.S. Dep’t of Just., Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources (Feb. 2020),

    3 See Wis. Stat. 134.98(1)(b).

    4 See Wis. Stat. 134.98(2)(a).

    5 See Wis. Stat. 134.98(2)(cm)1.

    6 See Wis. Stat. 134.98(2)(br).

    7 See Wis. Stat. 134.98(3).

    8 See Wis. Stat. 134.98(3m).

    9 See Wis. Stat. 134.98(5).

    10 See Wis. Stat. 134.98(7m).

    11 ABA, Formal Op. 483, Lawyers’ Obligations After an Electronic Data Breach or Cyberattack (Oct. 17, 2018),

    12 Id.

    13 See Wis. Formal Ethics Op. EF-15-01: Ethical Obligations of Attorneys Using Cloud Computing,

    » Cite this article: 95 Wis. Law. 51-54 (July/August 2022).

Join the conversation! Log in to comment.

News & Pubs Search

Format: MM/DD/YYYY