How To 🛠️: Choosing the Right USB-C & Thunderbolt Cables for Legal Professionals - Understanding Speed, Power, & Professional Requirements in 2025 ⚡

lawyers need to know what cables they are using in their tech work.

In today's technology-driven legal landscape, the cables connecting your devices matter more than you might realize. The Universal Serial Bus Type-C (USB-C) standard has become the dominant connection type for modern professional equipment, but the introduction of Thunderbolt 3, 4, and 5 technologies has created a complex ecosystem of capabilities that many legal professionals don't fully understand. These distinctions can impact everything from your laptop's charging efficiency to the speed at which you transfer critical case files, making cable selection a crucial professional decision.

Why Cable Selection Matters for Legal Practice 🏛️

Modern law firms increasingly rely on portable technology to maintain productivity across multiple locations. USB-C cables and Thunderbolt connections serve as the critical link between your devices, enabling power delivery, data transfer, and video output through a single connection . The European Union's recent mandate requiring USB-C as the universal charging standard demonstrates the connector's importance in professional environments.

The legal profession's unique requirements demand reliable, high-performance connections. Depositions recorded on tablets need swift transfer to desktop workstations. Court presentations require dependable connections between laptops and projection systems. Client meetings conducted remotely depend on stable power delivery to prevent device failures during critical discussions.

Poor-quality cables may deliver inconsistent power, cause data corruption, or even present fire hazards.

🚨

Poor-quality cables may deliver inconsistent power, cause data corruption, or even present fire hazards. 🚨

Understanding USB-C and Thunderbolt Cable Categories 🔌

USB-C cables fall into several categories, each serving distinct professional needs. Standard USB-C cables provide basic connectivity with varying data transfer speeds from USB 2.0 (480 Mbps) to USB 3.2 Gen 2x2 (20 Gbps). These cables excel in basic office environments where attorneys need simple device charging and document transfer capabilities.

Thunderbolt technology represents a significant advancement over standard USB-C connections . Thunderbolt 3 and 4 cables support up to 40 Gbps data transfer speeds while maintaining backward compatibility with USB-C devices. Thunderbolt 5, the latest generation, doubles this performance to 80 Gbps bidirectional bandwidth, with Bandwidth Boost capability reaching 120 Gbps for display-intensive applications.

Full-featured Thunderbolt cables provide comprehensive functionality, supporting data transfer, video output, and power delivery simultaneously. These cables excel in modern law office environments where attorneys need to connect laptops to external monitors while simultaneously charging devices and transferring large files.

Thunderbolt Technology Evolution and Legal Applications ⚙️

Thunderbolt 4 cables are probably good enough for lawyers who deal mostly with text and one additional monitor.

Thunderbolt 4 established mandatory minimum requirements that ensure consistent performance across all certified devices. Unlike USB-C standards where many features remain optional, Thunderbolt 4 requires 40 Gbps data transfer speeds, support for two 4K displays or one 8K display, and PCIe bandwidth (data transfer capacity per lane measured in gigabytes) of 32 Gbps. This consistency proves valuable for legal professionals who need reliable performance across different office locations and court systems.

Thunderbolt 5 represents the next generation of professional connectivity, offering 80 Gbps bidirectional bandwidth with Bandwidth Boost capability up to 120 Gbps. This technology supports dual 6K displays, PCIe Gen 4 data throughput at 64 Gbps, and power delivery up to 240 watts. Legal professionals working with video evidence, virtual reality presentations, or large-scale document productions benefit significantly from these enhanced capabilities.

The Bandwidth Boost feature in Thunderbolt 5 dynamically allocates bandwidth based on demand, providing up to 120 Gbps in one direction while maintaining 40 Gbps for the return path. This asymmetric allocation proves particularly valuable for attorneys conducting video depositions or presenting multimedia evidence in court settings.

Power Delivery Standards and Legal Practice Applications

USB-C Power Delivery specifications directly impact your device's charging capabilities and overall reliability. Standard USB-C cables support up to 100 watts of power delivery, adequate for smartphones, tablets, and many ultrabooks (premium, lightweight laptop computers) used in legal practice. However, high-performance laptops commonly used for legal research and document preparation often require higher power delivery capabilities.

Thunderbolt 4 requires support for up to 100 watts of power delivery, with availability up to 140 watts for compatible devices. Thunderbolt 5 extends this capability significantly, requiring up to 140 watts with availability up to 240 watts of power delivery. This enhanced power capability proves particularly valuable for legal professionals who rely on high-performance laptops for complex tasks such as large document review, video depositions, or presentations requiring substantial processing power.

Professional legal work often involves extended periods away from traditional power source. Courts, client offices, and temporary workspaces may offer limited charging opportunities. Cables supporting higher power delivery can significantly reduce charging time, ensuring devices remain operational during critical professional activities.

Data Transfer Speed Requirements for Legal Workflows 📈

Data transfer speeds become crucial when legal professionals handle large files common in modern practice. Video depositions, high-resolution evidence photographs, and comprehensive case documentation can consume substantial storage space and require efficient transfer capabilities.

USB 2.0 speeds (480 Mbps) handle basic document transfer adequately but struggle with multimedia files. USB 3.2 Gen 2 provides 10 Gbps transfer speeds, offering noticeable improvements for larger file handling. Thunderbolt 3 and 4 deliver 40 Gbps, while Thunderbolt 5 achieves up to 80 Gbps with Bandwidth Boost reaching 120 Gbps.

Legal professionals working with video evidence, virtual reality presentations, or large-scale document productions benefit significantly from higher-speed cables. The time savings compound when transferring multiple gigabytes of case materials between devices or to external storage systems.

Thunderbolt vs USB4 v2: Understanding Professional Differences 🔄

Thunderbolt 5 cables are good for lawyers who rely on video and/or large data files.

Thunderbolt 5 and USB4 v2 share similar underlying technology but differ significantly in implementation requirements. USB4 v2 specifications make many advanced features optional, with only 20 Gbps guaranteed and 80 Gbps as an optional capability. Thunderbolt 5, conversely, mandates 80 Gbps as the minimum requirement with 140 watts power delivery required.

This distinction proves critical for legal professionals who need consistent performance across different devices and locations. Thunderbolt certification ensures that every cable and device meets strict performance standards, while USB4 v2 devices may vary significantly in actual capabilities.

The mandatory certification process for Thunderbolt products provides additional assurance for professional environments. Legal professionals investing in Thunderbolt-certified equipment can expect reliable performance regardless of manufacturer or specific implementation.

Safety and Compliance Considerations 🛡️

Professional legal practice demands attention to safety standards and equipment reliability. USB-C cables carrying more than 60 watts require Electronic Marker (E-Marker) chips to communicate power requirements safely. These chips prevent dangerous power delivery mismatches that could damage expensive professional equipment.

The USB Implementers Forum (USB-IF) and Intel provide certification programs ensuring cable compliance with safety standards. Certified cables display appropriate logos and markings, providing assurance of proper manufacturing and testing. Legal professionals should prioritize certified cables to protect valuable equipment and maintain reliable operations.

Counterfeit or substandard cables pose significant risks in professional environments. Poor-quality cables may deliver inconsistent power, cause data corruption, or even present fire hazards. The potential consequences of equipment failure during critical legal proceedings justify investing in properly certified cables.

Practical Selection Guidelines for Legal Professionals 💼

Assess your specific professional requirements before selecting cables. Attorneys primarily using tablets and smartphones for basic tasks may find standard USB-C cables with 60-watt power delivery sufficient. However, professionals relying on high-performance laptops for complex legal software should consider Thunderbolt 4 or 5 cables supporting higher power delivery and data transfer speeds.

Consider your typical work environments and usage patterns. Mobile attorneys who frequently work in various locations benefit from durable, flexible cables that withstand regular handling. Office-based professionals may prioritize longer cables for permanent desk setups or conference room installations.

Evaluate your data transfer needs based on file types and sizes commonly handled in your practice. Personal injury attorneys working with extensive medical records and accident reconstruction videos require different capabilities than corporate attorneys primarily handling text-based contracts.

Selecting cables that support current and emerging standards ensures continued compatibility as your technology needs evolve.

💡

Selecting cables that support current and emerging standards ensures continued compatibility as your technology needs evolve. 💡

Cable Length and Performance Considerations 📏

Thunderbolt 5 passive cables support full performance up to 1 meter in length, with specialized implementations available in 0.3, 0.5, 0.8, and 1-meter lengths. Beyond 1 meter, active cables with built-in electronics become necessary to maintain signal integrity over longer distances.

Thunderbolt 4 cables under 1 meter can support Thunderbolt 5 data rates, providing some forward compatibility for existing installations. This backward compatibility proves valuable for legal professionals upgrading their technology infrastructure gradually.

Professional legal environments often require longer cable runs for conference rooms or courtroom presentations. You will need Active Thunderbolt cables to maintain performance over distances up to 2 meters. This will enable flexible installation options for permanent and temporary setups.

Future-Proofing Your Cable Investment 🚀

The legal technology landscape continues evolving rapidly. Thunderbolt 5 adoption is accelerating, and 240-watt power delivery is becoming more common in professional devices. Selecting cables that support current and emerging standards ensures continued compatibility as your technology needs evolve.

Professional legal practice increasingly relies on sophisticated technology for case management, client communication, and court presentations. Investing in appropriate Thunderbolt cables from reliable and admittedly more expensive providers represents a small but crucial component of maintaining technological competency in modern legal practice.

The continued development of artificial intelligence tools and high-resolution display technologies in legal applications will demand higher bandwidth and power delivery capabilities. Legal professionals who understand these evolving standards position themselves advantageously as technology continues advancing.

📊 USB-C & Thunderbolt Cable Comparison Table

Final Roundup 📋

USB-C and Thunderbolt cable selection directly impacts professional efficiency and equipment reliability in modern legal practice. Understanding power delivery requirements, data transfer speeds, safety standards, and the distinctions between USB-C, Thunderbolt 4, and Thunderbolt 5 enables informed decisions that support your professional objectives. As legal technology continues advancing, professionals who master these fundamental concepts will maintain competitive advantages in increasingly technology-dependent practice environments.

Word of the Week: “Phishing” 🎣 in the Legal Profession - What Every Lawyer Needs to Know in 2025 🛡️

Lawyers Battle phishing on a daily basis.

Phishing is one of the most persistent and dangerous cyber threats facing law firms today. Phishing is a form of computer and internet fraud in which criminals use fake emails, websites, or messages to trick recipients into revealing sensitive information such as passwords, bank details, or client data. For lawyers and legal professionals, the stakes are especially high: law firms hold vast amounts of confidential client information, making them prime targets for cybercriminals. The American Bar Association (ABA) Model Rules for Professional Conduct, particularly Rule 1.6 (Confidentiality of Information) and Rule 1.1 (Competence), require lawyers to protect client data and maintain competence in technology relevant to their practice.

How Phishing Targets Law Firms

Phishing attacks against law firms have become more sophisticated in 2025. Criminals now use generative AI to craft emails that closely mimic real communications from clients, colleagues, or even senior partners. These messages often create a sense of urgency, pressuring recipients to act quickly—such as transferring funds, sharing login credentials, or downloading malicious attachments. Business Email Compromise (BEC) scams are particularly damaging, as attackers impersonate managing partners or clients to divert wire transfers or request sensitive documents.

Impersonation: The Hidden Dangers in Your Inbox

Attackers often use email spoofing to manipulate the display name and email address, making a message appear to come from someone you trust. The display name (the name that appears in your inbox) can be set to any familiar contact, but the actual email address may be subtly altered or completely fake. For example, a scammer might use “john.smith@lawfirm.com”or “John Smith of ….” as the display name, but the underlying address could be “jjohn.smith@lawf1rm.com” or “john..john.smith@lawfirm.co@lawfirm.co.” These changes are often just a single character off, designed to trick you into replying or clicking a malicious link.

Lawyers should always examine the full email address, not just the display name, before responding or acting on any request. On many smartphones and email clients, only the display name is shown by default, so you may need to click or tap to reveal the actual sender’s email address. If the message requests sensitive information, money transfers, or urgent action, verify the request through a separate communication channel, such as a phone call using a known number—not one provided in the suspicious email. This vigilance aligns with ABA Model Rule 1.1, which requires lawyers to maintain competence, including understanding risks associated with technology.

Recent Phishing Incidents Involving Lawyers

Phishing Email Threatens Law Firm Cybersecurity Defense

What Lawyers Should Watch For

  • Impersonation: Always check the sender’s full email address, not just the display name. Watch for addresses that are off by one or more characters.

  • Urgency and Pressure: Be cautious of emails that demand immediate action, especially those involving money or confidential data.

  • Suspicious Links or Attachments: Hover over links to check their true destination, and never open unexpected attachments.

  • Unusual Requests: Be wary of requests outside normal procedures, such as buying gift cards or changing payment instructions.

Prevention and Best Practices

  • Employee Training: Regular cybersecurity awareness training is crucial. Staff should be able to recognize phishing attempts and know how to report them. This supports ABA Model Rule 5.3 (Responsibilities Regarding Nonlawyer Assistance).

  • Multi-Factor Authentication (MFA): MFA adds an extra layer of security, making it harder for attackers to access accounts even if credentials are compromised.

  • Incident Response Plan: Every law firm should have a clear plan for responding to phishing incidents, including communication protocols and legal obligations for breach notification.

  • Client Education: Educate clients about phishing risks and encourage them to verify any unusual requests that appear to come from your firm.

Professional Responsibility and Phishing

lawyers need to be proactive Against Cybersecurity Threats in 2025!

The ABA Model Rules make clear that lawyers must take reasonable steps to prevent unauthorized access to client information (Rule 1.6(c)). Lawyers must also keep abreast of changes in technology and its associated risks (Rule 1.1, Comment 8). Failing to implement basic cybersecurity measures, such as phishing awareness and email verification, may expose lawyers to disciplinary action and civil liability.

Final Thoughts

Phishing is not just an IT problem—it’s a business risk that can compromise client trust, cause financial loss, and result in legal liability. By staying vigilant, investing in training, and adopting robust security measures, lawyers can protect themselves, their clients, and their reputations in an increasingly digital world. Compliance with the ABA Model Rules is not optional—it's essential for ethical and effective law practice.

🎙️ Ep. 113 - How Seth Price Scaled a 50-Lawyer Firm and Digital Agency: Tech, Cloud, and the Future of Legal Marketing!

Seth Price, founding partner of Price Benowitz LLP and CEO of BluShark Digital, shares deep insights on leveraging technology to scale law firms. He highlights Salesforce, Clio, and Smart Advocate as essential tools, discussing their specific roles in case management and marketing automation. Seth outlines the evolution of digital marketing for lawyers, stressing the importance of content, links, and local reviews in SEO strategy. He offers tips for interpreting Google Analytics and staying ahead of algorithm changes. Concluding with advice on future-proofing practices, Seth urges law firm leaders to invest in adaptive tech stacks and remain inquisitive amid rapid innovation.

Join Seth and me as we discuss the following three questions and more!

  1. What are the top three pieces of tech, software, or hardware you use to scale price benefits from a two-person firm to over 50 attorneys?

  2. What are the top three ways you've seen digital marketing change for lawyers, and can you give us a tip for each one?

  3. What are your top three tips for law firm leaders looking to future-proof their practices amid rapid technological change?

In our conversation, we cover the following:

[01:23] Seth's Tech Setup

[09:50] Top Three Tech Tools for Scaling Price Benefits

[11:27] Detailed Explanation of Clio and SmartAdvocate

[12:40] Digital Marketing Changes for Lawyers

[16:09] Importance of Local Search and Reviews

[19:00] Tips for Understanding Google Analytics

[25:13] Final Tips for Future-Proofing Law Firms

Resources:

Connect with Seth:

Hardware mentioned in the conversation:

Software & Cloud Services mentioned in the conversation:

🚨 MTC: “Breaking News” Supreme Court DOGE Ruling - Critical Privacy Warnings for Legal Professionals After Social Security Data Access Approval!

Recent supreme court ruling may have placed every american’s pii at risk!

Supreme Court DOGE Ruling: Critical Privacy Warnings for Legal Professionals After Social Security Data Access Approval

Last Friday's Supreme Court ruling represents a watershed moment for data privacy in America. The Court's decision to allow the Department of Government Efficiency (DOGE) unprecedented access to Social Security Administration (SSA) databases containing millions of Americans' personal information creates immediate and serious risks for legal professionals and their clients.

The Ruling's Immediate Impact 📊

The Supreme Court's 6-3 decision lifted lower court injunctions that had previously restricted DOGE's access to sensitive SSA systems. Justice Ketanji Brown Jackson's dissent warned that this ruling "creates grave privacy risks for millions of Americans". The majority allowed DOGE to proceed with accessing agency records containing Social Security numbers, medical histories, banking information, and employment data.

This decision affects far more than government efficiency initiatives. Legal professionals must understand that their personal information, along with that of their clients and the general public, now sits in systems accessible to a newly-created department with limited oversight.

Understanding the Privacy Act Framework ⚖️

The Privacy Act of 1974 was designed to prevent exactly this type of unauthorized data sharing. The law requires federal agencies to maintain strict controls over personally identifiable information (PII) and prohibits disclosure without written consent. However, DOGE appears to operate in a regulatory gray area that sidesteps these protections.

Legal professionals should recognize that this ruling effectively undermines decades of privacy protections. The same safeguards that protect attorney-client privilege and confidential case information may no longer provide adequate security.

Specific Risks for Legal Professionals 🎯

your clients are not Alone Against the Algorithm!

Attorney Personal Information Exposure

Your personal data held by the SSA includes tax information, employment history, and financial records. This information can be used for identity theft, targeted phishing attacks, or professional blackmail. Cybercriminals regularly sell such data on dark web marketplaces for $10 to $1,000 per record.

Client Information Vulnerabilities

Clients' SSA data exposure creates attorney liability issues. If client information becomes publicly available through data breaches or dark web sales, attorneys may face malpractice claims for failing to anticipate these risks. The American Bar Association's Rule 1.6 requires lawyers to make "reasonable efforts" to protect client information.

Professional Practice Threats

Law firms already face significant cybersecurity challenges, with 29% reporting security breaches. The DOGE ruling amplifies these risks by creating new attack vectors. Hackers specifically target legal professionals because they handle sensitive information with often inadequate security measures.

Technical Safeguards Legal Professionals Must Implement 🔐

Immediate Action Items

Encrypt all client communications and files using end-to-end encryption. Deploy multi-factor authentication across all systems. Implement comprehensive backup strategies with offline storage capabilities.

Advanced Protection Measures

Conduct regular security audits and penetration testing. Establish data minimization policies to reduce PII exposure. Create incident response plans for potential breaches.

Communication Security

Use secure messaging platforms like Signal or WhatsApp for sensitive discussions. Implement email encryption services for all client correspondence. Establish secure file-sharing protocols for case documents.

Dark Web Monitoring and Response 🕵️

Cyber Defense Starts with the help of lawyers!

Legal professionals must understand how stolen data moves through criminal networks. Cybercriminals sell comprehensive identity packages on dark web marketplaces, often including professional information that can damage reputations. Personal data from government databases frequently appears on these platforms within months of breaches.

Firms should implement dark web monitoring services to detect when attorney or client information appears for sale. Early detection allows for rapid response measures, including credit monitoring and identity theft protection.

Compliance Considerations 📋

State Notification Requirements

Many states require attorneys to notify clients and attorneys general when data breaches occur. Maryland requires notification within 45 days. Virginia mandates immediate reporting for taxpayer identification number breaches. These requirements apply regardless of whether the breach originated from government database access.

Professional Responsibility

The ABA's Model Rules require attorneys to stay current with technology risks. See Model Rule 1.1:Comment 8.  These rules creates new obligations to assess and address government data access risks. Attorneys must evaluate whether current security measures remain adequate given expanded government database access.

Recommendations for Legal Technology Implementation 💻

Essential Security Tools

Deploy endpoint detection and response software on all devices. Use virtual private networks (VPNs) for all internet communications. Implement zero-trust network architectures where feasible.

Client Communication Protocols

Establish clear policies for discussing sensitive matters electronically. Create secure client portals for document exchange. Develop protocols for emergency communication during security incidents.

Staff Training Programs

Conduct regular cybersecurity training for all personnel. Focus on recognizing phishing attempts and social engineering. Establish clear protocols for reporting suspicious activities.

Looking Forward: Preparing for Continued Risks 🔮

Cyber Defense Starts BEFORE YOU GO TO Court.

The DOGE ruling likely represents the beginning of expanded government data access rather than an isolated incident. Legal professionals must prepare for an environment where traditional privacy protections may no longer apply.

Consider obtaining cybersecurity insurance specifically covering government data breach scenarios. Evaluate whether current malpractice insurance covers privacy-related claims. Develop relationships with cybersecurity professionals who understand legal industry requirements.

Final Thoughts: Acting Now to Protect Your Practice 🛡️

The Supreme Court's DOGE ruling fundamentally changes the privacy landscape for legal professionals. Attorneys can no longer assume that government-held data remains secure or private. The legal profession must adapt quickly to protect both professional practices and client interests.

This ruling demands immediate action from every legal professional. The cost of inaction far exceeds the investment in proper cybersecurity measures. Your clients trust you with their most sensitive information. That trust now requires unprecedented vigilance in our digital age.

MTC

📖 Word(s) of the Week (Woow): "Service as a Service" (SaaS) & "Hardware as a Service" (HaaS)!

SaaS vs. HaaS: What Law Firms Need to Know About Service as a Service and Hardware as a Service in 2025 ⚖️💻

Exploring SaaS vs. HaaS in Legal Tech!

Legal practices are rapidly embracing cloud-based solutions, and two models stand out: Software as a Service (SaaS) and Hardware as a Service (HaaS). Understanding these models is essential for law firms seeking efficiency, security, and cost-effectiveness in 2025.

What is SaaS?
SaaS is a cloud-based software delivery model. Instead of buying software outright and installing it on each device, law firms subscribe to web-hosted applications. This means no more managing physical servers or complex installations. Leading SaaS providers handle updates, security, and maintenance, freeing attorneys to focus on clients and cases.

Benefits of SaaS for Law Firms:

  • Centralized, secure document management—enabling paperless workflows and real-time collaboration.

  • Cost savings by eliminating expensive hardware and IT support. Firms pay only for what they use and can scale up or down as needed.

  • Remote access to case files, calendars, and billing from anywhere, supporting hybrid and remote work environments.

  • Automatic updates and improved security, with providers responsible for compliance and data protection.

  • Specialized legal features, such as document automation, calendaring, and legal billing, tailored for law practices.

Legal Considerations for SaaS:
SaaS agreements replace traditional software licenses. They must clearly define service levels, data privacy, and compliance with regulations. SaaS lawyers play a crucial role in drafting contracts, protecting intellectual property, and ensuring regulatory compliance across jurisdictions.

What is HaaS?
HaaS provides physical hardware—like computers, servers, or networking equipment—on a subscription basis. Law firms avoid large upfront purchases and instead pay a monthly fee for access, support, and maintenance. HaaS often includes installation, configuration, troubleshooting, and ongoing monitoring.

Benefits of HaaS for Law Firms:

Knowing your SAAS and Haas agreement terms is essential to maintaining client confidentiality and security

  • Predictable budgeting with no surprise hardware expenses.

  • Up-to-date equipment and proactive maintenance, reducing downtime.

  • Comprehensive support agreements, including warranties and rapid response times.

  • Enhanced security and compliance, as providers manage device updates and data protection.

Legal Considerations for HaaS:
HaaS contracts should specify the scope of services, pricing, service-level agreements (SLAs), liability, data privacy, and dispute resolution. Clear terms protect both the law firm and the provider, ensuring accountability and compliance with industry standards.

Challenges Law Firms Face in Using SaaS and HaaS

Law firms adopting SaaS and HaaS face several notable challenges:

  • Security Vulnerabilities: SaaS platforms can be susceptible to misconfigured access controls, inadequate monitoring, and insufficient threat detection. These weaknesses make law firms prime targets for cyberattacks, such as unauthorized access and data breaches, as seen in high-profile incidents involving major firms.

  • Data Breaches and Compliance Risks: Sensitive client data stored in SaaS environments is at risk if proper security measures are not in place. Breaches can expose confidential information, leading to regulatory penalties, reputational damage, and class action lawsuits if firms fail to notify affected parties promptly.

  • Integration Challenges: As law firms rely on multiple SaaS vendors, integrating various software platforms can become complex. Poor integration may disrupt workflows and reduce efficiency, especially if systems do not communicate seamlessly.

  • Shared Responsibility Confusion: SaaS providers typically secure the platform, but law firms are responsible for data security and access controls. Many firms mistakenly believe vendor security alone is sufficient, which can leave critical data exposed.

  • Reliable and consistent internet access: Reliable and consistent internet access is essential for law firms using SaaS and HaaS, as these cloud-based solutions require an active connection to access software, documents, and case management tools; any internet outage or slow connectivity can disrupt workflows, limit access to critical information, and impact client service. (What if you are on travel and the airplane, hotel, or location does have (reliable) internet connection - how do you get your work done?)

  • Business Email Compromise (BEC): SaaS ecosystems increase the risk of BEC attacks. Compromised email accounts can be exploited for fraud, impersonation, and data theft, often going undetected for extended periods.

  • Data Classification and Visibility Issues: Rapid adoption of SaaS can lead to scattered data across multiple platforms. Without a formal data classification strategy, firms may lose track of where sensitive information resides, complicating compliance and incident response.

  • Legal and Contractual Complexities: SaaS contracts involve nuanced licensing agreements, third-party vendor relationships, and service level commitments. Discrepancies between vendor terms and client expectations can result in disputes and legal challenges.

  • Dependency on Providers: Both SaaS and HaaS models make firms dependent on external vendors for uptime, support, and updates. Service disruptions or vendor instability can directly impact firm operations.

  • Hardware Lifecycle Management: With HaaS, firms avoid upfront hardware costs but must rely on the provider for timely upgrades, maintenance, and support. Poor vendor performance can lead to outdated equipment, downtime, or security gaps.

  • Cost Over Time: While SaaS and HaaS reduce initial capital expenditures, ongoing subscription fees may add up, potentially exceeding the cost of traditional ownership in the long term if not carefully managed.

Lawyers need to know the pros and cons in using saas and haas products!

While SaaS and HaaS offer significant advantages, law firms must address these risks through robust security practices, careful contract negotiation, and ongoing vendor management to protect sensitive data and maintain operational integrity. This may be easier for large law firms but difficult if not nearly impossible for mid- to small- to solo-size law practices.

Why Law Firms Should Care
Both SaaS and HaaS offer flexibility, scalability, and security that traditional IT models cannot match. By leveraging these services, law firms can modernize operations, improve client service, and reduce risk. The right contracts and due diligence are critical to ensure business continuity and compliance in a rapidly evolving legal tech landscape.

MTC: Law Firm Technology Procurement Strategy During Trade Court Tariff Chaos: Buy Now or Wait?

Tariff chaos continues with recent ruling by US Court of International trade creating confusion for lawyers on how to address their office tech needs!

The recent ruling by the US Court of International Trade has thrown technology procurement strategies for law firms into unprecedented uncertainty. Legal practitioners nationwide face a critical decision that could significantly impact their operational costs and technological capabilities for years to come.

On May 28, 2025, a three-judge panel at the US Court of International Trade delivered a landmark decision that struck down President Trump's sweeping tariff regime, ruling that the administration exceeded its constitutional authority by implementing global import duties under emergency powers legislation. The court determined that the International Emergency Economic Powers Act (IEEPA) does not grant the president unlimited authority to impose tariffs unilaterally, particularly the 30% tariffs on Chinese goods, 25% tariffs on certain imports from Mexico and Canada, and 10% universal tariffs on most other goods.

However, the victory for importers and businesses proved short-lived. The Trump administration immediately appealed the decision, and the Federal Circuit Court granted an emergency stay, allowing tariff collection to continue pending further legal proceedings. This legal ping-pong effect has created exactly the type of market uncertainty that makes technology procurement decisions particularly challenging for law firms.

The Technology Dilemma Facing Legal Practitioners

The smartphone and computer hardware that law firms depend on daily face significant price pressures under the current tariff regime. Industry analysts predict smartphone prices could increase by 4% in the US market due to tariff uncertainty. More dramatically, experts suggest that forcing iPhone production to move entirely to the United States could result in device prices reaching $3,500, several times the current prices. While such extreme scenarios may not materialize, the underlying message is clear: technology costs are likely to increase substantially if current trade policies persist.

For law firms, this creates a fundamental procurement dilemma. Should practices accelerate their hardware refresh cycles to avoid potential price increases? Or should they maintain their normal procurement schedules and hope that legal challenges will ultimately overturn the tariffs?

Understanding the Current Legal Landscape

lawyers struggle to balance timing of future tech purchases with the uncertainty the tariffs have created1

The Court of International Trade's ruling provides important guidance for understanding the likely trajectory of these trade policies. The judges specifically noted that tariffs designed to address drug trafficking and immigration issues fail to establish a clear connection between the emergency declared and the remedy implemented. The court emphasized that “…the collection of tariffs on lawful imports does not clearly relate to foreign efforts to arrest, seize, detain, or otherwise intercept wrongdoers within their jurisdictions".

This reasoning suggests that even if the Federal Circuit Court ultimately upholds some aspects of the administration's trade policy, the current broad-based tariff regime may face continued legal challenges. However, the court left intact Section 232 tariffs on steel, aluminum, and automobiles, indicating that more narrowly tailored trade measures may survive judicial scrutiny.

Practical Procurement Strategies for Law Firms

Given this uncertain environment, law firms should consider a hybrid approach to technology procurement that balances risk management with cost efficiency. Rather than making dramatic changes to established procurement cycles, firms should focus on strategic timing and vendor diversification.

  • Immediate Actions: Law firms with aging hardware that was already scheduled for replacement should consider accelerating those purchases slightly. Equipment approaching end-of-life status represents the highest risk category, as firms cannot afford to delay these replacements indefinitely. However, avoid panic purchasing of equipment that still has useful life remaining.

  • Vendor Diversification: The current trade tensions highlight the risks of over-reliance on any single country's manufacturing base. Samsung smartphones, for example, may face fewer tariff pressures than Apple devices because Samsung shifted most production away from China to Vietnam, India, and South Korea. Law firms should evaluate whether their technology vendors have diversified supply chains that reduce exposure to specific country-based tariffs.

  • Future-Proofing Without Overcommitment: Interestingly, recent surveys reveal that 73% of iPhone users and 87% of Samsung Galaxy users find little to no value in artificial intelligence features. This suggests that law firms should focus procurement decisions on proven functionality rather than cutting-edge features that may not provide practical value. Battery life, storage capacity, and build quality remain more important factors than AI capabilities for most legal professionals.

The Economics of Hardware as a Service

be the hero in your law office by having a solid understanding of where your tech comes from and how tariffs may impact your purchasing power!

The US Court of International Trade’s ruling and the ensuing tariff uncertainty underscore the need for law firms to reassess traditional hardware procurement models. Hardware as a Service (HaaS) offers a strategic alternative, shifting the financial and operational risks of ownership to specialized providers. Under HaaS, firms pay fixed monthly fees for enterprise-grade computers and devices, with vendors handling maintenance, upgrades, and supply chain disruptions—critical advantages amid fluctuating trade policies.

For small-to-midsize firms, HaaS mitigates two key risks: sudden tariff-driven price hikes and premature hardware obsolescence. By converting capital expenditures into predictable operational costs, firms avoid large upfront investments in equipment that may depreciate rapidly if tariffs escalate. Providers also absorb the burden of navigating geopolitical trade complexities, ensuring timely hardware replacements even if import restrictions tighten.

While many legal workflows rely on Software as a Service (SaaS), these cloud-based tools still require reliable hardware. Outdated computers struggle with modern SaaS platforms, leading to lagging performance, security vulnerabilities, and lost productivity. HaaS ensures firms maintain hardware capable of running current software efficiently, without the financial strain of cyclical refresh cycles.

Long-Term Strategic Considerations

Law firms must avoid knee-jerk reactions to tariff headlines. The legal challenges to presidential trade authority suggest broader import duties may face judicial limits, but appeals will prolong uncertainty. Instead, firms should build hardware procurement resilience through:

  1. Vendor Diversification: Partner with HaaS providers and suppliers across multiple regions to reduce dependency on tariff-affected geographies.

  2. Modular Budgeting: Allocate flexible funds for hardware upgrades, allowing adjustments as trade policies evolve.

  3. Performance Benchmarks: Prioritize devices with proven durability and processing power over speculative AI features, as 73% of legal professionals report minimal use of smartphone AI tools.

Final Thoughts

THERE ARE MORE FACTORS THAT JUST THE TARIFF’S THEMSELVES FOR LAWYER TO CONSIDER WHEN PURCHASING THEIR NEXT OFFICE TECH DEVICE!

The tariff chaos demands measured action, not paralysis. Firms should:

  • Replace aging hardware incapable of running current software and SaaS tools efficiently, as outdated devices increase security risks and hinder client service.

  • Adopt hybrid procurement models, blending HaaS for high-risk devices (e.g., laptops, servers) with outright purchases for stable, long-use equipment (e.g., monitors, keyboards, etc.).

  • Ignore speculative tech trends; focus on hardware that enhances core workflows, not flashy AI features with negligible practical value.

By anchoring decisions in operational needs rather than tariff panic, firms will balance cost efficiency with preparedness for any trade policy outcome.

MTC

BOLO: LexisNexis Data Breach: What Legal Professionals Need to Know Now—and Why All Lexis Products Deserve Scrutiny!

LAWYERS NEED TO BE BOTH TECH-SAVVY AND Cyber-SavvY!

On December 25, 2024, LexisNexis Risk Solutions (LNRS)—a major data broker and subsidiary of LexisNexissuffered a significant data breach that exposed the personal information of over 364,000 individuals. This incident, which went undetected until April 2025, highlights urgent concerns for legal professionals who rely on LexisNexis and its related products for research, analytics, and client management.

What Happened in the LexisNexis Breach?

Attackers accessed sensitive data through a third-party software development platform (GitHub), not LexisNexis’s internal systems. The compromised information includes names, contact details, Social Security numbers, driver’s license numbers, and dates of birth. Although LexisNexis asserts that no financial or credit card data was involved and that its main systems remain secure, the breach raises red flags about the security of data handled across all Lexis-branded platforms.

Why Should You Worry About Other Lexis Products?

LexisNexis Risk Solutions is just one division under the LexisNexis and RELX umbrella, which offers a suite of legal, analytics, and data products widely used by law firms, courts, and corporate legal departments. The breach demonstrates that vulnerabilities may not be limited to one product or platform; third-party integrations, development tools, and shared infrastructure can all present risks. If you use LexisNexis for legal research, client intake, or case management, your clients’ confidential data could be at risk—even if the breach did not directly affect your specific product.

Ethical Implications: ABA Model Rules of Professional Conduct

ALL LawyerS NEED TO BE PREPARED TO FighT Data LeakS!

The American Bar Association’s Model Rules of Professional Conduct require lawyers to safeguard client information and maintain competence in technology. Rule 1.6(c) mandates that attorneys “make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.” Rule 1.1 further obligates lawyers to keep abreast of changes in law and its practice, including the benefits and risks associated with relevant technology.

In light of the LexisNexis breach, lawyers must:

  • Assess the security of all third-party vendors, including legal research and data analytics providers.

  • Promptly notify clients if their data may have been compromised, as required by ethical and sometimes statutory obligations.

  • Implement additional safeguards, such as multi-factor authentication and regular vendor risk assessments.

  • Stay informed about ongoing investigations and legal actions stemming from the breach.

What Should Legal Professionals Do Next?

  • Review your firm’s use of LexisNexis and related products.

  • Ask vendors for updated security protocols and breach response plans.

  • Consider offering affected clients identity protection services.

  • Update internal policies to reflect heightened risks associated with third-party platforms.

The Bottom Line

The LexisNexis breach is a wake-up call for the legal profession. Even if your primary Lexis product was not directly affected, the interconnected nature of modern legal technology means your clients’ data could still be at risk. Proactive risk management and ethical vigilance are now more critical than ever.

🎙️ Ep. 112: How Judges and Lawyers Can Use AI Wisely: Judge Scott Schlegel on Best Practices, Pitfalls, and The Future of Legal Tech.

My next guest is the Honorable Judge Scott Schlegel, a nationally recognized judicial innovation and technology leader.

With extensive courtroom and technological experience, Judge Schlegel offers valuable insights into how attorneys can effectively leverage artificial intelligence and legal technology to enhance their workflows. He emphasizes the importance of avoiding common pitfalls while maintaining the highest standards of professional responsibility. Judge Schlegel also underscores the critical need to keep the human in the loop, advocating for a balanced approach that upholds efficiency and legal expertise.

Join Judge Schlegel and me as we discuss the following three questions and more!

  1. What are the top three ways lawyers should use AI for their work, and what are the top three ways lawyers do not use AI correctly today?

  2. What are the top three things lawyers still get wrong with using technology in the courtroom?

  3. AI is the current advancement in technology in the workplace. What are the top three technological advances lawyers should be keeping an eye on soon?

In our conversation, we cover the following:

[00:59] Top Three Ways Lawyers Should Use AI

[04:01] Security and Privacy Concerns with AI

[06:49] Common Mistakes Lawyers Make with AI

[11:52] What Lawyers Are Still Getting Wrong in Court

[18:30] Future Technological Advances for Lawyers

[22:18] Keeping the Human Element in AI Use

Resources:

Connect with Judge Schlegel:

Software & Cloud Services mentioned in the conversation:

SoundCloud’s AI TOS Controversy: A Wake-Up Call for Lawyers on Generative AI, ABA Model Rules, and Client Data Security 🛡️🤖 (Copy)

The recent uproar over SoundCloud’s Terms of Service (TOS) update—initially allowing user content to train artificial intelligence—should be a clarion call 📣 for legal professionals. While the music industry’s outrage was swift, the lessons for attorneys run deeper, especially as generative AI tools become woven into the fabric of law practice. This episode underscores the urgent need for lawyers to understand the terms of every digital tool they use, not just for convenience but to uphold their ethical duties under the ABA Model Rules and to protect their clients’ confidential and personally identifiable information (PII).

SoundCloud’s TOS update, which quietly granted the company broad rights to use user-uploaded music for AI training, raised fundamental questions about ownership and control. Musicians and creators were alarmed that their original works could be harvested to develop AI models—potentially even those that mimic or replace their creative output—without explicit consent or compensation. The controversy highlighted not only the risk of artists’ music being used to train generative AI but also the ambiguous ownership of derivative works that might result from such training. This concern over intellectual property rights and loss of control is a stark parallel to the legal profession’s own obligations to protect sensitive information in the digital age.

ABA Model Rules: The Foundation for Ethical Tech Use

Competence (Model Rule 1.1):
Lawyers must provide competent representation, which now includes technological competence. Comment 8 to Rule 1.1 specifically requires attorneys to “keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology”. The ABA’s Formal Opinion 512 reinforces that lawyers must understand the capabilities and limitations of generative AI tools before using them in their practice.

Confidentiality (Model Rule 1.6):
The duty of confidentiality is paramount. Rule 1.6 and its comments require lawyers to safeguard client information against unauthorized access or disclosure, including when using third-party technology like generative AI. The ABA’s recent guidance warns that self-learning AI tools, which may retain and reuse input data, pose a heightened risk of inadvertent disclosure—even within a closed system. Public generative AI platforms, in particular, can expose client data to prying eyes, including the opposition or other users.

Communication (Model Rule 1.4):
Lawyers must communicate effectively with clients about the use of AI tools, including any risks to confidentiality or data security. Informed consent is critical, especially when client data could be processed or stored in jurisdictions with different privacy laws.

Reasonable Fees (Model Rule 1.5):
While AI can enhance efficiency, lawyers must ensure that fees for AI-assisted work are reasonable and transparent. The ABA clarifies that time spent learning to use AI tools generally should not be billed to clients.

Lessons from The Tech-Savvy Lawyer.Page

The Tech-Savvy Lawyer.Page has been at the forefront of discussing these risks. In the blog post “Can Lawyers Ethically Use Generative AI with Public Documents? Navigating Competence, Confidentiality, and Caution,” the duty of confidentiality is highlighted as a significant challenge when using public generative AI tools. Even anonymized client data may risk exposure if the context allows for re-identification. My editorials and podcast episodes consistently urge lawyers to:

  • Vet AI platforms for robust data protection and clear, restrictive TOS.

  • Avoid inputting client PII into public AI tools without explicit, informed consent.

  • Stay educated on evolving bar association guidance and best practices for AI in law.

Podcast interviews, such as with Jayne Reardon, reinforce that even “whitewashed” data can be problematic, as the context may still reveal confidential client details. The Tech-Savvy Lawyer.Page Podcast regularly features experts discussing how to balance AI’s benefits with the profession’s ethical imperatives, echoing the same concerns that musicians voiced about the use and ownership of their creative works on SoundCloud.

The SoundCloud Example: Ownership, Control, and Risk

SoundCloud’s TOS update, which initially allowed the platform to use artists’ music to “inform, train, develop, or serve as input to artificial intelligence or machine intelligence technologies,” brought to light the risk that creators might lose control over how their work is used and who ultimately benefits from it. For musicians, the fear was that their own songs could be used to train AI models that would then generate similar music, possibly undermining their careers and eroding their ownership rights. The lack of transparency and the default opt-in nature of the policy further eroded trust.

This is directly analogous to the legal field, where attorneys must ensure that client documents and confidential information are not used to train AI models in ways that could compromise client interests or ownership of legal work product. Just as SoundCloud’s artists demanded clarity and control over their music, lawyers must demand the same over their data and intellectual property.

Why This Matters for Lawyers

The legal profession is rapidly adopting generative AI tools for research, drafting, and client communications. Many of these tools, whether standalone or embedded in cloud-based platforms, operate under terms of service that grant providers broad rights to access, analyze, and even use uploaded data to train their AI models. If attorneys do not scrutinize these terms, they risk inadvertently exposing privileged information, work product, or client PII to unauthorized access or use by the AI provider—or worse, by third parties.

Unlike musicians, whose primary concern is copyright and creative control, lawyers have an ethical and legal duty to protect client confidentiality. The American Bar Association’s Model Rules of Professional Conduct require attorneys to make reasonable efforts to prevent unauthorized disclosure of client information. Using a generative AI tool with permissive or ambiguous TOS could violate these duties, especially if sensitive documents are uploaded without clear assurances that the data will not be used for AI training or shared beyond the intended scope.

Past precedents highlight the urgency of this issue. In 2024, Utah’s court system implemented MyCase, a case management platform that claimed ownership of all user-generated data, including attorney work product and client communications, while disclaiming liability for breaches. Similarly, Google’s 2025 Local Services Ads policy update asserted ownership over law firms’ client intake data, including call recordings and messages, which could be analyzed by AI without explicit consent - see my editorial MTC: Google’s Claim Over LSA Client Intake Recordings: Why Lawyers Must Rethink Cloud Service Risks in 2025 ⚖️☁️. These cases mirror broader industry trends, such as Vultr’s short-lived attempt to claim perpetual commercial rights to cloud-hosted content and Slack’s controversial data export fees. For lawyers, these examples demonstrate how easily confidential information can fall under third-party control—often through clauses buried in updates to terms of service. The ABA’s Formal Opinion 512 and analysis from The Tech-Savvy Lawyer.Page emphasize that such risks are not theoretical, urging practitioners to treat TOS reviews as a core component of client protection1.

Security and the Adversarial Risk
One of the gravest risks is that information uploaded to a generative AI platform could be accessed or inferred by the opposition or other unauthorized parties. If an AI provider uses your data to train its models, there is a risk—however small—that elements of your confidential work could surface in responses to other users. This is not a hypothetical concern; it has already happened in other industries, and the consequences for legal practice could be catastrophic.

Practical Steps: Protecting Clients and Your Practice

SoundCloud’s TOS incident is a stark reminder: always read and understand the terms of service for any platform or AI tool before uploading client data. The New Solo podcast episode “AI And The Terms Of Service. Know What You Are Sharing!” echoes this advice, emphasizing that lawyers—even those who draft TOS for others—often neglect to scrutinize these agreements for their own practice. Key questions include:

  • Who owns the data entered into the platform?

  • What rights does the provider claim over your data?

  • Is your data used solely to deliver the service, or is it also used to train AI models?

  • What safeguards are in place to prevent unauthorized access or disclosure?

As with the SoundCloud controversy, where artists discovered their music could be used for AI training without their knowledge, lawyers must be vigilant to prevent their confidential work from being similarly exploited.

The Adversarial Risk: More Than Just Theory

The risk is not hypothetical. As detailed in ABA Formal Opinion 512 and multiple bar association opinions, generative AI can inadvertently disclose confidential information through its self-learning capabilities—even within a law firm’s own closed system. If a provider’s TOS allows broad use of your data, there’s a real danger that sensitive client information could be exposed to third parties, including opposing counsel. Along this same vein, remember when an online law practice management provider tried to claim ownership of the data user put into their system? Know your terms of service!

Final Thoughts: Vigilance Is Essential

The SoundCloud TOS controversy is a pivotal lesson for the legal profession. Lawyers must not only embrace technology but do so with a clear-eyed understanding of their ethical obligations. The ABA Model Rules, recent formal opinions, and thought leadership from The Tech-Savvy Lawyer.Page all point to the same conclusion: due diligence, transparency, and ongoing education are non-negotiable in the age of AI. Just as artists must protect the ownership and use of their creative works, attorneys must safeguard client data and their own legal work product from becoming fodder for AI models without consent.

🚨 BOLO: Android Ad Fraud Malware and Your ABA Ethical Duties – What Every Lawyer Must Know in 2025 🚨

Defend Client Data from Malware!

The discovery of the “Kaleidoscope” ad fraud malware targeting Android devices is a wake-up call for legal professionals. This threat, which bombards users with unskippable ads and exploits app permissions, is not just an annoyance - it is a direct risk to client confidentiality, law firm operations, and compliance with the ABA Model Rules of Professional Conduct. Lawyers must recognize that cybersecurity is not optional; it is an ethical mandate under the ABA Model Rules, including Rules 1.1, 1.3, 1.4, 1.6, 5.1, and 5.3.

Why the ABA Model Rules Matter

  • Rule 1.6 (Confidentiality): Lawyers must make reasonable efforts to prevent unauthorized disclosure of client information. A compromised device can leak confidential data, violating this core duty.

  • Rule 1.1 (Competence): Competence now includes understanding and managing technological risks. Lawyers must stay abreast of threats like Kaleidoscope and take appropriate precautions.

  • Rule 1.3 (Diligence): Prompt action is required to investigate and remediate breaches, protecting client interests.

  • Rule 1.4 (Communication): Lawyers must communicate risks and safeguards to clients, including the potential for data breaches and the steps being taken to secure information.

  • Rules 5.1 & 5.3 (Supervision): Law firm leaders must ensure all personnel, including non-lawyers, adhere to cybersecurity protocols.

Practical Steps for Lawyers – Backed by Ethics and The Tech-Savvy Lawyer.Page

Lawyers: Secure Your Practice Now!

  • Download Only from Trusted Sources: Only install apps from the Google Play Store, leveraging its built-in protections. Avoid third-party stores, the main source of Kaleidoscope infections.

  • Review App Permissions: Be vigilant about apps requesting broad permissions, such as “Display over other apps.” These can enable malware to hijack your device.

  • Secure Devices: Use strong, unique passwords, enable multi-factor authentication, and encrypt devices-simple but essential steps emphasized by our blog posts on VPNs and ABA guidance.

  • Update Regularly: Keep your operating system and apps up to date to patch vulnerabilities.

  • Educate and Audit: Train your team about mobile threats and run regular security audits, as highlighted in Cybersecurity Awareness Month posts on The Tech-Savvy Lawyer.Page.

  • Incident Response: Have a plan for responding to breaches, as required by ABA Formal Opinion 483 and best practices.

  • Communicate with Clients: Discuss with clients how their information is protected and notify them promptly in the event of a breach, as required by Rule 1.4 and ABA opinions.

  • Label Confidential Communications: Mark sensitive communications as “privileged” or “confidential,” per ABA guidance.

Advanced Strategies

Lawyers need to have security measures in place to protect client data!

  • Leverage AI-Powered Security: Use advanced tools for real-time threat detection, as recommended by The Tech-Savvy Lawyer.Page.

  • VPN and Secure Networks: Avoid public Wi-Fi. But if/when you do be sure to use VPNs (see The Tech-Savvy Lawyer.Page articles on VPNs) to protect data in transit.

  • Regular Backups: Back up data to mitigate ransomware and other attacks.

By following these steps, lawyers fulfill their ethical duties, protect client data, and safeguard their practice against evolving threats like Kaleidoscope.