Lawyer Sends Confidential Contracts via Unencrypted Email
Why sending confidential client documents via unencrypted email is a serious data protection violation — and how law firms can communicate securely.
The Scenario
Attorney Dr. Marcus Weber of the firm Weber & Associates has been managing a complex corporate acquisition for months. His client, Hagedorn Industrial Technologies Ltd., is acquiring a mid-sized machinery manufacturer for a purchase price of 12.5 million euros. On Thursday evening at 7:30 PM — after a long day of negotiations — Dr. Weber urgently needs to send the current version of the Share Purchase Agreement to opposing counsel. The deadline for the final response expires the following morning.
Dr. Weber opens his email client and attaches the 47-page purchase agreement as a PDF to a regular, unencrypted email. The contract contains: the complete purchase price structure including earn-out clauses, a detailed valuation of the target company with all financial metrics from the past five years, personal guarantee declarations from the shareholders including their private addresses and asset positions, a list of all pending litigation against the target company, and the terms of a silent partnership agreement that must remain confidential.
In the Cc field, Dr. Weber has included another attorney — one he accidentally selected from his address book's auto-complete. It is not the colleague from the opposing side, but a lawyer with the same surname at a competing firm, who happens to represent a client in the same industry.
The email is sent. Unencrypted. Across the open internet. To the wrong recipient.
Three weeks later, Hagedorn Industrial Technologies receives a competing offer from a rival that precisely undercuts the terms outlined in the confidential purchase agreement. The earn-out structure that Dr. Weber had negotiated as a strategic advantage is almost identically replicated in the competing bid. The deal collapses. A 12.5 million euro transaction — lost because of a single unencrypted email.
The Risks
Dr. Weber's case is far from unique. Studies show that over 60% of law firms still use regular, unencrypted email as their primary channel for transmitting confidential client documents. The risks are both varied and severe.
Email misdirection and wrong recipients: The most common data protection incident in law firms is sending documents to the wrong person. Auto-complete in email programs, similar names in address books, or a hasty click on "Reply All" — and confidential contract documents end up with unauthorized parties. Once sent, an email cannot be recalled.
Man-in-the-middle attacks: Unencrypted emails travel across the internet in plain text. At every routing node between sender and recipient, they can be intercepted and read. For high-value transactions, targeted surveillance by competitors or state actors is not a theoretical risk but a documented reality.
No control over recipients: The moment an email leaves the outbox, the sender loses all control over what happens to the attached documents. The recipient can forward them, print them, save them on unsecured devices, or upload them to cloud services. Revocation is impossible.
Breach of attorney-client privilege: The attorney-client relationship is built on absolute trust. The confidentiality of communication between lawyer and client is a cornerstone of the rule of law. Every unencrypted email containing client documents is a potential breach of this foundational principle.
Lack of accountability: With regular email, there is no reliable record of whether and when the recipient opened the message, whether attachments were downloaded, or whether the email was forwarded to third parties.
Legal Consequences
The legal consequences of such an incident hit law firms from multiple directions simultaneously.
Attorney-client privilege obligations: Every jurisdiction imposes strict confidentiality duties on practicing attorneys. This obligation extends explicitly to the manner and means of communication. Sending confidential documents through insecure channels constitutes a violation of core professional duties.
Criminal liability for breach of professional secrecy: In many European jurisdictions, the unauthorized disclosure of a client's secrets by an attorney is a criminal offense. Sending documents to the wrong recipient or exposure through lack of encryption can satisfy the elements of the offense. Penalties can include fines or imprisonment.
Art. 32 GDPR — Security of processing: The law firm, as the data controller, must implement technical and organizational measures that ensure a level of security appropriate to the risk. For highly sensitive transaction documents in a multi-million-euro deal, unencrypted email does not constitute an appropriate measure.
Bar association disciplinary proceedings: The relevant bar association can initiate disciplinary proceedings for violations of professional duties. Sanctions range from a formal reprimand to substantial fines to disbarment in severe cases.
Civil liability: The client can pursue damages — both for material harm (such as the collapsed deal) and for non-material damages. In a transaction worth tens of millions of euros, potential damage claims can be existentially threatening to the firm.
Financial Impact
The financial consequences of a data breach through unencrypted email communication can threaten a law firm's very existence:
| Cost Category | Estimated Amount |
|---|---|
| GDPR fine (first offense, Art. 83) | 10.000 – 50.000 € |
| Bar association disciplinary fine | 5.000 – 25.000 € |
| Client damage claim | 50.000 – 500.000 € |
| Legal representation in own proceedings | 5.000 – 15.000 € |
| IT forensic investigation | 3.000 – 8.000 € |
| Notification to supervisory authority & affected parties | 1.000 – 3.000 € |
| Reputational damage (client loss) | 30.000 – 150.000 € |
| Professional liability insurance increase | 2.000 – 5.000 €/year |
| Total costs | 50.000 – 200.000 € |
For comparison: a professional solution for secure document sharing costs from 19 euros per month. The cost of a single incident exceeds the investment in prevention by a factor of 200 to 800.
How to Prevent This
With SendMeSafe, Dr. Weber could have transmitted the purchase agreement securely and with full accountability — even at 7:30 PM under time pressure.
1. Create a share link: Instead of emailing the contract, Dr. Weber creates a share link in SendMeSafe. He uploads the PDF and configures access: a unique password, an expiration of 48 hours, and a maximum download limit of three retrievals.
2. Secure delivery via Flaschenpost: Dr. Weber sends the share link through SendMeSafe's integrated Flaschenpost feature. The recipient receives a secure notification with the link — without the actual document ever being transmitted via email. The confidential file never leaves the encrypted storage.
3. Password protection and access control: The recipient must authenticate with the agreed-upon password before accessing the purchase agreement. Even if the link accidentally reaches the wrong recipient, the document remains inaccessible without the password.
4. Complete audit trail: Every access to the share link is logged — with timestamp, IP address, and download status. Dr. Weber can prove at any time who accessed the contract and when. In the event of a GDPR data subject request, comprehensive documentation is immediately available.
5. Automatic expiration: After 48 hours or after three downloads, access is automatically revoked. No outdated contract versions circulate uncontrolled across the internet. No risk that old links still function months later.
6. Encryption at every level: The file is encrypted during transfer via SSL/TLS and at rest via AES-256. All data remains on European servers — fully GDPR-compliant.
Frequently Asked Questions
Is it not sufficient to send emails with a password-protected PDF?
A password-protected PDF offers only minimal protection. PDF encryption can be cracked in seconds using freely available tools. Moreover, the email itself is still transmitted unencrypted — the subject line, metadata, and the fact that attorney correspondence is taking place remain visible to anyone intercepting the traffic. There is also no access control: once downloaded, the PDF can be forwarded and copied without restriction.
Do I need to encrypt every email as a lawyer?
The encryption requirements depend on the sensitivity of the data being transmitted. For general correspondence without personal data, a regular email may be sufficient. However, as soon as confidential client documents, contracts containing personal data, or particularly sensitive information are being transmitted, the GDPR requires appropriate security measures. Data protection authorities across Europe have clarified that the transmission of sensitive data requires end-to-end encryption or equivalent protection.
How do clients react to switching to secure document transmission?
Experience shows that clients — especially in the corporate sector — highly value the professional handling of confidential documents. A secure share link appears more professional than an email attachment and signals that the firm takes data protection seriously. Many clients today actively expect their attorneys to maintain contemporary security standards. The switch can be communicated as a quality improvement: "We use a secure document platform to ensure your contracts and documents are protected at all times."
What happens if I have already sent a share link and need to revoke access retroactively?
Unlike an email, which is uncontrollable after sending, you can deactivate a SendMeSafe share link at any time. If you discover that a link was sent to the wrong person or a document needs to be withdrawn, you can block access with a single click. While you cannot retrieve copies that have already been downloaded, the link becomes immediately invalid and further downloads are prevented. The audit trail also shows you whether and when the link was accessed.
Frequently Asked Questions
Protect Your Business
Avoid data privacy incidents with secure upload and share links.
Start Free Trial