Security

SOC 2 Compliance for Legal Tech: What Law Firms Should Demand

Attorney-client privilege isn't optional — and neither is the security of the tools your firm relies on. Here's how to separate genuine security from marketing buzzwords.

29%

Of law firm data breaches involve a third-party vendor

$4.5M

Average cost of a data breach in professional services

6 mo+

Minimum audit window for SOC 2 Type II certification

Why Security Isn't Optional for Law Firms

Law firms are custodians of some of the most sensitive information in any industry. Client communications, litigation strategies, financial records, intellectual property disclosures, and personally identifiable information all flow through your practice management tools, document repositories, and communication platforms every day.

This isn't just a practical concern — it's an ethical one. ABA Model Rule 1.6 requires attorneys to make “reasonable efforts” to prevent unauthorized disclosure of client information. Rule 1.1 (competence) has been interpreted by multiple state bars to include a duty to understand the technology you use, including its security posture. When your firm adopts a new legal tech vendor, you're extending the perimeter of your ethical obligations to that vendor's infrastructure.

Yet many firms evaluate legal technology the same way they'd evaluate a new office printer — based on features and price. Security due diligence often amounts to a checkbox on a procurement form rather than a rigorous evaluation of how a vendor actually protects data. In a landscape where vendor-related breaches account for nearly a third of incidents in professional services, that approach carries real risk.

What SOC 2 Actually Means

SOC 2 (Service Organization Control 2) is an auditing framework developed by the American Institute of Certified Public Accountants (AICPA). It evaluates whether a service provider has implemented controls across five Trust Services Criteria:

  • Security: Protection against unauthorized access — the foundation every SOC 2 report covers.
  • Availability: Whether the system is operational and accessible as committed in SLAs.
  • Processing Integrity: Whether data processing is complete, accurate, and authorized.
  • Confidentiality: Protection of information designated as confidential — critical for legal data.
  • Privacy: How personal information is collected, used, retained, and disclosed.

Type I vs. Type II: The Distinction That Matters

A SOC 2 Type I report evaluates whether appropriate controls exist at a single point in time. It answers the question: “Did the vendor have the right policies in place on the day the auditor showed up?” This is a useful starting point, but it tells you nothing about whether those controls actually work in practice.

A SOC 2 Type II report evaluates whether controls operated effectively over a sustained period — typically six to twelve months. Auditors review logs, test access controls, verify encryption configurations, and examine incident response procedures across the full audit window. Type II is the standard that matters for ongoing vendor relationships because it demonstrates operational discipline, not just documentation.

When a vendor claims to be “SOC 2 compliant” without specifying Type II, ask questions. Type I is a snapshot; Type II is a track record. For a law firm entrusting client data to a platform, the difference is significant.

What CASA Certification Adds

The Cloud Application Security Assessment (CASA) is a complementary framework that evaluates cloud-native applications specifically. While SOC 2 covers organizational controls broadly, CASA focuses on application-layer security: secure coding practices, dependency management, API security, authentication mechanisms, and runtime protections.

For legal tech platforms that process sensitive data through web APIs and cloud infrastructure — which describes virtually every modern practice management and AI tool — CASA certification addresses attack surfaces that SOC 2 alone may not fully cover. A vendor with both SOC 2 Type II and CASA certification has been evaluated at the organizational level and the application level, providing layered assurance. Lexi AI is CASA certified with SOC 2 Type II in progress — learn more on our security page.

Red Flags in Vendor Security Claims

Not every vendor that claims strong security can back it up. Here are patterns that should prompt deeper scrutiny during your evaluation:

  • No independent audit: If a vendor has no SOC 2 report, no ISO 27001 certification, and no third-party penetration testing, you're relying entirely on their self-assessment.
  • Type I only with no timeline for Type II: Type I is a starting point, not an endpoint. Vendors committed to security should have a clear roadmap to Type II.
  • “Bank-grade encryption” without specifics: This phrase is marketing, not a security specification. Ask for the actual protocol (TLS 1.3, AES-256) and whether encryption covers data at rest, in transit, or both.
  • No data processing agreement (DPA): Any vendor handling client data should provide a DPA that specifies data handling, retention, and deletion obligations.
  • Vague or missing incident response plan: Ask how quickly the vendor commits to notifying you of a breach and what their response timeline looks like.
  • AI training on client data: For AI-powered legal tools, confirm explicitly whether client data is used to train or fine-tune models. If the vendor can't give a clear “no,” that's a serious concern.

Your Vendor Security Evaluation Checklist

When evaluating any legal technology vendor — whether it's a practice management system, a document automation tool, or an AI assistant like Lexi AI — use this checklist to structure your due diligence:

  1. Encryption: Verify AES-256 at rest and TLS 1.3 in transit. Ask about key management and rotation policies.
  2. Access controls: Confirm role-based access control (RBAC), multi-factor authentication (MFA), and the principle of least privilege for internal access.
  3. Data retention and deletion: Understand how long data is retained, what happens at contract termination, and whether you can request immediate deletion.
  4. Penetration testing: Ask for the frequency (quarterly is best practice), whether testing is performed by an independent firm, and whether summary reports are available.
  5. Subprocessor transparency: Know which third parties have access to your data and what controls govern their access.
  6. Incident response: Review the vendor's breach notification timeline — 72 hours aligns with GDPR requirements and represents a reasonable standard.
  7. AI model isolation: For AI tools, confirm that client data is never used for model training and that inference happens within the vendor's secure environment.
  8. Compliance documentation: Request the SOC 2 Type II report, DPA, CASA certification, and any completed security questionnaires (SIG Lite, CAIQ).
🛡️

SOC 2 Type II

Controls verified over an extended audit period — not a single-day snapshot. The standard that matters for ongoing trust.

☁️

CASA Certified

Application-layer security assessed independently, covering secure coding, API security, and runtime protections.

🔐

AES-256 + TLS 1.3

Enterprise-grade encryption for data at rest and in transit, with automated key rotation and HSTS enforcement.

🧪

Quarterly Pen Testing

Independent third-party penetration testing every quarter, with critical findings remediated within 48 hours.

How Lexi AI Approaches Security

At OpenLaw AI, security is foundational to how we build Lexi — not a feature we bolt on after the fact. Our approach is designed specifically for the legal industry's unique requirements:

  • CASA certified with SOC 2 Type II in progress, with documentation available upon request
  • Client data is never used to train or fine-tune AI models
  • All AI inference runs within our isolated infrastructure on Google Cloud Platform
  • Role-based access control that mirrors law firm permission structures
  • Immutable audit trails for every action within the platform
  • GDPR and CCPA compliant with standard DPAs for all customers

We publish our security practices transparently because we believe law firms shouldn't have to take a vendor's word for it. Our full security and compliance documentation is available for review, and our team is happy to walk through the details during your evaluation process.

Questions to Ask Every Legal Tech Vendor

Whether you're evaluating Lexi or any other platform, these questions will help you cut through marketing language and assess actual security posture:

  1. Can you provide your SOC 2 Type II report? When was your last audit completed?
  2. Do you hold any additional certifications (CASA, ISO 27001, HITRUST)?
  3. What encryption standards do you use for data at rest and in transit?
  4. How do you handle data deletion at contract termination?
  5. Who are your subprocessors, and what access do they have to our data?
  6. How frequently do you conduct penetration testing, and can we see a summary report?
  7. For AI features: is our data used to train models? Where does inference happen?
  8. What is your breach notification timeline, and what does your incident response plan include?
  9. Can you provide a Data Processing Agreement?
  10. Do you support role-based access control and multi-factor authentication?

A vendor that can answer these questions clearly and provide supporting documentation has earned the right to handle your client data. A vendor that deflects, delays, or responds with marketing language instead of specifics has told you something equally important.

Read our customer stories to see how firms evaluated Lexi's security before adopting the platform, or book a demo to discuss your firm's specific security requirements with our team.

The question isn't whether your legal tech vendor will be targeted — it's whether they've built the infrastructure to withstand it. SOC 2 Type II is the minimum bar; everything else is table stakes.

James Patterson, Head of Security at OpenLaw AI

Trusted by Leading Law Firms

See How Lexi Protects Your Firm's Data

Book a free 30-minute assessment and we'll show you exactly where Lexi can save your firm time and money.

The LegalTech FundFlint CapitalTechstarsThe LegalTech FundFlint CapitalTechstars

Book a demo

What case management software are you currently using?

How many members are in your firm?

What's your firm's biggest bottleneck with AI?

By submitting, you agree to our terms of service.