📄 What data we hold

If you contact us, we will hold the following information about you:

  • Your name, identity and contact information
  • Information about your business activities
  • Information and documents about your enquiries, including communications with you

We also generate log files from various servers: this will include an IP address assigned to you or, more likely, to someone who provides you with Internet access. All our client-facing platforms are accessible via Tor, and you can access this site on Tor. If you do not want us to see your actual IP address, feel free to visit us via Tor.

🏭 Using your information

References to the basis of processing (e.g. "(Basis: Art. 6(f).)") are a reference to the article of the General Data Protection Regulation under which we undertake the processing in question.

Giving you legal advice

If you get in touch looking for legal advice, we will do some research to understand more about you and what you do. Usually, this means reading up on your products or services, how you position yourself in the market, what you display on your public facing websites and social media presence, and so on. This helps us work out how best we can help you, and if we're really the right people for the job.

(Basis: Art. 6(b): this is necessary to deliver the service to you.)

ID checks

The law requires that, in some situations, we must know who you are before we can give you legal advice.’s approach to this is to check the identity of all clients.

The level of checking we need to undertake depends on the potential risk, and there are certain factors which are considered to be high risk. One example is if you are an individual and are not able to meet us face-to-face. (Yes, this is a rather archaic rule given video conferencing, but it is a rule.)

We will do what we can to make this as painless as possible. If you would prefer not to provide these information, we will not be able to act for you.

Any personal data received from you for this purpose will be processed only for the purposes of preventing money laundering or terrorist financing, unless we have your consent to process it for another purpose.

We retain identity verification information for as long as you are our client and then five years, or else five years from the point you decide you do not want to become a client.

(Basis: Art. 6(c): we have to do this processing to comply with legal and regulatory obligations.)

Sources of money

We may need to ask questions about the source of your money, to discharge our regulatory obligations relating to proceeds of crime and terrorist funding. If you would prefer not to provide these information, we will not be able to act for you.

(Basis: Art. 6(c): we have to do this processing to comply with legal and regulatory obligations.)

Dealing with enquiries

If you give us a ring or make contact by email, we will follow up on your enquiry and see if there is a way in which we can help you. We keep a record of enquiries received, to help us plan our business strategy and check that we are offering what potential clients want.

(Basis: Art. 6(b): we need to use your details to follow up with you. Art. 6(f): business planning is a legitimate thing for us to do, and keeps us relevant and hopefully more in tune with your needs.)

Technical data

We use the logs from our servers to assist in our firm's security, as well as to determine visitor behaviour and help us plan our strategy (e.g. such as working out which pages on the site are most popular, or whether particular events have caused an increase in traffic).

(Basis: Art. 6(c): we have legal and regulatory obligations to protect our clients and their information. Art. 6(f): strategy planning is a legitimate, indeed sensible, thing for a business to do.)

Your data and the EEA

We do not transfer or process data outside the European Economic Area unless we have your consent or where the nature of the processing requires it (for example, where we are emailing a party to your matter who is based outside the EEA, or because you have chosen to use an email or other communications service which routes data outside the EEA).

👉 Your rights

You have lots of rights in respect of our processing of your personal data. The relevant rights are:

  • get access to your personal data and information about our processing of it
  • in some circumstances, restrict our processing of your data for strategy planning purposes and other "legitimate interests" purposes, and compel us to erase the bits we do not use for those purposes
  • object to our processing for strategy planning purposes and other "legitimate interests" purposes

If you want to exercise any of these rights, please just contact us.

You also have the right to lodge a complaint about our processing with a supervisory authority — you probably want the UK's Information Commissioner's Office.

👪 Third parties

As a general principle, we will not transfer your personal data to third parties without your permission.

There are two exceptions to this:

  • It is possible, though unlikely, that we might be forced to disclose your information in response to a court order or other binding mandate.
  • As solicitors, we have professional duties, including to to co-operate with our regulator, the Solicitors Regulation Authority, as well as to report suspicious transactions or money laundering. We may not even be able to tell you of our suspicions if, in doing so, we would be committing the offence of tipping off. We will still try to minimise any sharing of your personal data.

We also have a small number of companies providing services to us. We use telephony services, which would get to see your phone number if we call you, and a broadband supplier which could see your email address (but not the content of what you send us, if you encrypt it).

💪 Technical security

All our computers are full-disk encrypted, as are our phones and tablets.

Our preference is to use PGP/GPG-encrypted email, but we appreciate that it may not be convenient for you to do so.

We have a secure document transfer portal, which lets you send documents to us, and us to send documents to you. It is less convenient than email, but is more secure than unencrypted email. If you want to use it to send specific documents to us, just let us know. If you want to protect all documents you send to us, we encourage you to set up PGP/GPG.

"Normal" phone calls are not encrypted.

All our client-facing platforms are accessible via Tor, and you can access this site on Tor.

If you have particular security requirements, please call us to discuss how we can support you.

🎤 Call recording

We record calls, both inbound and outbound, as we find that it can be useful to listen again to conversations, particularly the more technical ones, to help understand what we have been told. Sometimes, we need to listen to things two or three times and, by being able to do this automatically, we save you having to repeat yourself. That way, we can hopefully ask more relevant and useful questions.

Calls are recorded and stored on our premises, and not on any third party cloud platform. The server on which our telephony platform runs has full disk encryption. If we need to listen again to a call, we download the file to a computer and listen to it there. These, too, have full disk encryption.

We delete the recordings from our computers as soon as we have decided that we will no longer need to listen to them again. In most cases, this is immediately after the call takes place. Recordings are removed from the server automatically each day.

Here's our legitimate interests assessment for our call recording.

⏰ Retention periods

Data about clients: duration of your relationship with us, then seven years

Client ID verification: duration of your relationship with us, then five years

Enquiry data: duration of enquiry, then one year

Server logs: one year

ICO registration is registered with the Information Commissioner's Office (ZA152364).

Get in touch