Security for Legal SaaS

Episode 25 · Module 6 · Authorization & Access Control

Ethical Walls and Matter-Scoped Access

19 May 2026 · 9:02 · Security for Legal SaaS

9:02 9:02

Two partners at the same firm. One advises the acquiring company. The other advises the target. Same firm, opposite sides of the same transaction. If either partner sees the other's client communications — deal strategy, negotiation positions, privileged legal advice — it's not just a security incident. It's a professional ethics violation that can result in disqualification, sanctions, and malpractice liability.

Today’s Lesson

Security for Legal SaaS — Episode 25: Ethical Walls and Matter-Scoped Access

The Conflict Problem

Two partners at the same firm. One advises the acquiring company. The other advises the target. Same firm, opposite sides of the same transaction. If either partner sees the other's client communications — deal strategy, negotiation positions, privileged legal advice — it's not just a security incident. It's a professional ethics violation that can result in disqualification, sanctions, and malpractice liability.

This is the problem ethical walls solve. And for legal SaaS platforms, it's not optional — it's a regulatory requirement that your software must enforce.

Professional Rules: ABA Model Rules 1.7, 1.9, and 1.10

The obligation to prevent conflicts of interest is codified in ABA Model Rule 1.7 (concurrent conflicts) and Rule 1.9 (duties to former clients). When a conflict exists, Rule 1.10 addresses imputation — the principle that one lawyer's conflict is imputed to every lawyer in the same firm.1

Rule 1.10(a)(2) provides the critical exception: if the conflicted lawyer is timely screened from any participation in the matter and receives no part of the fee, the imputation can be overcome. The screen must include:2

Key insight for software builders: The rules don't just require that the wall exists — they require proof that it works. Your platform must produce evidence: audit logs showing who accessed what, when the wall was erected, and that screened individuals never accessed restricted material.1

Ethical Walls vs. Multi-Tenancy

This is a crucial distinction that will matter in Episode 27:

Concept Scope Example
Ethical wall Intra-tenant — within a single firm Partner A cannot see Partner B's matter files
Multi-tenant isolation Inter-tenant — between different firms Firm A cannot see Firm B's data at all

Ethical walls are harder to implement than multi-tenant isolation because you're creating information barriers within a shared environment. Both users have legitimate accounts in the same firm's instance. Both have roles that would normally grant them access to the same categories of resources. The wall is an exception — a targeted restriction that overrides normal permissions.3

Matter-Scoped Access: The Foundation

The foundation of ethical walls in legal SaaS is matter-scoped access — ensuring that every data access decision includes not just "what role does this user have?" but "is this user assigned to this matter?"

In Episode 23, we covered RBAC roles. In Episode 24, we covered ABAC attributes. Matter scoping combines both:

Access granted IF:
  1. User has the required ROLE permission (e.g., Associate can read documents)
  AND
  2. User is ASSIGNED to this specific matter
  AND
  3. No ethical wall BLOCKS this user from this matter

The matter assignment is the default access scope. The ethical wall is an additional restriction layer that can override normal access — even for users who would otherwise qualify.

Technical Implementation

Static Walls vs. Dynamic Walls

Static walls are configured manually by a firm administrator: "Attorney X must not access Matter Y." These are simple to implement — a deny-list checked on every access request — but they require someone to know the conflict exists and remember to configure the wall.

Dynamic walls are triggered automatically by conflict checking systems. When a new matter is opened, the system compares the parties involved against existing matters and identifies potential conflicts. If a conflict is found, the wall is erected automatically — no manual step required.4

For legal SaaS platforms, dynamic walls are the standard. A new matter for a client creates a conflict with any existing adverse representation. The system should:

  1. Run a conflict check when the matter is created
  2. Identify all lawyers with conflicting matter assignments
  3. Automatically erect walls barring those lawyers from the new matter
  4. Notify the affected parties (per Rule 1.10's notice requirement)
  5. Log the wall creation with a timestamp and reason

Database-Level Enforcement

Ethical walls must be enforced at the database query level, not just the application layer. Every query that retrieves matter data must include a wall check:

sql
SELECT d.* FROM documents d
JOIN matter_assignments ma ON d.matter_id = ma.matter_id
WHERE ma.user_id = :current_user
  AND d.matter_id NOT IN (
    SELECT matter_id FROM ethical_walls
    WHERE blocked_user_id = :current_user
    AND active = true
  )

If your wall enforcement only exists in the application layer and a developer writes a new database query that skips the check, the wall is breached. Defence in depth — a concept from Episode 4 — means implementing wall enforcement at multiple layers:5

Layer Enforcement
Database Row-level security policies or view-based filtering that exclude walled matters
API middleware Permission check that rejects requests for walled matters before reaching business logic
UI Walled matters are invisible in search results, matter lists, and navigation
Search index Walled matter documents are excluded from full-text search results

Cross-Matter Search: The Hard Problem

Law firms need firm-wide search — the ability to search across all matters for precedent, prior work product, or knowledge management. But firm-wide search creates a conflict with ethical walls: how do you let a lawyer search across hundreds of matters without returning results from a matter they're walled off from?

The solution is pre-filtered search indexing:

  1. The search index (Elasticsearch, Solr, or similar) is tagged with matter IDs and wall metadata
  2. At search time, the query includes a filter that excludes all matters where the current user has an active wall
  3. Results from walled matters are never returned — not even snippets or metadata
  4. The user has no indication that results were suppressed (to avoid revealing the existence of the conflict)
Critical detail: Even revealing that a wall exists can be a confidentiality breach. If a lawyer searches for "Acme Corp acquisition" and sees a message saying "2 results hidden due to an ethical wall," they now know the firm has an adverse matter involving Acme Corp. The correct behaviour is silent suppression — walled results simply don't appear.6

Audit Requirements

Proving wall integrity is as important as implementing it. Regulators, clients, and opposing counsel may demand evidence that the wall was effective. Your audit log must capture:7

Event Required Data
Wall creation Timestamp, triggering conflict, affected matter(s), affected user(s), creator
Wall modification What changed, who authorised it, why
Access attempts Every request where a wall was evaluated, including denials
Wall removal When the wall was lifted, who authorised it, certification of no breach
Periodic attestation Quarterly or annual confirmation that walls remain in place

These logs must be immutable — once written, they cannot be edited or deleted, even by firm administrators. This is a case where your audit infrastructure (which we'll cover in later episodes) directly supports a professional conduct obligation.

The SRA Perspective

The UK Solicitors Regulation Authority (SRA) imposes similar requirements under its Code of Conduct paragraphs 6.2-6.5.8 The SRA has been explicit that firms relying on information barriers must demonstrate that the barriers are effective in practice — not just documented in policy. Software-enforced walls with audit trails are increasingly the expected standard, not just a best practice.

Real-World Failures

Information barrier failures have led to firm disqualification in multiple jurisdictions:

What's Next

Episode 26 covers Zero Trust Architecture — the security model that assumes no user, device, or network location should be trusted by default, and how it extends the defence-in-depth principles from Episode 4 into continuous verification.

Sources & Further Reading

Sources & references

  1. ABA, Model Rule 1.10: Imputation of Conflicts of Interest — screening requirements and notice obligations.
  2. ABA, Model Rule 1.7: Conflict of Interest — Current Clients — concurrent conflict rules.
  3. GreenPoint Legal, Building Ethical Walls Using Modern Technology — technology implementation of ethical walls.
  4. Tessaract, Chinese Walls: What Are They? — practical overview of information barriers in legal practice.
  5. OWASP, Authorization Cheat Sheet — defence in depth for access control.
  6. Wikipedia, Chinese Wall — history and application across industries.
  7. US Legal Forms, Ethical Wall: Legal Definition and Importance — audit and compliance requirements.
  8. SRA, Code of Conduct for Solicitors — paragraphs 6.2-6.5 on conflicts and information barriers.
  9. Thomson Reuters Practical Law, Chinese Walls: Maintaining Client Confidentiality — UK legal framework for information barriers.
  10. Downey Law Group, Elements of an Effective Ethics Screen — screening procedure design.
  11. ABI, The Unsavory Origins of the Term "Chinese Wall" — terminology history and modern alternatives.