Legal Data? Anchor It™.

Keep clients’ confidential data and intellectual property secure with Anchor.

Attorney-Client Privilege Made Easy

Stop worrying about confidential data being leaked.  Anchor allows you to protect legal files so that they are never out of your control.  

The American Bar Association (ABA) has held lawyers to ethical and model rules of professional conduct.  Rule 1.6 ensures that lawyers make reasonable efforts to protect the confidentiality of client information.  The ABA issued Formal Opinion 483 in 2018, which gives information on how to handle security breaches. 

Duty of competence:
Technology must have adequate security measures in place.

Obligation to monitor:
Lawyers must continuously assess their systems, procedures and plans for mitigating a security breach.

Stopping the breach:
If a breach is suspected or detected, lawyers must take steps to stop an attack and prevent further exposure of data.

Notice of breach:
Lawyers who detect a breach must inform their clients in a timely and reasonable manner.

Risk of Security Breach

The threat of an attack has increased as more and more of our work is done online, especially since many law firms have moved to a remote format.  When employees check their email, browse social media, or make a client call, sensitive data gets exposed to  hackers who can infiltrate your law firm.  With 42% of law firms with up to 100 employees having experienced a security breach, legal data security has never been more important.

How Anchor Supports Confidentiality

Anchor is a novel method to ensure that client data remains safely protected, from both outside and inside threats, no matter where the information is stored or moved.  With Anchor, when a breach does happen, any stolen data would remain unreadable with military-grade encryption. 

Anchor ensures that your clients’ confidential data and intellectual property are secure by allowing individuals to anchor their data.  This means that only users who follow the access rules of the protected data are given access.  If access rules are not met, the data remains encrypted with a military-grade cipher.  Files can be shared securely, and Anchor’s monitoring features lets you audit who is accessing the data and how.  Anchor works behind the scenes, remaining invisible to the user and not affecting the way they work.  This means less effort at an affordable cost.

The benefits of Anchor include:

  • Invisible to the user.
  • File-level granularity.
  • Always encrypted.  Even when in use.
  • Instant access revocation.
  • Fully auditable. Even if it escapes your network.

In the old days sensitive data was protected with firewalls, shared drives, and a whole lot of user trust.   Now the security is baked right into the data itself. 

Datanchor Provides Compliance with CMMC Certification

With Anchor the “system” is the set of Anchor-protected files containing CUI. Anchor simplifies CMMC compliance by reducing the system boundary from a complex architecture of networks and computers to a narrow set of anchored files. Minimizing the attack surface with Anchor zero-trust data security means an attacker being on the same network or even on the same computer as CUI does not expose it to them.

Quick Guide For CMMC Compliance

This document provides a comprehensive overview of CMMC Level 3 (based on v1.02) and NIST 800-171 controls mapping that DAtAnchor. This guide will be your key to success in achieving CMMC compliance with Anchor.

Anchor Security Architecture For CMMC

This brief introduction to the basic CMMC requirements provides examples of IT infrastructures and how Achor fits in each. We provide a detailed mapping exercise illustrating the domains and subdomains covered by the Anchor platform.

Learn How NIST Supports Manufacturers

The integration of physical production and digital technologies has forever transformed the factory floor, but small manufacturers have often failed to protect their investments in these new technologies with a comparable investment in cybersecurity. 

Find out how your company can use crypto-technology that allows security to travel with the data versus within the confines of our network.

With Datanchor, users can collaborate and share sensitive files anywhere, without an organization sacrificing control of their data security. Contact us to see how.