By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    Ukraine approves second sanctions package targeting Russian nuclear industry
    23 February 2023
    SEC Climate Disclosure Rules Finally Come Out; Scope 3 Emissions Reporting Not Required
    11 March 2024
    Bank of America’s Corporate Culture Crisis: A Study in Failure
    19 September 2024
    Latest News
    Fractured & Fraught — but Still Potentially Profitable: The State of ESG in 2025
    7 November 2025
    UK AML Reform in 2025: A Public Recalibration of Risk and Responsibility
    1 November 2025
    US National Security Compliance Risk & Readiness Report
    26 October 2025
    What Would a Farage Government Mean for Compliance?
    20 October 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack
    26 June 2024
    Critical Flaws in CocoaPods Expose iOS and macOS Apps to Supply Chain Attacks
    1 July 2024
    New APT Group “CloudSorcerer” Targets Russian Government Entities
    8 July 2024
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    Chucky Has Been Cancelled, But Don Mancini Says ‘He’ll Be Back’
    28 September 2024
    I got scammed on Upwork so you don’t have to
    7 October 2024
    New York Comic Con 2024: What to Expect if You’re a TV, Movie or Anime Fan
    17 October 2024
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    Missing Chinese banker was working to set up Singapore family office
    22 February 2023
    European countries step up delivery of tanks to Ukraine
    23 February 2023
    Borealis Foods to Go Public via Merger with Oxus Acquisition Corp
    24 February 2023
    Latest News
    Microvast Holdings earnings beat by $0.02, revenue topped estimates
    11 November 2025
    Client Challenge
    10 November 2025
    Peter Thiel warns if you ‘proletarianize the young people,’ don’t be surprised they end up communist
    9 November 2025
    US Supreme Court lets Trump withhold $4 billion in food aid funding for now
    8 November 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    What’s Holding You Back? Cyber Security Today Weekend Special
    30 November 2024
    Cybercrime News For Dec. 10, 2024. North Korean Hackers Blamed for $50M Exploit. WCYB Digital Radio.
    11 December 2024
    Cybercrime News For Dec. 19, 2024. LastPass Breach Leads to $12M Crypto Theft. WCYB Digital Radio.
    20 December 2024
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: Does Attorney-Client Privilege Survive When AI Listens?
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > Compliance > Does Attorney-Client Privilege Survive When AI Listens?
Compliance

Does Attorney-Client Privilege Survive When AI Listens?

webmaster
Last updated: 2025/09/26 at 4:20 PM
webmaster
Share
10 Min Read
SHARE

ZwillGen’s Andrew Eichen examines how workplace email and social media precedents might guide judges facing novel legal questions that arise when AI joins the chat. Hint, the answer may hinge on whether AI systems can be considered independent entities or simply sophisticated algorithms. 

Your AI assistant just listened in on your strategy session with outside counsel and took notes. Is the discussion still privileged?

Contents
Privilege in the age of AI Flying Blind on AI: The New Normal for Compliance Teams Expectation of confidentialityConclusion and recommendations

As businesses increasingly incorporate AI into their workflows, many are facing questions about the implications of these tools for attorney-client privilege. While certainly useful for completing a range of tasks, AI features also introduce a potential third party into otherwise confidential communications.

Does attorney-client privilege survive when an AI is in the room? 

Privilege in the age of AI

Attorney-client privilege, an age-old facet of the legal system, protects confidential communications between lawyers and their clients. For the privilege to attach, four elements must be met. There must be (1) a communication (2) made in confidence (3) between privileged persons (i.e., attorney or client) (4) for the purpose of obtaining or providing legal advice. 

When upheld, privilege can prevent the discovery of sensitive conversations in a lawsuit. This protection, however, is not bulletproof and may be waived in some circumstances. One of the most common ways privilege can be lost is if the confidential communication is voluntarily disclosed to a third party outside the attorney-client relationship. 

Today, companies might consider using AI tools to process an assortment of privileged material. Project teams may want to use AI notetakers to summarize privileged meetings. Executives might feed attorney emails into large language models to distill guidance. Companies have even been known to upload confidential documents to chatbots for Q&A. 

Each of these scenarios has the potential to destroy privilege for two reasons. First, they place a third party — the AI provider — in possession of client information. Second, AI systems are typically trained in part on the inputs they receive from users. Because models may reproduce information from their training data when responding to other users, there is a risk that privileged communications used to train these systems might be exposed to the public.

How courts will approach the issue of AI and privilege remains an open question that no American body has yet addressed. Standing legal principles, however, provide a roadmap to anticipate how judges might approach these questions.

flying blind concept moody balloon drawing

Compliance

Flying Blind on AI: The New Normal for Compliance Teams

by Jennifer L. Gaskin
July 1, 2025

Read moreDetails

var jnews_module_65126_0_68d59f4cb0d08 = {“header_icon”:””,”first_title”:””,”second_title”:””,”url”:””,”header_type”:”heading_6″,”header_background”:””,”header_secondary_background”:””,”header_text_color”:””,”header_line_color”:””,”header_accent_color”:””,”header_filter_category”:””,”header_filter_author”:””,”header_filter_tag”:””,”header_filter_cpt_ctl-stories”:””,”header_filter_cpt_wpm-testimonial-category”:””,”header_filter_text”:”All”,”sticky_post”:false,”post_type”:”post”,”content_type”:”all”,”sponsor”:false,”number_post”:”1″,”post_offset”:0,”unique_content”:”disable”,”include_post”:”64505″,”included_only”:”true”,”exclude_post”:””,”include_category”:””,”exclude_category”:””,”include_author”:””,”include_tag”:””,”exclude_tag”:””,”ctl-stories”:””,”wpm-testimonial-category”:””,”sort_by”:”latest”,”date_format”:”default”,”date_format_custom”:”Y\/m\/d”,”excerpt_length”:””,”excerpt_ellipsis”:””,”force_normal_image_load”:””,”main_custom_image_size”:”default”,”pagination_mode”:”disable”,”pagination_nextprev_showtext”:””,”pagination_number_post”:4,”pagination_scroll_limit”:0,”ads_type”:”disable”,”ads_position”:1,”ads_random”:””,”ads_image”:””,”ads_image_tablet”:””,”ads_image_phone”:””,”ads_image_link”:””,”ads_image_alt”:””,”ads_image_new_tab”:””,”google_publisher_id”:””,”google_slot_id”:””,”google_desktop”:”auto”,”google_tab”:”auto”,”google_phone”:”auto”,”content”:””,”ads_bottom_text”:””,”el_id”:””,”el_class”:””,”scheme”:””,”column_width”:”auto”,”title_color”:””,”accent_color”:””,”alt_color”:””,”excerpt_color”:””,”block_background”:””,”css”:””,”paged”:1,”column_class”:”jeg_col_3o3″,”class”:”jnews_block_12″};

Expectation of confidentiality

Privilege requires, among other things, that the client intends the communication to remain confidential. Disclosure of privileged material to a third party typically waives the protection because it suggests an indifference to this secrecy. Thus, one possibility is that courts will analyze whether parties had a reasonable expectation of confidentiality when sharing information with an AI system. 

The most analogous line of cases involves employees who used workplace email systems to communicate with personal attorneys. Like users inputting confidential information into an AI system, employees communicating over company email entrust sensitive information to a system where a third party has direct access. As one court noted, sending a message over a company’s email system is “like placing a copy of that message in the company files. … the emails [can] be reviewed and read by anyone with lawful access to the system.” 

In these cases, courts have found that the reasonableness of the privacy expectation depends on the company’s email monitoring policy and the extent to which employees are made aware of it. (See Holmes v. Petrovich Dev. Co.) If an employee has previously agreed to workplace policies that allow employers to access their emails, then no privilege attaches.

While not an attorney-client privilege case, McMillen v. Hummingbird Speedway, Inc. is also instructive. There, the court rejected a claim of confidentiality over social media communications after examining Facebook and MySpace’s terms of service. The court found that both platforms’ terms granted operators access to user content and broad rights to monitor and disclose communications. Because users on these platforms “understand[] and tacitly submit[] to the possibility that … site operators will also be receiving his or her messages,” the court held there was no reasonable expectation of privacy. 

In the case of AI systems, the analysis might similarly focus on whether users can expect their communications to remain private when processed by a particular model. Here, too, the answer would likely turn on the terms of service. If the provider represents that it logs inputs and outputs and retains the right to access them, privilege would likely be waived. The same would likely apply if the terms reserve the right to use inputs for model training or improvement as a model may inadvertently reproduce the information when responding to other users.

An interesting wrinkle is whether courts might view AI systems themselves as independent entities capable of “knowing” information separately from their operators. Consider a company that contracts with a provider to train a private instance of a model on privileged communications. The provider represents that the data will be encrypted and inaccessible by its employees, and the company ensures internal access to the model is heavily restricted. In essence, no privileged material will be shared with any human outside the attorney-client relationship. Yet the AI itself has still “learned” from the privileged content. 

It exists on third-party servers with the attorney-client communications absorbed into its neural networks. Does privilege survive when an AI system “knows” privileged information, even if no human third party can access it? Will courts recognize that AIs are simply algorithms like any other system? Or will there come a point where AI becomes so advanced that courts lose sight of the fact that beneath the surface lies only mathematics and code? Though such considerations are unlikely to impact privilege disputes today, it’s only a matter of time before they land on a judge’s docket.

Conclusion and recommendations

Ultimately, privilege is decided on a case-by-case basis, and the exact contours of its application differ by jurisdiction. It is thus difficult to predict how a court would assess the implications of AI use, particularly given the novel nature of the technology.

Considering the uncertainty, the most prudent approach to avoid disclosure is simply to keep privileged communications away from AI tools altogether. For example, it’s probably best to turn off AI summarization tools in Zoom or similar video conferencing apps for confidential conversations.

If you do continue using these tools with privileged material, consider taking the following measures:

  • Review provider terms: Always review the terms of service before sharing anything privileged with an AI system. Ensure the provider makes explicit representations that inputs/outputs will not be used for training purposes and access to the data will be limited. Some enterprise agreements provide for more robust confidentiality provisions.
  • Disable risky features: Turn off conversation history and opt out of contributing to model improvements.
  • Treat AI outputs as privileged: Handle AI-generated summaries with the same care as any other privileged communication. If AI outputs based on privileged communication are uploaded to cloud storage, restrict access to specific employees with a need to know the legal advice. Never share these outputs with third parties.
  • Review sharing settings: If using a video conferencing app, check your system’s configuration to ensure summaries are not automatically distributed widely within the organization.
  • Implement clear policies: Establish organizational guidelines that clarify if and when AI tools may be used in privileged contexts and prohibit employees from using AI through their personal accounts.

Until courts provide clearer guidance, organizations should proceed with caution when using AI with privileged communication. While convenient, the utility of these systems rarely justifies the risk of disclosure.

The post Does Attorney-Client Privilege Survive When AI Listens? appeared first on Corporate Compliance Insights.

You Might Also Like

Fractured & Fraught — but Still Potentially Profitable: The State of ESG in 2025

UK AML Reform in 2025: A Public Recalibration of Risk and Responsibility

US National Security Compliance Risk & Readiness Report

What Would a Farage Government Mean for Compliance?

The Futurist’s Paradox: Advanced Technology, Age-Old Compliance Challenges

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article Partnering with AARP to help keep older adults safe online
Next Article Using AI to Check For Security Vulnerabilities Across Your Code Base | by Teri Radichel | Cloud Security | Sep, 2025
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

SessionReaper (CVE-2025-54236) Exploited in Adobe Commerce
VERACODE 11 November 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 11 November 2025
Microvast Holdings earnings beat by $0.02, revenue topped estimates
Businness 11 November 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 11 November 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?