Built for legal agencies — 14-day free trial

A client portal cert expiry on a law firm's matter-management subdomain is not just a downtime event.
It's an ABA Rule 1.6(c) confidentiality-duty exposure. State bars have brought disciplinary action on it.

Legal agencies building client portals, e-signature integrations, and encrypted-email gateways for law firms deal with cert expiry on the matter-management subdomain triggering ABA Model Rule 1.6(c) "competence" duty exposure under ABA Formal Opinions 477R (2017) and 483 (2018), DocuSign and Adobe Sign cert validation failures blocking the recipient from seeing the document and retroactively invalidating the signature on retainer agreements and closing docs, and encrypted-email gateway cert expiry on secure.firmname.com domains holding attorney-client privileged communications in escrow for 7+ days before the gateway drops the message. Merlonix monitors every law-firm-attached subdomain so the cert- expiry exposure surfaces 30 days before the failure window opens.

No credit card for the trial. Cancel any time.

Check cadence (Agency)
5 min
SSL pre-expiry alert
30 days
Independent DNS resolvers
3
Vendors watched
11

Where legal agencies get caught out

Three failure modes where SSL expiry creates regulatory and professional-responsibility exposure for law firms — and contractual liability for the agency operating the infrastructure under a cybersecurity SLA.

Legal agencies operating client portals, e-signature integrations, and encrypted-email gateways for law firms deal with cert expiry on matter-management subdomains triggering ABA Model Rule 1.6(c) confidentiality duty exposure (and analogues in CA, NY, and most state bars), DocuSign and Adobe Sign cert validation failures that retroactively invalidate signatures on closing documents and retainer agreements through the platform's permanent audit-trail attestation, and encrypted-email gateway cert expiry that holds attorney-client privileged communications in M365 or Google Workspace queues for 5-7 days before the gateway drops the message entirely.

ABA Model Rule 1.6(c) imposes a duty to "make reasonable efforts to prevent the inadvertent or unauthorized disclosure of" client information. ABA Formal Opinions 477R (2017) and 483 (2018) interpret this as requiring reasonable cybersecurity practices including encryption-in-transit. State bar rules — Cal. Rules of Prof'l Conduct 1.6, NYSBA Op. 1019, and analogous rules in most jurisdictions — adopt this standard. When a client portal's cert expires and a client clicks through the browser warning to submit case details, the firm has potentially breached this duty. The agency operating the portal on behalf of the firm is contractually exposed under the engagement's SLA and indemnity clauses. State bar disciplinary action has been brought in CA and NY under analogous rules; the duty is not theoretical

A legal agency builds and operates a client portal for a mid-sized litigation firm. The portal handles intake forms, document uploads, retainer signing, and matter-status updates — all touching client-confidential information. The cert on the matter-management subdomain (matters.firmname.com) is provisioned via Let's Encrypt with a 90-day cert. The agency's renewal automation was set up at the start of the engagement; the engineer who set it up has since moved to a different agency. The renewal automation fails silently when an upstream platform credential rotates. The cert expires; clients log in, see the browser warning, click through (modern browsers make this very easy), and submit case details over an unencrypted connection. The firm's general counsel discovers it three days later when a partner forwards a screenshot from a client's phone

A legal agency operates a matter-management portal at matters.bigfirmname.com for a 120-attorney litigation firm. The portal handles client intake (PII, case summary, conflict-check data), document uploads (privileged documents, expert reports, settlement drafts), retainer execution (DocuSign-integrated), and ongoing matter-status updates. The technical stack is a standard Node.js + Postgres deployment on a cloud platform with Let's Encrypt SSL via the platform's automated provisioning. The original agency engineer set up the LE renewal automation at the start of the engagement two years ago. The original engineer left the agency to join a competitor six months ago. The cloud platform's renewal API credential rotated last month as part of a security upgrade; the agency's renewal automation depends on that credential and silently fails when it's no longer valid. The previous cert is still valid for another 30 days; the renewal failure doesn't cause a visible event. 30 days later, the cert expires. Clients hit the portal Monday morning and see the browser's "this site is not secure" warning. Most click through (modern Chrome and Safari make this a one-click bypass for non-HSTS sites). They submit intake forms, upload privileged documents, and engage with matter-status updates over an unencrypted connection. The firm's general counsel is alerted Wednesday afternoon when a partner forwards a screenshot from a client's phone showing the browser warning. The GC immediately calls the agency for an explanation. The agency engineer investigates — the LE renewal credential is stale; the cert has been expired for three days; an estimated 200+ client sessions have submitted privileged data over the unencrypted window. The firm's GC engages outside counsel; outside counsel advises that the duty under ABA Rule 1.6(c) (and its CA Rule of Prof'l Conduct 1.6 analogue) has potentially been breached and the firm must consider self-reporting to the state bar plus client notification under the engagement contract's breach-notification clause. The agency's engagement contract includes a cybersecurity SLA and indemnity for cert-management failures; the agency's E&O policy is triggered. Total cost to the agency: legal fees defending the SLA claim, potential E&O premium increase, plus reputation exposure with the firm's referral network of similarly-sized litigation firms.

DocuSign and Adobe Sign integrations rely on the recipient's email client and the recipient's browser successfully negotiating SSL with the signing URL. Strict email clients (Outlook with strict cert policy enforcement, Apple Mail with Gatekeeper) reject the cert and the recipient never sees the document. Some integrations validate the cert chain at signature time and treat an invalid chain as an integrity failure — the signature is recorded but flagged as "signed under an invalid cert chain." Retainer agreements, NDAs, and real estate closing docs signed during the cert-expiry window may need to be re-executed, and the firm has to explain to the client why the original signature doesn't hold. Worse for the agency: the e-signature platform's audit trail records the SSL state at signature time, making the failure permanent and discoverable in litigation

A legal agency operates a real-estate closing platform that integrates DocuSign for closing-document execution. During a four-day cert expiry window on the signing URL (signing.realestatefirm.com), 47 closings are executed with DocuSign signatures recorded but flagged as "signed under an invalid cert chain" in DocuSign's audit trail. The flag is buried in the closing certificate's technical attestation section that nobody reads at the closing itself. Three months later, one of the closing documents is challenged in a property dispute; the audit trail surfaces the SSL flag; the entire closing is potentially voidable

A legal agency builds and operates a real-estate closing platform used by a network of 80+ small real-estate firms across three states. The platform integrates DocuSign for closing-document execution (deeds, mortgages, title-insurance docs). The signing URL is signing.realestateplatform.com. The cert on this domain is provisioned via the agency's cloud platform's automated SSL with Let's Encrypt. The cert renewal fails during a platform incident (the LE issuance API was degraded for 48 hours and the agency's automation didn't retry after the degradation ended). The previous cert expires three weeks later. Closings continue executing because recipients receive the DocuSign email, click through the browser warning to sign (real-estate closings are time-pressured and signers don't pause for browser warnings), and DocuSign successfully completes the signature flow. But DocuSign's audit trail records the SSL state of the signing URL at signature time. The audit-trail entry for each signature in the cert-expiry window includes a "TLS chain integrity: FAILED" attestation in the technical-details section of the closing certificate. The audit-trail metadata is generated automatically and the agency engineers don't see it during normal operations. The cert is eventually renewed when the agency engineer notices a customer-support ticket asking about the warning. By that point, 47 closings have executed with the SSL flag. Three months later, one of the closings is challenged in a property dispute — the buyers allege the sale documents weren't properly executed. The plaintiff's discovery request includes the DocuSign closing certificate. The certificate's technical-details section shows the "TLS chain integrity: FAILED" flag. The plaintiff's motion argues that the signature was not validly executed under the platform's own integrity attestation. The court may treat the signature as insufficient for the formality requirements of the deed; the closing is potentially voidable. The agency's engagement contract with the real-estate firm includes cybersecurity SLAs and indemnity for e-signature platform failures; the indemnity is triggered. The remediation requires re-executing the closing with new signatures from all parties (signers may have died, moved, or refused to re-execute) — a multi-month operational scramble plus six-figure legal fees defending the SLA claim and potential E&O premium increase across the agency's entire real-estate-vertical portfolio.

Encrypted email gateways (Mimecast, Virtru, Egress, Zix) operate on a custom domain (e.g., secure.firmname.com) that hosts the encryption + decryption flow for recipients without their own decryption key. When the gateway's cert expires, the gateway returns a TLS error to the sending firm's mail server. The sending mail server treats the failed delivery as a transient error and queues the message in the outbound queue for 7 days (Microsoft 365 default) or 5 days (Google Workspace default) before bouncing. The recipient receives no notice that an encrypted email was attempted; the sending firm receives a delivery-failure notification only after the queue timeout. Attorney-client privileged communications never reach the client. Under most state bar rules, failing to deliver a privileged communication during an active engagement is a competence-rule violation under ABA Rule 1.1 (and analogues)

A legal agency operates the encrypted-email gateway secure.boutiquefirm.com for a 25-attorney boutique firm. The gateway's cert expires; outbound encrypted emails fail TLS negotiation; M365 queues them for 7 days before bouncing. During the 7-day window, 23 privileged communications never reach clients. Discovery happens when an associate notices a client hasn't responded to a settlement offer email — the queue timeout has fired and the email bounced. The associate looks for the bounce, finds 22 more. Outside counsel advises that ABA Rule 1.1 competence duty and Rule 1.3 diligence duty have potentially been breached; the firm must notify affected clients and may need to re-send communications. Some settlement deadlines have passed because the original email never arrived

A legal agency operates the encrypted-email gateway secure.boutiqueimmigrationfirm.com for a 25-attorney boutique immigration firm. The gateway uses a third-party encrypted-email platform (Mimecast, Virtru, or Egress — the agency selected one at engagement start) hosted on the agency's infrastructure with a custom domain pointed at the platform's relay. The cert on secure.boutiqueimmigrationfirm.com is provisioned via Let's Encrypt with the standard 90-day cycle. The renewal automation fails because of a CAA-record misconfiguration introduced by an unrelated DNS cleanup project the agency ran two months ago — the firm's CAA record was tightened to only include the commercial CA the firm uses for its main domain, and Let's Encrypt was inadvertently removed. The gateway cert expires. The firm's M365 mail server attempts to deliver encrypted emails through the gateway; the gateway returns a TLS handshake error because the cert is expired; the M365 SMTP delivery agent treats the failed TLS as a transient delivery error and queues the message in the outbound queue. M365's default queue timeout is 7 days. During the 7-day window, 23 outbound privileged emails are queued. The sending attorneys see the emails in their Sent folder (M365 marks them as sent into the queue), so they assume delivery. Clients never receive the emails. Discovery happens when a senior associate notices that a client hasn't responded to a settlement offer that was time-sensitive (a 14-day window for accepting a USCIS Notice of Intent to Deny). The associate emails the client a follow-up; the follow-up bounces because the queue has just timed out. The associate digs into M365's admin center, finds the queue, sees 22 other queued messages, and surfaces the failure to the partner. Outside counsel advises that ABA Rule 1.1 competence duty (failure to maintain the technological skill to deliver privileged communications) and Rule 1.3 diligence duty (failure to act with reasonable diligence in client representation) have potentially been breached for any client whose communication was delayed during the window. Two of the 23 queued emails were time-critical filing notices; the filing deadlines have passed. The firm must notify affected clients, may need to file motions for extension based on the gateway failure, and faces potential malpractice exposure for any deadline that was missed. The agency's engagement contract with the firm includes cybersecurity SLAs and indemnity for encrypted-email gateway failures; the indemnity is triggered. The agency's E&O policy is triggered. Reputation exposure with the firm and the firm's peer network of boutique-immigration firms is significant.

How it works

SSL and DNS monitoring for legal agencies across matter-management portals (ABA Rule 1.6 confidentiality exposure), e-signature platform integrations (formal-execution exposure through audit-trail SSL attestations), and encrypted-email gateway subdomains (ABA Rule 1.1 competence and Rule 1.3 diligence exposure for delayed privileged communications).

Merlonix monitors SSL expiry and DNS integrity across every law-firm-attached subdomain — matters.* (matter-management portal), secure.* (encrypted-email gateway), signing.* (e-signature relay), intake.* (client intake form), and the firm's primary domain — and catches cert expiry on regulated subdomains before clients can click through a browser warning and trigger the firm's ABA Rule 1.6(c) duty exposure, before the e-signature platform records an SSL-failure attestation in the audit trail of an executed closing document, and before the M365 or Google Workspace queue times out on a privileged email and the gateway drops the message. Each regulated subdomain gets independent monitoring because each one carries independent professional- responsibility exposure.

01

Add every law-firm-attached subdomain — matters.*, secure.*, signing.*, intake.*, plus the firm's primary marketing domain — with DNS TXT verification that catches cert expiry on regulated infrastructure 30 days before clients can click through a browser warning

Verify ownership with a DNS TXT record on the apex domain. All subdomains under that apex — matters.* (matter-management portal), secure.* (encrypted-email gateway), signing.* (DocuSign/Adobe Sign relay), intake.* (client intake forms), apex (firm marketing site) — are added without additional verification. Monitoring every law-firm-attached subdomain catches cert expiry on the regulated subdomains (matter-management, e-signature, encrypted-email) 30 days before the failure window opens — well before any client can click through a browser warning and trigger the ABA Rule 1.6(c) exposure, and well before any e-signature platform records an "SSL chain integrity: FAILED" attestation in the closing certificate's audit trail. Under two minutes per firm.

02

CNAME and CAA monitoring across registrar nameserver changes, DNS cleanup projects, and platform credential rotations — surfacing the CAA-record tightening that silently breaks Let's Encrypt renewal on encrypted-email gateway subdomains

Three independent DNS resolvers check every CNAME and CAA record on every monitoring interval. When a CAA record is tightened (e.g., a DNS cleanup project pins CAA to a commercial CA and inadvertently removes letsencrypt.org), the change is detected in the first check cycle — well before the affected subdomain's next 90-day cert renewal attempts to issue against the now-pinned CA list and silently fails. The Let's Encrypt renewal pattern depends on the CAA record; the agency's automation depends on the renewal; the firm's ABA Rule 1.6(c) compliance depends on the cert. Each layer of the dependency is monitored independently so a CAA tightening from an unrelated DNS project doesn't silently break the agency's SLA two months later.

03

SSL monitoring 30 days before expiry across matter-management portals, e-signature integration URLs, and encrypted-email gateway subdomains — independent per-subdomain checks because each one has independent professional-responsibility exposure

Full SSL chain validation on every law-firm-attached subdomain — matters.*, signing.*, secure.*, intake.*. Independent checks per-subdomain catch cert expiry 30 days before the failure window opens — enough time to renew the cert, validate the new cert serves correctly, and confirm the e-signature platform's integrity attestation will record the new cert correctly at signature time. The three regulated subdomains each have independent exposure under different ABA rules (1.6(c) confidentiality on matters.*, 1.1 competence on secure.*, formal-execution requirements on signing.*) so each one gets its own pre-expiry alert and its own renewal verification.

04

Vendor status for Let's Encrypt, DocuSign, Adobe Sign, Mimecast, Virtru, Egress, M365, and Google Workspace to distinguish vendor-side incidents from per-firm SSL configuration failures

Merlonix monitors the e-signature platforms (DocuSign, Adobe Sign) and encrypted-email gateways (Mimecast, Virtru, Egress, Zix) alongside the firm's cert state — so when DocuSign has a platform-wide outage, you see the vendor event clearly rather than spending an hour investigating whether the firm's signing.* subdomain has a cert problem. M365 and Google Workspace status are monitored too because outbound encrypted-email queue timeouts depend on the sending mail server's availability; when M365 has a queue-handling incident, that's relevant to whether the encrypted-email gateway's cert state is the failure root cause or downstream noise.

What the numbers mean for legal agencies

Monitoring built for legal agencies where one client portfolio means a law firm's matter-management portal (ABA Rule 1.6(c) confidentiality exposure), e-signature integration relay (formal-execution exposure through permanent audit-trail SSL attestations), encrypted-email gateway (ABA Rule 1.1 competence + Rule 1.3 diligence exposure for delayed privileged communications), and client intake form — each with independent regulatory implications when a cert silently expires.

Legal agencies operating client-facing tech for law firms need monitoring that recognizes each regulated subdomain has independent professional-responsibility exposure — because a matter-management portal cert expiry is silent (clients click through the browser warning and submit privileged data over an unencrypted connection), an e-signature integration cert failure is silent and permanent (the platform's audit trail records the SSL-failure attestation at signature time and the flag is discoverable in litigation years later), and an encrypted-email gateway cert expiry is silent (M365 or Google Workspace queues the privileged email for 5-7 days before bouncing, and the sending attorney sees the email in their Sent folder and assumes delivery).

< 10 min

Time from DNS change to alert — catches CAA-record tightening introduced by DNS cleanup projects that silently break Let&apos;s Encrypt renewal on encrypted-email gateway subdomains 60+ days before the next renewal cycle, plus registrar nameserver changes and CNAME modifications on matter-management portals and e-signature relays

30 days

SSL expiry warning lead time — enough time to renew the cert, validate the new cert serves correctly across mobile and desktop browsers (where clients will hit the matter-management portal), and confirm the e-signature platform&apos;s integrity attestation will record the new cert correctly at signature time. 30 days is the audit-trail-safe lead time for a regulated subdomain

11 vendors

Upstream services monitored — DocuSign, Adobe Sign, Mimecast, Virtru, Egress, Zix, Microsoft 365, Google Workspace, Let&apos;s Encrypt, and the cloud platforms the firm&apos;s infrastructure runs on. Distinguishes a vendor-side incident from a per-firm SSL configuration failure

200 assets

Maximum monitored domains on the Agency plan — covers a full legal-vertical portfolio: 30+ firms each with matters.*, secure.*, signing.*, intake.*, and apex subdomains. Multi-state firms with separate subdomains per jurisdiction (matters.ca.firmname.com, matters.ny.firmname.com) are absorbed without per-domain fees

Pricing

Flat monthly fee. Every law-firm-attached subdomain, every e-signature relay, every encrypted-email gateway included.

No per-firm charges. No per-subdomain fees. Pick the tier that fits your legal-vertical portfolio and monitor every regulated subdomain (matters.*, secure.*, signing.*, intake.*) under each firm's apex without billing surprises.

See full feature comparison →

Starter

For solo developers or two-person agencies operating a single law-firm client portfolio with a matter-management portal, e-signature integration, and encrypted-email gateway under one apex domain.

$29/ month

  • 10 monitored assets
  • 1 seat
  • 15-min check cadence
  • SSL + DNS + vendor monitoring
  • Email + Slack alerts
Most chosen

Team

For legal agencies managing 5-10 law firm clients with separate matters.*, secure.*, signing.*, and intake.* subdomains per firm, plus the firm&apos;s primary marketing domain.

$79/ month

  • 50 monitored assets
  • 5 seats
  • 10-min check cadence
  • SSL + DNS + vendor monitoring
  • Email + Slack alerts

Agency

For agencies with a full legal-vertical client roster including multi-jurisdiction firms with separate subdomains per state (matters.ca.firmname.com, matters.ny.firmname.com), real-estate closing platforms with high-volume DocuSign integration, and encrypted-email gateways across boutique-immigration and litigation firms.

$199/ month

  • 200 monitored assets
  • 15 seats
  • 5-min check cadence
  • SSL + DNS + vendor monitoring
  • Email + Slack alerts

Know when matters.firmname.com is approaching cert expiry — 30 days before clients can click through the browser warning and submit privileged data over an unencrypted connection.

Add your first law-firm client subdomain in under two minutes. Matter-management portals, e-signature integration relays, encrypted-email gateways, and client intake forms across every firm in your portfolio are monitored from the same dashboard. 14-day trial, no card required.