Legal Prompting - Professional secrecy and AI infrastructure
S01:E08

Legal Prompting - Professional secrecy and AI infrastructure

Episode description

When a legal professional uses an AI system to handle information covered by professional secrecy, choosing the infrastructure is a deontological decision, not just a technical one. No well-written prompt can compensate for inadequate infrastructure.

In this episode:

  • Three concrete applications: confidential files, advice on special-category data, opinions on extraordinary transactions and criminal proceedings
  • Three operational rules: classify before prompting, document the choice, favor abstraction
  • References to Italian Law 132/2025, the AI Act and the implications of extra-EU data transfers

Weekly insights at nicfab.eu.

Download transcript (.vtt)
0:00

Welcome back to Legal Prompting, I'm Nicola Fabiano and this is episode 8.

0:06

In the previous episode, we saw how to integrate legal prompting into corporate compliance workflows

0:13

with structured processes, governance and traceability.

0:18

Today we tackle a topic that underpins everything,

0:22

professional secrecy and the choice of AI infrastructure.

0:27

The principle is simple but often underestimated.

0:32

When a lawyer, a legal consultant or a DPO enters information covered by professional secrecy into an AI system,

0:41

they are making a deontological choice, not just a technical one.

0:46

The infrastructure on which the model runs, the place where the data is processed,

0:52

the parties who can access it, the contractual guarantees in place, the applicable jurisdiction,

1:00

all of this is part of respecting that secrecy.

1:05

No well-written prompt can compensate for inadequate infrastructure.

1:10

Let's look at three concrete applications.

1:14

First application, analyzing a confidential file.

1:17

If I need to ask a model to summarize the documents of a dispute or to compare clauses of a contract covered by an NDA,

1:27

the first step is not writing the prompt.

1:30

It is verifying where that data will go, whether it will be used for training,

1:36

who will have access to the logs, how long it will be retained

1:40

and whether the provider offers guarantees compatible with the duty of confidentiality.

1:46

For highly sensitive data, a model run locally or on European infrastructure with a solid DPA

1:54

and explicit no training clauses is often the only coherent option.

2:01

Second application, privacy or health-related advice.

2:06

Special categories of data require reinforced caution.

2:10

Even when the use case appears generic,

2:14

a single identifying detail can turn the prompt into a processing of sensitive personal data.

2:21

The operational rule is preventative pseudonymization or, where possible, abstraction of the case.

2:29

If the provider does not offer adequate guarantees on extra EU transfers, sensitive data must not leave my perimeter.

2:38

Third application, drafting opinions on extraordinary transactions or criminal proceedings.

2:46

Here technical confidentiality is not enough.

2:49

One must consider the provider's jurisdiction, access requests from foreign authorities,

2:56

exposure to regulations such as the Cloud Act and the implications of Italian Law 132-2025

3:05

and the AI Act regarding infrastructure.

3:09

Three cross-cutting operational rules.

3:13

First rule, classify before prompting.

3:16

Every piece of information entering a model must be classified by confidentiality level.

3:23

Without classification there can be no informed choice of infrastructure

3:27

and every subsequent decision is blind.

3:31

Second rule, document the choice.

3:35

The client file must be able to show which tool was used, with what contractual guarantees,

3:42

on what legal basis and why that choice was proportional to the case.

3:48

Documentation protects the client and protects the professional.

3:52

Third rule, favor abstraction.

3:55

Where possible, replace identifying data with placeholders.

4:00

Work through categories and schemes.

4:03

Reconstruct the context only in your own mind.

4:07

The model helps you reason.

4:10

It does not need to know the identity of the persons involved.

4:14

Professional secrecy is not a constraint that limits the use of AI.

4:20

It is the framework that makes it legitimate.

4:23

Without this framework, every efficiency gain turns into a deontological and disciplinary risk

4:30

and every operational advantage becomes a latent liability.

4:36

In the next episode we will enter the heart of the AI Act,

4:40

which specific obligations fall on the legal professional,

4:44

how human oversight is articulated

4:47

and what transparency in the use of AI systems concretely means.

4:53

To explore these topics further

4:55

and receive weekly reflections on the relationship between law, privacy and technology,

5:03

I invite you to subscribe to the newsletter at nickfab.eu.

5:08

Thank you for listening!