Confidentiality issues of email. 3.2.1 Internet email could result in breaches of confidentiality e.g. any email may theoretically be intercepted, read, manipulated or corrupted at any point along its journey. Unless you specifically write to tell us otherwise e.g. on a particular piece of work or in respect of particular types of information, we shall assume that you are content for email to be used in respect of any matters where we act for you.
Appears in 2 contracts
Samples: www.summitlawllp.co.uk, www.summitlawllp.co.uk
Confidentiality issues of email. 3.2.1 Internet email could result in breaches of confidentiality e.g. any email may theoretically be intercepted, read, manipulated manipulated, or corrupted at any point along its journey. Unless you specifically write to tell us otherwise e.g. on a particular piece of work or in respect of particular types of information, we shall assume that you are content for email to be used in respect of any matters where we act for you.
Appears in 2 contracts
Samples: www.summitlawllp.co.uk, www.summitlawllp.co.uk