Working with Hostile Providers: Notice of Departure

Working with Hostile Providers: Notice of Departure

When working with a hostile provider, we first recommend reading the instructions in this article.
If the relationship has sufficiently deteriorated, you may consider using this email template to help ensure a smoother transition.

Warning
Never mention the people or companies assisting in your migration.  Some hostile providers are known to attempt legal action against consultants who help law firms leave their product.

Email Template:


Dear [Name],
As you know, we have made the decision to leave your product.
Because of the history between our organizations, we do not trust your company to provide us with a complete, useable backup of our data in a timely manner.  As such, please be aware that we have contracted our IT provider to create a remote backup of our data.

I have been advised that your company may attempt to prohibit our departure and interrupt our backup by doing any of the following:
  1. Disabling the user accounts we use for backing up our data
  2. Blacklisting / blocking the IP address(es) that will make our backup
  3. Throttling our connection speed to your servers
Please be aware that should any of the above happen, we will interpret this as a deliberate, hostile action by your organization may:
  1. Report your actions to our state bar association
  2. Report your actions to various legal technology news outlets
  3. Pursue litigation against your organization for breach of contract, damages to our firm, and lost time
  4. Other actions as we feel appropriate

If your organization has any purported "automated" systems that may take any of the above actions, please ensure they are not in effect for our account.

Thank you for your cooperation.
    • Related Articles

    • Working with Hostile Providers

      Many providers to law firms treat their customers with honesty and integrity, however, occasionally you may encounter hostile / predatory providers. A hostile provider is one that will actively work to make it difficult for the client to leave. This ...
    • Working with Systems that Prevent Credential Sharing

      Some applications prevent credential sharing by disconnecting a user from all other locations when they sign in. When working with a system that does not allow login sharing, special care must be taken so that a user does not inadvertently log in and ...
    • Best Practices for Working as a Subcontractor

      The following is our guidance on how to handle situations where you are requested to subcontract to another organization. (Almost) Never Subcontract Sometimes an IT department or another consultant may want to hire you to perform work for them ...
    • Working With Historic Users

      To Preserve or Merge? When a client moves into their new system, what do they want to happen with data tied to former employees? Do they want to keep it and attribute it to the original user? Do they want to attribute it to another user? Or do they ...
    • Choosing the Right Location for a Migration Workstation

      When performing a migration, where the migration workstation is located has a drastic impact on ease of delivery. When to Use an On-Premise Migration Workstation If the client is using an application that stores document on a server, then you should ...