03.04 - Working with Hostile Providers - Notice of Departure
If the relationship has sufficiently deteriorated, you may consider using this email template to help ensure a smoother transition.
Never mention the people or companies assisting in your migration. Some hostile providers are known to attempt legal action against consultants who help law firms leave their product.
Email Template:
Dear [Name],
As you know, we have made the decision to leave your product.
Because of the history between our organizations, we do not trust your company to provide us with a complete, useable backup of our data in a timely manner. As such, please be aware that we have contracted our IT provider to create a remote backup of our data.
I have been advised that your company may attempt to prohibit our departure and interrupt our backup by doing any of the following:
- Disabling the user accounts we use for backing up our data
- Blacklisting / blocking the IP address(es) that will make our backup
- Throttling our connection speed to your servers
Please be aware that should any of the above happen, we will interpret this as a deliberate, hostile action by your organization may:
- Report your actions to our state bar association
- Report your actions to various legal technology news outlets
- Pursue litigation against your organization for breach of contract, damages to our firm, and lost time
- Other actions as we feel appropriate
If your organization has any purported "automated" systems that may take any of the above actions, please ensure they are not in effect for our account.
Thank you for your cooperation.
Related Articles
03.03 - Working with Hostile Providers
Many providers to law firms treat their customers with honesty and integrity, however, occasionally you may encounter hostile / predatory providers. A hostile provider is one that will actively work to make it difficult for the client to leave. This ...
07 - Special Topics: Migrating from Slow Providers
Universal Migrator's best practices are generally optimized around doing migrations as quickly as possible. This is the ideal scenario, however, sometimes providers implement restrictions that force data to move much slower than technically possible. ...
02 - Working With Historic Users
To Preserve or Merge? When a client moves into their new system, what do they want to happen with data tied to former employees? Do they want to keep it and attribute it to the original user? Do they want to attribute it to another user? Or do they ...
03 - Working with Client-Provided CSV Data
Sometimes firms will have a special CSVs that they may provide that will be used to tweak or adjust data in the backup. When you receive this data you should do the following: DO NOT import these CSVs directly into a Universal Migrator database. ...
03.02 - Working with Systems that Prevent Credential Sharing
Some applications prevent credential sharing through various methods. This article explains how to work through different methods: Two-Factor Work-Around Some systems require two-factor authentication. Without a work-around, this makes a migration ...