The Bspoke Legal Suite
Security and control applied during legal conversations — across voice and encrypted collaboration.
Different conversations create different obligations
Legal conversations create obligations — to clients, courts, regulators, and the firm itself.
Some require clarity around participation.
Some require control over who is together, who is not, and how the interaction unfolds.
Some require confidentiality that cannot be compromised.
These obligations are not mutually exclusive — but they are not addressed the same way.
The Bspoke Legal Suite allows firms to handle routine, sensitive, and highly sensitive conversations within a single environment — from standard calls to governed voice and end-to-end encrypted collaboration — applying additional controls only when they are needed.
Standard calls that will not trigger post-event scrutiny may be run on Bspoke Legal Basic without governed entry, verification, or system-generated participation records.
If you’re here for a specific type of conversation, jump to:
Governed voice: Security and control for voice conversations, with a defensible participation record.
Governed voice applies security and control to phone conversations — where participation and access must be handled deliberately – while preserving the familiarity of a phone call.
Instead of relying on hosts to remember who joined or explain what happened later, governed voice applies controls as the call unfolds, producing a system-generated record of participation.
Participation records are encrypted in transit and at rest, with retention governed by firm configuration. Records are available for review and export, subject to firm policy.
In governed voice, Bspoke enforces security through system controls, with AI administering access requirements and producing audit-ready participation records in real time.
Bspoke provides two governed voice applications, designed to support different types of legal proceedings.
Bspoke Legal Pro
Governed voice with defensible participation records.
It is designed for legal conversations where the firm must later be able to show who joined, under what conditions, and when — without relying on memory, notes, or reconstruction.
Entry requirements are enforced by the system; participation events are observed and recorded.
What Legal Pro controls
Legal Pro enforces how access is granted to the call:
- Participants must provide required identifying information before joining
- In Secure Rooms, the system verifies possession of the calling device via callback
- Join attempts that do not meet requirements are blocked and logged by the system
These controls are applied before a participant is allowed into the conversation.
What Legal Pro records
As the call unfolds, Legal Pro produces a system-generated record of participation events:
- When each participant joined and left
- When participants spoke
- Which room they were in
- How access was granted
How AI supports security and accountability
AI is used to:
- Administer entry requirements consistently
- Trigger verification steps based on room configuration
- Observe participation events and assemble a structured timeline of the call
AI ensures the record reflects what actually happened, as it occurred.
How firms deploy Legal Pro
Firms typically deploy Legal Pro to individual attorneys for client and matter-related calls where participation or attribution may later matter.
Attorneys rely on the familiarity and simplicity of phone calls.
The system ensures participation can be clearly shown if questioned later.
Bspoke Legal Center
Bspoke Legal Center applies governed entry and participation controls and adds orchestration for proceedings that must be actively managed with a defensible record of how the proceeding unfolded.
Legal Center supports proceedings that require multiple, purpose-specific spaces operating simultaneously, with the ability to bring participants into the proceeding deliberately and in the correct order.
It is designed for multi-party proceedings that must be run, not merely joined.
What Legal Center controls
Legal Center applies the same entry controls as Legal Pro, then adds orchestration controls during the proceeding:
- Multiple simultaneous rooms within a single proceeding
- Host-controlled movement of participants between rooms
- Waiting states and deliberate transitions between sessions
- Control over when participants are brought into joint sessions and when they are moved into private discussions
These controls allow facilitators to manage who is present, where, and when and who is interacting with whom throughout the proceeding.
What Legal Center records
As the proceeding unfolds, Legal Center produces a system-generated record of both participation and structure:
- When participants entered and exited the proceeding
- Which room each participant was in, and when
- When participants were moved between rooms
- When ·the proceeding moved between joint sessions, waiting states, and private discussions
This record reflects how the proceeding was conducted, as it happened — not how it was later reconstructed.
How AI supports security and accountability
AI is used to:
- Administer entry requirements consistently
- Observe participation and transitions between sessions and rooms
- Assemble a structured timeline of the proceeding
AI ensures the record accurately reflects participation and the facilitator’s actions, as they occur.
How firms deploy Legal Center
Legal Center is typically provisioned for a practice area or firm and managed by litigation support or practice operations.
Legal support teams manage orchestration and sequencing.
Attorneys participate in the proceeding without managing operational complexity.
This separation keeps proceedings structured without slowing attorneys down.
Bspoke Secure Spaces
Bspoke Secure Spaces provide end-to-end encrypted messaging, files, application sharing, voice, and video.
They are used when firms must ensure that content is protected by encryption, such that it cannot be accessed by anyone other than the intended participants — including the service provider. Where governed voice produces participation records, Secure Spaces allow firms to decide whether content exists at all.
Secure Spaces are powered by AWS Wickr.
What Secure Spaces control
Secure Spaces control who can participate in the conversation, and how content is protected.
- Only invited users can join a Secure Space
- Messages, files, and video are protected with end-to-end encryption
- Each Secure Space is separate from all others, with no shared access or visibility
These controls are enforced by the encryption model itself, not by policy or moderation.
What Secure Spaces retain
Secure Spaces allow firms to determine whether content exists at all after the conversation.
- Retention policies can be configured from urn-on-read to persistent
- Content can be set to expire automatically
- Persistent records can be retained when required
Retention is intentional and explicit — not assumed.
How administration works
Administration is limited to adding or removing participants; no administrative access to content exists.
- Users are invited and managed through Bspoke
- No access to message content is available through administration
How firms deploy Secure Spaces
Secure Spaces are used when firms require a communication model where content protection is enforced by encryption, rather than by access controls alone.
In some matters, Secure Spaces replace voice calls entirely — using encrypted messaging, video, or file exchange as the primary mode of communication.
In others, they are used alongside governed voice — allowing teams to conduct discussions by phone while keeping sensitive messages or documents confined to an encrypted space.
