REMOTE WORK SECURITY POLICY
TABLE OF CONTENTS
- Policy Overview
- Scope and Applicability
- Definitions
- Roles and Responsibilities
- Device Security
- Network Security
- Access Control and Authentication
- Data Protection
- Physical Security
- Communication Security
- Incident Response
- BYOD (Bring Your Own Device)
- Third-Party and Cloud Services
- Monitoring and Compliance
- Training Requirements
- Violations and Enforcement
- Policy Administration
- Acknowledgment
1. POLICY OVERVIEW
1.1 Purpose
This Remote Work Security Policy (the "Policy") establishes the cybersecurity requirements and controls that all remote workers must follow to protect [Company Name] (the "Company") information assets, systems, and data when working outside of Company premises.
1.2 Objectives
This Policy is designed to:
☐ Protect Company systems and data from unauthorized access, disclosure, or destruction
☐ Ensure secure remote access to Company resources
☐ Comply with regulatory requirements and industry standards
☐ Maintain business continuity and operational security
☐ Establish clear expectations for remote worker security responsibilities
1.3 Regulatory Framework
This Policy is aligned with:
☐ NIST Special Publication 800-46 Rev 2 (Enterprise Telework Security)
☐ NIST Cybersecurity Framework 2.0
☐ NIST SP 800-171 (Protecting CUI) - if applicable
☐ [Industry-specific standards: HIPAA, PCI-DSS, SOC 2, CMMC, etc.]
☐ Applicable federal, state, and international data protection laws
1.4 Effective Date
This Policy is effective as of [Effective Date].
2. SCOPE AND APPLICABILITY
2.1 Scope
This Policy applies to:
☐ All employees working remotely (full-time, hybrid, or temporary)
☐ Contractors and consultants with remote access privileges
☐ Third-party vendors accessing Company systems remotely
☐ Any individual using Company equipment or accessing Company data from outside Company premises
2.2 Covered Activities
This Policy governs:
☐ Remote access to Company networks, systems, and applications
☐ Use of Company-provided devices at remote locations
☐ Use of personal devices for Company work (where permitted)
☐ Handling of Company data outside Company premises
☐ Remote communications involving Company information
2.3 Geographic Scope
This Policy applies regardless of:
☐ The location from which remote work is performed
☐ The type of network used to connect
☐ Whether work is performed during or outside normal business hours
3. DEFINITIONS
"Authentication" means the process of verifying the identity of a user, device, or system.
"BYOD" means Bring Your Own Device, where employees use personal devices for work purposes.
"Company Data" means any information owned, created, processed, or stored by the Company, including confidential, proprietary, and personal information.
"Company-Managed Device" means hardware provided by the Company or managed under Company's mobile device management (MDM) solution.
"Confidential Information" means non-public information requiring protection, including trade secrets, financial data, customer information, and employee data.
"Endpoint" means any device that connects to Company networks, including laptops, desktops, tablets, and mobile phones.
"MFA" means Multi-Factor Authentication, requiring two or more verification factors.
"PII" means Personally Identifiable Information that can identify an individual.
"Remote Access" means the ability to access Company systems from outside Company premises.
"VPN" means Virtual Private Network, a secure encrypted connection to Company networks.
"Zero Trust" means a security model requiring verification of every user and device, regardless of location.
4. ROLES AND RESPONSIBILITIES
4.1 Remote Workers
All remote workers must:
☐ Comply with all provisions of this Policy
☐ Complete required security training before working remotely
☐ Maintain security of devices, credentials, and Company data
☐ Report security incidents immediately
☐ Keep software and security tools updated
☐ Cooperate with security audits and investigations
4.2 Managers
Managers of remote workers must:
☐ Ensure team members understand and comply with this Policy
☐ Approve remote access requests based on business need
☐ Monitor for security compliance issues
☐ Report suspected violations to IT Security
☐ Ensure security is addressed during onboarding/offboarding
4.3 IT Security Team
The IT Security Team is responsible for:
☐ Implementing and maintaining technical security controls
☐ Monitoring for security threats and incidents
☐ Responding to security incidents
☐ Providing security tools and support
☐ Conducting security assessments and audits
☐ Updating this Policy as threats evolve
4.4 Human Resources
Human Resources is responsible for:
☐ Ensuring security training is completed
☐ Coordinating security aspects of onboarding/offboarding
☐ Addressing Policy violations in coordination with IT Security
☐ Maintaining records of policy acknowledgments
5. DEVICE SECURITY
5.1 Approved Devices
Remote work shall be performed using:
☐ Company-Managed Devices (required for most roles)
☐ Approved BYOD Devices (where permitted per Section 12)
☐ NOT permitted: Shared, public, or unknown devices
5.2 Operating System Requirements
All devices must run:
☐ Supported operating system versions receiving security updates
☐ Windows: [Windows 10/11 or later, current security patches]
☐ macOS: [Current version minus one, current security patches]
☐ iOS: [Current version minus two]
☐ Android: [Version X or later with security patches within 90 days]
☐ Linux: [Approved distributions with current patches]
5.3 Required Security Software
All Company-managed devices must have:
☐ Endpoint Protection: Antivirus/anti-malware (Company-provided)
☐ Firewall: Host-based firewall enabled
☐ Encryption: Full-disk encryption enabled
☐ MDM Agent: Mobile device management software (if applicable)
☐ VPN Client: Company-approved VPN application
☐ Patch Management: Automatic updates enabled
5.4 Device Configuration Requirements
All devices must be configured with:
☐ Automatic screen lock: After [5] minutes of inactivity
☐ Strong password/PIN: Per password policy (see Section 7)
☐ Biometric authentication: Enabled where available (optional)
☐ Remote wipe capability: Enabled for mobile devices
☐ Find My Device: Enabled where available
5.5 Prohibited Device Modifications
Remote workers shall NOT:
☐ Disable or circumvent security software
☐ Root, jailbreak, or unlock devices
☐ Install unauthorized operating systems
☐ Remove or modify security configurations
☐ Connect to Company networks from compromised devices
5.6 Device Maintenance
Remote workers shall:
☐ Apply security updates within [72] hours of release
☐ Restart devices regularly to complete updates
☐ Report any device malfunctions to IT
☐ Not attempt repairs that could compromise security
6. NETWORK SECURITY
6.1 VPN Requirements
Mandatory VPN Use:
☐ All remote access to Company systems MUST use Company VPN
☐ VPN must be connected BEFORE accessing Company resources
☐ Split tunneling is [permitted/not permitted] based on configuration
☐ VPN sessions will timeout after [X] hours of inactivity
VPN Exceptions:
The following may be accessed without VPN:
☐ [List any approved cloud services that don't require VPN]
☐ Emergency access during VPN outages (contact IT Security)
6.2 Home Network Security
Remote workers with home networks shall:
☐ Use WPA2 or WPA3 encryption (NOT WEP or open networks)
☐ Set strong, unique router password (change from default)
☐ Enable router firewall
☐ Keep router firmware updated
☐ Disable remote management unless specifically needed
☐ Consider using a separate network/VLAN for work devices
Recommended Home Network Settings:
☐ Change default SSID (network name)
☐ Disable WPS (Wi-Fi Protected Setup)
☐ Enable MAC address filtering (optional)
☐ Use DNS filtering service (optional)
6.3 Public and Shared Networks
When using public Wi-Fi (hotels, airports, cafes):
☐ ALWAYS connect VPN before any work activity
☐ Verify network authenticity (confirm correct network name)
☐ Avoid accessing highly sensitive data on public networks
☐ Use mobile hotspot as alternative when available
☐ Never conduct sensitive transactions (banking, etc.) without VPN
Prohibited Networks:
☐ Open/unsecured networks without VPN
☐ Networks with suspicious names or captive portals
☐ Networks in high-risk locations
6.4 Mobile Hotspot Use
Personal mobile hotspots may be used for work:
☐ With password protection enabled
☐ As primary connection in untrusted environments
☐ Subject to data usage policies
6.5 Bluetooth and Wireless
☐ Disable Bluetooth when not in use
☐ Do not pair with unknown devices
☐ Use Bluetooth only in private settings
☐ Disable automatic connection to open networks
7. ACCESS CONTROL AND AUTHENTICATION
7.1 Multi-Factor Authentication (MFA)
MFA is REQUIRED for:
☐ All remote access to Company systems
☐ VPN connections
☐ Email access
☐ Cloud application access
☐ Administrative or privileged access
☐ Any system containing PII or confidential data
Approved MFA Methods:
☐ Hardware security keys (preferred)
☐ Authenticator apps (Google Authenticator, Microsoft Authenticator, etc.)
☐ Push notifications to registered mobile device
☐ SMS/text codes (least preferred, but acceptable)
7.2 Password Requirements
All passwords must meet the following requirements:
☐ Minimum [14] characters for standard accounts
☐ Minimum [16] characters for privileged accounts
☐ Include combination of uppercase, lowercase, numbers, and symbols
☐ Not contain dictionary words or personal information
☐ Unique for each account (no password reuse)
☐ Changed immediately if compromised
Password Management:
☐ Use Company-approved password manager: [Password Manager Name]
☐ Do NOT store passwords in browsers, text files, or sticky notes
☐ Do NOT share passwords with anyone
☐ Enable breach monitoring in password manager
7.3 Account Security
☐ Use only assigned Company accounts for work
☐ Do not share accounts or credentials
☐ Log out of applications when finished
☐ Report any unauthorized access attempts
☐ Review account activity regularly
7.4 Privileged Access
Remote workers with privileged/administrative access must:
☐ Use separate privileged accounts (not daily-use accounts)
☐ Access privileged systems only through approved methods
☐ Log all privileged activities
☐ Use just-in-time access where available
☐ Complete additional security training
7.5 Session Management
☐ Sessions will timeout after [30] minutes of inactivity
☐ Automatic logoff after [8] hours
☐ Re-authentication required for sensitive actions
☐ Concurrent sessions may be limited
8. DATA PROTECTION
8.1 Data Classification
All Company data is classified as:
☐ Public: May be shared externally
☐ Internal: For Company use only
☐ Confidential: Restricted access, requires protection
☐ Highly Confidential: Strictest controls, limited access
8.2 Data Handling Requirements
Highly Confidential and Confidential Data:
☐ Access only on Company-managed devices
☐ Store only in Company-approved locations
☐ Encrypt when stored locally (if authorized)
☐ Never transfer via personal email or unapproved channels
☐ Never print unless business-critical and secured
Internal Data:
☐ May be accessed on approved devices
☐ Store in Company-approved locations
☐ Follow standard security practices
8.3 Data Storage
Approved Storage Locations:
☐ Company network drives
☐ Company-approved cloud storage: [List approved services]
☐ Company email systems
☐ Company-managed local encryption (limited, with approval)
Prohibited Storage:
☐ Personal cloud storage (Dropbox, Google Drive personal, iCloud, etc.)
☐ Personal email accounts
☐ Unencrypted local storage
☐ USB drives (unless encrypted and approved)
☐ Social media or messaging apps
8.4 Data Transfer
Approved Transfer Methods:
☐ Company email with encryption for sensitive data
☐ Company-approved file sharing platforms
☐ Secure file transfer solutions
☐ Encrypted attachments with password shared separately
Prohibited Transfer Methods:
☐ Personal email
☐ Consumer file sharing (WeTransfer free, etc.)
☐ Text/SMS messages
☐ Social media messaging
☐ Unencrypted FTP
8.5 Data Retention and Disposal
☐ Retain data only as long as needed
☐ Delete data per retention schedules
☐ Securely delete files (use secure deletion tools)
☐ Shred physical documents containing Company data
☐ Report data that cannot be properly deleted
8.6 Printing and Physical Documents
When printing is necessary:
☐ Print only what is required
☐ Retrieve printouts immediately
☐ Store documents securely
☐ Shred documents after use (cross-cut shredder)
☐ Do not leave documents visible to others
9. PHYSICAL SECURITY
9.1 Workspace Security
Remote workers shall:
☐ Work in a private, secure area when handling confidential information
☐ Position screens to prevent unauthorized viewing
☐ Use privacy screens when working in view of others
☐ Secure work area when not present
9.2 Device Security
☐ Never leave devices unattended in public places
☐ Keep devices in sight during travel
☐ Store devices in locked areas when not in use
☐ Use laptop locks when working in shared spaces
☐ Lock devices in hotel safes when traveling
9.3 Document Security
☐ Store physical documents in locked drawer or cabinet
☐ Do not leave documents visible when not working
☐ Shred confidential documents when no longer needed
☐ Do not discuss confidential matters where others can overhear
9.4 Visitor Security
☐ Do not allow visitors to view screens or documents
☐ Do not allow others to use Company devices
☐ Secure work area before allowing visitors access
☐ Be aware of cleaning staff and others with access to workspace
10. COMMUNICATION SECURITY
10.1 Email Security
☐ Use only Company email for work communications
☐ Verify sender identity before opening attachments or clicking links
☐ Report suspicious emails to [IT Security Contact]
☐ Use encryption for sensitive email content
☐ Do not auto-forward Company email to personal accounts
10.2 Video Conferencing Security
☐ Use only Company-approved platforms: [List platforms]
☐ Enable waiting rooms or meeting passwords
☐ Verify participant identities
☐ Be aware of what is visible in video background
☐ Mute microphone when not speaking
☐ Do not record without consent and approval
☐ Lock meetings once all participants have joined
10.3 Instant Messaging and Collaboration
☐ Use only Company-approved platforms: [List platforms]
☐ Do not share confidential information in public channels
☐ Verify recipient before sharing sensitive information
☐ Be aware that messages may be monitored and retained
10.4 Phone and Voice Communications
☐ Use Company phone systems for sensitive discussions
☐ Verify caller identity for sensitive requests
☐ Do not discuss confidential matters in public areas
☐ Be aware of smart speakers and voice assistants
10.5 Social Media
☐ Do not discuss Company business on social media
☐ Do not share Company information, photos, or documents
☐ Do not indicate Company affiliation when discussing work topics
☐ Report social engineering attempts
11. INCIDENT RESPONSE
11.1 What Constitutes a Security Incident
Report immediately if you experience or suspect:
☐ Lost or stolen device
☐ Unauthorized access to accounts or systems
☐ Phishing email or social engineering attempt
☐ Malware or virus infection
☐ Unusual system behavior
☐ Data breach or unauthorized data access
☐ Suspected compromise of credentials
☐ Physical security breach
11.2 Incident Reporting
IMMEDIATELY report incidents to:
☐ IT Security: [Phone Number] / [Email]
☐ 24/7 Security Hotline: [Number] (if available)
☐ Manager (as backup)
For lost/stolen devices, also contact:
☐ Local law enforcement (file police report)
☐ Credit monitoring services (if personal data at risk)
11.3 Incident Response Steps
If you suspect a security incident:
1. STOP - Cease the activity that may have caused the incident
2. DISCONNECT - If device is compromised, disconnect from network
3. REPORT - Contact IT Security immediately
4. DOCUMENT - Note what happened, when, and what you observed
5. PRESERVE - Do not delete files or clear logs
6. COOPERATE - Assist with investigation as requested
11.4 Incident Response for Specific Scenarios
Lost/Stolen Device:
☐ Report to IT Security within [1] hour
☐ Request remote wipe
☐ File police report
☐ Change passwords for all accounts accessed from device
☐ Monitor accounts for unusual activity
Phishing/Social Engineering:
☐ Do not click links or open attachments
☐ Forward suspicious email to [Phishing Report Email]
☐ If you clicked a link or entered credentials:
- Disconnect from network
- Report to IT Security
- Change affected passwords immediately
Malware Infection:
☐ Disconnect device from network
☐ Do not turn off device (preserves evidence)
☐ Contact IT Security
☐ Do not attempt to remove malware yourself
11.5 Post-Incident
☐ Participate in incident review
☐ Implement recommended security improvements
☐ Complete additional training if required
☐ Learn from the incident to prevent recurrence
12. BYOD (BRING YOUR OWN DEVICE)
12.1 BYOD Authorization
☐ BYOD is NOT permitted - Use only Company-managed devices
OR
☐ BYOD is permitted for the following:
- Email access on mobile devices
- Collaboration tools (Teams, Slack, etc.)
- [Specific applications]
12.2 BYOD Requirements (If Permitted)
Personal devices used for work MUST:
☐ Be approved and registered with IT
☐ Meet minimum security requirements:
- Current, supported operating system
- Automatic updates enabled
- Screen lock with PIN/password (minimum 6 digits)
- Device encryption enabled
- No jailbreak/root
☐ Have Company MDM agent installed
☐ Comply with all provisions of this Policy
12.3 BYOD Security Controls
Company may implement the following on BYOD devices:
☐ Remote wipe of Company data (containerized)
☐ Enforcement of security policies
☐ Monitoring of Company applications
☐ Device compliance checks
12.4 BYOD Limitations
Personal devices CANNOT be used for:
☐ Processing or storing Highly Confidential data
☐ Administrative or privileged access
☐ [Specific restricted activities]
12.5 BYOD Termination
Upon termination of employment or BYOD authorization:
☐ Company data will be remotely wiped
☐ Company apps must be removed
☐ Employee must certify removal of Company data
13. THIRD-PARTY AND CLOUD SERVICES
13.1 Approved Services
Use only Company-approved cloud services:
☐ [List approved cloud storage, e.g., SharePoint, OneDrive]
☐ [List approved collaboration tools]
☐ [List approved productivity apps]
13.2 Prohibited Services
Do NOT use without explicit approval:
☐ Personal cloud storage services
☐ Consumer-grade file sharing
☐ Unauthorized SaaS applications
☐ AI tools or chatbots for Company data
☐ Personal accounts for work purposes
13.3 Shadow IT
☐ Do not install or use unauthorized software
☐ Do not sign up for cloud services using Company email without approval
☐ Report useful tools to IT for evaluation and potential approval
13.4 AI and Machine Learning Tools
☐ Do NOT enter Company data into public AI tools without approval
☐ Approved AI tools: [List approved tools, e.g., Company's internal AI assistant]
☐ Prohibited uses: [List restrictions]
☐ Contact [IT Security/Legal] before using AI with Company data
14. MONITORING AND COMPLIANCE
14.1 Monitoring Notice
NOTICE: Company systems and devices are monitored.
Company may monitor:
☐ Network traffic and VPN connections
☐ Device compliance and security status
☐ Application usage on Company devices
☐ Email and communication systems
☐ Cloud service activity
☐ Security events and logs
14.2 Purpose of Monitoring
Monitoring is conducted to:
☐ Detect and prevent security threats
☐ Ensure compliance with this Policy
☐ Investigate security incidents
☐ Protect Company and employee data
☐ Meet regulatory requirements
14.3 Privacy Expectations
☐ There is NO expectation of privacy when using Company systems or devices
☐ Personal use (where permitted) is also subject to monitoring
☐ Monitoring is conducted per applicable law
14.4 Compliance Audits
Company may conduct:
☐ Periodic security assessments
☐ Random compliance checks
☐ Vulnerability scans
☐ Device configuration audits
☐ Access reviews
14.5 Self-Assessment
Remote workers should regularly verify:
☐ Devices are updated and secure
☐ Security software is running
☐ VPN is functioning properly
☐ MFA is working correctly
☐ No unauthorized applications installed
15. TRAINING REQUIREMENTS
15.1 Required Training
All remote workers must complete:
☐ Initial Security Awareness Training - Before beginning remote work
☐ Annual Security Refresher Training - Each year thereafter
☐ Phishing Awareness Training - [Frequency]
☐ Role-Specific Training - Based on access level and job function
15.2 Training Topics
Training covers:
☐ This Policy's requirements
☐ Recognizing and reporting phishing
☐ Social engineering awareness
☐ Password and authentication security
☐ Data handling and protection
☐ Physical security
☐ Incident reporting
15.3 Training Records
☐ Training completion is tracked and documented
☐ Failure to complete training may result in access suspension
☐ Certificates of completion available upon request
15.4 Simulated Phishing
☐ Company conducts simulated phishing tests
☐ Clicking on simulated phishing may result in additional training
☐ Repeated failures may result in access review
16. VIOLATIONS AND ENFORCEMENT
16.1 Policy Violations
The following are violations of this Policy:
☐ Failing to use VPN for remote access
☐ Disabling security software
☐ Using unauthorized devices or applications
☐ Failing to report security incidents
☐ Sharing credentials
☐ Storing data in unauthorized locations
☐ Failing to complete required training
☐ Any action that compromises security
16.2 Consequences
Violations may result in:
☐ Warning - First minor violation
☐ Mandatory retraining - Security training required
☐ Access suspension - Remote access temporarily revoked
☐ Formal disciplinary action - Per HR policies
☐ Termination - Serious or repeated violations
☐ Legal action - Willful misconduct or criminal activity
16.3 Severity Assessment
Factors in determining consequences:
☐ Nature and severity of violation
☐ Intent (accidental vs. willful)
☐ Impact on Company or data
☐ Prior violations
☐ Employee's cooperation and response
16.4 Reporting Violations
☐ Report suspected violations to [IT Security/Manager/HR]
☐ Anonymous reporting available via [Method]
☐ No retaliation for good-faith reporting
17. POLICY ADMINISTRATION
17.1 Policy Owner
This Policy is owned by: [IT Security Department]
Contact: [Email/Phone]
17.2 Related Policies
This Policy should be read with:
☐ Acceptable Use Policy
☐ Information Security Policy
☐ Data Classification Policy
☐ Incident Response Plan
☐ Remote Work Agreement
☐ Equipment Agreement
☐ Privacy Policy
17.3 Policy Review
This Policy will be reviewed:
☐ Annually
☐ After significant security incidents
☐ When regulations change
☐ As technology evolves
17.4 Updates
☐ Updates will be communicated to all remote workers
☐ Significant changes require re-acknowledgment
☐ Current version always available at [Location]
17.5 Questions and Support
☐ Policy questions: [IT Security Contact]
☐ Technical support: [Help Desk Contact]
☐ Emergency security: [24/7 Contact if available]
18. ACKNOWLEDGMENT
By signing below, I acknowledge that:
☐ I have received and read the Remote Work Security Policy
☐ I understand my responsibilities under this Policy
☐ I agree to comply with all provisions of this Policy
☐ I understand that violations may result in disciplinary action
☐ I have completed the required security training
☐ I will report security incidents immediately
☐ I understand Company systems and devices are monitored
☐ I will seek clarification if I am unsure about any requirements
Employee Acknowledgment
Employee Name (Print): _________________________________
Employee Signature: ____________________________________
Date: ________________________________________________
Department: __________________________________________
Manager Name: ________________________________________
APPENDIX A: QUICK REFERENCE SECURITY CHECKLIST
Daily:
☐ Connect VPN before accessing Company systems
☐ Lock screen when stepping away
☐ Verify suspicious emails before clicking
☐ Secure devices when leaving workspace
Weekly:
☐ Check for and install software updates
☐ Review account activity for anomalies
☐ Back up local work to approved storage
☐ Verify security software is running
Monthly:
☐ Review and update passwords as needed
☐ Check MFA methods are working
☐ Review device for unauthorized applications
☐ Complete any pending security training
Immediately Report:
☐ Lost or stolen device
☐ Suspected phishing or social engineering
☐ Unusual account activity
☐ Potential malware infection
☐ Any security concern
IT Security Contact:
Phone: [Number]
Email: [Email]
Emergency: [24/7 Number]
APPENDIX B: APPROVED APPLICATIONS AND SERVICES
| Category | Approved Applications |
|---|---|
| VPN | [Application Name] |
| [Application Name] | |
| Cloud Storage | [Application Name] |
| Collaboration | [Application Name] |
| Video Conferencing | [Application Name] |
| Messaging | [Application Name] |
| Password Manager | [Application Name] |
| Antivirus | [Application Name] |
APPENDIX C: SECURITY INCIDENT REPORT FORM
Report Date: ______________________
Reported By: ______________________
Contact Information: ______________________
Incident Type:
☐ Lost/Stolen Device
☐ Phishing/Social Engineering
☐ Unauthorized Access
☐ Malware
☐ Data Breach
☐ Other: ______________________
Date/Time of Incident: ______________________
Description of Incident:
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
Devices/Systems Affected:
_____________________________________________________________
Data Potentially Affected:
_____________________________________________________________
Actions Taken:
_____________________________________________________________
For IT Security Use:
Incident ID: ______________________
Severity: ☐ Low ☐ Medium ☐ High ☐ Critical
Assigned To: ______________________
Status: ______________________
[END OF DOCUMENT]
Need help customizing this document?
Get 3 days of intelligent editing. Tailor every section to your specific case.
About This Template
Jurisdiction-Specific
This template is drafted for general use across all U.S. jurisdictions. State-specific versions with local statutory references are also available.
How It's Made
Drafted using current statutory databases and legal standards for employment hr. Each template includes proper legal citations, defined terms, and standard protective clauses.
Important Notice
This template is provided for informational purposes. It is not legal advice. We recommend having an attorney review any legal document before signing, especially for high-value or complex matters.
Last updated: February 2026