
A high-profile divorce or a contested business dispute changes the privacy calculus for the people involved. Records that usually sit quietly, filings, depositions, text messages, financial disclosures, can be used to pressure, embarrass, or leverage. Counterparties, their counsel, and occasionally the press pay close attention. Household staff who were trusted for years can become uncertain variables. Devices that used to be shared suddenly need to be separated. The timelines are often set by courts and counsel rather than by the principal.
This guide lays out a calm, practical approach to protecting privacy during a sensitive period. It is not legal advice and does not replace counsel. It is a security-focused perspective from a firm that regularly supports principals and family offices through divorces, partner splits, shareholder disputes, and related conflicts. The goal is to reduce exposure, preserve optionality, and give the principal room to focus on the matters that actually require their attention.
Who this is for
- Principals and spouses navigating a divorce
- Business partners heading into a split or shareholder dispute
- Chiefs of staff, family office leads, and personal counsel
- Security, finance, legal, and comms leaders supporting a principal
- Household staff coordinating through a sensitive period
At a glance
- Disputes often change who has access to what, and the change is rarely clean without a plan.
- The first two to six weeks set the baseline. Decisions made, or not made, in that window shape the entire matter.
- The goal is controlled separation, not scorched earth. Overreactions often backfire, both legally and relationally.
- Privacy discipline complements counsel. It does not replace it. The most successful matters we see coordinate both lanes tightly.
Why disputes change the privacy landscape
Disputes reshape the privacy environment along several axes at once.
- Legal exposure expands. Communications, financial records, device contents, and household logistics can become discoverable. Routine behaviors from last year can become evidence this year.
- Trust relationships shift. A spouse, a partner, a long-tenured staff member, can move from default-trusted to uncertain. The shift is often gradual, which makes it easier to miss.
- Third parties start watching. Opposing counsel, private investigators, press, and sometimes hostile third parties begin collecting information. Their methods are often entirely legal.
- Emotional pressure rises. Pressure is the environment where privacy discipline slips. An exhausted principal or stressed staff member can make documentation, communication, or device mistakes that take months to untangle.
- Public interest can spike. For prominent principals, the matter may draw press coverage. Social media and group chats amplify in ways that are hard to predict.
None of these dynamics justify paranoia. All of them justify structure. A small amount of preparation, before and during the matter, tends to materially improve outcomes.
The early window matters most
The first weeks of a matter have outsized influence on what follows.
During this window, three things usually happen:
- A principal and their counsel form a strategy. Early choices, venue, filings, posture, affect the entire trajectory.
- Information flows are redrawn. Who gets what, who has access to what, who is looped into which decisions, changes, sometimes silently.
- Counterparties set their own strategy. Their tactics will often test the principal's discipline in small, easy-to-miss ways.
In our experience, the matters that go most smoothly are the ones where privacy decisions are made explicitly and early, in coordination with counsel.
Among the early decisions that pay off:
- A single point of coordination for privacy and security, typically a chief of staff or family office lead working with a security partner
- A documented inventory of shared accounts, devices, and systems
- A clear plan for separating and credentialing those accounts and devices
- A short, written code of conduct for the principal's private communications during the matter
- A monitoring posture calibrated to the matter, not defaulted to normal operations
A thoughtful Executive privacy audit at the outset can crystallize these decisions and surface exposures that the principal may not be aware of.
Digital separation without drama
Separation of digital environments is a normal part of a dispute. Done poorly, it creates conflict, evidentiary problems, or retaliation. Done well, it is quiet and orderly.
Begin with an inventory
Before separating anything, inventory what is shared, what is owned by whom, and what the defaults are. Common shared items include:
- Apple, Google, or Microsoft family plans
- Shared streaming and media accounts
- Shared cloud storage and photo libraries
- Shared calendars and contact lists
- Family or household password managers
- Shared banking and payment accounts
- Children's accounts and devices
- Home network, smart home, and surveillance systems
The inventory becomes the reference for sequencing the separation.
Coordinate with counsel before making changes
Certain changes can have legal consequences. Locking a spouse out of a shared account, deleting shared content, or altering device access before counsel has weighed in can produce discovery issues or court-level pushback. The sequence should be set in conversation with counsel, not by instinct.
Move decisively once the sequence is set
Hesitation is often more harmful than action. Once counsel has approved a separation plan, execute it crisply. Dragging separation out over weeks often generates the kind of ambiguity that later becomes a dispute inside the dispute.
Document the separation
Every separation step should be logged. When an account was split, who had access before, who has access after, and how it was communicated. Documentation protects the principal and provides clarity if a question arises later.
Engage a neutral if needed
In some cases, a neutral technical partner can manage the separation, with both sides having visibility into the process. Our teams sometimes act in this capacity when both parties accept a structured approach, often as part of a broader Digital Executive Protection engagement.
Communications discipline that holds up under pressure
Communications are often the most consequential surface in a dispute. Messages written quickly in the evening can be read slowly in a deposition months later.
A useful posture for communications during a sensitive matter includes:
- Assume every written message could be read by someone other than the intended recipient
- Use counsel as the default routing channel for matter-related communications
- Maintain a clean separation between counsel communications and other communications
- Avoid making material decisions over text. Use secure channels for substantive discussions
- Preserve, do not delete. Deletion during a matter can create serious problems
- Refresh authentication on accounts used for sensitive communications before the matter escalates
Encryption and secure channels
End-to-end encryption is useful for reducing third-party interception, but it does not protect the principal if devices themselves are compromised. Disk encryption, strong passcodes, and current devices matter as much as channel choice.
Email accounts
Many principals enter a matter with a mix of personal, executive, and domain emails that have accumulated over years. Identify the account that will be the matter's primary inbox, isolate it if possible, and avoid routing other matter content through accounts that are shared, exposed, or likely to be discoverable.
Calendars and travel
Calendars can reveal more than expected. Regular meetings, recurring dinners, new relationships, and personal appointments are discoverable surfaces. Coordinate with counsel on calendar hygiene during the matter.
Family and social group chats
Group chats with family or friends can be subpoenaed and are often screenshotted. During a matter, principals should assume that matter-adjacent content in group chats may become visible and behave accordingly.
Device, account, and credential hygiene
Devices are the physical expression of the digital environment. A short, disciplined pass on devices and credentials at the start of a matter pays off throughout.
Device inventory
Inventory every device that holds matter-relevant information. Phones, tablets, laptops, watches, home hubs, cameras, and any device that has been synced. Know where each device lives, who uses it, and what is on it.
Password rotation
Rotate passwords on:
- Primary email
- Banking, brokerage, and crypto accounts
- Identity providers (Apple, Google, Microsoft)
- Cloud storage
- Password manager
- Carrier account
- Any corporate accounts that touch personal matters
New passwords should be strong and stored in a password manager the other party does not control.
Authentication upgrade
Where supported, add hardware security keys or authenticator apps for high-value accounts. Remove SMS as the primary factor for accounts that permit it. Revoke unfamiliar sessions across major accounts.
Recovery paths
Reset recovery paths for major accounts. Ensure recovery email addresses and phone numbers are current and not shared with the counterparty. Trusted contact lists in services like Apple and Google should be reviewed.
Smart home and surveillance
Smart home and surveillance systems often contain account credentials, live feeds, and historical footage. Decide, with counsel, who has continued access, whether footage is preserved, and what configurations are changed.
Find My and location services
Location-sharing relationships should be reviewed. Services like Find My, Find My Device, and family location features can continue quietly sharing location information unless explicitly reviewed. The review should be explicit, not assumed.
Historical data
Old backups, old cloud storage, and dormant accounts may contain matter-relevant material. Work with counsel to decide what to preserve and what to archive. Unilateral deletion during a matter is almost always a mistake.
Household staff, vendors, and access
Household staff are often the most operationally sensitive element of a dispute. They have access, they have relationships with both parties, and they have their own interests.
Conversations with staff
A short, documented conversation with household staff is usually appropriate. Counsel can advise on content and timing. Staff should understand:
- The matter is ongoing and discretion is expected
- Access may change for operational reasons
- Requests that are unusual should be escalated to a specified contact
Access review
Access to homes, vehicles, and devices should be reviewed. In many cases, changes are light and orderly. In a smaller number of cases, locks, codes, and credentials may need to change. Coordinate with counsel.
Vendor communications
Delivery, cleaning, childcare, and other vendors often communicate through phone numbers and email addresses that were shared between spouses or partners. Review which channels remain in use and which should change.
Background reassurance
In some cases, a periodic refresh of Vendor and Staff Vetting during a matter is appropriate. It is not about suspicion. It is about maintaining confidence in the household environment while a sensitive matter plays out.
Surveillance concerns
It is not uncommon for one party to hire a private investigator, and it is not uncommon for that work to extend to surveillance. A measured awareness of this possibility, without paranoia, helps principals and families maintain composure. A quiet VIP Family Risk Protection posture often reduces the consequences of surveillance pressure on children and household routines.
Financial and entity exposure
Financial and entity surfaces often carry some of the highest risk during a matter.
Banking and brokerage
Work with counsel to decide which accounts remain shared, which are separated, and when. Unilateral movements can have legal consequences. Document every change.
Credit and identity
Identity monitoring often becomes more valuable during a matter. Fraud risk can rise as personal details become more widely visible or as emotional dynamics change. Consider dedicated identity monitoring through Breach and Dark Web Tracking for the matter window.
Entity structure and filings
Entity structures, operating agreements, and filings can become contested territory. Counsel usually leads. Security supports by ensuring documents are preserved, access is tracked, and changes are logged. For active misconduct concerns, Corporate Investigations support is sometimes engaged in coordination with counsel.
Family office operations
Family offices often operate across multiple entities with multiple stakeholders. A dispute can cause operational complications. A documented access model for systems, vendors, and funds helps the office continue to operate during the matter.
Philanthropy and third-party commitments
Commitments the principal has made to boards, charities, and external stakeholders often continue through the matter. Security supports the chief of staff in keeping those commitments functioning while matter-related exposure is reduced.
Press, social media, and reputation posture
For high-profile principals, the matter may attract external attention. Whether or not attention is expected, a thoughtful posture pays off.
Media posture
In coordination with counsel and comms, decide what the media posture is from day one. For some matters, no comment is the right posture. For others, a prepared statement is ready if needed. The decision is deliberate, not reactive.
Social media
Active personal posting often needs to shift during a matter. Posts can be screenshotted, contextualized, and used by counterparties. A quieter period often serves the principal better than activity that looks like commentary on the matter, even when it is not.
Search posture
In some matters, search results become a battleground. Online Reputation Management work can prepare positive assets, address misleading content, and ensure that search does not amplify the counterparty's narrative.
Press relationships
Journalists will sometimes reach out. A clear internal policy, do not engage, or engage only through counsel or comms, prevents casual conversations that become unintended stories.
Family and friends
Family and friends are often a source of unintended information. A short, direct conversation, or a note from counsel, often preserves relationships while tightening exposure.
A simple scoring model for dispute exposure
Score each dimension 1 to 5. Total to 20. Higher scores indicate areas that should concentrate attention.
- Shared digital surface (1 to 5): how many accounts, devices, and platforms are shared with the counterparty or household members who are in the counterparty's circle.
- Public visibility (1 to 5): how much public attention the matter is likely to attract, including press coverage, social media engagement, and industry visibility.
- Operational complexity (1 to 5): how many entities, offices, and staff will be affected by the matter.
- Emotional and relational pressure (1 to 5): how much pressure the principal and household are likely to be under during the matter.
Scores of 16 to 20 justify a program response with Digital Executive Protection, Executive privacy audits, Privacy and Threat Monitoring, and VIP Family Risk Protection. Lower scores may still benefit from a lighter engagement. The point is structured attention early, not after the matter is already complicated.
What good looks like
A well-run dispute is quiet on the privacy and security side. The noise, if any, is in the substantive legal or business matter, not in the scaffolding around it.
Deliverables
- A documented inventory of shared digital surfaces and a sequenced separation plan
- An updated authentication and recovery posture
- A household and staff communication brief
- A financial and entity access map
- A media and reputation posture document
- A matter-specific monitoring configuration
- An incident response plan for matter-related events
Cadence
- Baseline: within the first two to four weeks of the matter
- Weekly operations: coordination with counsel, monitoring review, and issue resolution
- Monthly strategic review: posture reassessment as the matter evolves
- Event-driven updates: filings, depositions, press activity, or settlement milestones
Ownership
- Principal sponsor: makes key decisions
- Counsel: leads legal strategy and approves sensitive steps
- Chief of staff or family office lead: owns program operations
- Security lead: owns response, threat posture, and physical coordination
- Comms lead: owns public posture
- Finance lead: owns banking, brokerage, and entity coordination
Monitoring
- Privacy and Threat Monitoring tuned for the matter
- Breach and Dark Web Tracking for credential, identity, and identifier exposure
- Ongoing Monitoring Retainers to keep signal quality during and after the matter
Common mistakes
Several patterns tend to amplify rather than reduce harm during a matter.
Acting before coordinating with counsel
Security moves that look obvious can create legal complications. Every material step, especially involving shared accounts, devices, or records, should be coordinated with counsel first.
Deleting during an active matter
Deletion during a matter is one of the most common self-inflicted wounds. Preserve first, decide later, with counsel.
Taking a public posture without planning
An off-the-cuff statement, a social post, or an email that lands in the wrong hands can reshape the matter for weeks. Defaults should be quiet, with deliberate engagement where appropriate.
Treating staff as a problem rather than a partner
Most household staff navigate disputes well if they are communicated with honestly and supported with clear expectations. Treating staff as suspect from day one often backfires.
Ignoring the financial side
Financial and entity exposure can be the most consequential part of the matter. Security work that focuses only on devices and communications misses the core.
Missing the children and family
Children in particular are often caught in the middle. Privacy and security work that does not protect them, quietly and in coordination with both parents where possible, can produce harm that is hard to repair.
Pushing for total separation in week one
Separation is usually better sequenced. The matter will take months or longer. A sustainable, documented approach outperforms a dramatic week of changes that have to be walked back.
Illustrative patterns drawn from practice
The following composite scenarios help illustrate how disputes often unfold.
The shared family office
A principal and spouse share a family office. A divorce is imminent. Counsel and security coordinate carefully on access to systems, vendors, and records. The office continues to operate, with a documented access model that reflects the matter's constraints. Staff are briefed on posture without being brought inside the matter. The office's continuity is a quiet success story, largely because the pre-matter preparation allowed for a staged separation rather than an abrupt one.
The high-visibility matter
A partnership dispute becomes public. Press coverage follows. Opposing counsel's team begins aggressive discovery. The principal follows a preservation-first posture, a tight verification protocol for communications, and a coordinated comms strategy. Online commentary is monitored; targeted takedowns are pursued where appropriate. The litigation concludes on terms the principal can accept. The privacy and security posture is not what wins the case, but it is part of what allows the principal to focus on the substance of the matter without being distracted by preventable exposures.
The dispute that never escalates
A brewing shareholder dispute is caught early by counsel. A quiet pre-dispute privacy engagement tightens the principal's environment before any filings. The dispute resolves through negotiation, and the privacy work proves valuable even though the public phase never arrives. Preparation is a hedge, and the hedge paid off.
The matter with children
A divorce involves young children. Both parents are public. The privacy team, coordinating with counsel and family therapists where appropriate, tightens the children's social footprint, aligns devices, and briefs schools. The children's world is not disrupted. The parents' dispute does not spill into their routine. That outcome is the goal, and it is reachable with planning.
What to keep for the long tail
After a matter concludes, the residue deserves planning.
- Credential hygiene persists. Shared credentials that survived the matter should be rotated and monitored for reappearance.
- Records management matters. Documents from the matter should be archived with clear retention rules, coordinated with counsel.
- Search posture takes time. Press coverage and online commentary often fade slowly. Quiet search hygiene through Online Reputation Management can accelerate recovery.
- Monitoring should continue. New narratives can emerge months after resolution. Standing coverage through Ongoing Monitoring Retainers catches them early.
- Household practices benefit from reinforcement. The habits built during the matter, verification, discretion, documentation, are worth keeping as long as they remain useful.
The point is that the matter's operational shadow is usually longer than its formal duration. A program that plans for the long tail, rather than for only the acute phase, produces better outcomes.
Work with Biscayne Secure
High-profile disputes are consequential enough that quiet professional support usually pays off. A structured approach, coordinated with counsel, reduces exposure, preserves optionality, and frees the principal to focus on the matter itself rather than on the scaffolding.
Biscayne Secure supports principals and family offices through disputes with Digital Executive Protection, Executive privacy audits, Privacy and Threat Monitoring, Breach and Dark Web Tracking, VIP Family Risk Protection, Vendor and Staff Vetting, Corporate Investigations, Online Reputation Management, and Ongoing Monitoring Retainers. Engagements are handled discreetly, in coordination with counsel, and calibrated to the principal's life and the matter's specifics. The aim is calm, structured support during a stressful period, not theater.
Frequently asked questions
Should I do anything before a divorce or business dispute is filed?
If a dispute is foreseeable, yes, a measured preparation is often appropriate, coordinated with counsel. Early, documented steps tend to produce better outcomes than reactive moves once the matter is public.
Can I lock my spouse or partner out of shared accounts right away?
Not without coordinating with counsel. Some accounts can be separated, others cannot, and the sequencing often matters legally and relationally. An experienced counsel and security partner can map the right approach.
Is it safe to delete old messages or files?
During an active matter, deletion is almost always a mistake. Preservation is the default. Specific deletions, if any, should be explicit decisions made with counsel, not reactive cleanups.
Should I change all my passwords?
For accounts that matter and that may be known to or shared with the counterparty, yes. Rotate passwords, harden authentication, and review recovery paths. Use a password manager the counterparty does not control.
What about our children's accounts and devices?
Children's digital lives deserve specific attention. Coordinate with both parents where appropriate, align with counsel, and treat the child's privacy as the priority. Family location services, shared iCloud accounts, and school communications all deserve review.
Should I hire a private investigator if I think the other side has?
Only in coordination with counsel, and with a firm experienced in family or shareholder matters. The goal is always to support the legal strategy, not to create new legal exposure. In many cases, reinforcing defense, exposure reduction, monitoring, and response readiness, is more valuable than mirroring offense through the use of a private investigator.
How long does the privacy work continue after the matter is resolved?
Usually months, sometimes longer. The residue of a matter, credential exposure, document leakage, search results, reputation effects, tends to outlast the matter itself. Standing Ongoing Monitoring Retainers often continue for the long tail.
What if my counterparty hires a private investigator?
It is not uncommon. Legitimate investigators work within the law, and most matters tolerate the presence of such work without incident. The appropriate response is reinforcement of privacy practices, not escalation. Coordinate with counsel on any specific concerns about methods.
Can I monitor communications for my own protection during a matter?
This is a legal question as much as a security one. Coordinate with counsel before any monitoring decision. Well-advised monitoring protects the principal. Poorly advised monitoring can create serious exposure.
How should we handle staff who are close to both sides?
Respectfully and professionally. Staff often have loyalties that developed over years. The goal is clarity about expectations, access, and confidentiality, without forcing staff to choose sides. Counsel and HR can help structure the conversation.
What if press reaches out during the matter?
The default is no comment unless counsel and comms have approved otherwise. Inbound press should be routed through a designated contact, often counsel or a comms lead, who responds on a consistent plan. Off-the-cuff comments during a matter carry outsized risk.
Is it worth engaging a security partner if the matter looks straightforward?
Often yes, even for matters that appear manageable. Many matters escalate in ways that are hard to predict. A quiet, retained relationship with a security partner makes escalation resources available without delay if the matter turns.
Navigating a sensitive matter?
If a divorce, partner split, or shareholder dispute is on the horizon or already underway, a confidential review can identify the privacy and security steps that matter most in the early window, in coordination with counsel.