Keystone Law home

Annual Report & Accounts 2026

25
OUR GOVERNANCE
Risk
Mitigation
Competition
Keystone competes with other legal firms that offer commercial law services in which quality of advice, service, reputation and value operate as highly competitive factors to distinguish the Group. Despite this, there remains a risk that competitor firms or a newly established firm will acquire market share. Competition remains a core risk for the Group as any loss of market share could reduce revenue, reduce margins, reduce the ability to recruit new lawyers and reduce the retention rates of current personnel, any of which could materially adversely affect the Group’s business operations and overall financial condition.
Keystone’s growth strategy continues to be focused on attracting good quality lawyers with strong client relationships. By maintaining the calibre of lawyers attracted and retained, management believes that they will maintain and enhance their position in the market. Management also continues to review and monitor the characteristics of the Keystone model to ensure that they stay ahead of any current or future competitors.
Information systems and system security breaches
IT forms an integral part of the business’s operating model and, as such, any breakdown of the Group’s information technology system could be significant. Also, as Keystone processes sensitive personal data, it is possible that a security breach could result in some of this data becoming public. Were this to occur, then Keystone could face liability under data protection laws and could lose the goodwill of any clients affected by such a breach. Such a breach could also create reputational damage. Hosting and support of all systems is outsourced to a large, reputable business which is dedicated to the provision of these services. It is contracted to keep all data safe, secure and backed up, and utilises a number of tools and appliances to maintain Keystone’s data integrity and security. Over and above this, we continue to invest in IT security systems to reduce the risk that any breach/penetration can occur.