Professional Documents
Culture Documents
High-technology and privacy litigation, throughout the United States: Federal and State Privacy Statutes Trademark/Domain name disputes Privacy/Data Security Audits Antitrust Software/Hardware Product Performance Author and featured speaker on numerous technology and privacy related
3
ROADMAP
Technology & Legal Ethics Adventures and Misadventures in E-Mail and the Internet Discovery in the Electronic Age
Everyday Routine
Arrive at the Office Check Voicemail Turn on Computer Review E-Mail Review Client Information Stored on Firm Server
11
Lawyer Competency
Competent Representation
A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness, and preparation reasonably necessary for the representation. Rule 1.1
Lawyer Competency
Competent Handling
Competent handling of a particular matter includes inquiry into and analysis of the factual and legal elements of the problem, and use of methods and procedures meeting the standards of competent practitioners. Rule 1.1, Comment (5)
To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. Rule 1.1, Comment (6)
13
Digital Discovery
Duty of Competency The duty requires you to educate yourself and your clients about electronic discovery before a complaint or answer is ever filed. Wall, Ethics in the Era of Electronic Evidence, Trial, October 2005 Courts view ignorance as stonewalling Counsel is presumed to be aware of the existence of responsive material, even if its digital A reasonable inquiry by the plaintiffs counsel prior to responding to Federals document requests or preparing the December 12, 2002 letter would have alerted counsel that the plaintiff possessed electronic mail that fell within the scope of Federals document requests. Invision Media Communications v. Federal Insurance Co., 2004 U.S. Dist. LEXIS 3196, *22
15
Data Transmission
Legal practice is no longer one of telephones and letters Lawyers communicate daily with clients and opposing counsel Manner of communication has a direct impact on lawyers ability to maintain client confidentiality Ease of use and informality comes at a price
Usually Insecurity Professional and Ethical Troubles Await
16
Data Transmission
17
18
22
Confidentiality Rule
Broader Than Attorney-Client Privilege and Work-Product Doctrine
Applies to not only matters communicated in confidence by the client but also to all information relating to the representation, whatever its source. A lawyer may not disclose such information except as authorized or required by the Ohio Rules of Professional Conduct or other law. Rule 1.6, Comment (3)
23
E-MAIL COMMUNICATION
E-mail poses a greater risk of inadvertent disclosure of confidences than other communications Think about the manner an e-mail is sent Unintended transmissions or unintended recipients
Can easily forward communication from a client to others by simple act of hitting forward button Hitting Reply All instead of Reply
Protect Yourself
Disclaimers
Routinely used on attorney communications The above e-mail is for intended recipient only and contains confidential information protected by the attorneyclient privilege.
Limited Value
Indiscriminate use Computers programmed to send on every e-mail Court may view overuse as indication that nothing is privileged Usually off the screen - ineffective
25
METADATA
Data About Data
Your name Your initials Your company or organization name Name of your computer Name of network server or hard drive File properties and summary information Names of previous document authors Document revisions Document versions Template information Hidden text or cell personalized views Comments Time spent editing a document
26
METADATA
Unknown transmission of information
Poses potential risks to attorney-client communications as well as attorney work product
May inadvertently provide opposing counsel prior draft or comments made by client Other risks Removing Data
Scrubbing Software Send as image or .pdf
27
Today
Every bar permits use of unencrypted e-mail to send privileged communications (although some states require disclosure to clients about the risk of data interception) (Missouri Informal Op. 970161 (1997)
28
Formal Opinion notes that the above Rule does not diminish lawyer s obligation to consider the sensitivity of the communication
29
Asia Global
In re Asia Global Crossing, Ltd, 322 B.R. 247 (S.D.N.Y 2005)
Addressed privacy in employees use of company e-mail Employee used company e-mail to communicate with private lawyer about dispute with employer Court (in a lengthy discussion of privacy and e-mail issues) held that privilege was not destroyed Conflict where ex-employee used company computer
Kaufman v. SunGard Inv. Sys. (E.D.N.Y. May 15, 2006) waiver. Curto v. Med. World Communications, Inc. (E.D.N.Y. May 15, 2006) no waiver.
30
Metadata
Is the transmission of metadata inadvertent? Some commentators only visible portion of document should be viewed Some commentators such conduct should be expected New York Bar Association
Absent an explicit direction to the contrary counsel plainly does not intend the lawyer to receive the hidden material or information. N.Y.St. B. Assn Op. 749 (12/14/2001)
District of Columbia
Permitted to review metadata unless the lawyer has actual knowledge that the metadata was sent inadvertently; mere uncertaintydoes not trigger an ethical obligationto refrain from reviewing the metadata. District of Columbia Legal Ethics Cmmt, Op. 341 (9/07)
32
ROADMAP
Technology & Legal Ethics Adventures and Misadventures in E-Mail and the Internet Discovery in the Electronic Age
33
34
Advantages/Disadvantages of E-mail
Several Advantages
Speed Convenience Good for simple problems, answers Provides documentation No telephone tag Saves money
Several Disadvantages
Lack of confidentiality Impersonal Lack of real time Raises the expectation bar Potential for misunderstanding
35
36
Advantages/Disadvantages of E-mail
37
Jack Abramoff
E-mails my biggest regret Referred to clients as:
Monkeys Idiots Morons
38
BTK
40
The jury found [Anderson] guilty on the basis [of this statement]
Houston Chronicle June 25, 2002
41
42
E-Mail Evidence
They [preferred insurers] have gotten the lions [sic] share of our Environmental business PLUS they get an unfair competitive advantage as our prefferred [sic] insurance company
43
E-Mail Evidence
We acknowledge that this was inappropriate behavior . . . [We will] do the necessary to [sic] eliminate all documentation, electronic or otherwise, that references or otherwise alludes to the [contingent commissions]
44
E-Mail Policies
Compliance with the law Minimize liability exposure Implement sound legal and operational policies Create awareness of responsibility Establish ground rules
Appropriate topics and content Appropriate attachment Permissible transactions Forwarding e-mails
45
46
Statement on E-mail
This e-mail communication contains CONFIDENTIAL INFORMATION WHICH ALSO MAY BE LEGALLY PRIVILEGED and which is intended only for the use of the intended recipients identified above. If you are not the intended recipient of this communication, you are hereby notified that any use, dissemination, distribution, downloading, or copying of this communication is strictly prohibited. If you have received this communication in error, please immediately notify us by e-mail or by telephone at (xxx) xxx-xxxx and delete the communication and destroy all copies. Thank you in advance for your cooperation.
48
IRS Disclosure
IRS Circular 230 Disclosure:
To ensure compliance with requirements imposed by the IRS, we inform you that any U.S. federal tax advice contained in this communication (including any attachments) is not intended or written to be used, and cannot be used, for purposes of (i) avoiding penalties under the Internal Revenue Code, or (ii) promoting, marketing or recommending to another party any transaction or matter addressed herein.
49
50
Follow-up E-mail
I am writing you in regard to an email you received from me earlier today. As I am aware that you opened the message, you probably saw that it was a personal communication that was inadvertently forwarded to the underwriting mailing list. Before it was retracted, it was received by approximately 40 people inside of the Firm, about half of whom are partners.
52
54
Remember
Dont put anything in an e-mail that you wouldnt put in a formal memo or you would be reluctant to say in public or say to the client Be professional Dont write in haste Dont be too cute, ironic, or sarcastic Dont jump to conclusions Use common sense Apply the Golden Rule
55
ROADMAP
Technology & Legal Ethics Adventures and Misadventures in E-Mail and the Internet Discovery in the Electronic Age
56
Law Develops
Printing data insufficient (Armstrong v. Executive Office of the President) Request for documents includes deleted emails (Playboy)
1972
1993
1995
1999
2000
FRCP adds data compilations Electronic Discoverable; paper not substitute (AntiMonopoly
Computerized data includes voice mail, email, back up files, data files, program files, system files, web site log files and more (Kleiner)
57
Law Develops
Landscape Shifts for Lawyers 2002 2003
Counsel has affirmative obligation to become familiar with client systems and data retention policies (Zubalake V)
2004
2005
Adverse Inference and burden shifting for multiple violations (Morgan Stanley)
58
Discoverability
"The law is clear that data in computerized form is discoverable even if paper 'hard copies' of the information have been produced . . . . [T]oday it is black letter law that computerized data is discoverable if relevant." Anti-Monopoly, Inc. v. Hasbro, Inc., No. 94 Civ.
2120, 1995 WL 649934, 1995 U.S. Dist. LEXIS 16355, at *1 (S.D.N.Y. Nov. 3, 1995).
59
61
62
63
ELECTRONIC DISCOVERY
93% of Corporate documents created electronically 70% of those NEVER migrate to paper corporations are expected to generate 17.5 trillion electronic documents annually Office workers exchange est. 2.8 billion e-mails per day
64
ELECTRONIC DISCOVERY
Floppy Diskette
100 pages or inch stack
CD
52,500 pages or 16 boxes
DVD
350,000 pages or about 117 boxes
1 Terabyte
100,000,000 pages or about 30,000 boxes
65
Word-Processing Documents
Including drafts, revisions, and Metadata
Spreadsheets
Including drafts, revisions, and metadata
Databases
Customer-designed or off-the-shelf programs
Website information
Including intranet pages, web-based data or web sever logs
Internet data
Including web-browser history, cookies, etc.
66
Scanned Documents Digital Video Recordings Computer System Data or Network Operating Logs Containing Usage Information Electronic Scheduling or Calendar Information Contact Manager Information
67
Checklist (Where to Look) Tapes, disks, DVDs, CD-ROMs, and other storage media Computer hard drives (desktop or laptop computers) Flash drives, thumb drives, memory sticks or flash cards Third-party vendor hosted servers or back up systems Network drives or servers
68
Revisions of the original Copies forwarded to others for review Comments being added by those reviewing Versions kept on home computers or flash drives Copies made for back-up for archiving
70
Checklist (What to Ask For) Ask for in format which you prefer to receive data
Original or native format Searchable format Acrobat (PDF) format
Mirror Image of Relevant Hard Drives Index and/or Data as Kept in the Usual Course of Business
71
Checklist (What to Ask For) Available Deleted Data Computer System Information
Type of Hardware, Operating Systems, and Applications Used
Computer Configuration
Local Area Network (LAN) Wide Area Network (WAN) Stand-alone computer
72
Document Management Protocol List of Sources of Data (Custodians) Document Retention Programs Person Most Knowledgeable about above-listed items
73
DATA BREACHES
Year of the Security Breach
A REAL RISK
5/12/06)
74
45.7 Million Records $256 Million (October 12, 2007) Reputation/Consumer Confidence
75
Sources of Breach
Risks
Office Bound Workers Greatest Risk Contractors/Outsourced Labor Guests Hackers
76
QUESTIONS?
Ronald Raether, Esq. Faruki Ireland & Cox P.L.L. rraether@ficlaw.com www.ficlaw.com