download mo lexport slides -- handout...
TRANSCRIPT
9/14/2012
1
Ethics and Technology
Michael Downey
Litigation Partner, Armstrong Teasdale LLP Tried lawyer discipline cases in Missouri and Illinois
Argued for lawyers before Missouri Supreme Court and Illinois ARDC Review Panel
Expert witness on legal ethics in Missouri, Kansas, DC
Teach legal ethics at Washington University and St. Louis University
Chair-Elect, ABA Law Practice Management Section
Former chair, Ethics & Technology Committee in the ABA Center for Professional Responsibility
Technology Task Force, ABA Ethics 20/20 Commission
About Myself
9/14/2012
2
A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.
Comment ...
Maintaining Competence
[6] To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject.
ABA Model Rule 1.1 Competence (8/2012)
ABA Model Rule 1.6 Confidentiality of Information (8/2012)
c) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.
9/14/2012
4
Websites = Advertisement
Accurate – Rule 4-7.1
Advertising – Rule 4-7.2 • Claims
• Disclaimers
"Specialist" or "Expert" – Rule 4-7.4
Firm names/URLs – Rule 4-7.5
9/14/2012
5
Web 1.0VisitorsHome PagesContentOne-wayRead
Web 2.0CommunityApplicationsConversationTwo-wayRead & Write
Blogs
9/14/2012
7
Why Web 2.0?
Promote services Build community – and buzz Engage – and form relationships with – clients
and potential clients• Great way to track connections
Concerns Confidentiality Inadvertent clientsAdvertising regulations
• Accurate• Disclaimers• "Specialist"
9/14/2012
8
What Heightens Scrutiny
Claims about skill Claims of specialization Discussing past results Client (or other) testimonials Legal or accounting advice Pricing information
Client-related information Lack of disclaimers
Accurate Content?
9/14/2012
17
PasswordsWhen are passwords requiredWhen must passwords be changed
• How complex must passwords be• Can they be reused• Where are reminders kept
Insecure Workstations What happens to computers when people go
home at night• Physical security (will they be stolen)• Do they remain on• Does the network remain open
How easy is it to gain access during the day• Receptionist• Vacant offices
9/14/2012
18
Relation with Data Storage/ISPDo your third-party providers have
written confidentiality obligationsWhen and how can your firm receive
• Information from system• Audit of sharing or disclosures
Access Problems Forwarding of email to personal account VOIP Telephone Use of public computers Use of unprotected WiFi systems
9/14/2012
19
Risk of Mobile DevicesWho is using a portable device and for what
• Do you need to worry about overtimeWhat protections existWhat backup systems exist
Lost or Stolen Mobile Devices
What backup capacity is available Are devices protected – password (or more)
• Screensaver protections• Encryption
Can the firm remotely lock/wipe devices
9/14/2012
20
NYT Learns of Goldman Trade's Legal Defense from Discarded Laptop The New York Times has learned about the legal defenses for a Goldman
Sachs trader from a discarded laptop discovered in a garbage area of a New York apartment building.
An artist and filmmaker gave legal materials from the laptop to the newspaper, saying a friend had discovered the computer in the garbage [in 2006]. Even after artist Nancy Cohen obtained the laptop, email messages for the defendant, Fabrice Tourre, continued streaming into the computer, the story says.
The documents include draft replies by Allen & Overy to a Securities and Exchange Commission lawsuit against Tourre, a midlevel executive at Goldman. The replies point the finger at other Goldman employees, including two lawyers, who worked on the same targeted deal as Tourre.
Cohen said she ignored the streaming messages until she heard news reports about Tourre and decided to turn over the materials to the Times.
ABA Journal Online, June 1, 2011
Unintended Disclosure
9/14/2012
21
Errant Emails
Is the email an improper solicitation Is the email spam (federal regulations) Would the email (inadvertently) disclose client
confidences Is the email going to the right people
• Reply all• AutoComplete
"Reply All"
9/14/2012
22
Possible Disclosure of Metadata How is the firm managing metadata Scrubber issues
• Default/override settings• Applicability to remote access• Availability for non-email files
Ease of .pdf creations
Ineffective Redactions
Document generated in word processing program Document redacted (usually with black
"highlighting") Document then converted (or printed or saved) as
.pdf for production
Result: redacted text likely available for "select text"tool
9/14/2012
23
Disposal of Obsolete Equipment/Data
Who is disposing of obsolete computers, flash drives, cell phones, palms, etc. What safeguards are being observed
What is happening with home computers
Data Recovery
9/14/2012
24
What Is Your Back-Up?
How readable are backup systems? Can data be accessed if computer system is
unusable?• Back-up data ≠ usable information
Undesirable Data
9/14/2012
25
Unsolicited (Non-Client) Data Website may invite communication – and thus
creation of lawyer- or accountant-client relationships• Listing of email addresses• Pop-up or click-through protections
Protocols (and education) for replying to unsolicited emails
What About Viruses
Status of firm virus protection Response to unsolicited emails
• Messages from impostors
9/14/2012
27
Metadata Did you disclose it? Can you look for it? Can you use it if you find it?
Discovering Social Media – Limitations
Is the person represented? Prosecution of John Robertelli and Gabriel Adamo (NJ)
Is subterfuge used?
Even if subterfuge is not used, contacting a non-represented person with a "friend" request may be unethical
9/14/2012
28
Safest Approaches
Use publicly available information
Use ordinary discovery to obtain what is not publicly available
Preservation of Social Media