Safeguarding Attorney-Client Privilege in a Wireless World
|
|
- Hilda Stone
- 6 years ago
- Views:
Transcription
1 Safeguarding Attorney-Client Privilege in a Wireless World What to consider when communicating with your clients Marc S. Martin, Partner mmartin@klng.com
2 Attorney Treatment of Client Communications The degree of caution with which an attorney handles communications between the attorney and the client has two primary consequences: An attorney may violate his duty of confidentiality under Model Rule 1.6 An attorney may accidentally waive (or cause his client to waive) attorney-client privilege. 2
3 Preliminary Questions What medium? Phone, , instant message, fax, etc? What form? Plain text, word-processing document, Adobe document, within body of ? Which account (work or private)? Does the physical place of origin of the matter? Does its place of retrieval matter? 3
4 A few terms Wireless Generally, a service or technology that involves the transmission and reception of voice and/or data over the radio spectrum. Cordless a handset that operates over certain frequencies within a short range of a base landline phone. Cellular/PCS/Wireless a mobile commercial radio service provided by a common carrier that includes voice and data communications over certain frequencies to subscribers, typical via digital technologies. Wireless Broadband/WiFi/WiMax Technologies that enable fast transmissions of large files of digital data, video, voice and other information typically to any enabled device (e.g., laptop) within a certain geographic range of a transmitter. VOIP Voice over Internet Protocol. A technology that transmits the digital bits of voice and data information over computer networks in a manner that may enable both basic telephone-like communications services and enhanced interactive functionalities. 4
5 ABA Formal Opinion Issued in 1999, addressed , fax machines, and cordless/wireless phone communications. Opinion already out of date: messages are not broadcast over public airwaves. (e.g., Blackberry, PDA, WiFi, etc.) The Opinion generally approves of the use of unencrypted communications as a method of communication consistent with Model Rule
6 ABA Formal Opinion Preserving confidentiality ethically includes choosing a means of communication in which the lawyer has a reasonable expectation of privacy. The opinion notes that it is not reasonable to require that a mode of communication be avoided simply because interception is technologically possible, especially when unauthorized interception of the information is a violation of the law. Query: Is there a difference between technically possible and likely? 6
7 New York State Bar Association: Ethical Opinion No Metadata Addresses ing documents, and the metadata which may exist beneath the surface. Information about previous drafts, types of revisions Hidden text may reflect editorial comments, strategy considerations, legal issues, or legal advice. 7
8 New York State Bar Association: Ethical Opinion No Metadata Opinion affirms the fact that lawyers have a duty to use reasonable care when transmitting documents by to prevent the disclosure of metadata containing client confidences or secrets. This is a good reason to send Adobe Acrobat versions instead of Word Documents, or save into a new document, where possible. It is unethical to seek to exploit such metadata, should another party provide it. 8
9 Statutory Background There are two main laws which establish a statutory backdrop against which one must make communications decisions: Electronic Communications Privacy Act prohibits the unauthorized interception or disclosure of any wire, oral, or electronic communication. Computer Fraud and Abuse Act prohibits the unauthorized access of a computer, including through a network. 9
10 Statutory Backdrop The aforementioned laws provide substantial support for the idea that communications protected these statutes have a reasonable expectation of privacy. However, it should be noted that the 1 st Circuit, in United States v. Councilman, has challenged the applicability of the ECPA to certain types of interception. This interpretation could undermine the presumption of privacy. (The Department of Justice was granted rehearing en banc, and a decision has not yet been handed down.) 10
11 Who is the Client? Who is the client the corporation or an employee of the corporation? Generally, employees who have consented to monitoring of electronic communications in the workplace have no reasonable expectation of privacy. United States v. Simons, 206 F.3d 392,
12 Location, location, location From where was the communication sent? From where was it accessed? If the is sent to an AOL account, but the client retrieves the at work or another venue where Internet use is subject to supervision, then the may lose protection. Watch the cc: or bcc: as distribution to a third party likely eliminates attorney client privilege ex. Martha Stewart, next slide. 12
13 Martha s Mistake In Martha Stewart s criminal trial, she forwarded an from her attorney to her daughter. She did waive the attorney-client privilege. However, the court also found that she did not waive the attorney work-product protections. 13
14 Attorney-Client Privilege in a Corporate Setting in a world of cc: s The implications of the erroneous CC: are intimidating, even without the intricacies of corporate representation. In a corporate setting, must be careful not to waive privilege by including individuals inappropriately, or including consultants. See Streamline Capital, LLC v. Hartford Casualty Insurance Co., No. 02 Civ PKC MHD (S.D.N.Y. 01/11/05) 14
15 New Technologies, New Concerns As noted earlier: the ABA Formal Opinion noted: messages are not broadcast over public airwaves. Today, they are with devices like Blackberry, Treo, Palm, and other wireless devices. In addition, instant messaging and wireless SMS (text) messages are growing in popularity. s are sent, documents are transmitted, and text messages may be exchanged between attorneys and their clients, over the radio spectrum with or without encryption. Although many of these forms of communication may be protected by statute, some may not be. (public WiFi?) 15
16 Inadvertent Production A technical glitch, or in some cases, a malicious interception, could be considered an inadvertent production. Remember metadata. A properly addressed, secure piece of with an attachment could contain privileged information. 16
17 Balancing Tests Many courts have employed a balancing test, which has five factors, in determining whether or not an inadvertent production should result in the loss of privilege: (1) the reasonableness of the precautions taken to prevent inadvertent disclosure, (2) the amount of time it took the producing party to recognize its error, (3) the scope of the production, (4) the extent of the inadvertent disclosure, and (5) the overriding interest of fairness and justice. 17
18 Reasonableness of the precautions taken to prevent inadvertent disclosure. This factor, of the five, is the most relevant to the use of advanced technologies, e.g., reasonableness of laptop communications from a Starbucks hotspot, airport lounge, etc. Taking reasonable precautions should preserve benefit of the doubt in close calls. See American National Bank and Trust Co. of Chicago v. Equitable Life Assurance Society of The United States, No (7th Cir. May 4, 2005) (no discovery sanctions on party that had erroneously asserted privilege on internal s to avoid production, which it had taken steps to keep confidential). Issues: Is encryption required? Anti-spyware and anti-virus software? Screen saver locks on PDAs? Could technical assistance (from a third party) mean the inadvertent loss of privilege? 18
19 ABA Formal Opinion When the lawyer reasonably believes that confidential client information being transmitted is so highly sensitive that extraordinary measures to protect the transmission are warranted, the lawyer should consult the client as to whether another mode of transmission, such as special messenger delivery, is warranted. 19
Autofill and Other Disasters: The Ethics of Inadvertent Disclosures
Autofill and Other Disasters: The Ethics of Inadvertent Email Disclosures Deborah C. Meiners, Esq. DeWitt Ross & Stevens, S.C. (608) 252 9266 dcm@dewittross.com SCR 20:1.6 Confidentiality for Lawyers (a)
More informationR E F E R E N C E L I B R A R I A N. Jane Larrington Faculty Services & Reference Librarian sandiego.edu
R E F E R E N C E L I B R A R I A N Jane Larrington Faculty Services & Reference Librarian jlarrington@ sandiego.edu 619.260.4766 Dangers of metadata for the uninitiated attorney Professional responsibilities
More informationTexas Health Resources
Texas Health Resources POLICY NAME: Remote Access Page 1 of 7 1.0 Purpose: To establish security standards for remote electronic Access to Texas Health Information Assets. 2.0 Policy: Remote Access to
More informationBCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement
BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance
More informationHIPAA Federal Security Rule H I P A A
H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created
More informationGM Information Security Controls
: Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5
More informationMEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL
National Economic Research Associates, Inc. v. EvansMass.Super.,2006. Superior Court of Massachusetts. NATIONAL ECONOMIC RESEARCH ASSOCIATES, INC. and Marsh & McLennan Companies, Inc., Plaintiffs v. David
More informationPrivacy Policy Effective May 25 th 2018
Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand
More informationElements of a Swift (and Effective) Response to a HIPAA Security Breach
Elements of a Swift (and Effective) Response to a HIPAA Security Breach Susan E. Ziel, RN BSN MPH JD Krieg DeVault LLP Past President, The American Association of Nurse Attorneys Disclaimer The information
More informationPRIVACY POLICY Let us summarize this for you...
PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase
More informationAcceptable Use Policy
Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information
More informationViolations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.
Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist
More informationWASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information
WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington
More informationU.S. v. Weaver, 636 F.Supp.2d 769 (C.D. Ill., 2009)
636 F.Supp.2d 769 UNITED STATES of America, Plaintiff, v. Justin D. WEAVER, Defendant. No. 09-30036. United States District Court, C.D. Illinois, Springfield Division. July 15, 2009. Elham M. Peirson,
More informationChecklist: Credit Union Information Security and Privacy Policies
Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC
More informationUnderstanding Privilege in an Electronic World BY JEFFREY E. DUBIN AND SAM A. BENSON, JAVITCH, BLOCK & RATHBONE, LLC
Understanding Privilege in an Electronic World BY JEFFREY E. DUBIN AND SAM A. BENSON, JAVITCH, BLOCK & RATHBONE, LLC Have you ever sent an email that you wish you could recall? Have you ever sent an email
More informationBYOD (Bring Your Own Device): Employee-owned Technology in the Workplace
BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information
More informationUniversity Policies and Procedures ELECTRONIC MAIL POLICY
University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must
More informationHIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996
HIPAA Privacy & Security Training HIPAA The Health Insurance Portability and Accountability Act of 1996 AMTA confidentiality requirements AMTA Professional Competencies 20. Documentation 20.7 Demonstrate
More informationHarmony Telephone Company. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and
Harmony Telephone Company Broadband Internet Access Services Network Management Practices, Performance Characteristics, and Commercial Terms and Conditions for Fixed Services Harmony Telephone Company
More informationCleveland State University General Policy for University Information and Technology Resources
Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information
More informationUT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES
ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary
More informationCOMPUTER & INFORMATION TECHNOLOGY CENTER. Information Transfer Policy
COMPUTER & INFORMATION TECHNOLOGY CENTER Information Transfer Policy Document Controls This document is reviewed every six months Document Reference Document Title Document Owner ISO 27001:2013 reference
More informationHIPAA Privacy & Security Training. Privacy and Security of Protected Health Information
HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security
More informationFACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?
FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit
More informationUWTSD Group Data Protection Policy
UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful
More informationAccess to personal accounts and lawful business monitoring
Access to personal email accounts and lawful business monitoring Contents Policy statement... 2 Access to personal emails... 2 Manager suspects misuse... 3 Lawful business monitoring... 4 Additional information...
More informationEmployee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC
Employee Privacy, Digital Evidence, and the CFE Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC The Good Old Days CFE s Aerial View 1. What Information
More informationYADTEL - Privacy Information INFORMATION WE COLLECT
YADTEL - Privacy Information As a customer of Yadtel, you are entitled to know what we do with personal information about you that we receive. We consider our treatment of such information to be a part
More informationEMPLOYEE COMPUTER, , AND INTERNET USAGE POLICY
EMPLOYEE COMPUTER, E-MAIL, AND INTERNET USAGE POLICY Included: Overview Dos and Don ts Checklist Sample Computer, E-mail, and Internet Usage Policy 1. Overview Every business that uses computers should
More informationHIPAA FOR BROKERS. revised 10/17
HIPAA FOR BROKERS revised 10/17 COURSE PURPOSE The purpose of this information is to help ensure that all Optima Health Brokers are prepared to protect the privacy and security of our members health information.
More informationRecords Management and Retention
Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors
More informationPEDs in the Workplace: It s a Mad, Mad BYOD World
PEDs in the Workplace: It s a Mad, Mad BYOD World Technology in the Workplace Technology in the workplace has transformed over the years from this The World s First Computer (1946) 2015 Snell & Wilmer
More informationEthical and other Issues Concerning Technology and Your Law Practice By: Gregory W. Herring, CFLS, AAML, IAFL
Certified Specialist, Family Law, The California Board of Legal Specialization of the State Bar of California Fellow of the American Academy of Matrimonial Lawyers Fellow of the International Academy of
More informationSample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.
Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring
More informationHealthfirst Website Privacy Policy
Healthfirst Website Privacy Policy We value your relationship with us and have detailed our privacy objectives for our website below. Please be sure to read this notice as it covers the terms and conditions
More informationMobile Application Privacy Policy
Mobile Application Privacy Policy Introduction This mobile application is hosted and operated on behalf of your health plan. As such, some information collected through the mobile application may be considered
More informationReferences to "you" mean you, the assigned user, or someone authorized by you to act on your behalf.
MNG Direct Privacy Policy THIS POLICY DESCRIBES HOW MNG DIRECT MAY USE AND DISCLOSE THE PERSONAL INFORMATION THAT YOU PROVIDE IN CONNECTION WITH YOUR USE OF THE MNG DIRECT SOLUTIONS, AND ALSO HOW YOU MAY
More informationPrivacy Policy Manhattan Neighborhood Network Policies 2017
Privacy Policy Manhattan Neighborhood Network Policies 2017 Table of Contents Manhattan Neighborhood Network Policies 3 MNN s Privacy Policy 3 Information Collection, Use and Sharing 4 Your Access to and
More informationACCEPTABLE USE OF HCHD INTERNET AND SYSTEM
Page Number: 1 of 6 TITLE: PURPOSE: ACCEPTABLE USE OF HCHD INTERNET AND EMAIL SYSTEM To establish the guidelines for the use of the Harris County Hospital District s Internet and email system. POLICY STATEMENT:
More informationTri-County Communications Cooperative, Inc. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and
Tri-County Communications Cooperative, Inc. Broadband Internet Access Services Network Management Practices, Performance Characteristics, and Commercial Terms and Conditions for Fixed Services Tri-County
More informationHMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By:
HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING Created By: Overview The purpose of this presentation is to emphasize the importance of security when using HMIS. Client information
More informationTITLE SOCIAL MEDIA AND COLLABORATION POLICY
DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the
More informationACCEPTABLE USE POLICY (AUP), v 1.4, 6 January 2012
ACCEPTABLE USE POLICY (AUP), v 1.4, 6 January 2012 Reference: AR 25-2 (Information Assurance). A well-protected DoD/Army network enables organizations to easily handle the increasing dependence on the
More informationPRIVACY STATEMENT. Effective Date 11/01/17.
PRIVACY STATEMENT Effective Date 11/01/17. PREMIER Bankcard, LLC. [hereinafter referred to as our, us, or we ] is committed to advising you of the right to your privacy, and strives to provide a safe and
More informationWhat every attorney should know about E-security Also, ESI
What every attorney should know about E-security Also, ESI Sean Markham Esq. McCarthy Law Firm, LLC smarkham@mccarthy-lawfirm.com Why should I care about security? Because it is a good idea! and, if that
More informationRMU-IT-SEC-01 Acceptable Use Policy
1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities
More informationDISCLAIMER & PRIVACY Important Information Use of Information and Materials
DISCLAIMER & PRIVACY Important Information By accessing and using this website (the Website ) and any web page hereof, you agree to be bound by the terms and conditions below. Reference to these general
More informationTechnology Safety Quick Tips
Technology Safety Quick Tips Spyware: Computer & Phone Monitoring Software It enables a person to secretly monitor someone else s entire computer activity. It can be installed remotely by sending an email,
More informationAcceptable Use Policy
IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations
More informationTERMS AND CONDITIONS FOR THE USE OF THE WEBSITE AND PRIVACY POLICY
TERMS AND CONDITIONS FOR THE USE OF THE WEBSITE AND PRIVACY POLICY Trademarks-Intellectual Property Rights Xtrade BLZ (hereinafter called the Company or we or us) is the owner of the Copyright in the pages
More informationDate Approved: Board of Directors on 7 July 2016
Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory
More informations, Texts and Social Media: What Physicians Need to Know
Emails, Texts and Social Media: What Physicians Need to Know 1 Today s Learning Objectives By the end of today s program, you will be able to : Identify the risks to patients privacy which email, text
More informationOutsourcing und Data Protection
Outsourcing und Data Protection Clara-Ann Gordon IAPP Workshop on Outsourcing, 9 May 2017 Subject Matter Outsourcing: depending on area different meaning and requirements However always personal data are
More informationDATA PROTECTION LAWS OF THE WORLD. Bahrain
DATA PROTECTION LAWS OF THE WORLD Bahrain Downloaded: 7 April 2018 BAHRAIN Last modified 25 January 2017 LAW There is currently no standalone data protection law in Bahrain. A draft is being reviewed before
More informationPCA Staff guide: Information Security Code of Practice (ISCoP)
PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Information Risk and Privacy Version 2015.1.0 December 2014 PCA Information Risk and Privacy Page 1 Introduction Prudential Corporation
More informationComputer Use and File Sharing Policy
Computer Use and File Sharing Policy Williamson College recognizes the value of computer and other electronic resources to improve student learning and enhance the administration and operation of its school.
More informationFORT STEWART INSTALLATION CAMPUS AREA NETWORK (ICAN) ACCEPTABLE USE POLICY (AUP)
FORT STEWART INSTALLATION CAMPUS AREA NETWORK (ICAN) ACCEPTABLE USE POLICY (AUP) For use of this form, see AR 25-2, Army Best Business Practice 06-PR-M-0003, IA Control ECWM SECTION I - ACCEPTABLE USE
More informationSpringfield, Illinois Police Department
Directive Number: ADM-46 01-084 Issue Date: 05/28/01 Distribution: C,E* Revision Dates: 06/01/01 Effective Date: 06/01/01 Related CALEA Standards: 82.1.7 References: CALEA Standards Manual Rescinds: ADM-46/01-015
More informationFirst National Bank and Trust P. O. Box 100 London, KY Attention: Statements
is pleased to offer Email Statements. These statements are an electronic version of the paper statements that are delivered to customers, and will include check images. Since email statements do not rely
More informationLesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA)
Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA) Introduction: Welcome to Honesty and Confidentiality Lesson Three: The False Claims Act is an important part
More informationMotorola Mobility Binding Corporate Rules (BCRs)
Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,
More informationFreedom of Information and Protection of Privacy (FOIPOP)
Freedom of Information and Protection of Privacy (FOIPOP) No.: 6700 PR1 Policy Reference: 6700 Category: FOIPOP Department Responsible: Records Management and Privacy Current Approved Date: 2008 Sep 30
More information2017_Privacy and Information Security_English_Content
2017_Privacy and Information Security_English_Content 2.3 Staff includes all permanent or temporary, full-time, part-time, casual or contract employees, trainees and volunteers, including but not limited
More informationInternet, , and Computer Usage Policy
Important disclaimer: The policy available on this page is only an example and is furnished merely as an illustration of its category. It is not meant to be taken and used without consultation with a licensed
More informationAcceptable Use Policy
Acceptable Use Policy Effective: September 2, 2016 Purpose Montreat College is committed to protecting its employees, partners, and itself from illegal or damaging actions by individuals, either knowingly
More informationCase 2:07-cv MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA
Case 2:07-cv-04756-MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA RHOADS INDUSTRIES, INC. : CIVIL ACTION : v. : : NO. 07-4756
More informationCONFLICT OF INTEREST SYSTEMS
CONFLICT OF INTEREST SYSTEMS Conflicts of interest can lead to serious malpractice and ethical problems. To detect conflicts, a good conflicts checking system is essential. No lawyer can remember every
More informationDepartment of Public Health O F S A N F R A N C I S C O
PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:
More informationThe Table Privacy Policy Last revised on August 22, 2012
The Table Privacy Policy Last revised on August 22, 2012 The Table, an online venue through which your organization and its members/employees can connect to better fulfill its mission respects and is committed
More informationCorporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial
Corporate Policy Information Systems Acceptable Use Document No: ISY-090-10 Effective Date: 2014-06-10 Page 1 of 5 Rev. No: 0 Issuing Policy: Information Systems Department Policy Originator: Erick Edstrom
More informationII.C.4. Policy: Southeastern Technical College Computer Use
II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer
More informationClear Creek Communications. Open Internet Policy
Clear Creek Communications Open Internet Policy Clear Creek Communications ( the Company ) has adopted the following Open Internet Policy for its broadband Internet access services. These practices, characteristics,
More informationCELLULAR TELEPHONE USE POLICY
CLACKAMAS COUNTY EMPLOYMENT POLICY & PRACTICE (EPP) EPP # 50 Implemented: 01/01/03 Clerical Update: 09/05, 11/06, 12/07 CELLULAR TELEPHONE USE POLICY DEFINITION: References to cell phones include cell
More informationA Homeopath Registered Homeopath
A Homeopath Registered Homeopath DATA PROTECTION POLICY Scope of the policy This policy applies to the work of homeopath A Homeopath (hereafter referred to as AH ). The policy sets out the requirements
More informationCustomer Proprietary Network Information
Customer proprietary network information (CPNI) means information that relates to the quantity, technical configuration, type, destination, location, and amount of use of our service by you and information
More informationELECTRONIC MAIL POLICY
m acta I. PURPOSE The Information Systems (IS) Department is responsible for development and maintenance of this policy. The Finance and Administration Division is responsible for publishing and distributing
More informationThe University of Tennessee. Information Technology Policy (ITP) Preamble
Preamble The policy for Use of Information Technology Resources at the University of Tennessee (UT) (Section 135, Part 01, of UT s Fiscal Policy Manual) regulates use of the University's information technology
More informationHIPAA Security and Privacy Policies & Procedures
Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400
More informationFarmers Mutual Telephone Company. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and
Farmers Mutual Telephone Company Broadband Internet Access Services Network Management Practices, Performance Characteristics, and Commercial Terms and Conditions for Fixed Services Farmers Mutual Telephone
More informationOPD PRESS/PUBLIC COMMENT/LEGISLATIVE/GUBERNATORIAL/ COMMENT POLICY (rev )
OPD PRESS/PUBLIC COMMENT/LEGISLATIVE/GUBERNATORIAL/ COMMENT POLICY (rev. 1-2017) I. MEDIA CONTACTS A. OPD Employees Need Advance Approval Before Making Public Statements or Responding to Media Requests
More informationAcceptable Use of Systems Policy Version # 3.3 Effective September 8, 2017
Acceptable Use of Systems Policy Version # 3.3 Effective September 8, 2017 Copyright 2017 California ISO Acceptable Use of Systems Policy, Version #3.3 REVISION HISTORY VERSION SUGGESTED REVISED DATE NO.
More informationRecord Keeping Best Practice. Distinguish between University and Non-University Records
UNIVERSITY SECRETARIAT Gilmour Hall, Room 210 Phone: 905.525.9140, Ext. 24337 Board of Governors 1280 Main Street West Fax: 905.526.9884 Senate Hamilton, Ontario, Canada E-mail: univsec@mcmaster.ca L8S
More informationThis regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.
UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities
More informationWireless Network Policy and Procedures Version 1.5 Dated November 27, 2002
Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Pace University reserves the right to amend or otherwise revise this document as may be necessary to reflect future changes made
More informationRe: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog
April 6, 2012 National Institute of Standards and Technology 100 Bureau Drive, Stop 1070 Gaithersburg, MD 20899-1070 Re: Special Publication 800-53 Revision 4, Security Controls of Federal Information
More informationApex Information Security Policy
Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8
More informationDonor Credit Card Security Policy
Donor Credit Card Security Policy INTRODUCTION This document explains the Community Foundation of Northeast Alabama s credit card security requirements for donors as required by the Payment Card Industry
More informationPrivacy Policy. 1. Information may collected by Feelingtouch
Privacy Policy When you use Feelingtouch game software or accept Feelingtouch game services, Feelingtouch may collect and use your relevant information. Feelingtouch promises to strictly protect your privacy.
More informationFunding University Inc. Terms of Service
Funding University Inc. Terms of Service None of the information contained in Funding University's website constitutes a recommendation, solicitation or offer by Funding University or its affiliates to
More informationHIPAA UPDATE. Michael L. Brody, DPM
HIPAA UPDATE Michael L. Brody, DPM Objectives: How to respond to a patient s request for a copy of their records. Understand your responsibilities after you send information out to another doctor, hospital
More informationVETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES
VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES PLEASE READ THIS PRIVACY POLICY CAREFULLY BEFORE USING THIS SITE. Last Updated: January 01, 2015 Direct Vet Marketing, Inc. (hereinafter,
More informationCOUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9
ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,
More informationThe University of Texas at El Paso. Information Security Office Minimum Security Standards for Systems
The University of Texas at El Paso Information Security Office Minimum Security Standards for Systems 1 Table of Contents 1. Purpose... 3 2. Scope... 3 3. Audience... 3 4. Minimum Standards... 3 5. Security
More informationWHEN TO HOLD YOUR TONGUE - THE BENEFITS AND RISKS OF SELF-DISCLOSURE. WHAT IS A PHYSICIAN PRACTICE TO DO? October 13, 2009
, II C II EA i :1'11 C.\Il C(HI l' I.L\ '" C..\SSOCIATI \"'l\lull...... Ii \ ~ L~ WHEN TO HOLD YOUR TONGUE - THE BENEFITS AND RISKS OF SELF-DISCLOSURE WHAT IS A PHYSICIAN PRACTICE TO DO? October 13, 2009
More informationGOCO.IO, INC TERMS OF SERVICE
GOCO.IO, INC TERMS OF SERVICE GoCo.io, Inc. ("GoCo", the "Site", "https://www.goco.io") welcomes you! GoCo provides services to you subject of the following terms of service (the "Agreement"). The Agreement
More informationHIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012
HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice
More informationDONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY
DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an
More informationTIME SYSTEM SECURITY AWARENESS HANDOUT
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/16/2017 2018 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
More information3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )?
Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What Every In-House Attorney Needs to Know Presented by Mike Seitz, Attorney at Spencer Fane LLP March 14, 2018 What
More information