Overwhelmed by ? Best Practices for Ethics, Discovery and Trial Evidence

Similar documents
Autofill and Other Disasters: The Ethics of Inadvertent Disclosures

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace

R E F E R E N C E L I B R A R I A N. Jane Larrington Faculty Services & Reference Librarian sandiego.edu

University Policies and Procedures ELECTRONIC MAIL POLICY

Motorola Mobility Binding Corporate Rules (BCRs)

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

Federal Rules of Civil Procedure IT Obligations For

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

Data Processing Agreement

Islam21c.com Data Protection and Privacy Policy

DATA PROCESSING AGREEMENT

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

Subject: Kier Group plc Data Protection Policy

1 About GfK and the Survey What are personal data? Use of personal data How we share personal data... 3

CONFLICT OF INTEREST SYSTEMS

Online Ad-hoc Privacy Notice

Disaster Preparedness + Cloud Computing. Jack Newton CEO + Founder Clio

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers

General Legal Requirements under the Act and Relevant Subsidiary Legislations. Personal data shall only be processed for purpose of the followings:

CTI BioPharma Privacy Notice

Acceptable Use Policy

PRIVACY POLICY Last Updated May, 2018

GENERAL OPERATIONS MANUAL FOR ASTM PERSONNEL CERTIFICATE PROGRAMS

PRIVACY POLICY PRIVACY POLICY

Data Protection Policy

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Employee Security Awareness Training Program

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

Privacy Policy. Effective date: 21 May 2018

Data Processing Agreement for Oracle Cloud Services

Computer Use and File Sharing Policy

Data Processing Clauses

Privacy notice. Last updated: 25 May 2018

8/28/2017. What Is a Federal Record? What is Records Management?

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

Safeguarding Attorney-Client Privilege in a Wireless World

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose

The HIPAA Omnibus Rule

Summer 2014, Vol. 23 No. 3

EMPLOYEE COMPUTER, , AND INTERNET USAGE POLICY

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures

HPE DATA PRIVACY AND SECURITY

Data Leak Protection legal framework and managing the challenges of a security breach

UWTSD Group Data Protection Policy

Mobile Wallet Service Terms and Conditions

COMMENTARY. Information JONES DAY

Last updated 31 March 2016 This document is publically available at

Freedom of Information and Protection of Privacy (FOIPOP)

Red Flags/Identity Theft Prevention Policy: Purpose

Terms and Conditions for MPF e-statement/e-advice Service ( Terms and Conditions )

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

2018 HOT TOPICS LEGAL TRENDS IMPACTING PUBLIC TRANSIT

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other

Privacy Breach Policy

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

MEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL

Privacy Shield Policy

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

Policy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents

DATA PROTECTION LAWS OF THE WORLD. Bahrain

Data Processor Agreement

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6

Shaw Privacy Policy. 1- Our commitment to you

Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson

Cleveland State University General Policy for University Information and Technology Resources

Throughout this Data Use Notice, we use plain English summaries which are intended to give you guidance about what each section is about.

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.

Data Processing Agreement

The Apple Store, Coombe Lodge, Blagdon BS40 7RG,

Acceptable Use Policy

Checklist: Credit Union Information Security and Privacy Policies

DCU Guide to Subject Access Requests. Under Irish Data Protection Legislation

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

Emergency Nurses Association Privacy Policy

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003

Building a Privacy Management Program

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

19 Dec The forwarding and returning obligation does not concern messages containing malware or spam.

HIPAA Security Manual

DATA PROTECTION POLICY THE HOLST GROUP

Learning Management System - Privacy Policy

SOUTHERN CALIFORNIA EDISON COMPANY

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

Privacy policy. Definitions and interpretation

Cyber Risks in the Boardroom Conference

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

Rights of Individuals under the General Data Protection Regulation

Putting It All Together:

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY

Financial Planning Standards Council 2016 ENFORCEMENT AND DISCIPLINARY REVIEW REPORT

Shielding the Organization from Data Risk & E- Discovery Failures

Lusitania Savings Bank Retail Internet Banking Terms and Conditions

Security and Privacy Breach Notification

PRIVACY 102 TRAINING FOR SUPERVISORS. PRIVACY ACT OF U.S.C.552a

DATA SUBJECT ACCESS REQUEST PROCEDURE

Procedures for responding to requests for personal data to support Data Protection Policy

Data Processing Agreement

Transcription:

Overwhelmed by Email? Best Practices for Ethics, Discovery and Trial Evidence THE ETHICS OF EMAIL Lynda C. Shely The Shely Firm, PC Scottsdale, Arizona 1. Definitions and Basic Ethics Standards Emails are just another form of written communication for lawyers. They are considered writings according to the ABA Model Rules of Professional Conduct, and as such, lawyers should treat them the same way they treat letters and pleadings. The following sets forth some of the basic ethical obligations related to emails. a. Emails are writings The ABA Model Rules of Professional Conduct ( ERs ), ER 1.0 contains various definitions, including: (n) Writing or written denotes a tangible or electronic record of a communication or representation, including handwriting, typewriting, printing, photostating, photography, audio or video recording, and electronic communications. A signed writing includes an electronic sound, symbol or process attached to or logically associated with a writing and executed or adopted by a person with the intent to sign the writing. Practice Tip: Train all firm staff and lawyers to treat emails like letters including but not limited to PROOFREADING the written communication, assuming that the communication could be viewed by a judge someday, and refraining from casual, partial sentences and conversations in email communications. This reminder holds true for communications on a client matter that is sent to opposing counsel or experts. For instance, no lawyer would write a letter to an opposing counsel on behalf of a client and at the end of the letter say Hey, I ll see you for drinks at happy hour tonight. If a letter would not include such personal dialog, emails should not either b. Emails are part of a client file and must be preserved In most U.S. jurisdictions, clients own the file and are entitled to the entire contents of the file. For instance, Arizona Ethical Rule 1.16 Comment [9] provides: [9] Ordinarily, the documents to which the client is entitled, at the close of the representation, include (without limitation) pleadings, legal documents, evidence, discovery, legal research, work product,

transcripts, correspondence, drafts, and notes, but not internal practice management memoranda. A lawyer shall not charge a client for the cost of copying any documents unless the client already has received one copy of them. This means that all law firms must have the ability to store, retrieve and search emails, by client, to provide clients with copies of the emails upon request or termination of the representation. Preserving written communications as part of the client file includes preserving email communications with anyone about a client s matter not just emails to and from the client. Practice Tip: Include a clause in fee agreements that inform clients that they will receive copies of all emails regarding their matter and that the clients should maintain those copies as part of their client files. c. Lawyers are required to be competent in relevant technology Seriously. The ABA amended the Comments to ER 1.1, the rule on competence, to remind lawyers that, in addition to staying current on their practice areas, lawyers also have a duty to stay current and competent on relevant technology. Comment [8] to ER 1.1 now requires: [8] To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. While lawyers are not required personally to understand all technology, they are required to at least hire information technology personnel who understand relevant technology and the firm s obligations to maintain competence and confidentiality. Lawyers who fail to maintain their understanding of technology and fail to keep current on changes in technology can violate the Ethical Rules, get sanctioned by courts, and be sued for malpractice if the failure falls below the standard of care. For instance, in Communications Network Int l, Ltd. v. MCI Worldcom Communications Inc., Docket Nos. 10-4588 (L), 11-0408 (XAP) (2d. Cir. Jan. 12, 2012) a lawyer s failure to update his email address in the court s electronic case records was held by the court to be indefensible and did not excuse his delayed filing of an appeal, which was denied as untimely. See also In the Matter of Cynthia E. Collie, Appellate Case No. 2012-213164 (Sup.Ct. S.Car. Oct. 17, 2013)(interim suspension for failing to provide the Bar and Court with a current email address that the lawyer reviews and responds to on a regular basis). Practice Tip: Either understand your jurisdiction s requirements for maintaining current email addresses or hire personnel who will keep lawyer email addresses current. d. Lawyers are required to ask clients if they want to communicate by email. And lawyers need to inform clients to use a secure address that only they are authorized to view because lawyers have an ethical obligation to maintain confidentiality. Contrary to the common misperception that only privileged information is confidential, under the Ethical Rules ALL INFORMATION about the representation is confidential and lawyers have a mandatory duty to preserve that confidentiality. ER 1.6 explains: (a) A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent, the disclosure is impliedly authorized in order to carry out the representation or the disclosure is permitted by paragraph (b). In addition, paragraph (c) of Model Rule 1.6 explains: (c) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client. This provision was added by the ABA after the 20/20 Commission s recommendations to preserve confidentiality when using technology. The following comment to ER 1.6 further explains a lawyer s obligations to follow

reasonable measures to preserve confidentiality and to discuss with clients if they have any heightened security requirements for such things as government clearances: [18] Paragraph (c) requires a lawyer to act competently to safeguard information relating to the representation of a client against unauthorized access by third parties and against inadvertent or unauthorized disclosure by the lawyer or other persons who are participating in the representation of the client or who are subject to the lawyer s supervision. See Rules 1.1, 5.1 and 5.3. The unauthorized access to, or the inadvertent or unauthorized disclosure of, information relating to the representation of a client does not constitute a violation of paragraph (c) if the lawyer has made reasonable efforts to prevent the access or disclosure. Factors to be considered in determining the reasonableness of the lawyer s efforts include, but are not limited to, the sensitivity of the information, the likelihood of disclosure if additional safeguards are not employed, the cost of employing additional safeguards, the difficulty of implementing the safeguards, and the extent to which the safeguards adversely affect the lawyer s ability to represent clients (e.g., by making a device or important piece of software excessively difficult to use). A client may require the lawyer to implement special security measures not required by this Rule or may give informed consent to forgo security measures that would otherwise be required by this Rule. Whether a lawyer may be required to take additional steps to safeguard a client s information in order to comply with other law, such as state and federal laws that govern data privacy or that impose notification requirements upon the loss of, or unauthorized access to, electronic information, is beyond the scope of these Rules. For a lawyer s duties when sharing information with nonlawyers outside the lawyer s own firm, see Rule 5.3, Comments [3]-[4]. The ABA Ethics Committee issued Opinion 11-459, which expressly noted that lawyers must warn clients to avoid communicating with the firm using public computers (such as in hotels or libraries) and to use an email address for which only the client is authorized to view the emails. This means reminding clients to avoid using work email addresses or an address for which a soon-to-be ex-spouse has the password. Practice Tip: Include a clause in all engagement letters/fee agreements that informs clients the firm may communicate with them by email and will use the email addresses the clients provide, and remind clients to use addresses that only they are authorized to view in order to maintain both attorney/client privilege and confidentiality. e. The ethical duty to communicate promptly includes responding to emails. ABA Model Rule of Professional Conduct 1.4 requires: (a) (b) A lawyer shall: (1) promptly inform the client of any decision or circumstance with respect to which the client's informed consent, as defined in Rule 1.0(e), is required by these Rules; (2) reasonably consult with the client about the means by which the client's objectives are to be accomplished; (3) keep the client reasonably informed about the status of the matter; (4) promptly comply with reasonable requests for information; and (5) consult with the client about any relevant limitation on the lawyer's conduct when the lawyer knows that the client expects assistance not permitted by the Rules of Professional Conduct or other law. A lawyer shall explain a matter to the extent reasonably necessary to permit the client to make informed decisions regarding the representation. The ABA added to the Comments to ER 1.4 that lawyers at least need to acknowledge client communications promptly. This means lawyers should respond to client communications in a prompt manner (ideally 48 hours) OR ACTIVATE AN OUT-OF-OFFICE AUTO RESPONSE. Managing client expectations is one of the key components both to avoiding Bar grievances and to keeping clients satisfied. Tell clients if you are going to be out of the office for

a trial and not able to respond to email timely or use an out of office message. Caution: Do not use a permanent automated message as some lawyers try to use (e.g. I don t check my email regularly. Please contact my secretary. ). Also, when attempting to respond to emails promptly, avoid the inclination to try to give quick substantive responses. Thinking about a legal question is still required. Practice Tip: At least try to acknowledge all emails within 48 hours even if the acknowledgement must be thanks for your email. I m in trial this week and will need to get back to you next week. A subcategory of promptly responding to emails is to establish protocols for handling emails sent to an email address at the firm for a lawyer who has left the firm. The Philadelphia Bar Association issued Opinion 2013-4, which confirmed that a law firm not only may read emails sent to a firm email address for a departed lawyer, but the firm should read the emails to assure that client matters are not missed. The firm should not just have messages bounce back to the sender, and should provide senders with the departed lawyer s current contact information and must forward email messages to the departed lawyer on matters that went with him or her. Note that hacking into the email of a former attorney at your firm or opposing counsel not only is an ethics violation but also a crime. See ABA Journal by Martha Neil, Partner reprimanded after taking plea in attorney email hacking case, has also settled lawsuit (Aug. 7, 2013). f. Ethical duty to train and supervise law firm staff on the use of email. There actually is an ethical rule that requires lawyers to supervise staff. ER 5.3 provides: With respect to a nonlawyer employed or retained by or associated with a lawyer: (a) a partner, and a lawyer who individually or together with other lawyers possesses comparable managerial authority in a law firm shall make reasonable efforts to ensure that the firm has in effect measures giving reasonable assurance that the person's conduct is compatible with the professional obligations of the lawyer; (b) a lawyer having direct supervisory authority over the nonlawyer shall make reasonable efforts to ensure that the person's conduct is compatible with the professional obligations of the lawyer; and (c) a lawyer shall be responsible for conduct of such a person that would be a violation of the Rules of Professional Conduct if engaged in by a lawyer if: (1) the lawyer orders or, with the knowledge of the specific conduct, ratifies the conduct involved; or (2) the lawyer is a partner or has comparable managerial authority in the law firm in which the person is employed, or has direct supervisory authority over the person, and knows of the conduct at a time when its consequences can be avoided or mitigated but fails to take reasonable remedial action. Lawyers are responsible for assuring all staff, including contract labor and outside service providers (such as IT companies and delivery services), understand and comply with the lawyer s ethical obligations. This means training staff on using their non-lawyer titles when signing emails, using professional language and complete sentences in email communications about client matters, and preserving client-related emails. Practice Tip: Have regular employee/contract labor trainings on both ethical requirements and professionalism topics. Practice Tip II: If employees and/or attorneys can access firm email/contact information/data on their personal phones/ipads/laptops, the firm must have a BYOD policy to assure that employees/lawyers never leave the firm with confidential information and never trigger a data breach by losing their phone and not having a) a password on it; and b) remote erase capability. g. Maintain professionalism at all times in all communications means reminding lawyers and staff that email communications must be professional in tone and content.

Unfortunately, there are many examples of lawyers engaging in less than professional vocabulary and comments in email communications both internal and external. Just a few recent examples of what your law firm would not like to see in the news: And opposing counsel: The Florida Supreme Court disciplined both lawyers; according to the ABA Journal article and the St. Petersburg Times, Mr. Mooney received a public reprimand and was ordered to take a class on professionalism and Mr. Mitchell was suspended for 10 days and ordered to attend an anger management class. In another legal news story that no firm wants to have as the ABA Journal news title: Churn that bill, baby! email surfaces in fee dispute with DLA Piper Posted Mar 25, 2013 2:54 PM CST By Martha Neil ABA Journal The quote is from an internal email between lawyers at DLA Piper that was produced when the firm sued a client for fees. The firm s explanation of the email communications was, the emails were in fact an offensive and inexcusable effort at humor, but in no way reflect actual excessive billing. DLA Piper, a well-respected large firm, now has to take the time to deal with negative press over comments that presumably were meant only to be viewed internally

and intended to be funny and those internal communications became very public when the firm decided to sue for the fees owed by the client. Lawyers are human. Lawyers are permitted to get angry, have a sense of humor, or think hostile thoughts towards others but lawyers and staff must remember that those thoughts should not appear in any writing including emails. 2. Practical Ethics Procedures for Managing Email Based upon the ethical obligations discussed above, law firms should have written policies and procedures that at a minimum cover the following email topics: a. Emails are writings just like letters and other correspondence, which means law firms ethically must: 1. Preserve client-related email communications in a searchable format; 2. Provide clients with copies of all emails upon request or termination of the representation; 3. Obtain client consent to communicate with clients via email and inform clients that they must use an email address that is secure; and 4. Confirm if clients have any heightened security requirements that would prohibit email communication and/or cloud data storage. b. Law firms ethically must educate lawyers and staff about: 1. The ethical obligation to preserve client confidentiality, including assuring the security of email communications about client matters (including storage and transmission of data and obtaining clawback agreements in litigated matters); 2. The need to keep courts, bar associations, and others apprised of changes in email contact information for the law firm; 3. Changes in technology so that firm lawyers assure that the changes comport with their ethical obligations; 4. The firm s data and file retention protocols including any litigation hold requirements and any changes in ethical requirements for data retention; 5. The ethical obligation to review and acknowledge promptly all communications from clients including emails; 6. The ethical obligation to supervise staff including assuring their professional use of email communications on behalf of and with clients and securing email accessed on personal phones/computers; and 7. The firm s professional reputation and image exists through both the legal work performed by lawyers and through communications online from everyone who works at the firm not just the lawyers.