Download - 5 19 09 Brandeis Lawyer Technology CLE
![Page 1: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/1.jpg)
ETHICAL CHALLENGES OFTECHNOLOGY USE
BY ATTORNEYSProfessor Jonathan I. Ezor ‘89
Brandeis University Alumni Association
New York City ChapterCLE Presentation
May 19, 2009
![Page 2: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/2.jpg)
Computers and Technology Embedded in Legal Practice
• Document creation and management• Communication with clients, courts, government• Back office management• Legal and business research• Advertising and marketing• Courtroom presentation and practice
![Page 3: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/3.jpg)
All Professionals Face Issues Depending On Technology
• Reliability of hardware/software can affect business
• Employee abuse of Internet leads to lost productivity
• Costs of acquisition, support can be extensive• Vulnerability to viruses, spyware
![Page 4: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/4.jpg)
Legal Practice Raises Additional Concerns
• Confidentiality• Unauthorized practice• Verifiability of sources• Uneven “playing field” in courtroom• Electronic discovery• Others
![Page 5: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/5.jpg)
Confidentiality:Absolute Obligation, Serious
Questions• Attorneys must keep client information
confidential• Obligation extends to non-attorneys within
practice• Failure to protect can lead to malpractice claims,
loss of license
![Page 6: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/6.jpg)
Networking And Connectivity Open Many “Holes” in Firm
Walls• Internet connectivity links firm’s files to whole
world• Internet’s architecture puts many parties between
sender and recipient• Possibility of serious accidental disclosures
– Misaddressed e-mails– Wrong files attached
![Page 7: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/7.jpg)
Mobile Devices & Telecommuting:
Additional Confidentiality Risks• Attorneys carry entire client files, critical
documents on laptops, PDAs, hiptops– Easily lost or stolen– Often not protected with passwords
• Many work from home over unsecured wireless networks
• Public computers (hotels, business centers) can store info. in memory
![Page 8: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/8.jpg)
Protecting Confidentiality Requires Training and
Procedures• All service providers, IT consultants should sign
written NDA• Staff must be trained on proper e-mail use,
avoiding typical errors• E-mail should be encrypted when feasible• For sensitive material/practices, consider
disconnecting e-mail from system
![Page 9: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/9.jpg)
![Page 10: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/10.jpg)
![Page 11: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/11.jpg)
![Page 12: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/12.jpg)
![Page 13: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/13.jpg)
![Page 14: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/14.jpg)
Scott v. Beth Israel Medical Center, Inc., 17 Misc.3d 934, 847 NYS2d 436
(Sup. Ct., NY Co. 2007)
![Page 15: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/15.jpg)
3 Other Recent Cases About
E-mail Confidentiality• Orbit One Communications, Inc. v. Numerex
Corp., 2008 WL 4778133 (SDNY 2008)• Pure Power Boot Camp v. Warrior Fitness Boot
Camp, 587 F.Supp2d 548 (SDNY 2008)• Steingart v. Loving Care, No. BER-L-858-08 (N.J.
Super. Ct. Law Div. Feb. 5, 2009)
![Page 16: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/16.jpg)
Steingart v. Loving Care
Consequently, when plaintiff decided to use company time, equipment and resources to communicate with her attorney regarding the terms of her resignation from Loving Care, she proceeded with knowledge that such computer use and communications would not be private or personal to her. Plaintiff took a risk of disclosure of her communications and a risk of waiving the privacy she expected by way of the method she chose to communicate with her attorney.”
![Page 17: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/17.jpg)
E-mail, Blogs,Social Networking May
Reveal More Than Desired• Many firms and attorneys now publish “Blawgs”• Lawyers and law students using Facebook,
Twitter and other tools• Personal and professional line may blur• Texting and e-mails lack nuance, formality• Current and future employers, clients may read• Consequences can be embarrassing or worse
![Page 18: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/18.jpg)
![Page 19: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/19.jpg)
![Page 20: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/20.jpg)
![Page 21: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/21.jpg)
![Page 23: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/23.jpg)
![Page 24: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/24.jpg)
![Page 25: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/25.jpg)
Unauthorized Practice: Where In The World is The Client?
• Many Web sites offer legal information, form documents which could be “practicing law”
• Almost impossible to limit where site will be viewed
• Disclaimers, careful review of text essential• Issue faced by in-house counsel as well
![Page 26: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/26.jpg)
![Page 27: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/27.jpg)
Verifiability of Sources:Can the Internet Be Trusted?• Web offers attractive alternative to traditional and
electronic research– Zero- or low cost– Easy cut-and-paste– Clients balk at paying Lexis/Westlaw fees
• Younger professionals turn naturally to Internet• Some information available only/first on ‘Net
![Page 28: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/28.jpg)
Double Trouble of Internet: Reliability and Currency
• Difficult to determine whether Web sites are accurate, complete– Legitimate-looking sites can be fraudulent (“phishing”)– Few sites offer guarantees of accuracy– Can be problem to determine who owns/runs site
• Even official sites may not be current• Need to check “pocket part,” whether literal or
figurative, before relying on material• Online forms tempting for both lawyers and
clients
![Page 29: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/29.jpg)
![Page 30: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/30.jpg)
Litigation Technology: High Stakes, Frequent Mistakes
• Courtroom technology increasing– Presentation graphics– Multimedia exhibits
• Well-funded litigants with high-tech “toys” may dazzle jury
• Unfamiliarity with technology can impede rather than help case
• Best approach: Careful choice of technology, extensive rehearsal
![Page 31: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/31.jpg)
Electronic Discovery: Giving and Receiving
• Many cases now hinge on digitally-stored materials– E-mail– Memoranda– Web sites
• Unfamiliar attorneys may request too little, produce wrong/too much material
• Spoliation issues for both clients and attorneys• Critical to enlist computer forensics consultants
![Page 32: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/32.jpg)
![Page 33: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/33.jpg)
![Page 34: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/34.jpg)
Malicious Hacking:
• Long Island law firm brought Web server in-house
• Consultant failed to close security holes• Firm ended up hosting Eastern European porn
server
“The Case of the Law Firm Porn Server”
![Page 35: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/35.jpg)
![Page 36: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/36.jpg)
![Page 37: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/37.jpg)
With Digital Records, Backups Required by Ethics and Best
Practices• Firms keep documents, client records electronically• Natural, man-made disasters can make them inaccessible
– 9/11 and other terrorist attacks– Hurricanes– Blackouts
• Failure to make backups could be grounds for sanctions• Not just onsite but offsite backups critical
![Page 38: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/38.jpg)
Departing Employees: Huge Storage Comes in Small
Packages• Departing employees can be security concern• New storage devices (SD/CF, USB keys, MP3
players, PDAs, burners) permit wholesale removal of information
• Access controls, tracking of files essential in preventing, detecting info. theft
![Page 39: 5 19 09 Brandeis Lawyer Technology CLE](https://reader033.vdocuments.us/reader033/viewer/2022060203/559effea1a28ab17378b4576/html5/thumbnails/39.jpg)
Knowledge, Policies and Procedures Must Work
Together To Minimize Risks• Adequate funding of IT staff, including training• Make sure attorneys and support staff given
proper education• Set up systems with legal practice concerns in
mind• Keep up with legal trade press, ethics opinions