Legal Ethics and Technology: Complying With...

31
Legal Ethics and Technology: Complying With Changes to the Model Rules of Professional Conduct Best Practices to Protect Client Confidences and Advertise Legal Services Today’s faculty features: 1pm Eastern | 12pm Central | 11am Mountain | 10am Pacific The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions emailed to registrants for additional information. If you have any questions, please contact Customer Service at 1-800-926-7926 ext. 10. WEDNESDAY, DECEMBER 12, 2012 Presenting a live 90-minute webinar with interactive Q&A Jack Marshall, President, ProEthics, Alexandria, Va. Shannon Brown, Attorney, Law Office of Shannon Brown, Mount Joy, Pa. Jodi Cramer, Senior Air Staff Counsel, United States Air Force, Washington, D.C.

Transcript of Legal Ethics and Technology: Complying With...

Legal Ethics and Technology: Complying With

Changes to the Model Rules of Professional Conduct Best Practices to Protect Client Confidences and Advertise Legal Services

Today’s faculty features:

1pm Eastern | 12pm Central | 11am Mountain | 10am Pacific

The audio portion of the conference may be accessed via the telephone or by using your computer's

speakers. Please refer to the instructions emailed to registrants for additional information. If you

have any questions, please contact Customer Service at 1-800-926-7926 ext. 10.

WEDNESDAY, DECEMBER 12, 2012

Presenting a live 90-minute webinar with interactive Q&A

Jack Marshall, President, ProEthics, Alexandria, Va.

Shannon Brown, Attorney, Law Office of Shannon Brown, Mount Joy, Pa.

Jodi Cramer, Senior Air Staff Counsel, United States Air Force, Washington, D.C.

Sound Quality

If you are listening via your computer speakers, please note that the quality of

your sound will vary depending on the speed and quality of your internet

connection.

If the sound quality is not satisfactory and you are listening via your computer

speakers, you may listen via the phone: dial 1-866-570-7602 and enter your PIN

when prompted. Otherwise, please send us a chat or e-mail

[email protected] immediately so we can address the problem.

If you dialed in and have any difficulties during the call, press *0 for assistance.

Viewing Quality

To maximize your screen, press the F11 key on your keyboard. To exit full screen,

press the F11 key again.

For CLE purposes, please let us know how many people are listening at your

location by completing each of the following steps:

• In the chat box, type (1) your company name and (2) the number of

attendees at your location

• Click the SEND button beside the box

FOR LIVE EVENT ONLY

If you have not printed the conference materials for this program, please

complete the following steps:

• Click on the + sign next to “Conference Materials” in the middle of the left-

hand column on your screen.

• Click on the tab labeled “Handouts” that appears, and there you will see a

PDF of the slides for today's program.

• Double click on the PDF and a separate page will open.

• Print the slides by clicking on the printer icon.

Legal Ethics

And Technology:

Complying with Changes

To the Model Rules of

Professional Conduct

Best Practices to

Protect Client Confidences and

Advertise Legal Services

Sponsored by the

Legal Publishing Group

Of Strafford Publications

5

Your Presenters

Shannon Brown, Esq.

Attorney, Mount Joy, Pennsylvania

www.shannonbrownlaw.com

Jodi Cramer, Esq.

Senior Air Staff Counsel, specializing in

information law for the U.S. Air Force* (*Acting in personal capacity, not as representative of Air Force)

Jack Marshall, Esq.

Attorney (Massachusetts and D.C.)

President, ProEthics, Ltd.

www.proethics.com

6

Introduction:

Why Technology is the

Achilles Heel of

Legal Ethics

A. Speed of Change

B. Increasing Reliance

C. The Cluelessness of Lawyers

►►►

7

D. The ABA: Technology-Related

Changes to the Model Rules

Approved by ABA House of

Delegates (10/6/12)

1. Technology, Competence & Confidentiality www.americanbar .org/content/dam/aba/administrative/ethics_2020/20120808

_revised_resolutiion_105a_as_amended.authcheckdam.pdf

►►►►

8

Rule 1.1: Competence

“A lawyer shall provide competent representation to a client. Competent

representation requires the legal knowledge, skill, thoroughness, and

preparation reasonably necessary for the representation.”

Comment: Maintaining Competence

“[6] To maintain the requisite knowledge and skill, a lawyer should keep abreast

of changes in the law and its practice, including the benefits and risks associated

with relevant technology, engage in continuing study and education and comply

with all continuing legal education requirements to which the lawyer is

subject.”

9

Other Rules:

Rules 1.1, 1.4, 1.18, 4.4, 5.5, 7.1, 7.3

http://www.americanbar.org/conent/dam/aba/administrative/ethics_

2020/2012_hod_annual_meeting_1-5b.authcheckdam.pdf

Rule 1.6 - Confidentiality of Information

“(c) A lawyer shall make reasonable efforts to prevent the inadvertent or

unauthorized disclosure of, or unauthorized access to, information relating

the representation of a client.”

►►►►

10

Rule 1.6 (cont.)

Comment: Acting Competently to Preserve Confidentiality

“[16]… The unauthorized access to, or the inadvertent or unauthorized disclosure of,

confidential information relating to the representation of a client does not constitute a

violation of paragraph (c) if the lawyer has made reasonable efforts to prevent the

access or disclosure. Factors to be considered in determining the reasonableness of the

lawyer’s efforts include, but are not limited to, the sensitivity of the information, the

likelihood of disclosure if additional safeguards are not employed, the cost of

employing additional safeguards, the difficulty of implementing the safeguards, and the

extent to which the safeguards adversely affect the lawyer’s ability to represent clients

(e.g., by making a device or important piece of software excessively difficult to use). A

client may require the lawyer to implement special security measures not required by

this Rule, or may give informed consent to forgo security measures that would

otherwise be required by this Rule. Whether a lawyer may be required to take

additional steps to safeguard a client’s information in order to comply with other law,

such as state and federal laws that govern data privacy or that impose notification

requirements upon the loss of, or unauthorized access to, electronic information, is

beyond the scope of these Rules.”

►►►► 11

Rule 1.6 (cont.)

Comment: Acting Competently to Preserve Confidentiality (cont.)

“[17] When transmitting a communication that includes information relating to the

representation of a client, the lawyer must take reasonable precautions to prevent the

information from coming into the hands of unintended recipients. This duty, however,

does not require that the lawyer use special security measures if the method of

communication affords a reasonable expectation of privacy. Special circumstances,

however, may warrant special precautions. Factors to be considered in determining the

reasonableness of the lawyer’s expectation of confidentiality include the sensitivity of

the information and the extent to which the privacy of the communication is protected

by law or by a confidentiality agreement. A client may require the lawyer to implement

special security measures not required by this Rule or may give informed consent to the

use of a means of communication that would otherwise be prohibited by this Rule.

Whether a lawyer may be required to take additional steps in order to comply with

other law, such as state and federal laws that govern data privacy, is beyond the scope

of these Rules.” 12

The Punt:

ABA Formal

Opinion 11-459

August 4, 2011

13

“Duty to Protect the Confidentiality of

E-Mail Communications with One’s Client”

“A lawyer sending or receiving substantive communications with a

client via e-mail or other electronic means ordinarily must warn the

client about the risk of sending or receiving electronic communica-

tions using a computer or other device, or e-mail account, where

there is a significant risk that a third party may gain access. In the

context of representing an employee, this obligation arises, at the very

least, when the lawyer knows or reasonably should know that the

client is likely to send or receive substantive client-lawyer

communications via e-mail or other electronic means, using a

business device or system under circumstances where there is a

significant risk that the communications will be read by the employer

or another third party.”

14

The

Technology

Culture:

Incursions and

Temptations in

Trials, Juries, and

Practice

15

• The Wired Client

• The Wired Juror

• The Wired Judge

• The Wired Lawyer

16

“Don’t

Get Cocky,

Kid…”

Old Technology That

Can Still Bite

17

E-Mail and Encryption 1. E-Mail is not as private as you think it is:

The Rehberg v. Paulk scare

2. Encryption issues: Types and Limitations

- at-rest encryption

- transient encryption

http://www.shannonbrownlaw.com/cms/archives/819

http://www.shannonbrownlaw.com/cms/archives/930

http://www.shannonbrownlaw.com/cms/archives/417

►►► 18

GMAIL

• Google’s computers scan your e-mail for key

words.

• They use those key words to provide

advertisements when you use GMAIL.

• Google stores all that data in their system to

send you targeted advertisements.

19

Metadata

Copy Machines Florida Bar Opinion 10-2

http://floridabar.org/tfb/TFBETOpin.nsf/SMTGT/ETHICS, %20OPINION%2010-2

San Diego County Bar Association

http://www.sdcba.org/index.cfm?pg=Legal-Ethics-Corner-4-11

YouTube

20

Laptops / PCs

►►►►

21

Safekeeping and Reporting

A. Client file as client property thus subject to safekeeping requirements.

ABA Model Rule 1.15 (“Safekeeping Property”) requires that client property should be

“appropriately safeguarded.” Client property generally includes files, information and documents, including those existing electronically.” (Emphasis added.)

B. Sample Act: Pennsylvania Breach of Personal Information Act

“An entity that maintains, stores, or manages computerized data that includes personal

information shall provide notice of any breach of the security of the system following

discovery of the breach of the security of the system to any resident of this Commonwealth

whose unencrypted and unredacted personal information was of is reasonably believed to

have been accessed and acquired by an unauthorized person.” 73P.S. 2303(a) (Emphasis

added.)

C.Interaction of the Data Breach Acts and the Rules of Professional Conduct:

An Ethical Dilemma?

22

Protecting the Data 1. Full~Disk Encryption

2. Up~To~Date Anti~Virus/Malware/Spyware, Firewalls

3. Up~To~Date Systems

4. Back~Ups

◊ Kelly Jackson Higgins, Half of Machines Shopping on Cyber Monday Likely

Contain Vulnerabilities, http://darkreading.com/insider-threat/167801100/

security/vulnerabilities/240142405/half-of-machines-shopping-on-cyber-

Monday-likely-contain-vunerabilities.html?cd=ni_DR_daily-2012-11-21_html&

elq=ecdae14b5a347ae180bdc5ad645ec990

23

The

New

Frontier

24

What is the Cloud?

25

Issues:

• Security

• Privacy

• E-discovery

• Records

26

Resources https://cio.gov/wp-content/

uploads/downloads/2012/09/

cloudbestpractices.pdf

http://www.shannonbrownlaw.com/

cms/archives/794

27

• Persistent

Cookies

• iPhones, Siri,

Apps & Privacy

►►►►

28

• Social Networking Sites

Facebook, Linked-In, Twitter, etc.

1. Informal Discovery

- Witnesses

- Jurors

2. Advertising

29

Ethical Practice

In

Technological

Turmoil:

Discussion

30

Legal

Publishing

Group Thanks To

Shannon Brown, Esq.

[email protected]

Jodi Cramer, Esq.

[email protected]

Jack Marshall, Esq.

[email protected]

For Their Participation In This Webinar (Power Point Created by Grace Bowen Marshall, ProEthics, Ltd.)

31