29
9/14/2012 1 Ethics and Technology Michael Downey Litigation Partner, Armstrong Teasdale LLP Tried lawyer discipline cases in Missouri and Illinois Argued for lawyers before Missouri Supreme Court and Illinois ARDC Review Panel Expert witness on legal ethics in Missouri, Kansas, DC Teach legal ethics at Washington University and St. Louis University Chair-Elect, ABA Law Practice Management Section Former chair, Ethics & Technology Committee in the ABA Center for Professional Responsibility Technology Task Force, ABA Ethics 20/20 Commission About Myself

Download Mo LexPort Slides -- handout 9-2012armstrongteasdale.typepad.com/files/mo-lexport-slides----handout-9... · Ethics and Technology ... The New York Times has learned about

  • Upload
    vuduong

  • View
    218

  • Download
    1

Embed Size (px)

Citation preview

9/14/2012

1

Ethics and Technology

Michael Downey

Litigation Partner, Armstrong Teasdale LLP Tried lawyer discipline cases in Missouri and Illinois

Argued for lawyers before Missouri Supreme Court and Illinois ARDC Review Panel

Expert witness on legal ethics in Missouri, Kansas, DC

Teach legal ethics at Washington University and St. Louis University

Chair-Elect, ABA Law Practice Management Section

Former chair, Ethics & Technology Committee in the ABA Center for Professional Responsibility

Technology Task Force, ABA Ethics 20/20 Commission

About Myself

9/14/2012

2

A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.

Comment ...

Maintaining Competence

[6] To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject.

ABA Model Rule 1.1 Competence (8/2012)

ABA Model Rule 1.6 Confidentiality of Information (8/2012)

c) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.

9/14/2012

3

Diffusion of Innovation

Intentional Disclosure

9/14/2012

4

Websites = Advertisement

Accurate – Rule 4-7.1

Advertising – Rule 4-7.2 • Claims

• Disclaimers

"Specialist" or "Expert" – Rule 4-7.4

Firm names/URLs – Rule 4-7.5

9/14/2012

5

Web 1.0VisitorsHome PagesContentOne-wayRead

Web 2.0CommunityApplicationsConversationTwo-wayRead & Write

Blogs

9/14/2012

6

LinkedIn

Facebook

9/14/2012

7

Why Web 2.0?

Promote services Build community – and buzz Engage – and form relationships with – clients

and potential clients• Great way to track connections

Concerns Confidentiality Inadvertent clientsAdvertising regulations

• Accurate• Disclaimers• "Specialist"

9/14/2012

8

What Heightens Scrutiny

Claims about skill Claims of specialization Discussing past results Client (or other) testimonials Legal or accounting advice Pricing information

Client-related information Lack of disclaimers

Accurate Content?

9/14/2012

9

"Client" Recommendations

Whom Do You Know?

9/14/2012

10

Professional Services?

JD Supra

9/14/2012

11

GoogleDocs

Third Party Content

9/14/2012

12

Above the Law

Imposter Sites

9/14/2012

13

"MySpace"

Or Outer Space?

9/14/2012

14

The Robing Room

You Wrote What?

9/14/2012

15

Borrowing Another Firm's Brand

Protecting Data

9/14/2012

16

History of Data Migration

ThreatsElectronic Physical "Social engineering"

9/14/2012

17

PasswordsWhen are passwords requiredWhen must passwords be changed

• How complex must passwords be• Can they be reused• Where are reminders kept

Insecure Workstations What happens to computers when people go

home at night• Physical security (will they be stolen)• Do they remain on• Does the network remain open

How easy is it to gain access during the day• Receptionist• Vacant offices

9/14/2012

18

Relation with Data Storage/ISPDo your third-party providers have

written confidentiality obligationsWhen and how can your firm receive

• Information from system• Audit of sharing or disclosures

Access Problems Forwarding of email to personal account VOIP Telephone Use of public computers Use of unprotected WiFi systems

9/14/2012

19

Risk of Mobile DevicesWho is using a portable device and for what

• Do you need to worry about overtimeWhat protections existWhat backup systems exist

Lost or Stolen Mobile Devices

What backup capacity is available Are devices protected – password (or more)

• Screensaver protections• Encryption

Can the firm remotely lock/wipe devices

9/14/2012

20

NYT Learns of Goldman Trade's Legal Defense from Discarded Laptop The New York Times has learned about the legal defenses for a Goldman

Sachs trader from a discarded laptop discovered in a garbage area of a New York apartment building.

An artist and filmmaker gave legal materials from the laptop to the newspaper, saying a friend had discovered the computer in the garbage [in 2006]. Even after artist Nancy Cohen obtained the laptop, email messages for the defendant, Fabrice Tourre, continued streaming into the computer, the story says.

The documents include draft replies by Allen & Overy to a Securities and Exchange Commission lawsuit against Tourre, a midlevel executive at Goldman. The replies point the finger at other Goldman employees, including two lawyers, who worked on the same targeted deal as Tourre.

Cohen said she ignored the streaming messages until she heard news reports about Tourre and decided to turn over the materials to the Times.

ABA Journal Online, June 1, 2011

Unintended Disclosure

9/14/2012

21

Errant Emails

Is the email an improper solicitation Is the email spam (federal regulations) Would the email (inadvertently) disclose client

confidences Is the email going to the right people

• Reply all• AutoComplete

"Reply All"

9/14/2012

22

Possible Disclosure of Metadata How is the firm managing metadata Scrubber issues

• Default/override settings• Applicability to remote access• Availability for non-email files

Ease of .pdf creations

Ineffective Redactions

Document generated in word processing program Document redacted (usually with black

"highlighting") Document then converted (or printed or saved) as

.pdf for production

Result: redacted text likely available for "select text"tool

9/14/2012

23

Disposal of Obsolete Equipment/Data

Who is disposing of obsolete computers, flash drives, cell phones, palms, etc. What safeguards are being observed

What is happening with home computers

Data Recovery

9/14/2012

24

What Is Your Back-Up?

How readable are backup systems? Can data be accessed if computer system is

unusable?• Back-up data ≠ usable information

Undesirable Data

9/14/2012

25

Unsolicited (Non-Client) Data Website may invite communication – and thus

creation of lawyer- or accountant-client relationships• Listing of email addresses• Pop-up or click-through protections

Protocols (and education) for replying to unsolicited emails

What About Viruses

Status of firm virus protection Response to unsolicited emails

• Messages from impostors

9/14/2012

26

Spyware

What is your computer saying?

51

Discovery Issues

9/14/2012

27

Metadata Did you disclose it? Can you look for it? Can you use it if you find it?

Discovering Social Media – Limitations

Is the person represented? Prosecution of John Robertelli and Gabriel Adamo (NJ)

Is subterfuge used?

Even if subterfuge is not used, contacting a non-represented person with a "friend" request may be unethical

9/14/2012

28

Safest Approaches

Use publicly available information

Use ordinary discovery to obtain what is not publicly available

Preservation of Social Media

9/14/2012

29

Thank You Michael Downey

314-342-8072 direct

[email protected]