Unit 2: Practical and Ethical Considerations of a Paperless Law Office.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Protect Our Students Protect Ourselves
Working with the Internet
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
© The McCoy Law Firm 2012 James McCoy The McCoy Law Firm Coit Rd., Ste. 560 Dallas, Texas (214)
INDIANA UNIVERSITY OFFICE OF THE VICE PRESIDENT AND GENERAL COUNSEL Indiana Access to Public Records Act (APRA) Training.
Week Duty to keep quiet, not talk about cases By product of Fiduciary Duty 2. Right not to be forced to testify about communications --Statutory.
Complying with Privacy to Enable Innovation & Research
Privilege, Privacy, and Waiver. Privilege Attorney/Client In the law of evidence, a client's privilege to refuse to disclose, and to prevent any other.
Welcome to Class INTRODUCTION TO LEGAL TECHNOLOGY.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Advanced Civil Litigation Class 6Slide 1 Steps in Filing a Complaint First, the necessary complaint must be prepared. Make sure you attach the: First,
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
INTERNET and CODE OF CONDUCT
Law Office Equipment and Technology Some basic rules.
CPS Acceptable Use Policy Day 2 – Technology Session.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
HIPAA PRIVACY AND SECURITY AWARENESS.
Electronic Use Policies.   Social Media  Internet.
Unit 4: Electronic Documents and the Paperless Office.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Welcome to Class. The Syllabus Due dates for assignments (Tuesday of that Unit) Self-check quizzes Midterm project and midterm exam Final project Office.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Protecting and Sharing Documents Lesson 13. Objectives.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Protecting Students on the School Computer Network Enfield High School.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Data Mining Opinions Rita Assetto E-Discovery Fall 2009.
The Model Rules of Professional Conduct and Electronic Tools: How Ethical Rules Must Adapt to Address Current and Forthcoming Technologies By Melissa Freeman.
Unit 4: Electronic Documents and the Paperless Office.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Reminders Office hours Friday, from 1pm – 3pm EST Complete the Unit 6 test Participate on the discussion.
Kaplan University - Adjunct Professor Brian Tippens, J.D. - October 24, Welcome to Legal Ethics Unit One : Preview.
Chapter Three Confidentiality In this chapter, you will learn about: Basic principles of confidentiality The attorney-client privilege and the difference.
Unit 5 Midterm Review. What are some of the components of the ABA?
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
Mandatory online training. intro why we are doing this why you should care what we hope you get out of this.
John Steele, Attorney at Law. 2 Confidentiality 3 Topics 1. Definitions 2. Comparison 3. ABA Approach 1. Rule; Exceptions; Other rules 4. California.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Functions of Word Processing Software Preparing written forms of communications for clients, other lawyers,
Session 8 Confidentiality and disclosure. 1 Contents Part 1: Introduction Part 2: The duty of confidentiality Part 3: The duty of disclosure Part 4: Confidentiality.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Unit 2: Practical and Ethical Considerations of a Paperless Law Office.
Watech.wa.gov Records Management In a nutshell. watech.wa.gov What’s a record? A record is anything you create in the course of doing your work – Everything.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
Unit 3: Ethical Issues Surround Electronic Communications.
Unit 3: Ethical Issues Surround Electronic Communications.
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
The Paralegal Professional ESSENTIALS, 2/e By Cheeseman and Goldman PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ PA 101: Unit.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Seminar Topics Assignments due this week Functions of word processing software Microsoft Word features.
UNIT 4 Security Protocols. Seminar Topics Assignments this week Metadata – what is it? Security Protocols Next week—no seminar, no discussion—MIDTERM!!!
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Legal Ethics: Seminar 3  Quiz 2 Review  Questions  Confidentiality  Attorney-Client Privilege  Exceptions  Work Product Doctrine  Inadvertent Disclosure.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
1 Ethical Lawyering Spring 2006 Class 8. 2 Rest. 68 Except as otherwise provided in this Restatement, the attorney-client privilege may be invoked as.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Functions of Word Processing Software Preparing written forms of communications for clients, other lawyers,
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
PA 230 Unit 1, Lecture 2: Jeopardy PA 230 Jeopardy Class Rules Confidentiality E-Courthouse Paperless Tech in Law Firm Q $100 Q $200 Q $300 Q $400 Q.
PA 230 Unit 2 – Lecture 2  Wrap up and Review. Reminders  Read weekly announcements  Office hours Fridays from 1:00pm to 3:00pm EST  Written assignment.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Protect Our Students Protect Ourselves
HIPAA Privacy & Security
Privacy & Confidentiality
Move this to online module slides 11-56
Legal Ethics of Information Governance Presented by Sean Monahan
The Issues with Technology in education
HIPAA Privacy & Security
Presentation transcript:

Unit 2: Practical and Ethical Considerations of a Paperless Law Office.

Topics for Lecture Assignment this week Attorney-Client Privilege and Confidentiality

Reminders Read weekly announcements Office hours Written assignment due Tuesday One week to make up missed seminar Quiz due Tuesday (can take multiple times) Discussion board has TWO topics tabs

Written Assignment Written Assignment – Ethical Considerations for a law firm website Remember the formatting requirements point font Double-spaced, one-inch margins Header on every page Reference page Use the Model Rules provided in the assignment – cite the rule Provide an answer for each question

Introduction Today there are volumes of information at your fingertips 24/7 The Internet is used by legal professionals to communicate, market the business, engage in commerce, and research issues. Technology involving the Internet and ethical issues that can arise with use of electronic forms of communication are ever evolving

Technology and Confidentiality Legal assistants and nonlegal staff have access to confidential data and need to understand the nature of confidentiality so that client confidences are not disclosed Attorneys have a duty to keep client confidences, and those doing work for the attorney are similarly bound

Key Concepts for Confidentiality Duty of Confidentiality (and its exceptions) The Attorney-Client Privilege The Work Product Rule Inadvertent Disclosure

The Model Rules ABA Model Rule confidentiality Covers all client information, regardless of the source Allows disclosure to prevent client crimes only if the crime is likely to result in imminent death or substantial bodily harm

How Do the Ethics Rules Apply Confidentiality to Legal Assistants? Professional Responsibility Rules apply the duty of confidentiality to the lawyer’s employees and associates (including paralegals and computer consultants) NALA guidelines requires legal assistants to preserve client confidences and secrets before, during, and after the course of the professional relationship

The Attorney-Client Privilege Is related to the ethics duty of confidentiality Is found in witness competency statutes Is a rule of evidence (confidentiality is an ethical rule) Protects against compelled disclosure of confidential communications

Technology and Client Confidentiality Fax Machines Mobile or Cellular Phones According to the ABA and many jurisdictions, communicating in these ways does not violate the duty of confidentiality because there is a reasonable expectation of privacy with this technology, and because federal law prohibits wiretapping.

Protecting Against Breaches of Confidentiality Use encrypted Get client permission to communicate by Change computer passwords frequently Be careful on the phone Be careful in common office space Protect files and other client documents Remember the WWII phrase, “loose lips sink ships”

Protecting Against Inadvertent Disclosure  Mark protected or privileged materials in a permanent way  When in doubt about whether certain discovery materials should be sent to the other side, confirm with your lawyer  If you think you may have inadvertently sent protected materials, or have received privileged materials, tell someone quickly

Summarizing the Confidentiality Family Tree 1.The Duty of Confidentiality (ethics rules: MR 1.6 or DR 4-101)  prohibits the voluntary disclosure of client information 2.The Attorney-Client Privilege (witness competency statutes)  prevents compelled disclosure of confidential communications 3.The Work Product Rule (civ. pro. rule 26(b)(3))  presides over the discoverability of lawyer and employee-created evidence, prepared in connection to litigation 4.The Inadvertent Disclosure Doctrine (evidence rule 501(b))  provides the opportunity after fouling up

Network Computers A single computer faces security issues only for that computer When a computer is on a network, a breach of security on one computer can affect other computers on the network Limiting access to the network can help to ensure that the system and files stored on it are not corrupted

Security Protocols “Security Protocols” refers to securing communications between points within computer network and across Internet. There are software programs that can limit ability to access file server, workstations, printers, etc. on the network.

Network Rights and Privileges How can right to access server and other devices be limited to maximize security? 1: Who has access can be indicated. 2: It can be designated what type of info. can be stored on server. 3: How info. is disseminated can also be restricted.

Hacking Unauthorized access to computer networks in order to obtain info. stored on network or undermine how network operates (viruses) This can happen when someone on network surfs the web Liability can result when unauthorized material’s stored on network

Firewalls Firewalls serve to limit access to computer or system by those outside computer or system with unauthorized access Sometimes firewalls can prevent you from accessing some info. you need or working from offsite location

Backing Up Data Back up work while you are working and when you are done. USB sticks are great for storing data, but many computers also have internal recovery systems. Online data storage (example, Google docs)

Marketing Most law firms have a web site to market the firm electronically rather than in printed form. Usually the site will describe the firm, the type of work it concentrates in, and articles that it has published. Firms need to ensure that their web sites comply with state bar ethics codes.

Ethical Concerns – Marketing Does marketing online constitute advertising and solicitation? State bar regulations on attorney advertising must be carefully reviewed to ensure that all materials posted on the Internet or sent out to groups complies with certain rules Usually these websites are viewed as advertisements instead of solicitations Disclaimers – no attorney client relationship

Commerce and Research Legal material can be purchased online. The Internet and other electronic data bases are also used to conduct legal research to determine the strength of a case and that of an opponent.

Communication Through and other electronic communication, clients are kept informed of their cases and have questions answered. There is an ethical duty to ensure that electronic communication is secure and protected if it contains confidential information.

What is Electronic Communication? There are several forms of electronic communication. They are much faster forms of communication than mail, but there are problems that can arise with the use of various forms of electronic communication.

Phones and Voice Mail Conference calls and voice mail are effective ways to communicate. - consider what information you can and should leave on a voice mail, and who is on the conference call. You should also ask permission before putting someone on speaker phone, and know if someone else is doing so in order to avoid inadvertent disclosure of confidential information.

Faxes Most facsimile (fax) coversheets contain a “confidentiality” notice indicating that if the fax was received in error he or she should return it to the sender. This is used to maintain the attorney/client privilege and confidentiality. Double check fax numbers before sending. Request confirmation of receipt.

Avoid the “reply to all” unless you are sure everyone should be receiving the response. Be specific in the subject line so that what the is about will be clear. Confidentiality and security are huge issues in the legal arena with regard to . Type ahead feature should be disabled

Ethical Concerns -- is used between legal staff and clients, and can be used to send documents for a client to review before sending out. Because these documents are sent over networks over an essentially open environment, privacy is a concern. The communications can be intercepted and altered, so those s need to be secure when they are sent.

Ethical Concerns -- s In order to avoid inadvertent waiver of the attorney client privilege, encrypting the communication that is sensitive is a good idea. Include in the a notice that the communication is intended only for the recipient (just like is used with faxes) If the law firm deals with cyber law, it can also be held to a higher standard. Employers monitor s and usually restrict them for professional use only!

Metadata Metadata tracks information about documents that are attached to an electronic file. System metadata refers to tracking the file – the file name, size, and where it can be found. Content metadata refers to who created the document, changes, etc.

So … What Can You Do? Encryption – locking information to protect it from being discovered by others would definitely serve to preserve the attorney/client privilege. Encryption software allows scrambling of information that can only be understood with those who have the encryption code. Those who do not have the password or encryption key will only see scrambled messages and files.

Encrypting There are different encryption programs, such as Mail it Safe, that authenticate both parties before the contents of the message are understandable. Because of the confidential matters that are discussed between a lawyer and his client via , this is an invaluable tool to ensure protection.

Questions?