TECHNOLOGY & ETHICS 101 1 Association of Corporate Counsel © 2015 The information contained in these materials should not be construed as legal advice.

Slides:



Advertisements
Similar presentations
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Advertisements

Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
BELMONT UNIVERSITY AMERICAN INN OF COURT SEPTEMBER 9, 2014 PRESENTED BY KRISANN HODGES DEPUTY CHIEF DISCIPLINARY COUNSEL - LITIGATION BOARD OF PROFESSIONAL.
TECHNOLOGY & ETHICS Association of Corporate Counsel ©
Developing a Records & Information Retention & Disposition Program:
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Outsourcing: The Ethical Issues Steven M. Richman November 2014.
Internal Auditing and Outsourcing
Practical Information Management
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Electronic Records Management: What Management Needs to Know May 2009.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA PRIVACY AND SECURITY AWARENESS.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
STATE OF ARIZONA BOARD OF CHIROPRACTIC EXAMINERS Mission Statement The mission of the Board of Chiropractic Examiners is to protect the health, welfare,
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
Practice Management Quality Control
Chapter Three Confidentiality In this chapter, you will learn about: Basic principles of confidentiality The attorney-client privilege and the difference.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Internal Audit Considerations for Cybersecurity Risks Posed by Vendors October th, 2015 Chicago IIA Chapter’s 2 nd Annual IIA Chicago IT Hacking.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
Security – 2015’s Biggest Threat to Client Confidentiality A Panel Discussion Joseph Abrenio, VP of Cyber Advisory Services & General Counsel Delta Risk.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Women in Products Liability 2016 Annual Regional CLE November 3, 2016
Law Firm Data Security: What In-house Counsel Need to Know
Ethics & Technology Sari w. montgomery Robinson Law group, llc
An Attorney’s duty of Technical Competence
CPA Gilberto Rivera, VP Compliance and Operational Risk
Data Minimization Framework
Privacy & Confidentiality
Responding to Intrusions
Microsoft 365 Get help with regulatory compliance
Auditing Cloud Services
The Ethics of Technology
Chapter Three Ethics and Professional Responsibility
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
LATIHAN MID SEMINAR AUDIT hiday.
Association of Corporate Counsel © 2015
Chapter 3: IRS and FTC Data Security Rules
Unit 7 – Organisational Systems Security
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Making Information Security Manageable with GRC
AI & ETHICAL CONSIDERATIONS
What do you hope to learn from this session
Network Security Best Practices
Cybersecurity compliance for attorneys
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Preparing for GDPR Sharing experiences of the process and using the British Canoeing Toolkit bit.ly/BCGDPRToolkit
Legal Ethics of Information Governance Presented by Sean Monahan
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
ABA Ethics Commission 20/20 Presentation by Stephanie Kimbro, Esq
Dr. Sarah Quinton, UREC Chair,
ACCOUNTING ETHICS Conf.univ.dr. Victor-Octavian Müller.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Successful lawyer’s toolkit
Government Data Practices & Open Meeting Law Overview
ACCOUNTING ETHICS Conf.univ.dr. Victor-Octavian Müller.
Government Data Practices & Open Meeting Law Overview
ACCOUNTING ETHICS Conf.univ.dr. Victor-Octavian Müller.
ACCOUNTING ETHICS Conf.univ.dr. Victor-Octavian Müller.
ACCOUNTING ETHICS Lect. Victor-Octavian Müller, Ph.D.
Ethical Considerations and Firm Protocols for Departing Attorneys
Anatomy of a Common Cyber Attack
Practical & Ethical Guidelines for Texting with Clients
School of Medicine Orientation Information Security Training
Presentation transcript:

TECHNOLOGY & ETHICS Association of Corporate Counsel © 2015 The information contained in these materials should not be construed as legal advice or legal opinion on specific facts, and should not be considered representative of the views of ACC or any of its lawyers or consultants, unless so stated. The information contained in these materials is not intended to be a definitive statement on the subject but rather to serve as a resource providing practical information for the reader.

Our Goals Understand primary ethical responsibilities governing tech issues Provide practical tips for dealing with technology Identify resources to learn more about tech issues 2

What is Your Level of Tech Knowledge? Poor…little to none Good…I get by without much difficulty Very good…I am an early adaptor & stay ahead of the curve High…I am an expert and should teach this class 3 Image courtesy of Boians Cho Joo Young at FreeDigitalPhotos.net

Ethical Duties Affecting Tech Knowledge In August 2012, the ABA modernized the Model Rules to address technology issues, including… 4 Competence: Rule 1.1Confidentiality: Rule 1.6 Metadata: Rule 4.4 Outsourcing/Cloud Computing:Rule 5.3 Remember to read your state rules!

Technology and Competence ABA Model Rule 1.1: “Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.” Comment [8] (new): “To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology…” 5 Image courtesy of twobee at FreeDigitalPhotos.net

Practical Relevance Responding to discovery Storing client information in the cloud Compliance with data privacy regulations Protecting data and responding to a breach (“Cyber Security”) Managing corporate information flows Advising on document retention policies Sending & receiving documents with metadata Leveraging technology to lower legal department costs Advising on social media for investigations, hiring, etc. The proficiency you need may vary. 6

Takeaways on Competence Not a new obligation—nor is it difficult to grasp You should understand how technology works Standards evolve as practice changes—context matters and standards may vary You can still rely on consultants and IT experts (and probably should with appropriate diligence) Ethical duty of competence minimal standard; as a practical matter client business needs may require more You are in best position to see the big picture (e.g., PA Bar Ethics Op , p. 4) This is how you can provide value 7

“An attorney’s obligations under the ethical duty of competence evolve as new technologies develop and then become integrated with the practice of law.” California State Bar Formal Opinion Interim No (Feb. 28, 2014) (related to ESI and discovery request) See also, Luddite Lawyers Are Ethical Violations Waiting to Happen, Lawyerist, By Megan Zavieh, July 10, waiting-happen/ 8

Technology and Confidentiality ABA Model Rule 1.6(c) (new): “A lawyer shall make reasonable efforts to prevent the inadvertent disclosure of, or unauthorized access to, information relating to the representation of a client.” Earlier focus was simply: “A lawyer shall not reveal information relating to the representation of a client * * *.” ABA Model Rule 1.6(a) 9 Image courtesy of Stuart Miles at FreeDigitalPhotos.net

Cyber Security and Lawyers FBI: Law firms and law departments are among the most vulnerable targets for cyber attacks. Lawyers are reported to… Have limited resources to dedicate to computer security Lack a sophisticated appreciation of technology risks Lack an instinct for cyber security Source: The ABA Cyber Security Handbook Consider breach of several Canadian law firms: targetted-in-top-10-worst-cyber-attacks.html targetted-in-top-10-worst-cyber-attacks.html 10

Cyber Security and Reasonableness Ethical duties vs. legal & regulatory obligations –Lawyer & law department data & communications –Corporate & business data Ethical considerations –Sensitivity –Cost –Difficulty –Likelihood of disclosure NDA or Confidentiality Agreements HIPAA, EU Directive and other regulatory obligations 11

HYPO 1 – Working at home! Situation: In-house counsel’s work is never done at the end of the day. In-house counsel just received information from the compliance team that an employee may be acting inappropriately to advantage certain clients seeking to purchase assets. Action: IHC forwards the relevant documents and s, including the name and other data on the suspected employee, to a personal account so that she can spend the rest of the night working on the issue. This is much easier than trying to log back in through VPN. And the home network is password protected. Issue: Is the in-house counsel meeting the ethical obligation to make reasonable efforts to prevent inadvertent disclosure? 12

Takeaways on Confidentiality Assess risks of handling information – systemically &matter specific “Reasonable efforts” is the standard for ethical duty; business needs may require more Analyze separately from data privacy obligations Bottom line - add value: Develop approaches to protect data Employee training Contracts 13

Receiving Metadata ABA Model Rule 4.4(b): “A lawyer who receives a document or electronically stored information [ESI] relating to the representation of the lawyer’s client and knows or reasonably should know that the document or electronically stored information was inadvertently sent shall promptly notify the sender.” 14 Image courtesy of David Castillo Dominici at FreeDigitalPhotos.net

ABA Model Rule 4.4(b) Obligations Notify sender No need to send back You can read metadata But avoid using special forensic software to access it Rules vary by state, e.g., New Jersey, do not read the document; stop reading the document; promptly notify the sender; and return the document to the sender. NJ RPC 4.4(b) For a summary of metadata ethics opinions from around the US, see datachart.html datachart.html 15

Notify the Sender Triggers Must know or should know ESI sent inadvertently Relates to representation “Inadvertently sent” ESI itself Info that includes ESI 16 Image courtesy of Stuart Miles at FreeDigitalPhotos.net

HYPO 2 – Nasty Letter! Situation: The HR Department receives an with an attached letter from an employee alleging discrimination and breach of contract. The letter is very well written and very specific in stating the desired remedies. Action: The HR department brings the to your attention. You decide to check the metadata to see if the employee has retained a lawyer. Next steps: Any problems? 17

Outsourcing & Cloud Computing ABA Model Rule 5.3 “With respect to a nonlawyer employed or retained by or associated with a lawyer: * * * (b) A lawyer having direct supervisory authority over the nonlawyer shall make reasonable efforts to ensure that the person’s conduct is compatible with the professional obligations of the lawyer; * * *.” 18 Image courtesy of ddpavumba at FreeDigitalPhotos.net

ABA Model Rule 5.3 What’s new? Comment clarifies that rule applies to nonlawyers outside dept. –Investigators –Paraprofessionals –Document management –Printing or scanning co. –Internet-based services Comment includes monitoring responsibility 19 Image courtesy of stockimages at FreeDigitalPhotos.net

Reasonableness Depends On… [Vendor’s] education, experience and reputation Nature of services How client information is protected Legal & ethical environments of jurisdictions 20 Image courtesy of pakorn at FreeDigitalPhotos.net

Cloud Computing Ethics rules allow it It is a form of outsourcing Exercise reasonable care to protect confidentiality of client information States largely agree that reasonable care required WSBA Advisory Opinion 2215 (2012) 21 Image courtesy of ddpavumba at FreeDigitalPhotos.net

States May Require a Mix of Precautions… Stay abreast of best practices Depending on sensitivity of date, get client consent Heed client instructions Understand provider’s security controls Periodically review security measures Have enforceable confidentiality agreement Get notice of breach Ensure access to client data Delete data & return to client when not needed Ensure back-up strategy E.g. New Hampshire State Bar Opinion /4 (Cloud Computing) 22

Takeaways on outsourcing Give appropriate instructions to non-lawyers. If directing outside counsel to use certain vendors, agree on who is monitoring the vendors. Ensure nonlawyers in non-US jurisdictions understand your professional obligations. Remember, cloud computing is a form of outsourcing – so the same standards of diligence apply. 23 Image courtesy of digitalart at FreeDigitalPhotos.net

HYPO 3 – We need cutting edge! Situation: GC determines that the widely dispersed legal team needs a more efficient way to communicate real time to serve the client. Additionally, legal documents – including contracts, advice memos, and board documents – need to be stored and properly catalogued in a central repository with tiered access rights. Action: GC is poised to hire an innovative start-up that would provide a custom solution at a competitive cost. Issue: Is there anything the GC needs to consider before signing the deal? 24

Practical Takeaways Ten Tips for Working With Technology* *Jennifer Mailander, Associate GC, Corporation Services Co., and Chair of the ACC Litigation Committee, originally developed these tips for a presentation to the ACC Chicago Chapter. They have been modified and adapted for this presentation and are used with prior permission from the author. 25

10. Understand Your Company’s Technology Understand your company’s business and the technology your company uses on a daily basis Understand your company’s technology strategy Understand who has responsibility for buying and maintaining technology o What is Legal’s role? o What is your process for buying? o Make sure it includes a process to identify when Shadow IT is being used (when user/department finds Cloud provider when IT too busy) Know the regulations that apply to your industry Update your policies and procedures 26

9. Know Your Vendors and Your Vendors’ Vendors Know who your vendors are and what services they provide Connect and work with your security team -You both need to know when you find new places to store data Put a process in place to identify new technology being used -It’s happening: you just may not know about it NOTE: Hackers see your vendors as conduits to your data o Data loss at Target and Home Depot resulted from sub-contractor and 3 rd party vendor breaches 27

8. Know Your Law Firm’s Security Practices Understand your obligations as in-house counsel when working with your law firms Law firms are prime targets for hacks and unauthorized intrusions Join the ACC Litigation Committee Subcommittee on Cyber Security and Law Firms –Contact: Evan Slavitt, Join the ACC Working Group on Data Security for Law Firms –Contact: Amar Sarwal, 28

7. Be A Partner To The Business Find a way to help your business partners understand and mitigate technology risks; help them achieve success Host a series of lunch and learns with your business and technology counterparts –Present on areas of respective expertise Contract and licensing 101 Technology 101 Sales 101; Operations 101 etc. –Meet regularly to discuss issues, trends, etc 29

6. Conduct A Data Audit Form a cross-functional team to identify data practices Understand what and how data is managed -What is the data? -Who has (and should have) access? -Where does it go? -How long is it stored? Don’t collect data you do not need 30

5. Assess Your Individual Data Practices Where do you keep your personal data? –At home? –At work? Use a password manager –Do not store your passwords online 31

4. Know Your Company’s Breach and Incident Response Plan and Practices If you do not have a plan—create one! -Disaster recovery plan; incident response -Communication protocols -Key Stakeholders -Identify 3 rd Party Vendor in advance Know the plan and practices Know who has what roles in the plan Practice, practice, practice 32

3. Employee Training on Technology, Security & Privacy JUST DO IT! Employees are your biggest threat—poor security practices o Phishing o E.g., Sony 2. Get Comfortable With Technology Use your ACC resources: ACC Committees and Chapterswww.acc.com o Webcasts; ACC Docket; Inhouse ACCess blog; eGroup David Pogue TED Talk o ps?language=en ps?language=en 33

2. Get Comfortable With Technology Password Storage o Lifehacker: Five Best Password Managers o PinHawk Law Technology Digest o ABA’s Law Technology Today o The Lawyerist o Google iPhone and Android tips Take a class 34

1. Network Inside and Outside Your Organization Develop a core team of company contacts to assist on technology issues -Use your contacts in other parts of the organization (e.g., IT, Security) to help keep you up to date on technology developments affecting your business Talk with your peers outside the company regarding best practices and stay current on new developments 35

THANK YOU! Association of Corporate Counsel 36