Top-Rated Free Essay
Preview

Law Firms and Electronic Communication Dealing with Cyberspace

Best Essays
1475 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Law Firms and Electronic Communication Dealing with Cyberspace
Law Firms and Electronic Communication Dealing with Cyberspace

Annette Slaughter
LES.330.DISB1T01.SP2011
February 23, 2011

Abstract

In the world of litigation, it is a difficult enough task to wade through all the laws, acts and statutes that compose constitutional law. With the introduction of new technologies dealing with cyberspace, one of the issues laws firms have to contend with electronic communication.

Electronic communication encompasses the areas of document review or electronic discovery, electronic file formatting, file retention, transmission, and content management. This is not a technical matter that can be simply left to computer professionals or law office support staff; it requires the active participation of the attorneys as well.

While cyberspace continues to grow, the options available to police cyberspace are not in place, making the tasks of law firms even more difficult. Now along with intellectual property cases, contract resolution and fraud cases, attorneys using electronic communication to carry out their work must recognize the importance of security and privacy issues. Attorneys have to ensure the ‘legwork’ done to gather electronic evidence for a case does not violate the attorney-client privilege, the client’s confidentiality or breach the protocol in place for gathering evidence, all on an electronic platform.

Attorneys have professional obligations that are expected under the Model Code or Model Rules. Those who fail to recognize and fulfill those obligations will hamper their ability to practice law effectively, risk alienating their clients, and face possible professional actions under the version of the Model Code or Model Rules in their jurisdiction.

Law Firms and Electronic Communication Dealing With Cyberspace

Today’s law firms are often required to convert, create, store and transmit legal documents and other components of a client’s file electronically which brings concerns regarding electronic communication security and content management. When traditional paper files are converted to electronic format, there is a preference of saving the file in native or raw format because of the ease of opening a document with multiple applications and toolkits that support this format. There are also protocols attorneys should follow as listed in Ethics Opinions 2010-02 for proper procedure for retention, storage, ownership, production and destruction of client files. While it is wise to keep an electronic and traditional paper copy of documents, it can be quite costly storing data in both formats. Some documents such as wills are classified as category 1 documents, must also be retained in traditional paper format. Documents classified as category 2 such as photographs and memoranda can be destroyed after being converted to electronic format (Ethics Opinion 2010-02, p.13). In electronic communications, attorneys must ensure that measures are in place to protect the confidentiality, security and integrity of the documents and the process must be at least as secure as that required of traditional paper files (Ethic Opinions, 2010-02), although unlike paper files, electronic files must be ‘backed up’ on another computer or media in case of a computer crash, the original file becomes corrupted, or the attorney’s office is damaged. One option that attorneys are using for data backup is cloud computing. Cloud computing is a new technology for data storage hosted by a third party vendor. A law firm would hire a third party vendor to host the data instead of keeping the data on the law firm’s servers. While cloud computing would allow an attorney to access client’s files from almost anywhere in the world, the issue of confidentiality comes to the forefront since the sensitive data is out of the attorney’s hands and being controlled by the third party host. There is also the threat of the host server being hacked and the data compromised. Electronic communication also includes document review or electronic discovery. Electronic discovery (e-discovery) deals with the exchange of information in electronic format. Examples of the types of data included in e-discovery are email, instant messaging chats, documents, accounting databases, websites and any other electronically stored information that could be relevant evidence in a law suit (Wikipedia, 2011). Many firms today have an in-house e-discovery team, consisting of attorneys, and IT professionals, as attorneys are not necessarily IT experts. Some smaller firms may use software such as EnCase or Acuity for their e-discovery tasks. Some firms prefer to outsource to third parties such as computer forensic investigation professionals to gather e-discovery evidence and present the evidence to the court as an expert witness. Great care must be taken with e-discovery evidence; the responsible parties must follow specific protocol for retrieval, storage and presentation of the evidence. Expert witnesses should be credible and exhibit integrity when appearing before the court. Any discrepancies or doubts can have evidence picked apart and thrown out, causing a law firm to lose a case. Security is a major concern when dealing with electronic communication. Sending correspondence over the Internet, particularly via email should be encrypted especially when sending sensitive data to prevent inadvertent disclosure. There are some drawbacks that may have hindered this approach for some law firms though. First, the sender and all receiving parties must use the same software, and the keys on the sender and recipients’ keyboards must be programmed correctly to properly decode and read the correspondence. Another hindrance was the cost of encryption programs being so expensive and coupled with the taxing of a firm’s computer network because of the large amount of memory used to operate encryption programs, lead some firms to find the encryption software not cost effective for the value. This is changing with the addition of encryption software being built into operating systems such as Microsoft’s Windows XP and Vista and programs add-ons are available for popular software packages such as Microsoft’s Office Suite. Another security issue with electronic communication is attorney-client privilege and client confidentiality. It is an attorney’s responsibility to maintain confidentiality of information relating to representation. Failure to maintain confidentiality can bring disciplinary actions against an attorney and a malpractice claim if the breach leads to damages the client or the attorney-client privilege. To protect themselves, some bar associations recommend attorneys always get the client’s consent before sending email although there is no formal opinion by the courts declaring email as a reasonable and acceptable means of communication. Content management is another area when new technologies are coming into play within law firms. Instead of retaining a slew of administrative or support staff, content management software or services can reduce the overall cost of staffing. Attorneys within a firm often collaborate on documents, such as contracts by reviewing them for clarity and repetitiveness of information. In the past, hard copies of these documents contained white out marks and markups in pen (edocmagazine, 2008). Content management software can assist attorneys and paralegals with this task. Content management software such as eCopy allows a document to be scanned and converted into a searchable PDF file, and then stores the document in a central repository.
With the emergence of new technologies in cyberspace, law firms have electronic calendars and docket management software to never miss a court appearance, content management software to electronically search through a document for interpretation and email for the electronic transmission of data pertinent to cases from one party to another with encryption. The ability to handle these tasks detail the strides made towards the almost paperless office and autonomy, but there are serious concerns surrounding security. Although there are laws, written opinions and recommendations by state bar associations on the protocols to be followed by the use of electronic communication, cyberspace does not have enough regulation to ensure that a client’s files stored on a third party’s host server will not be compromised nor can a law firm ensure that their network will not get hacked into. What law firms can do is to practice known and trusted security and privacy measures to protect their client data and their reputation to the best of their ability.

Bibliography

Ethics Opinions 2010-02. Retrieved February 16, 2011, from www.alabar.org/ogc/PDF/2010-02.pdf

FYI: Playing it Safe with Encryption. Retrieved February 19, 2011, from http://www.americanbar.org/groups/departments_offices/legal_technology_resources/ resources/law_office_technology/FYI_Playing_it_safe.html

Harney, J. (2010). Making a Case for Content Management. edocmagazine.com, Retrieved February 15, 2011 from EBSCOhost

Kass, A. (2008). Legal service firms make case. Crain’s Cleveland Business, 29(35), 7. Retrieved February 15, 2011 from EBSCOhost.

Krause, J. (2008). Fear of the ‘Native’. ABA Journal, 94(1), 59. Retrieved February 15, 2011 from EBSCOhost.

Maleske, M. (2010). The Modern Office. insidecounsel.com, Retrieved February 15, 2011 from EBSCOhost.

Perkins, M. (2010). Emerging Ethical Issues in the 21st Century. Retrieved February 16, 2011 from www.perkinsfirm.com/ethics_in_cyberspace.html

Electronic discovery. Retrieved February 16, 2011, from www.wikipedia.com

Bibliography: Ethics Opinions 2010-02. Retrieved February 16, 2011, from www.alabar.org/ogc/PDF/2010-02.pdf FYI: Playing it Safe with Encryption. Retrieved February 19, 2011, from http://www.americanbar.org/groups/departments_offices/legal_technology_resources/ Kass, A. (2008). Legal service firms make case. Crain’s Cleveland Business, 29(35), 7. Retrieved February 15, 2011 from EBSCOhost. Krause, J. (2008). Fear of the ‘Native’. ABA Journal, 94(1), 59. Retrieved February 15, 2011 from EBSCOhost. Maleske, M. (2010). The Modern Office. insidecounsel.com, Retrieved February 15, 2011 from EBSCOhost. Perkins, M. (2010). Emerging Ethical Issues in the 21st Century. Retrieved February 16, 2011 from www.perkinsfirm.com/ethics_in_cyberspace.html Electronic discovery

You May Also Find These Documents Helpful

  • Powerful Essays

    Mgt7019-5 It Challenges

    • 3406 Words
    • 14 Pages

    |Moor, J. H. (2001). The Future of Computer Ethics: You Ain’t Seen No thin’ Yet! Ethics |…

    • 3406 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Technology has gone from the days of the pony express to advancing at a rate of a mile a minute to now evolving to what seems like the speed of light or faster. With such a fast paced environment of change in technology, policies and laws must adapt to be compatible to those advancements in order to provide the best method to govern the laws and policies and protect its people. This paper will explore how technological advancements have influenced crucial changes in two essential policies: the Electronic Communications Privacy Act (ECPA) and the Electronic Funds Transfer Act (EFTA).…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In the case of United States v. Warshak, the primary issue at hand is the constitutionality of the government’s warrantless seizure of more than twenty-seven thousand e-mails stored on an internet service provider’s server. To answer the constitutionality issue, the first focus is on e-mail itself as a form of communication, and whether there can be a reasonable expectation of privacy for e-mail stored on a service provider’s equipment. In this case, the Court ruled that e-mail has fundamental similarities with traditional forms of communication, such as a phone call or letter (Craig, 2013). For example, law enforcement cannot obtain a wiretap, search a house, or open mail without a…

    • 628 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Good Essays

    * Boulos, P. (2008). Understanding cyber ethics in a cyber world. Dubuque, IA: Kendall Hunt Pub.…

    • 952 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In this article, Patrick Thibodeau comments on Federal CIO Vivek Kundra’s claim that cloud computing concerns are exaggerated. Thibodeau explains clearly the claims made by Kundra about the overall security with cloud computing. Thibodeau blames the scare of cloud computing to IT developers belief of a status quo. Thibodeau concludes the article with a few success stories of basic cloud computing services working in the U.S. Government.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    CpEddDocumentView

    • 6008 Words
    • 18 Pages

    You are showing us that you have the ability to receive documents electronically. We describe the hardware and software you will…

    • 6008 Words
    • 18 Pages
    Powerful Essays
  • Best Essays

    need Access

    • 596 Words
    • 3 Pages

    Barrajón, P. (2013). ETHICAL ISSUES AND INTERNET. International Journal of Communication Research, 3(3), 228-234. Retrieved from http://search.proquest.com/docview/1442860356?accountid=32521…

    • 596 Words
    • 3 Pages
    Best Essays
  • Powerful Essays

    Book Review - Cyberethics: Morality and Law in Cyberspace, 4th Edition by Richard Spinello, Sudbury, MA: Jones and Bartlett Publishers, 2003…

    • 1813 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Fear is a major player in the lives of the native population. The quote “Deep down the fear of a man who lives in a world not made for him, whose own world is slipping away, dying, being destroyed, beyond any recall,” (Pg 44) describes how the old tribal system that most natives have relied upon for thousands of years is being destroyed and replaced by a modern “democracy”. This new government has been made mostly for whites by whites, and left natives lost and quite fearful. Because of this, many of the lost natives have turned to criminal ways to survive and avoid the fear of death, these…

    • 637 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Legal and Ethical Issues

    • 374 Words
    • 2 Pages

    In the internet age, e-commerce and e-business professions also have many legal and ethical issues in the internet service and all transaction and operations are controlled and guided by the law and legal rules and if there is a violation of law it is considered as illegal and the offenders are punished by the legal system. Privacy problems, violations of copy right, frauds, publishing offensive and illegal information are some of the main legal and ethical issues found in the profession of e-commerce. This may result in loss of trust about the firm/company or the loss of business.…

    • 374 Words
    • 2 Pages
    Good Essays
  • Good Essays

    References: Importance of Ethics on the Internet. (2006, October 23). Retrieved March 16, 2008, from http://pwebs.net/marketing/ethics/articles/internetethics.htm…

    • 643 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Legal Issue

    • 864 Words
    • 4 Pages

    Implementing communication methods such as video or instant messaging presents several legal implications and there are various areas to consider when looking at the legalities of communication methods. Some of the main aspects to take in to consideration involve respecting the privacy of user posted information and be aware of not disclosing personal or confidential information unless authorised to do so.…

    • 864 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    asdf

    • 7943 Words
    • 32 Pages

    Dunne, Robert "Computers and the law: an introduction to basic legal principles and their application in cyberspace" Cambridge University Press, 2009. ISBN 978-0-521886-50-5…

    • 7943 Words
    • 32 Pages
    Powerful Essays