This document provides guidance on safe communications. It advises assuming that no email or social media is truly private and could be discovered. Staff should be educated to exercise discretion in communications and write defensively to avoid statements that could harm the company. Key databases should be reviewed to understand compliance history. Attorney-client privilege and work product doctrines are explained, noting the requirements and limitations of each. The overall message is to communicate carefully and assume communications could be reviewed publicly.
PR 313 - Media Regulation & PR/Preparing your ResumeBrett Atwood
This is a two-part PR lecture. Part 1 deals with various media regulations and rules to consider when conducting a media campaign. Part 2 is a basic overview of resume crafting for PR professionals.
This is a narrow look at two issues related to social media look by employees - monitoring workplace computers and employee publication and "off duty" conduct.
PR 313 - Media Regulation & PR/Preparing your ResumeBrett Atwood
This is a two-part PR lecture. Part 1 deals with various media regulations and rules to consider when conducting a media campaign. Part 2 is a basic overview of resume crafting for PR professionals.
This is a narrow look at two issues related to social media look by employees - monitoring workplace computers and employee publication and "off duty" conduct.
PowerPoint slides from general session of the Grow Revenue: Get Online and Boost Sales Restaurant Education Series event hosted by the Ohio Restaurant Association for their members. Speakers included Jarrod Clabaugh of the Ohio Restaurant Association and Jaime Kolligian of Kastner Westman and Wilkins.
Employment and Social Media: An Introduction to the Rules for Human Resource ...Elizabeth Lewis
Employment and Social Media: An Introduction to the Rules for Human Resource Professionals presents the basic information that a human resource professional in Colorado needs to be aware about when dealing with employment issues.
The First 30 Minutes After a Crisis: How to Improve or Kill Your Law Firm's R...Thomas Ciesielka
Scandals can be found anywhere and magnified profoundly on social media. It can range from political candidates to consumer products, and from salacious personal conduct by corporate CEOs to environmental calamities. While King Solomon wrote “there is nothing new under the sun,” today’s limitless channels of communication exponentially might challenge that statement since messages now travel at the speed of the Internet and not on handwritten scrolls. Message that impact both the reputation of the those involved in the crisis and also can create additional legal liabilities for law firms and their clients. And since a crisis can have significant legal implications, lawyers are often involved throughout the process. Most importantly, how well a crisis is managed depends both on handling the public narrative as well as legal implications.
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...Shawn Tuma
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss. This is a keynote speech delivered by Shawn Tuma to the Paralegal Division of the State Bar of Texas on June 17, 2016.
Transitory Electronic Communication: Recordless Messaging in the Context of a...jonneiditz
This presentation is designed to change the way in which you look at electronic communications, and to pave the way for new communications technologies that offer the privacy and security of a hallway conversation with the efficiency and convenience of asynchronous communication through electronic text.
This webinar is for the lawyer -or anyone else- who wants to brush up on the latest issues and strategies to be aware of regarding legal ethics and best practices. The panelists discuss recent and important case law in the area and explain how those decisions can have real-world impact on the situations you may be involved in. Among others, the panel will address the following Model Rules of Professional Conduct: Rule 1.7-Conflict of Interest: Current Clients; Rule 1.8-Conflict of Interest: Current Clients: Specific Rules; Rule 3.8 - Special Responsibilities of a Prosecutor; and Rule 4.4(a) Respect for Rights of Third Persons.
Part of the webinar series: LEGAL ETHICS – BEST PRACTICES 2022
See more at https://www.financialpoise.com/webinars/
Information on avoiding slander and libel claims. Provides a general overview of the law of defamation and invasion of privacy, with tips to avoid such claims.
Bullet Proofing Your Affiliate Agreement Pete WellbornAffiliate Summit
Avoid catastrophe and build in great offensive weapons and defensive shields by a carefully-crafted affiliate agreement. Bear in mind that most lawyers do not understand this specialized field.
Pete Wellborn, Founding Member, Wellborn, Wallace & Woodard
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
Shawn Tuma, Cybersecurity & Data Protection Partner at Scheef & Stone, L.L.P., presented to the Dallas Bar Association's Corporate Counsel Section on May 3, 2016. The title was Cybersecurity: What the GC and CEO Need to Know.
A hands-on cybersecurity presentation: preparing an action plan before you are attacked, contracting tips and available insurance coverage.
PowerPoint slides from general session of the Grow Revenue: Get Online and Boost Sales Restaurant Education Series event hosted by the Ohio Restaurant Association for their members. Speakers included Jarrod Clabaugh of the Ohio Restaurant Association and Jaime Kolligian of Kastner Westman and Wilkins.
Employment and Social Media: An Introduction to the Rules for Human Resource ...Elizabeth Lewis
Employment and Social Media: An Introduction to the Rules for Human Resource Professionals presents the basic information that a human resource professional in Colorado needs to be aware about when dealing with employment issues.
The First 30 Minutes After a Crisis: How to Improve or Kill Your Law Firm's R...Thomas Ciesielka
Scandals can be found anywhere and magnified profoundly on social media. It can range from political candidates to consumer products, and from salacious personal conduct by corporate CEOs to environmental calamities. While King Solomon wrote “there is nothing new under the sun,” today’s limitless channels of communication exponentially might challenge that statement since messages now travel at the speed of the Internet and not on handwritten scrolls. Message that impact both the reputation of the those involved in the crisis and also can create additional legal liabilities for law firms and their clients. And since a crisis can have significant legal implications, lawyers are often involved throughout the process. Most importantly, how well a crisis is managed depends both on handling the public narrative as well as legal implications.
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...Shawn Tuma
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss. This is a keynote speech delivered by Shawn Tuma to the Paralegal Division of the State Bar of Texas on June 17, 2016.
Transitory Electronic Communication: Recordless Messaging in the Context of a...jonneiditz
This presentation is designed to change the way in which you look at electronic communications, and to pave the way for new communications technologies that offer the privacy and security of a hallway conversation with the efficiency and convenience of asynchronous communication through electronic text.
This webinar is for the lawyer -or anyone else- who wants to brush up on the latest issues and strategies to be aware of regarding legal ethics and best practices. The panelists discuss recent and important case law in the area and explain how those decisions can have real-world impact on the situations you may be involved in. Among others, the panel will address the following Model Rules of Professional Conduct: Rule 1.7-Conflict of Interest: Current Clients; Rule 1.8-Conflict of Interest: Current Clients: Specific Rules; Rule 3.8 - Special Responsibilities of a Prosecutor; and Rule 4.4(a) Respect for Rights of Third Persons.
Part of the webinar series: LEGAL ETHICS – BEST PRACTICES 2022
See more at https://www.financialpoise.com/webinars/
Information on avoiding slander and libel claims. Provides a general overview of the law of defamation and invasion of privacy, with tips to avoid such claims.
Bullet Proofing Your Affiliate Agreement Pete WellbornAffiliate Summit
Avoid catastrophe and build in great offensive weapons and defensive shields by a carefully-crafted affiliate agreement. Bear in mind that most lawyers do not understand this specialized field.
Pete Wellborn, Founding Member, Wellborn, Wallace & Woodard
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
Shawn Tuma, Cybersecurity & Data Protection Partner at Scheef & Stone, L.L.P., presented to the Dallas Bar Association's Corporate Counsel Section on May 3, 2016. The title was Cybersecurity: What the GC and CEO Need to Know.
A hands-on cybersecurity presentation: preparing an action plan before you are attacked, contracting tips and available insurance coverage.
I have included 3 classmate discussions.Respond by Day 5 and e.docxbillylewis37150
I have included 3 classmate discussions.
Respond by Day 5
and expand on your colleague’s posting by providing an alternate position for integrating technology into delivering counseling services. Propose a potential scenario where the use of technology in managing counseling services represents an ethical violation and provide your colleague with a potential solution for eliminating repeated violations.
1.
M.Beau--
My position
I am not comfortable in using technology because it is not secure and client’s confidential information could be compromised. If this was not the case why is it that so many client’s records, personal information from hospital, banks and credit card companies have been compromised. It will be very difficult to clear a person’s credit because once that information is in someone’s hand the damage has been done. To avoid an issue a therapist should use encryption to protect the privacy of their clients.
According to the ACA Code, in Standard.
H.2.d
. (ACA, 2014)
states,
counselors use current encryption standards within their websites and/or technology-based communications that meet applicable legal requirements. Counselors take reasonable precautions to ensure the confidentiality of information transmitted through any electronic means.
Much of our work with clients involves expressing themselves and how they communicate with others. The reality is that we live in the 20
th
century and as a future therapist, I must learn to embrace technology to be in a much better position to meet my client’s needs. Some college students don’t feel comfortable having a face to face session with the counselor and would rather opt to communicating virtually. It is important for therapist to be aware of the ways people are connecting and communicating with one another in this era. Bradley and Hendricks noted,
the past three decades, and especially the last decade, have produced enormous advances in technology (p.267). Furthermore, the advantages of the technologies will make therapy accessible to clients that live in remote areas.
One ethical technology violation and challenge
Informed consent poses an ethical challenge especially if the therapist has not never met with the client in person and have been afforded the opportunity to speak with them about informed consent. There is no guarantee that the information the client sends via email will be protected. It would beneficial for the therapist to meet the client in person and obtain the informed consent and provide the client with written disclosure statements. Herlihy and Remley (2016) stated, “beyond legal requirements, however, we believe it is best practice to provide clients with written information about the counseling relationship before the relationship begins” (p. 96).
Technology counseling is conducted many ways via internet, email, telephone or other applications so there are no exceptions to rule of having an excuse to protect client’s information. Therefore, coun.
Hacker Defense: How to Make Your Law Firm a Harder TargetLexisNexis
It is up to law firms to protect both themselves and their clients with security measures that keep up with increasing risk. The firm can’t risk losing the trust of its clients. Here are some important ways that individual lawyers, and their firms, can improve the security of the information entrusted to them.
Law firms need to stay sharp because corporate security is getting harder,not easier. At the same time, companies are starting to recognize that information security is a fundamental business issue—one that demands an increased focus on cyber resilience, not just security. The reason is simple: criminals and state-sponsored attackers are targeting intellectual property, customer information, and avenues for business disruption. That makes law firms an ideal target.
To learn how you can locate and get a more complete picture of people and businesses across the U.S., visit http://www.lexisnexis.com/publicrecords.
For more topics that are transforming the legal industry,
visit http://www.thisisreallaw.com.
Preserving the Privilege during Breach ResponsePriyanka Aash
When companies hire cybersecurity consultants to investigate incidents, those professionals’ reports and emails could be used against the company in court unless a privilege applies. This session provides an overview of the attorney-client privilege for post-breach investigations, and tips for increasing the chances that the privilege will apply and the data will remain confidential.
(Source: RSA USA 2016-San Francisco)
Similar to Safe(er) Communications--Attorney Client Privilege; Walker, Roger; RAWalker & Associates; 2014 Mid-America Environmental Compliance Conference (20)
EPA Region 7, EPA, Region 7, Waters of the United States, Water Security, Nonpoint Source, NPS, Nutrients, Ammonia, Kansas, KS, NHD, National Hydrography Dataset, Drury Creek, Cheyene County, dam permit, finding leaks, fixing leaks, drought, dry summer, Chesapeake Bay, Mississippi River Basin, municipal lagoons
Epcon is One of the World's leading Manufacturing Companies.EpconLP
Epcon is One of the World's leading Manufacturing Companies. With over 4000 installations worldwide, EPCON has been pioneering new techniques since 1977 that have become industry standards now. Founded in 1977, Epcon has grown from a one-man operation to a global leader in developing and manufacturing innovative air pollution control technology and industrial heating equipment.
different Modes of Insect Plant InteractionArchita Das
different modes of interaction between insects and plants including mutualism, commensalism, antagonism, Pairwise and diffuse coevolution, Plant defenses, how coevolution started
Presented by The Global Peatlands Assessment: Mapping, Policy, and Action at GLF Peatlands 2024 - The Global Peatlands Assessment: Mapping, Policy, and Action
ENVIRONMENT~ Renewable Energy Sources and their future prospects.tiwarimanvi3129
This presentation is for us to know that how our Environment need Attention for protection of our natural resources which are depleted day by day that's why we need to take time and shift our attention to renewable energy sources instead of non-renewable sources which are better and Eco-friendly for our environment. these renewable energy sources are so helpful for our planet and for every living organism which depends on environment.
Top 8 Strategies for Effective Sustainable Waste Management.pdfJhon Wick
Discover top strategies for effective sustainable waste management, including product removal and product destruction. Learn how to reduce, reuse, recycle, compost, implement waste segregation, and explore innovative technologies for a greener future.
"Understanding the Carbon Cycle: Processes, Human Impacts, and Strategies for...MMariSelvam4
The carbon cycle is a critical component of Earth's environmental system, governing the movement and transformation of carbon through various reservoirs, including the atmosphere, oceans, soil, and living organisms. This complex cycle involves several key processes such as photosynthesis, respiration, decomposition, and carbon sequestration, each contributing to the regulation of carbon levels on the planet.
Human activities, particularly fossil fuel combustion and deforestation, have significantly altered the natural carbon cycle, leading to increased atmospheric carbon dioxide concentrations and driving climate change. Understanding the intricacies of the carbon cycle is essential for assessing the impacts of these changes and developing effective mitigation strategies.
By studying the carbon cycle, scientists can identify carbon sources and sinks, measure carbon fluxes, and predict future trends. This knowledge is crucial for crafting policies aimed at reducing carbon emissions, enhancing carbon storage, and promoting sustainable practices. The carbon cycle's interplay with climate systems, ecosystems, and human activities underscores its importance in maintaining a stable and healthy planet.
In-depth exploration of the carbon cycle reveals the delicate balance required to sustain life and the urgent need to address anthropogenic influences. Through research, education, and policy, we can work towards restoring equilibrium in the carbon cycle and ensuring a sustainable future for generations to come.
Improving the viability of probiotics by encapsulation methods for developmen...Open Access Research Paper
The popularity of functional foods among scientists and common people has been increasing day by day. Awareness and modernization make the consumer think better regarding food and nutrition. Now a day’s individual knows very well about the relation between food consumption and disease prevalence. Humans have a diversity of microbes in the gut that together form the gut microflora. Probiotics are the health-promoting live microbial cells improve host health through gut and brain connection and fighting against harmful bacteria. Bifidobacterium and Lactobacillus are the two bacterial genera which are considered to be probiotic. These good bacteria are facing challenges of viability. There are so many factors such as sensitivity to heat, pH, acidity, osmotic effect, mechanical shear, chemical components, freezing and storage time as well which affects the viability of probiotics in the dairy food matrix as well as in the gut. Multiple efforts have been done in the past and ongoing in present for these beneficial microbial population stability until their destination in the gut. One of a useful technique known as microencapsulation makes the probiotic effective in the diversified conditions and maintain these microbe’s community to the optimum level for achieving targeted benefits. Dairy products are found to be an ideal vehicle for probiotic incorporation. It has been seen that the encapsulated microbial cells show higher viability than the free cells in different processing and storage conditions as well as against bile salts in the gut. They make the food functional when incorporated, without affecting the product sensory characteristics.
2. Current: Environmental Attorney, RAWalker & Associates LLC
Executive Director, REGFORM (20 years off and on)
Adjunct Instr., Environmental Law, St. Louis University (6
years)
Prior: Armstrong Teasdale (13 years)
General Counsel, Missouri Chamber of Commerce (6
years)
Education: LL.M Environmental Law, Lewis & Clark – Portland, OR
J.D., University of Missouri at K.C.
Journalism/Education, University of Missouri at Columbia
ROGER WALKER
3. SAFE(R) COMMUNICATIONS
Communication Goals:
Communications should be clear and accurate.
Communications should not hide negative facts
[but] should be written in such a way that it cannot
be misconstrued or taken out of context by those
who would seek to harm you.
3
4. SAFE(R) COMMUNICATIONS
4
Key Takeaways:
The way the world communicates has changed
Assume NO email (or other social media) is private
Educate staff to exercise discretion
Write “defensively”
Avoid “smoking guns”
Review state and federal databases
Understanding Attorney Client Privilege and Work-
Product Doctrine
5. SAFE(R) COMMUNICATIONS
5
The way the world communicates has
changed
Email (and other social media) plays an essential role
taking the place of in-person meetings and phone calls.
Formal correspondence maintains a level of caution, but
the standard of decorum is attenuated for digital
communications.
Environmental Context. In the past, permitting issues
were entirely the province of paper exchange and an
occasional meeting with regulators.
NGO Activity. Every major permit and rulemaking is
challenged by NGOs; increasing scrutiny of water
discharge permits and waste disposal activities. FOIA
and Sunshine requests are on the rise.
6. SAFE(R) COMMUNICATIONS
6
Assume NO email (or social media) is private
Former CIA Director: David Petraeus (enough said).
Apple legal victory over Sumsung for patent infringement: a
decision (according to interviews with jurors) – based largely
on inarticulate and damaging emails by Sumsung officials
about its competitor Apple. (We need something just like this)
Arthur Anderson accountants re: Enron collapse. Anderson
e-mail to others on Enron team, “no more shredding” of
Enron-related documents.
Phen-Fen: Mass. class-action diet drug combination Phen-
Fen. Court allowed e-mail from company executive: "Do I
have to look forward to spending my waning years writing
checks to fat people worried about a silly lung problem?“
7. SAFE(R) COMMUNICATIONS
7
Assume NO email (or social media) is private
Chevron: Settled a lawsuit for $2.2 million that involved an
interoffice e-mail giving 25 reasons why beer is better than
women.
DOD: In reviewing contract with Boeing, DoD emails: “We all
know this is a bailout for Boeing” [and] “We didn‟t need those
aircraft”
Investment banker: convicted of obstructing federal
investigations into stock offerings at Credit Suisse First Boston.
Banker e-mail telling employees that it was "time to clean up
those files" after he learned of the investigation.
Zubulake: Wrongful termination. Plaintiff‟s attorney obtained
through discovery an e-mail saying she was too “old and ugly
and she can‟t do the job.”
8. SAFE(R) COMMUNICATIONS
8
Assume NO email (or social media) is private
Missouri environmental examples:
Missouri Agri-business: Odor litigation. Email allowed into
evidence: “MDNR has no idea how to regulate odor”
Defense strategy hinged in part on ability of DNR to regulate
and thus reliance on nuisance common law as unwarranted.
Missouri remediation firm: Issue regarding selection process
for remediation contractor. Email to DNR sunshined to Post-
Dispatch: “I have better things to do than jump through
hoops for a reporter on a witch hunt.”
9. SAFE(R) COMMUNICATIONS
9
Educate staff to exercise discretion
Create formal but short policies and procedures.
Implement an email destruction policy. Emails should be
retained for the shortest period possible consistent with
statutory/regulatory requirements, business needs, and
legal requirements.
This policy must be suspended for “custodians” who
have emails relevant to pending, anticipated or
threatened litigation.
Provide regular training on the appropriate use of email
correspondence, including a deletion policy and litigation
hold.
10. SAFE(R) COMMUNICATIONS
10
Simple Ideas
Prevent inadvertent emails by leaving the subject
line blank which forces the system to ask a follow-up
question.
Do NOT email conversations or meetings about
competitors.
For any sensitive issue, consider whether or not the
subject of the email would be best conveyed in
person or by telephone.
For any sensitive legal issue, consider whether or
not the email should be protected by Attorney Client
Privilege.
11. SAFE(R) COMMUNICATIONS
11
Simple Ideas
Stop „reflex‟ e-mailing. This is the „texting culture‟
invading the workplace - an environment that demands
better judgment and discretion. Waiting even 10-15
minutes makes a difference.
Think of every e-mail like a potential trial exhibit. Ask
yourself, if you were on the witness stand, would you like
to be confronted with this?
Start treating e-mail like paper. Apply the same care and
consideration when you‟re sending an e-mail that you
would if you were sending a letter on your company‟s
letterhead.
Never put anything in an email that you would not want to
see in a newspaper article (because it may come to that).
12. SAFE(R) COMMUNICATIONS
12
Write “defensively”
Clearly set out your rationale for any choices you
make.
Avoid words that describe legal theories, such as
"hazardous," "foreseeable," "dangerous," “illegal,”
“violation,” “exceedance,” etc. Be factual.
Avoid overstated expressions, characteristics, or
opinions, such as calling a product problem
"catastrophic" or an environmental release a
“nightmare,” or emissions limits “impossible.”
Do not overstate perceived shortcomings -- just to
get someone's attention. If follow-up is
needed, follow up in person, then document that you
did.
13. SAFE(R) COMMUNICATIONS
13
Write “defensively”
Avoid modifiers like "often" or "frequently" if they are
not necessary. Avoid ambiguity altogether and just
be factual.
Do not write about things outside your area of
expertise or responsibility.
Do not discuss product safety or emissions or
remediation efforts in financial terms.
Do not try to be funny – this includes adding doodles
or comments in the margins.
If you state a conclusion, give the data or facts that
support it.
14. SAFE(R) COMMUNICATIONS
14
Write “defensively”
Do not speculate, guess, conjecture or editorialize.
Do not play lawyer and raise liability issues.
Do not blame anybody else in the company or
needlessly refer to internal differences of opinion.
Do not promiscuously create or distribute documents
beyond the minimum number necessary. This
definitely includes e-mail.
Always assume your document will be read on
national television during half-time at the Super Bowl
and will remain in the company's file forever.
15. SAFE(R) COMMUNICATIONS
15
Avoid “smoking guns”
Stick to company business
Keep it respectful, courteous, and constructive
Choose and use communications channels
wisely
Keep it confidential
Apply legal literacy
Contribute positively to the value chain
16. SAFE(R) COMMUNICATIONS
16
Avoid “smoking guns”
Strive for clarity and accuracy
Keep it legal
Keep it ethical
Listen and respond to warnings responsibly
Manage the closure process
Manage the document retention process
diligently
18. SAFE(R) COMMUNICATIONS
18
Review Missouri DNR databases
Water Quality Sampling Assessment System
Proposed and Issued Permits
Drinking Water Watch
Exceedance Monitoring System
Hazwaste database
UST database
EMS tracking system
19. SAFE(R) COMMUNICATIONS
19
Understanding Attorney Client Privilege
NOT every communication with legal counsel is
privileged
Elements of Privilege
Attorney
Client
Communication
Confidentiality anticipated/expected
Purpose must be to provide legal advice.
The key concept is purpose. The communication must be
related to the provision of legal advice.
20. SAFE(R) COMMUNICATIONS
20
Understanding Attorney Client Privilege
Originated in Roman and canon law: "is the oldest of
the privileges for confidential communications known
to the common law." Upjohn Co. v. U.S., 449 U.S.
383, 389 (1981).
Purpose is "to encourage full and frank
communications between attorneys and their
clients," and it exists to protect “not only the giving of
professional advice to those who can act on it but
also the giving of information to the lawyer to enable
him to give sound and informed advice." Id. at 389-
91.
21. SAFE(R) COMMUNICATIONS
21
Understanding Attorney Client
Privilege
If outside counsel is involved, the confidential
communication is presumed to be a request for and the
provision of “legal advice.”
Cannot insulate files from discovery simply by sending a
“cc” to the attorneys.
No non-attorney can create the Attorney Client
Privilege.
22. SAFE(R) COMMUNICATIONS
22
Understanding Attorney Client
Privilege
ONLY the client can waive the privilege.
Waiver can be done inadvertently
Do NOT overuse “Attorney Client Privilege” or “CC”
attorneys routinely since such language does NOT by
itself create a privilege; attenuates the valid use of
attorney client privilege; and can cause a judge or jury to
make an inference that the company operates with a
“fear” mentality.
23. SAFE(R) COMMUNICATIONS
23
Understanding Attorney Client Privilege
Attorney Client Privilege in the digital age.
Attorney should be in the “TO” field.
CC: Non lawyers who need to know based on
corporate responsibilities. The privilege only extends
to non-attorneys where it is clear that they are acting
at the direction of legal counsel.
Restrict circulation to those who “need to know.”
Consider verbal communications.
Subject field: “intent is to obtain legal advice.”
24. SAFE(R) COMMUNICATIONS
24
Understanding “Work-Product Doctrine”
Work-product doctrine is an independent source of
immunity from discovery, separate and distinct from the
attorney-client privilege." In re Grand Jury, 106 F.R.D.
255, 257 (D.N.R. 1985). [Rules of Court]
It is "broader than the attorney-client privilege; it protects
materials prepared by the attorney, whether or not
disclosed to the client, and it protects material prepared
by agents for the attorney." In re Grand Jury
Proceedings, 601 F.2d 162, 171 (5th Cir. 1979).
It protects material prepared by NON-Attorneys as well if
prepared in anticipation of litigation.
25. SAFE(R) COMMUNICATIONS
25
Understanding “Work-Product Doctrine”
Litigation need only be contemplated at the time the work is
performed for the doctrine to apply and the term "litigation" is
defined broadly to encompass the defense of administrative
and other investigations.
Work-Product may include interviews, statements,
memoranda, correspondence, briefs, mental impressions,
personal beliefs, and countless other tangible and materials.
Compared with Attorney-Client:
“Factual" work-product may be discoverable upon a showing of
substantial need for the information.
However, "opinion" work-product -- which reflects counsel's
subjective beliefs, impressions, and strategies regarding a case -- is
nearly absolute.