Christopher H. Dolan, Faegre Baker Daniels, Understanding Attorney Client Privilege, Confidential Business Information and the Work Product Doctrine, Midwest Environmental Compliance Conference, Chicago, October 29-30, 2015
Christopher H. Dolan, Faegre Baker Daniels, Understanding Attorney Client Privilege, Confidential Business Information and the Work Product Doctrine, Midwest Environmental Compliance Conference, Chicago, October 29-30, 2015
Incident Response and the Attorney Client Privilege - ShmooCon 2019Wendy Knox Everette
Oh no, you’ve suffered a computer security incident. The DFIR team you hired wrote up a great report detailing exactly what happened and making suggestions for how to fix some of these issues. But now you’re being sued, and opposing counsel requests that report!
Many times, companies will seek to protect investigations under the cover of attorney-client privilege. But what is that, when and how does the privilege attach, and how helpful is it most of the time? What should your goal be, and just what are best practices for working with attorneys?
Michael Cosgrove from Workplace Laws discusses:
- Steps to prevent workplace bullying
- The process of dealing with workplace bullying after it occurs
- Legal frameworks, resources available for businesses and options for employees to have their workplace bullying issues dealt with effectively
Cover your workplace with LawPath's Workplace Policies Bundle: http://bit.ly/1AFe9VM
Incident Response and the Attorney Client Privilege - ShmooCon 2019Wendy Knox Everette
Oh no, you’ve suffered a computer security incident. The DFIR team you hired wrote up a great report detailing exactly what happened and making suggestions for how to fix some of these issues. But now you’re being sued, and opposing counsel requests that report!
Many times, companies will seek to protect investigations under the cover of attorney-client privilege. But what is that, when and how does the privilege attach, and how helpful is it most of the time? What should your goal be, and just what are best practices for working with attorneys?
Michael Cosgrove from Workplace Laws discusses:
- Steps to prevent workplace bullying
- The process of dealing with workplace bullying after it occurs
- Legal frameworks, resources available for businesses and options for employees to have their workplace bullying issues dealt with effectively
Cover your workplace with LawPath's Workplace Policies Bundle: http://bit.ly/1AFe9VM
This is a powerpoint that contains basic information on Lay Magistrates, and it informs you on how you can become a magistrate for your local magistrates court. It also has a link at the end of the powerpoint so you can apply to be a magistrate.
If your company is like most companies, your confidential information is critical to your competitive advantage.Your employees work with company confidential information daily, and are your first line of defense against unintended disclosure. Help them to better understand what information is confidential and ways to protect confidential information.
On Tuesday, 23 September, MCRB hosted a half-day workshop on “Anti-Corruption Programmes” for Myanmar businesses in Yangon. The workshop, held in collaboration with Spectrum – a Yangon-based sustainable development knowledge network - was the first in a series of events to follow-up on the Transparency in Myanmar Enterprises (TiME) report and build business capacity in the area of anti-corruption and human rights.
Never one to duck away from a controversial subject, world-class trainer and author of the highly successful Be the Ultimate Assistant, Bonnie returns to Executive Secretary LIVE to shine a light on a problem that affects over 65% of Assistants at least once in their careers.
If you have ever witnessed or experienced bullying, you know that it takes many forms -- from the “Devil Wears Prada” irrational diva to the co-worker who intentionally withholds important information to the manager who applies rules to certain people and not to others. All of it is bullying that is toxic to a healthy, happy and profitable workplace.
As someone who has first-hand experience with bullying, Bonnie has been researching this subject for years and has connected with some of the world’s experts on the subject. She will be focusing on the proactive and realistic solutions that Assistants are implementing that are slowing down the revolving door of staff who are resigning. Together, we will break the silence and eat the elephant…one bite at a time.
www.bonnielowkramen.com
BUSINESS LAW REVIEW- 2022: Defending White Collar Crime-101Financial Poise
While white collar crimes don’t usually carry the same stigma or penalties as violent crime, the consequences of a conviction, or even an allegation can be devastating. Leaving prison time aside, the business may also face investigation, prosecution and possibly, the risk of reputational damage, financial loss and unwanted exposure.
As governmental enforcement of laws against those accused of white collar crime increases, companies need to understand how to avoid unknowingly acting in ways that may be unlawful, how to prevent and detect potential employee misconduct, and how to react if misconduct does occur.
Part of the webinar series: Business Law Review 2022
See more at https://www.financialpoise.com/webinars/
This is a powerpoint that contains basic information on Lay Magistrates, and it informs you on how you can become a magistrate for your local magistrates court. It also has a link at the end of the powerpoint so you can apply to be a magistrate.
If your company is like most companies, your confidential information is critical to your competitive advantage.Your employees work with company confidential information daily, and are your first line of defense against unintended disclosure. Help them to better understand what information is confidential and ways to protect confidential information.
On Tuesday, 23 September, MCRB hosted a half-day workshop on “Anti-Corruption Programmes” for Myanmar businesses in Yangon. The workshop, held in collaboration with Spectrum – a Yangon-based sustainable development knowledge network - was the first in a series of events to follow-up on the Transparency in Myanmar Enterprises (TiME) report and build business capacity in the area of anti-corruption and human rights.
Never one to duck away from a controversial subject, world-class trainer and author of the highly successful Be the Ultimate Assistant, Bonnie returns to Executive Secretary LIVE to shine a light on a problem that affects over 65% of Assistants at least once in their careers.
If you have ever witnessed or experienced bullying, you know that it takes many forms -- from the “Devil Wears Prada” irrational diva to the co-worker who intentionally withholds important information to the manager who applies rules to certain people and not to others. All of it is bullying that is toxic to a healthy, happy and profitable workplace.
As someone who has first-hand experience with bullying, Bonnie has been researching this subject for years and has connected with some of the world’s experts on the subject. She will be focusing on the proactive and realistic solutions that Assistants are implementing that are slowing down the revolving door of staff who are resigning. Together, we will break the silence and eat the elephant…one bite at a time.
www.bonnielowkramen.com
Similar to Christopher H. Dolan, Faegre Baker Daniels, Understanding Attorney Client Privilege, Confidential Business Information and the Work Product Doctrine, Midwest Environmental Compliance Conference, Chicago, October 29-30, 2015
BUSINESS LAW REVIEW- 2022: Defending White Collar Crime-101Financial Poise
While white collar crimes don’t usually carry the same stigma or penalties as violent crime, the consequences of a conviction, or even an allegation can be devastating. Leaving prison time aside, the business may also face investigation, prosecution and possibly, the risk of reputational damage, financial loss and unwanted exposure.
As governmental enforcement of laws against those accused of white collar crime increases, companies need to understand how to avoid unknowingly acting in ways that may be unlawful, how to prevent and detect potential employee misconduct, and how to react if misconduct does occur.
Part of the webinar series: Business Law Review 2022
See more at https://www.financialpoise.com/webinars/
Data Breach Response: Before and After the BreachFinancial Poise
You’ve received the dreaded call that your company has just suffered a data breach – what do you do next? Who do you call for help? What notification obligations do you have?
With proper preparation, you can mitigate the damage caused by this unfortunate event and put your business in a position to recover. Your company may have already implemented its information security program and identified the responsible parties, including applicable outside experts, to be contacted in the event of a breach. However, now you must call up your incident response team to investigate the extent of the breach, evaluate the possible damage to your company, and determine whether you must notify your clients, customers, or the public of the breach. This webinar will help prepare you to take action when the worst happens.
Part of the webinar series: Cybersecurity & Data Privacy 2021
See more at https://www.financialpoise.com/webinars/
The new regime relating to mandatory notification for data breaches came into effect on 22 February, 2018. Organisations that are subject to the Privacy Act 1988 must now notify the Office of the Australian Information Commissioner and affected individuals where an 'eligible data breach' has occurred.
HOM INtro #28: Demand Your Note: A Foreclosure Intervention StrategyMildredWilkins
Show me the NOTE
One of the more successful strategies to avert foreclosure has emerged and is being used around the country by both attorneys who are representing clients facing foreclosure and individual consumers who are defending themselves is demanding that the lender/servicer provide the NOTE which demonstrates the party suing for foreclosure has the legal authority to do so.
So simplistic and yet overwhelmingly successful in case after case when it is has been used. Across the country consumers and attorneys (and the courts where foreclosures are processed) are becoming aware that all too often the foreclosing party has NO legal standing—NO right to foreclose.
Securitization has created scenarios where mortgages have been sliced and diced and sold in pieces so frequently NOBODY has clear, RECORDED, unequivocal ownership of your specific mortgage.
Do the research on MERS and the lawsuits and decisions recently on their right to foreclose. Check carefully your paperwork to see if the person who is threatening foreclosure is, in fact, the note holder of record in the recorder office.
In any case, demand the note. A “QUALIFIED WRITTEN REQUEST” is your most effective way to present this demand. Do independent research or get a copy of Webinar Vol. 13 for details on how to proceed.
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...Shawn Tuma
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss. This is a keynote speech delivered by Shawn Tuma to the Paralegal Division of the State Bar of Texas on June 17, 2016.
Chapter 12 Duties as a WhistleblowerWhistleblowerA whis.docxcravennichole326
Chapter 12: Duties as a Whistleblower
Whistleblower
A whistleblower is an employee or former employee who reports misconduct to people or entities that have the power and presumed willingness to take corrective action.
Whistleblowers can be internal or external.
Whistleblower Motivations
Whistleblower motivations include:
Revenge
Reputation Preservation
Altruism
Collecting financial rewards
Fasle Claims Act
Whistleblower (cont)
Whistleblower-
One of the most well known whistleblowers is Jeffrey Wigand, who exposed the Big Tobacco scandal, revealing that executives of the companies knew that cigarettes were addictive while approving the addition of known carcinogenic ingredients to the cigarettes.
http://www.imdb.com/title/tt0140352/trailers-screenplay-E11632-10-2
Think Russell Crowe in the movie The Insider.
More recent whistleblowers include…..
Whistleblower (cont)
Cynthia Cooper (Worldcom), Coleen Rowley (FBI), and Sherron Watkins (Enron)
“their lives may not have been at stake, but Watkins, Rowley and Cooper put pretty much everything else on the line. Their jobs, their health, their privacy, their sanity--they risked all of them to bring us badly needed word of trouble inside crucial institutions”
Whistleblower Programs
FeatureIRSDodd-Frank ActFocusTax violationsFederal securities laws violations, including bribery, fraudulent accounting, and insider tradingSubmitted information Secret information or publicly available information Only “original”, nonpublic information Minimum threshold for recoveryOver $2 million Over $1 million Typical range of award15% to 30% of IRS Recovery15% to 30% of SEC RecoveryAnonymity protected? Yes, usuallyYesProtection against workplace retaliation?No Yes
Whistleblower Laws
Section 806 of SOX
Only applies to publicly traded companies
File a complaint with the Department of Labor (DOL)
If DOL hasn’t ruled on it within 180 days, it goes to federal court or a civil suit may be filed
Remedies of employee include relief “to make the employee whole”, compensatory damages (same job back, back pay, special damages as result of action)
Whistleblower Laws (cont)
Do Whistleblower laws (specifically SOX section 806 provisions) work?
whistle-blowers still face a painful cost-benefit decision: whether a lawsuit with uncertain chances of success is worth the professional and personal sacrifices that will assuredly be required
Many employees have to change industries after filing suit, whether the case has merit or not
A study that looked at 470 cases filed between 2002-2005, the whistleblower won only 3.6% of the time.
Whistleblower Laws (cont)
What can/should employers do?
Have an independently-operated whistleblower complaint system. If the system is operated by personnel skilled in the underlying accounting, auditing, and internal control issues, proper information will be immediately collected, so that investigations are cost-effective and complete.
Must be overseen by audit com ...
This webinar is for the lawyer -or anyone else- who wants to brush up on the latest issues and strategies to be aware of regarding legal ethics and best practices. The panelists discuss recent and important case law in the area and explain how those decisions can have real-world impact on the situations you may be involved in. Among others, the panel will address the following Model Rules of Professional Conduct: Rule 1.7-Conflict of Interest: Current Clients; Rule 1.8-Conflict of Interest: Current Clients: Specific Rules; Rule 3.8 - Special Responsibilities of a Prosecutor; and Rule 4.4(a) Respect for Rights of Third Persons.
Part of the webinar series: LEGAL ETHICS – BEST PRACTICES 2022
See more at https://www.financialpoise.com/webinars/
The Ugly Secret about Third Party Risk Management.pptxBreachSiren
The ugly secret about the Third Party Risk Management industry is that the data quality used to provide risk decisions is poor. We list a few solutions for your company to reduce its workload and make your third party program better.
Learn more with BreachSiren [dot] com
Whitepaper: The Enlightened Legal Hold 2014Zapproved
Three years after the Pension Committee opinion, Judge Shira Scheindlin's message is still loud and clear: The courts do not want to waste time and squander resources on motion practice, depositions and reams of submissions growing out of inexcusable failures to properly preserve relevant ESI.
Now is the time for enlightened legal holds, an age when counsel have the judgment to distinguish what must be preserved, the knowledge to negotiate and lucidly communicate the scope, and the skills and tools to select and instruct on reasonable and effective methods of preservation.
Download the white paper to discover:
How to avoid the 5 Deadly Sins of Legal Holds
Why a legal hold is an organic, bespoke process
How to know if you are 'over-preserving'
9 key elements of a sound legal hold
When to expect higher standards, raised stakes, and new vulnerabilities
The Enlightened Legal Hold serves as a guide for organizations of any size in tackling the task of preservation that at times can seem overwhelming. The 2014 version includes updated citations and other improvements to guide you on your path to Preservation Nirvana.
7 Days of Playing Minesweeper, or How to Shut Down Whistleblower Defense with...Evention
The next time you find yourself thinking there isn’t enough time in a week, consider what Drinker Biddle did for their client in 7 days.
When a senior executive for a publicly traded company was fired for underperformance, he made a serious allegation on his way out the door. He claimed he was laid off because of his repeated attempts to inform officials that the company was falsifying quarterly financial reports to the public. Instead of waiting for the typical pace of discovery that could potentially cost their client at least a quarter of a million dollars, Drinker Biddle used powerful analytics technology to conduct an intelligent investigation, fast. In this session, you will learn about machine learning that makes digging through large multi-sources data sets possible. You will have a chance to see the backstage of how engineers empower legal teams to organize data, discover the truth and act on it.
The Ugly Secret about Third Party Risk Management.pdfBreachSiren
Your current data provider doesn’t have federal, state and industry sources representing more than 75% of the US population and growing… but we do.
BreachSiren provides quality breach data to innovative risk and security companies looking to differentiate themselves from competitors. Contact us to learn more about our data breach database and enterprise API.
AZBIA & Traklight present "New Year, New Business" Open HouseTraklight.com
Traklight organized the New Year New Business event open house with CEI and AZBIA.
5 presenters shared on their legal expertise in the area of intellectual property. Patents, protection, copyrights, business formation, contracts and identification of intellectual property permeated throughout the presenter's discussions.
Russ Yelton (President and CEO of NACET) & Joann McMaster (President of AZBIA)
Mary Juetten (Founder and CEO of Traklight
Juliet Peters (Founding Partner of Becker Peters, PLLC)
Ron Kisicki (registered Patent Attorney and Partner with Woods Oviatt Gilman, LLP)
Ruth Carter (Owner and Attorney of Carter Law Firm, PLLC)
Recovering from a Cyber Attack was delivered on February 7, 2018, at the Texas Bar CLE Cybersecurity Workshop course by Todd Hindman, Global Director, Data Breach Response Services of ID Experts Corp. and Shawn Tuma, Cybersecurity & Data Privacy Attorney at Scheef & Stone.
Similar to Christopher H. Dolan, Faegre Baker Daniels, Understanding Attorney Client Privilege, Confidential Business Information and the Work Product Doctrine, Midwest Environmental Compliance Conference, Chicago, October 29-30, 2015 (20)
Andracsek, Robynn, Burns & McDonnell, What Every EHS Staff should Know about ...Kevin Perry
Andracsek Robynn Burns McDonnell What Every EHS Staff should Know about Monitoring and Modeling MECC Kansas City May 11-13, 2016 Overland Park www.mecconference.com
Funderburg, Lisa, Stinson Leonard Street, Compliance Tools Top Ten Tips When ...Kevin Perry
Funderburg Lisa Stinson Leonard Street Compliance Tools Top Ten Tips When Conducting an Audit MECC Kansas City 2016 May 11-13, 2016 Overland Park www.mecconference.com
Grice, Lisa, Ramboll, Corporate Sustainability Where the Rest of the Company ...Kevin Perry
Grice Lisa Ramboll Corporate Sustainability Where the Rest of the Company Fits From Strategy to Implementation MECC Kansas City May 11-13, 2016 Overland Park www.mecconference.com
"Understanding the Carbon Cycle: Processes, Human Impacts, and Strategies for...MMariSelvam4
The carbon cycle is a critical component of Earth's environmental system, governing the movement and transformation of carbon through various reservoirs, including the atmosphere, oceans, soil, and living organisms. This complex cycle involves several key processes such as photosynthesis, respiration, decomposition, and carbon sequestration, each contributing to the regulation of carbon levels on the planet.
Human activities, particularly fossil fuel combustion and deforestation, have significantly altered the natural carbon cycle, leading to increased atmospheric carbon dioxide concentrations and driving climate change. Understanding the intricacies of the carbon cycle is essential for assessing the impacts of these changes and developing effective mitigation strategies.
By studying the carbon cycle, scientists can identify carbon sources and sinks, measure carbon fluxes, and predict future trends. This knowledge is crucial for crafting policies aimed at reducing carbon emissions, enhancing carbon storage, and promoting sustainable practices. The carbon cycle's interplay with climate systems, ecosystems, and human activities underscores its importance in maintaining a stable and healthy planet.
In-depth exploration of the carbon cycle reveals the delicate balance required to sustain life and the urgent need to address anthropogenic influences. Through research, education, and policy, we can work towards restoring equilibrium in the carbon cycle and ensuring a sustainable future for generations to come.
UNDERSTANDING WHAT GREEN WASHING IS!.pdfJulietMogola
Many companies today use green washing to lure the public into thinking they are conserving the environment but in real sense they are doing more harm. There have been such several cases from very big companies here in Kenya and also globally. This ranges from various sectors from manufacturing and goes to consumer products. Educating people on greenwashing will enable people to make better choices based on their analysis and not on what they see on marketing sites.
Willie Nelson Net Worth: A Journey Through Music, Movies, and Business Venturesgreendigital
Willie Nelson is a name that resonates within the world of music and entertainment. Known for his unique voice, and masterful guitar skills. and an extraordinary career spanning several decades. Nelson has become a legend in the country music scene. But, his influence extends far beyond the realm of music. with ventures in acting, writing, activism, and business. This comprehensive article delves into Willie Nelson net worth. exploring the various facets of his career that have contributed to his large fortune.
Follow us on: Pinterest
Introduction
Willie Nelson net worth is a testament to his enduring influence and success in many fields. Born on April 29, 1933, in Abbott, Texas. Nelson's journey from a humble beginning to becoming one of the most iconic figures in American music is nothing short of inspirational. His net worth, which estimated to be around $25 million as of 2024. reflects a career that is as diverse as it is prolific.
Early Life and Musical Beginnings
Humble Origins
Willie Hugh Nelson was born during the Great Depression. a time of significant economic hardship in the United States. Raised by his grandparents. Nelson found solace and inspiration in music from an early age. His grandmother taught him to play the guitar. setting the stage for what would become an illustrious career.
First Steps in Music
Nelson's initial foray into the music industry was fraught with challenges. He moved to Nashville, Tennessee, to pursue his dreams, but success did not come . Working as a songwriter, Nelson penned hits for other artists. which helped him gain a foothold in the competitive music scene. His songwriting skills contributed to his early earnings. laying the foundation for his net worth.
Rise to Stardom
Breakthrough Albums
The 1970s marked a turning point in Willie Nelson's career. His albums "Shotgun Willie" (1973), "Red Headed Stranger" (1975). and "Stardust" (1978) received critical acclaim and commercial success. These albums not only solidified his position in the country music genre. but also introduced his music to a broader audience. The success of these albums played a crucial role in boosting Willie Nelson net worth.
Iconic Songs
Willie Nelson net worth is also attributed to his extensive catalog of hit songs. Tracks like "Blue Eyes Crying in the Rain," "On the Road Again," and "Always on My Mind" have become timeless classics. These songs have not only earned Nelson large royalties but have also ensured his continued relevance in the music industry.
Acting and Film Career
Hollywood Ventures
In addition to his music career, Willie Nelson has also made a mark in Hollywood. His distinctive personality and on-screen presence have landed him roles in several films and television shows. Notable appearances include roles in "The Electric Horseman" (1979), "Honeysuckle Rose" (1980), and "Barbarosa" (1982). These acting gigs have added a significant amount to Willie Nelson net worth.
Television Appearances
Nelson's char
Artificial Reefs by Kuddle Life Foundation - May 2024punit537210
Situated in Pondicherry, India, Kuddle Life Foundation is a charitable, non-profit and non-governmental organization (NGO) dedicated to improving the living standards of coastal communities and simultaneously placing a strong emphasis on the protection of marine ecosystems.
One of the key areas we work in is Artificial Reefs. This presentation captures our journey so far and our learnings. We hope you get as excited about marine conservation and artificial reefs as we are.
Please visit our website: https://kuddlelife.org
Our Instagram channel:
@kuddlelifefoundation
Our Linkedin Page:
https://www.linkedin.com/company/kuddlelifefoundation/
and write to us if you have any questions:
info@kuddlelife.org
WRI’s brand new “Food Service Playbook for Promoting Sustainable Food Choices” gives food service operators the very latest strategies for creating dining environments that empower consumers to choose sustainable, plant-rich dishes. This research builds off our first guide for food service, now with industry experience and insights from nearly 350 academic trials.
Christopher H. Dolan, Faegre Baker Daniels, Understanding Attorney Client Privilege, Confidential Business Information and the Work Product Doctrine, Midwest Environmental Compliance Conference, Chicago, October 29-30, 2015
1. Understanding Attorney Client Privilege,
Confidential Business Information and
the Work Product Doctrine
Christopher H. Dolan
Midwest Environmental Compliance Conference
October 29, 2015
1
2. Overview
►Why We Care
►Attorney-Client Privilege
►Work Product
►Third-Party Consultant Work Product
►Self-Evaluative Privilege
►Confidential Business Information
►Recommendations
2
3. Why We Care
►Emails
► work account
► personal account, if used for work
►Facebook posts
►Texts
►Tweets
►Facebook
►Voicemail
►Chat Applications
►…Paper too!
3
4. How Do Your Emails Turn into Their Evidence?
►Lawsuit by or against your company
►Subpoena to your company in other parties’ legal proceeding
►Regulatory Request for Information
►Discovery – almost anything goes
4
6. The party asserting the privilege
bears the burden of establishing
each element.
6
Privilege
You
7. Attorney-Client Privilege
►Attorney-client privilege protects confidential communications
between clients and lawyers for the purpose of obtaining legal advice.
► Communications are privileged, but not facts.
► The privilege belongs to the company, not to you.
► Privileges tend to be construed narrowly.
► Must not be for the purpose of committing crime or fraud.
► Beware overuse of the “attorney-client privilege” label.
7
9. How To Lose The Privilege
1 2 3 4
Communication Between
Attorneys
& Clients
In
Confidence
Purpose:
Legal Advice
Non-
lawyers
9
10. How To Lose The Privilege
1 2 3 4
Communication Between
Attorneys
& Clients
In
Confidence
Purpose:
Legal Advice
Tell Someone
Outside of the
Circle
10
11. How To Lose The Privilege
1 2 3 4
Communication Between
Privileged
Persons
In
Confidence
Purpose:
Legal Advice
Business
Communications
11
12. From:
Sent:
To:
CC:
Subject:
Our company totally messed this one up in the following ways:
(1) lying;
(2) bribing;
(3) stealing.
I'm cc'ing Sarah Lawyer on this so it's privileged.
Business, Joe
Wednesday, March 4, 2015 11:55 PM
Business, Jane;
Lawyer, Sarah
The big disaster
Example 1
12
13. From:
Sent:
To:
CC:
Subject:
Sarah,
I need your legal advice on this situation.
Our company totally messed this one up in the following ways:
(1) lying;
(2) bribing;
(3) stealing.
I'm cc'ing Sarah Lawyer on this so it's privileged."
Business, Joe
Wednesday, March 4, 2015 11:55 PM
Business, Jane
Lawyer, Sarah
The big disaster
1. State that you are seeking legal
advice.
Example 1
13
14. From:
Sent:
To:
CC:
Subject:
Sarah,
I need your legal advice on this situation.
Our company totally messed this one up in the following ways:
(1) lying;
(2) bribing;
(3) stealing.
Business, Joe
Wednesday, March 4, 2015 11:55 PM
Lawyer, Sarah; Business, Jane
Lawyer, Sarah Business, Jane
The big disaster
2. Direct the communication to the
lawyer or other legal
professional from whom legal
advice is being sought.
Example 1
14
15. From:
Sent:
To:
CC:
Subject:
Sarah,
I need your legal advice on this situation.
Our company totally messed this one up in the following ways:
(1) lying;
(2) bribing;
(3) stealing.
Business, Joe
Wednesday, March 4, 2015 11:55 PM
Lawyer, Sarah
Business, Jane
The big disaster The ABC Matter
3. Keep the subject neutral.
Example 1
15
16. From:
Sent:
To:
CC:
Subject:
Privileged and Confidential—Attorney-Client Communication
Sarah,
I need your legal advice on this situation.
Our company totally messed this one up in the following ways:
(1) lying;
(2) bribing;
(3) stealing.
Business, Joe
Wednesday, March 4, 2015 11:55 PM
Lawyer, Sarah
Business, Jane
The ABC Matter
4. Label the communication
“Privileged and Confidential—Attorney-
Client Communication.”
Example 1
16
17. From:
Sent:
To:
CC:
Subject:
Privileged and Confidential—Attorney-Client Communication
Sarah,
I need your legal advice.
Our company totally messed this one up in may have done the
following:
(1) lying Said we released two gallons of hazardous substances;
(2) bribing; Offered a position to the Administrator’s daughter;
(3) stealing. Moved dedicated remediation funds to the operating
account.
Business, Joe
Wednesday, March 4, 2015 11:55 PM
Lawyer, Sarah
Business, Jane
The ABC Matter
5. Even if you think it’s privileged
– don’t forget your email basics.
Example 1
17
18. From:
Sent:
To:
CC:
Subject:
Privileged and Confidential—Attorney-Client Communication
Sarah,
I need your legal advice. Can we set up a time to talk?
Our company totally messed this one up in may have done the
following:
(1) lying Said we released two gallons of hazardous substances;
(2) bribing; Offered a position to the Administrator’s daughter;
(3) stealing. Moved dedicated remediation funds to the operating
account.
Business, Joe
Wednesday, March 4, 2015 11:55 PM
Lawyer, Sarah
Business, Jane
The ABC Matter
6. And there’s nothing wrong with
a phone call.
Example 1
18
19. From:
Sent:
To:
CC:
Subject:
Everyone,
FYI – from legal.
Jill
______________________________________________
From: Lawyer, Tom
Sent: Tuesday, September 24, 2007 3:17 PM
To: Business, Jill
Subject: Legal Advice
I think dumping the hazardous waste is illegal. Don’t do it.
Business, Jill
Tuesday, March 3, 2015 9:23 AM
Mark; Jack; Sue; Steve; Tom; Nancy; Amy; Eric; Jim; Tina
Tim Vendor
FYI
Example 2
19
20. From:
Sent:
To:
CC:
Subject:
Everyone,
FYI – from legal.
Jill
______________________________________________
From: Lawyer, Tom
Sent: Tuesday, September 24, 2007 3:17 PM
To: Business, Jill
Subject: Legal Advice
I think dumping the hazardous waste is illegal. Don’t do it.
Business, Jill
Tuesday, March 3, 2015 9:23 AM
Mark; Jack; Sue; Steve; Tom; Nancy; Amy; Eric; Jim; Tina
Tim Vendor
FYI
Recommendation: Do not
forward legal advice to people
outside of company.
Example 2
20
21. From:
Sent:
To:
CC:
Subject:
Everyone,
FYI – from legal. Do Not Forward.
Jill
______________________________________________
From: Lawyer, Tom
Sent: Tuesday, September 24, 2007 3:17 PM
To: Business, Jill
Subject: Legal Advice
I think dumping the hazardous waste is illegal. Don’t do it.
Business, Jill
Tuesday, March 3, 2015 9:23 AM
Mark; Jack; Sue; Steve; Tom; Nancy; Amy; Eric; Jim; Tina
FYI
Recommendation: Forward
legal advice internally on a need-
to-know basis only. Instruct
others not to forward it.
Example 2
21
22. From:
Sent:
To:
CC:
Subject:
Hi everybody – Take a look at this article, is this a consultant we
should be doing business with?
Thanks,
Jill
Business, Jill
Monday, March 2, 2015 2:37 PM
Lawyer, Tom; Business, Mark; Business, Jack
article
Example 3
22
23. From:
Sent:
To:
CC:
Subject:
Hi everybody – Take a look at this article, is this a consultant we
should be doing business with?
Thanks,
Jill
Business, Jill
Monday, March 2, 2015 2:37 PM
Lawyer, Tom; Business, Mark; Business, Jack
article
Remember, not all communications
with lawyers are privileged—the
subject matter needs to be legal.
Example 3
23
24. Work Product Doctrine
►Attorney work product doctrine protects materials (including notes)
prepared by or on behalf of an attorney in anticipation of litigation.
►“Anticipation of litigation” means that the material must be:
► Prepared before or during litigation (or threat of litigation), and
► For the purpose of litigation specifically, and not some other purpose.
►Waived if party shares document/information/opinion with third party.
► Document itself is protected, underlying facts are not.
24
25. Work Product: What Isn’t Covered?
►Materials prepared before litigation anticipated
►Materials prepared in ordinary course of business
►Materials that are not kept confidential
►Fact work product – substantial need
►Whether you reference potential litigation is important
25
26. Third-Party Consultant Work Product
► Communications with consultants, including consultant-attorney
communications, reports, technical studies, and laboratory tests, may
be protected if prepared at attorney’s direction/supervision in
anticipation of litigation.
►“Anticipation of litigation” includes when an agency issues a request
for an investigation.
►Protection more likely if consultant considered retained by counsel.
►Lawyer should be included on communications with consultants where
possible.
26
27. Self-Evaluative Privilege
► 25 States have passed laws and/or rules establishing limited
self-evaluative privileges.
► Can be helpful in environmental audit situations.
► Rules vary by state.
► Do your research in advance.
►
► Courts interpret these privileges narrowly.
27
28. Requests for Information
►EPA and DOJ are aggressively using RFIs to identify violations
► CWA § 308, CAA § 114, RCRA § 3007(a), and CERCLA § 104(e)
► Extremely broad RFIs
► Not limited to documentation of violations or compliance issues
► May include routine documentation and communications
28
29. Confidential Business Information
►CBI is broadly defined as proprietary information, considered
confidential to the submitter, the release of which would cause
substantial business injury to the owner.
►Broadly defined, but narrowly construed.
►CBI is not a Privilege.
►CBI as a Tool to Limit Public Disclosure.
29
30. Recommendations to Protect Communications
►If requesting legal advice, state that you are requesting legal advice.
►Label legitimate communications as “Privileged and Confidential—
Attorney-Client Communication.”
►Explain the purpose of the document.
►Sending a message to a lawyer does not guarantee it will be
privileged.
►Limit the use of ccs to maintain the privilege.
► Beware of e-mail strings.
►Include only non-lawyers on a need to know basis.
►Include a “Do Not Forward” line and abide by it.
►Strictly follow by your company’s document retention policy.
►If it doubt, call… your lawyer.
30
31. Don’t . . .
►Write when you can call (or even better, meet in person).
►“Fire off” an email, text, post, etc.
►Joke or kid about things that would be very bad if you meant it
►Be flip or sarcastic
►Exaggerate or overstate things
►Use absolutes
►Say things you do not know to be true
►Swear
►Reply all unless you really, really mean it
31