SlideShare a Scribd company logo
1 of 27
NABRICO:
Cyber Liability Coverage
In the Marketplace
August 18, 2017
Presenters:
Daniel A. Cotter
Butler Rubin Saltarelli & Boyd LLP
321 N. Clark Street, Suite 400
Chicago, IL 60654
Dcotter@butlerrubin.com
The materials in this presentation are intended to provide a general
overview of the issues contained herein and are not intended nor
should they be construed to provide specific legal or regulatory
guidance or advice. If you have any questions or issues of a specific
nature, you should consult with appropriate legal or regulatory
counsel to review the specific circumstances involved. Views
expressed are those of the speaker and are not to be attributed to
his firm or clients.
Goals/Roadmap
• Rules of Professional Conduct
• Obligations they Impose
• Toward a New Standard
The Parade of Horribles
- Inadvertence, mistake: Law Firm’s Documents Dumped in
Trash, Gainesville Times, October 16, 2011.
- Cyber attack: Wiley Rein Hack LLP Hack (2011).
- Physical Security. Laptop Stolen from Law Offices of David A.
Krausz, Sensitive Info at Risk, Softpedia.
- Insider threats: Orrick breach.
- Readers of WSJ on 3/29/2016: “Hackers Breach Law Firms,
Including Cravath and Weil Gotshal”
- Edelson Law putative class action against Johnson & Bell (N.D.
IL 2016) and what has since happened
- DLA and Peyta
- CIO Magazine, 8/3, Hackers Aggressivley Attacking Law Firms-
http://www.cio.com/article/3212829/cyber-attacks-
espionage/hackers-are-aggressively-targeting-law-firms-
data.html
Rules of Professional Conduct
Some Relevant Ethical Rules
•Illinois Rule 1.1 (Competence)
•Illinois Rule 1.6 (Confidentiality of
Information)
•Illinois Rule 1.4 (Communication)
•Illinois Rules 1.15, 1.16 (Duty to Safeguard
Client Property)
•Illinois Rules 5.1, 5.2, 5.3 (Duty of
Supervision)
Rules of Professional Conduct
Illinois Rule 1.1  
Duty of Competence    
A lawyer shall provide competent representation to a client.
Competent representation requires the legal knowledge, skill,
thoroughness and preparation reasonably necessary for the
representation.
Duty of Competence
Rule 1.1 includes competence in selecting and using
technology. It requires attorneys who lack the
necessary technical competence for security (many, if
not most attorneys) to consult with qualified people
who have the requisite expertise.
Comment [8] MRPC: To maintain the requisite
knowledge and skill, a lawyer should keep abreast of
changes in the law and its practice, including the
benefits and risks associated with relevant technology,
engage in continuing study and education and comply
with all continuing legal education requirements to
which the lawyer is subject.
Relevant Laws Relating to Legal Obligations
All 50 states and DC have adopted ABA Model Rule 1.1
(either in whole or with modifications).
At least 25 states have adopted Comment 8.
8
Florida Rule
- September 30, 2016- every lawyer admitted to Florida
Bar must take three hours of technology-related CLE
during a three-year cycle.
Duty of Confidentiality
Illinois Rule 1.6(e)(amended October 15, 2015,
effective January 1, 2016)
– “A lawyer shall make reasonable efforts to
prevent the inadvertent or unauthorized
disclosure of, or unauthorized access to
information relating to the representation of
a client.”
Duty of Confidentiality
Comments to Illinois Rule 1.6
Acting Competently to Preserve Confidentiality
[19] When transmitting a communication that includes information relating to the
representation of a client, the lawyer must take reasonable precautions to prevent the
information from coming into the hands of unintended recipients. This duty, however, does
not require that the lawyer use special security measures if the method of
communication affords a reasonable expectation of privacy. Special circumstances,
however, may warrant special precautions. Factors to be considered in determining the
reasonableness of the lawyer’s expectation of confidentiality include the sensitivity of the
information and the extent to which the privacy of the communication is protected by
law or by a confidentiality agreement. A client may require the lawyer to implement
special security measures not required by this Rule or may give informed consent to the use
of a means of communication that would otherwise be prohibited by this Rule.
Duty of Confidentiality
Comment to Model Rule 1.6, now in comments to Illinois
Rule, effective January 1, 2016
Acting Competently to Preserve Confidentiality
[18] Factors to be considered in determining the reasonableness
of the lawyer’s efforts include, but are not limited to, the
sensitivity of the information, the likelihood of disclosure if
additional safeguards are not employed, the cost of employing
additional safeguards, the difficulty of implementing the
safeguards, and the extent to which the safeguards adversely
affect the lawyer’s ability to represent clients (e.g., by making a
device or important piece of software excessively difficult to use).
What does your client want?
Illinois Rule 1.6, Comment [19]:
“A client may require the lawyer to
implement special security measures not
required by this Rule or may give
informed consent to forgo security
measures that would otherwise be
required by this Rule.”
The Duties of Competence and Confidentiality
Ariz. Bar. Op. 09-04
Lawyer encrypted files, installed layers of password
protection, randomly generated folder names and
passwords, and converted each document to PDF
format that required password.
• “In satisfying the duty to take reasonable security
precautions, lawyers should consider firewalls,
password protection schemes, encryption, anti-virus
measures, etc.”
• The duty “does not require a guarantee that the
system will be invulnerable to unauthorized access.”
Duty to Safeguard Client Property
Illinois RPC 1.15(a)
“A lawyer shall hold property of clients
or third persons that is in a lawyer's
possession in connection with a
representation separate from the
lawyer’s own property. ... Other property
shall be identified as such and
appropriately safeguarded.”
ABA Formal Opinion 477 (May 11, 2017)
• Unencrypted generally okay
• But special circumstances/laws may require.
• Lawyer must make “reasonable efforts to prevent
inadvertent or unauthorized access”
• Includes a “reasonable efforts” balancing
• Concludes that: “A lawyer generally may transmit
information relating to the representation of a client
over the Internet….where…has undertaken
reasonable efforts….”
Nuts and Bolts of ABA Formal Opinion 477
- What does it say?
- What if anything does it mandate?
- Does it change the landscape?
- What should lawyers do to address?
Termination of Representation
Illinois RPC 1.16(d)
“Upon termination of representation, a lawyer shall
take steps to the extent reasonably practicable to
protect a client's interests, such as giving reasonable
notice to the client, allowing time for employment of
other counsel, surrendering papers and property to
which the client is entitled and refunding any advance
payment of fee or expense that has not been earned or
incurred. The lawyer may retain papers relating to the
client to the extent permitted by other law.”
Other Applicable Rules
Duty to supervise (Rules 5.1 and 5.3)
Illinois Rule 5.1(a):
“A partner in a law firm, and a lawyer who individually
or together with other lawyers possesses comparable
managerial authority in a law firm, shall make
reasonable efforts to ensure that the firm has in effect
measures giving reasonable assurance that all lawyers
in the firm conform to the Rules of Professional
Conduct.”
Other Applicable Rules
Duty to supervise (Rules 5.1, 5.2 and 5.3)
Illinois Rule 5.3:
“With respect to a nonlawyer employed or retained by
or associated with a lawyer:
(a)    The lawyer, and, in a law firm, each partner,
shall make reasonable efforts to ensure that the firm
has in effect measures giving reasonable assurance
that the nonlawyer's conduct is compatible with the
professional obligations of the lawyer and the firm;
Other Applicable Rules
Warning to client?
•You are obligated under Rule 1.4 to warn your client
about the risk of using electronic communications
where there is a significant risk that a 3d party may
gain access.
•E.g., when representing a company employee,
employer could read/access the email.
•And a warning may not be enough – you may be
required to recommend to the client methods of
ensuring that electronic communications remain
confidential.
•ABA Formal Op. 11-459 (8/4/11)
•Texas Opinion No. 648
And that’s not all…
Duty to Former clients?
Model Rule1.9(c)
“[A] lawyer who has formerly represented a
client in a matter or whose present or former
firm has formerly represented a client in a
matter shall not thereafter ... reveal
information relating to the representation
except as these Rules would permit or require
with respect to a client.”
What laws might be relevant?
• Mass. Security Regulations (201 CMR 17.00)
• Data Breach Notification laws (47 states, including
Illinois have these laws) HIPAA/HITECH
• Gramm Leach Bliley
• Data Security Laws
• Fiduciary Duty?
• Malpractice laws?
All Great, But What is Reasonable?
- Toward a Standard
-Pre-Breach Assessment and certification?
-Post-Breach, what is defensible?
CONCLUSION
QUESTIONS?
Cyber Liability Coverage in the Marketplace with Dan Cotter

More Related Content

What's hot

Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)Mark Milburn
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Eric Vanderburg
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesTech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesEvents2018
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Adv Prashant Mali
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentationashishjoshi
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesIISPEastMids
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet LawKlemchuk LLP
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...- Mark - Fullbright
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Ai on the case legal and ethical issues (may 17 2019)
Ai on the case   legal and ethical issues (may 17 2019)Ai on the case   legal and ethical issues (may 17 2019)
Ai on the case legal and ethical issues (may 17 2019)Richard Austin
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOIDan Michaluk
 

What's hot (20)

Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesTech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Ethics for lawyers in the cloud
Ethics for lawyers in the cloudEthics for lawyers in the cloud
Ethics for lawyers in the cloud
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Ai on the case legal and ethical issues (may 17 2019)
Ai on the case   legal and ethical issues (may 17 2019)Ai on the case   legal and ethical issues (may 17 2019)
Ai on the case legal and ethical issues (may 17 2019)
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 

Similar to Cyber Liability Coverage in the Marketplace with Dan Cotter

Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsNehal Madhani
 
AI on the Case: Legal and Ethical Issues
AI on the Case:  Legal and Ethical IssuesAI on the Case:  Legal and Ethical Issues
AI on the Case: Legal and Ethical IssuesRichard Austin
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeRobert Ambrogi
 
Ethics and our Electronic Toys
Ethics and our Electronic Toys Ethics and our Electronic Toys
Ethics and our Electronic Toys Kevin O'Shea
 
Offshore Legal Outsourcing The Ethical Implications Webinar Sep 9th 2008
Offshore Legal Outsourcing The Ethical Implications Webinar Sep 9th 2008Offshore Legal Outsourcing The Ethical Implications Webinar Sep 9th 2008
Offshore Legal Outsourcing The Ethical Implications Webinar Sep 9th 2008Mark Ross
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesCassie McGarvey, JD
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxEdFeranil
 
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...Financial Poise
 
Am Acad Actuaries Presentation 090315
Am Acad Actuaries Presentation 090315Am Acad Actuaries Presentation 090315
Am Acad Actuaries Presentation 090315Michael R Geske
 
Ethics - Duty of Competency & Technology
Ethics - Duty of Competency & TechnologyEthics - Duty of Competency & Technology
Ethics - Duty of Competency & TechnologyMichael Cole
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersRobert Ambrogi
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua LenonUnderstanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua LenonClio - Cloud-Based Legal Technology
 
Trust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkTrust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkFrancoise Gilbert
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2MLG College of Learning, Inc
 

Similar to Cyber Liability Coverage in the Marketplace with Dan Cotter (20)

Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerations
 
AI on the Case: Legal and Ethical Issues
AI on the Case:  Legal and Ethical IssuesAI on the Case:  Legal and Ethical Issues
AI on the Case: Legal and Ethical Issues
 
How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
 
Ethics and our Electronic Toys
Ethics and our Electronic Toys Ethics and our Electronic Toys
Ethics and our Electronic Toys
 
Offshore Legal Outsourcing The Ethical Implications Webinar Sep 9th 2008
Offshore Legal Outsourcing The Ethical Implications Webinar Sep 9th 2008Offshore Legal Outsourcing The Ethical Implications Webinar Sep 9th 2008
Offshore Legal Outsourcing The Ethical Implications Webinar Sep 9th 2008
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and Employees
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptx
 
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
 
Michigan Alsp 2009(3)
Michigan Alsp 2009(3)Michigan Alsp 2009(3)
Michigan Alsp 2009(3)
 
Legal Ethics in the Digital Age
Legal Ethics in the Digital AgeLegal Ethics in the Digital Age
Legal Ethics in the Digital Age
 
Am Acad Actuaries Presentation 090315
Am Acad Actuaries Presentation 090315Am Acad Actuaries Presentation 090315
Am Acad Actuaries Presentation 090315
 
Ethics - Duty of Competency & Technology
Ethics - Duty of Competency & TechnologyEthics - Duty of Competency & Technology
Ethics - Duty of Competency & Technology
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua LenonUnderstanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
 
Trust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkTrust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory Framework
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
 

Recently uploaded

Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesFinlaw Associates
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 

Recently uploaded (20)

Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 

Cyber Liability Coverage in the Marketplace with Dan Cotter

  • 1. NABRICO: Cyber Liability Coverage In the Marketplace August 18, 2017 Presenters: Daniel A. Cotter Butler Rubin Saltarelli & Boyd LLP 321 N. Clark Street, Suite 400 Chicago, IL 60654 Dcotter@butlerrubin.com
  • 2. The materials in this presentation are intended to provide a general overview of the issues contained herein and are not intended nor should they be construed to provide specific legal or regulatory guidance or advice. If you have any questions or issues of a specific nature, you should consult with appropriate legal or regulatory counsel to review the specific circumstances involved. Views expressed are those of the speaker and are not to be attributed to his firm or clients.
  • 3. Goals/Roadmap • Rules of Professional Conduct • Obligations they Impose • Toward a New Standard
  • 4. The Parade of Horribles - Inadvertence, mistake: Law Firm’s Documents Dumped in Trash, Gainesville Times, October 16, 2011. - Cyber attack: Wiley Rein Hack LLP Hack (2011). - Physical Security. Laptop Stolen from Law Offices of David A. Krausz, Sensitive Info at Risk, Softpedia. - Insider threats: Orrick breach. - Readers of WSJ on 3/29/2016: “Hackers Breach Law Firms, Including Cravath and Weil Gotshal” - Edelson Law putative class action against Johnson & Bell (N.D. IL 2016) and what has since happened - DLA and Peyta - CIO Magazine, 8/3, Hackers Aggressivley Attacking Law Firms- http://www.cio.com/article/3212829/cyber-attacks- espionage/hackers-are-aggressively-targeting-law-firms- data.html
  • 5. Rules of Professional Conduct Some Relevant Ethical Rules •Illinois Rule 1.1 (Competence) •Illinois Rule 1.6 (Confidentiality of Information) •Illinois Rule 1.4 (Communication) •Illinois Rules 1.15, 1.16 (Duty to Safeguard Client Property) •Illinois Rules 5.1, 5.2, 5.3 (Duty of Supervision)
  • 6. Rules of Professional Conduct Illinois Rule 1.1   Duty of Competence     A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.
  • 7. Duty of Competence Rule 1.1 includes competence in selecting and using technology. It requires attorneys who lack the necessary technical competence for security (many, if not most attorneys) to consult with qualified people who have the requisite expertise. Comment [8] MRPC: To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject.
  • 8. Relevant Laws Relating to Legal Obligations All 50 states and DC have adopted ABA Model Rule 1.1 (either in whole or with modifications). At least 25 states have adopted Comment 8. 8
  • 9. Florida Rule - September 30, 2016- every lawyer admitted to Florida Bar must take three hours of technology-related CLE during a three-year cycle.
  • 10. Duty of Confidentiality Illinois Rule 1.6(e)(amended October 15, 2015, effective January 1, 2016) – “A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to information relating to the representation of a client.”
  • 11. Duty of Confidentiality Comments to Illinois Rule 1.6 Acting Competently to Preserve Confidentiality [19] When transmitting a communication that includes information relating to the representation of a client, the lawyer must take reasonable precautions to prevent the information from coming into the hands of unintended recipients. This duty, however, does not require that the lawyer use special security measures if the method of communication affords a reasonable expectation of privacy. Special circumstances, however, may warrant special precautions. Factors to be considered in determining the reasonableness of the lawyer’s expectation of confidentiality include the sensitivity of the information and the extent to which the privacy of the communication is protected by law or by a confidentiality agreement. A client may require the lawyer to implement special security measures not required by this Rule or may give informed consent to the use of a means of communication that would otherwise be prohibited by this Rule.
  • 12. Duty of Confidentiality Comment to Model Rule 1.6, now in comments to Illinois Rule, effective January 1, 2016 Acting Competently to Preserve Confidentiality [18] Factors to be considered in determining the reasonableness of the lawyer’s efforts include, but are not limited to, the sensitivity of the information, the likelihood of disclosure if additional safeguards are not employed, the cost of employing additional safeguards, the difficulty of implementing the safeguards, and the extent to which the safeguards adversely affect the lawyer’s ability to represent clients (e.g., by making a device or important piece of software excessively difficult to use).
  • 13. What does your client want? Illinois Rule 1.6, Comment [19]: “A client may require the lawyer to implement special security measures not required by this Rule or may give informed consent to forgo security measures that would otherwise be required by this Rule.”
  • 14. The Duties of Competence and Confidentiality Ariz. Bar. Op. 09-04 Lawyer encrypted files, installed layers of password protection, randomly generated folder names and passwords, and converted each document to PDF format that required password. • “In satisfying the duty to take reasonable security precautions, lawyers should consider firewalls, password protection schemes, encryption, anti-virus measures, etc.” • The duty “does not require a guarantee that the system will be invulnerable to unauthorized access.”
  • 15. Duty to Safeguard Client Property Illinois RPC 1.15(a) “A lawyer shall hold property of clients or third persons that is in a lawyer's possession in connection with a representation separate from the lawyer’s own property. ... Other property shall be identified as such and appropriately safeguarded.”
  • 16. ABA Formal Opinion 477 (May 11, 2017) • Unencrypted generally okay • But special circumstances/laws may require. • Lawyer must make “reasonable efforts to prevent inadvertent or unauthorized access” • Includes a “reasonable efforts” balancing • Concludes that: “A lawyer generally may transmit information relating to the representation of a client over the Internet….where…has undertaken reasonable efforts….”
  • 17. Nuts and Bolts of ABA Formal Opinion 477 - What does it say? - What if anything does it mandate? - Does it change the landscape? - What should lawyers do to address?
  • 18. Termination of Representation Illinois RPC 1.16(d) “Upon termination of representation, a lawyer shall take steps to the extent reasonably practicable to protect a client's interests, such as giving reasonable notice to the client, allowing time for employment of other counsel, surrendering papers and property to which the client is entitled and refunding any advance payment of fee or expense that has not been earned or incurred. The lawyer may retain papers relating to the client to the extent permitted by other law.”
  • 19. Other Applicable Rules Duty to supervise (Rules 5.1 and 5.3) Illinois Rule 5.1(a): “A partner in a law firm, and a lawyer who individually or together with other lawyers possesses comparable managerial authority in a law firm, shall make reasonable efforts to ensure that the firm has in effect measures giving reasonable assurance that all lawyers in the firm conform to the Rules of Professional Conduct.”
  • 20. Other Applicable Rules Duty to supervise (Rules 5.1, 5.2 and 5.3) Illinois Rule 5.3: “With respect to a nonlawyer employed or retained by or associated with a lawyer: (a)    The lawyer, and, in a law firm, each partner, shall make reasonable efforts to ensure that the firm has in effect measures giving reasonable assurance that the nonlawyer's conduct is compatible with the professional obligations of the lawyer and the firm;
  • 21. Other Applicable Rules Warning to client? •You are obligated under Rule 1.4 to warn your client about the risk of using electronic communications where there is a significant risk that a 3d party may gain access. •E.g., when representing a company employee, employer could read/access the email. •And a warning may not be enough – you may be required to recommend to the client methods of ensuring that electronic communications remain confidential. •ABA Formal Op. 11-459 (8/4/11) •Texas Opinion No. 648
  • 22. And that’s not all… Duty to Former clients? Model Rule1.9(c) “[A] lawyer who has formerly represented a client in a matter or whose present or former firm has formerly represented a client in a matter shall not thereafter ... reveal information relating to the representation except as these Rules would permit or require with respect to a client.”
  • 23. What laws might be relevant? • Mass. Security Regulations (201 CMR 17.00) • Data Breach Notification laws (47 states, including Illinois have these laws) HIPAA/HITECH • Gramm Leach Bliley • Data Security Laws • Fiduciary Duty? • Malpractice laws?
  • 24. All Great, But What is Reasonable? - Toward a Standard -Pre-Breach Assessment and certification? -Post-Breach, what is defensible?