SlideShare a Scribd company logo
Email and Cloud Ethics
Maintaining Competence and Confidence Without Being a Luddite
©2016 MailControl.net
Email and Cloud Ethics
Maintaining Competence and Confidence Without Being a Luddite
©2016 MailControl.net
Chad Gilles
Legal/Marketing/Product at MailControl.net
Previous:
• 9 years as a patent agent/attorney
(J.D. Chicago-Kent)
• 3 years as an electrical engineer
Introduction
©2016 MailControl.net
Agenda
 Rules 1.1 (Competence) and 1.6 (Confidentiality of information)
 Technology overview: cloud computing
 Ethics of cloud computing
 Technology overview: email
 Ethics of email
 Ethics of “spymail”
©2016 MailControl.net
Rule 1.1 - Competence
Comment [8]: “a lawyer should keep abreast of changes
in the law and its practice, including the benefits and
risks associated with relevant technology”
A lawyer shall provide competent representation to a client. Competent
representation requires the legal knowledge, skill, thoroughness and preparation
reasonably necessary for the representation.
©2016 MailControl.net
Rule 1.6 – Confidentiality of Information
Comment [18]: The unauthorized access to, or the
inadvertent or unauthorized disclosure of, information
relating to the representation of a client does not
constitute a violation of paragraph (c) if the lawyer has
made reasonable efforts to prevent the access or
disclosure. . .
1 IL rule 1.6(e)
(c)1 A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized
disclosure of, or unauthorized access to, information relating to the representation of a
client.
©2016 MailControl.net
Rule 1.6 – Confidentiality of Information (cont.)
Factors to be considered in determining the reasonableness of the lawyer’s efforts include, but
are not limited to,
• the likelihood of disclosure if additional safeguards are not employed,
• the sensitivity of the information,
• the cost of employing additional safeguards,
• the difficulty of implementing the safeguards, and
• the extent to which the safeguards adversely affect the lawyer’s ability to represent clients
(e.g., by making a device or important piece of software excessively difficult to use).
A client may require the lawyer to implement special security measures not required by this
Rule or may give informed consent to forgo security measures that would otherwise be
required by this Rule.
©2016 MailControl.net
Agenda
 Rules 1.1 (Competence) and 1.6 (Confidentiality of information)
 Technology overview: cloud computing
 Ethics of cloud computing
 Technology overview: email
 Ethics of email
 Ethics of “spymail”
©2016 MailControl.net
What is “The Cloud?”
“DESKTOP COMPUTING”
Data center
Network
“CLOUD COMPUTING” /
“SOFTWARE AS A SERVICE”
• “PUBLIC CLOUD”
• “PRIVATE CLOUD”
• “HYBRID CLOUD”
• “REMOTE/HOSTED PRIVATE
CLOUD”
• “VIRTUAL PRIVATE CLOUD”
©2016 MailControl.net
AMERICAN BAR ASSOCIATION:
“Broadly defined, cloud computing (or "Software as a Service") refers to a category
of software that's delivered over the Internet via a Web browser (like Internet
Explorer) rather than installed directly onto the user's computer. The cloud offers
certain advantages in terms of minimal upfront costs, flexibility and mobility, and
ease of use.“
https://www.americanbar.org/groups/departments_offices/legal_technology_resources/resources/
charts_fyis/cloud-ethics-chart.html
What is “The Cloud?” (cont.)
©2016 MailControl.net
Agenda
 Rules 1.1 (Competence) and 1.6 (Confidentiality of information)
 Technology overview: cloud computing
 Ethics of cloud computing
 Technology overview: email
 Ethics of email
 Ethics of “spymail”
©2016 MailControl.net
Benefits of Cloud Computing
 Mobility & Device Independence
 Easy updates/upgrades
 Scalability
 Disaster recovery
 Environmentally friendly
 Cost savings
©2016 MailControl.net
Risks of Cloud Computing
American Bar Association:
 “Because cloud computing places data--including client data--on remote
servers outside of the lawyer's direct control, it has given rise to some
concerns regarding its acceptability under applicable ethics rules.”
 Cloud provider may have access to the data
 Loss of ownership or control of data?
 Lack of access if no Internet
 More likely to be targeted by hackers?
©2016 MailControl.net
Cloud Ethics Opinions
https://www.americanbar.org/groups/departments_offices/legal_technology_resources/resources/charts_fyis/cloud-ethics-chart.html
©2016 MailControl.net
Cloud Ethics Opinions (cont.)
“Reasonable Care”
 Review (and periodically revisit) the provider's terms of service
 Confidentiality agreement
 Ownership of data; return and deletion of data upon cancellation
 Who can access data and under what circumstances?
 Encryption practices
 Backup practices
 Guarantees on access to data (e.g., "uptime")
 Notice upon breach or request for access
 Clause that data will be stored in the U.S.
 What certifications does the provider have? (HIPAA, ISP 27001, FISMA, etc.)
 Include cloud clause in retainer agreement with clients
 For very sensitive information, consider encrypting before sending to the cloud
©2016 MailControl.net
 Service Level Agreement: http://www.microsoftvolumelicensing.com/SLA.
 25% refund if they don’t meet 99.9% uptime in a month
 50% refund if they don’t meet 99% uptime in a month
 Privacy policy: https://www.microsoft.com/online/legal/v2/?docid=43
 Security information: https://products.office.com/en-us/business/office-365-trust-center-welcome
Example: Microsoft Office 365
©2016 MailControl.net
Agenda
 Rules 1.1 (Competence) and 1.6 (Confidentiality of information)
 Technology overview: cloud computing
 Ethics of cloud computing
 Technology overview: email
 Ethics of email
 Ethics of “spymail”
©2016 MailControl.net
On-premises / self-hosted
Company A
email server
Company B
email server
Company A network Internet Company B network
Company A
email client
Company B
email client
How Email Works
©2016 MailControl.net
Cloud based
Email
client Email
client
Company A
Local Area Network
Office 365
Mail server
Google
Mail server
Internet
Company B
Local Area Network
What is “The Cloud?”
©2016 MailControl.net
Agenda
 Rules 1.1 (Competence) and 1.6 (Confidentiality of information)
 Technology overview: cloud computing
 Ethics of cloud computing
 Technology overview: email
 Ethics of email
 Ethics of “spymail”
©2016 MailControl.net
Email for Client Communications
 State Level opinions Pre-1997
 Some states required clients’ informed consent before using unencrypted emails (IA Sup. Ct. Ethics Op. 96-1 (Aug 1996);
N.C. State Bar Ethics Op. RPC 216 (July 1995); S.C. Bar Ethics Opinion 94-27 (July 1995); CO Ethics Opinion 90 (Nov 1992)
 State level opinions 1997-
 IL State Bar Ethics Op. 96-10 (May 1997)1
 Reasonable expectation of privacy
 18 U.S.C. 2517(4) (“ECPA”) – “No otherwise privileged wire, oral or electronic communication intercepted in accordance
with, or in violation of, the provisions of this chapter shall lose its privileged character.”
 “Nor is it necessary, as some commentators have suggested, to seek specific consent of the use of unencrypted email.”
 “[T]here may be unusual circumstances involving an extraordinarily sensitive matter that might require enhanced security
measures like encryption. These situations would, however, be of the nature that ordinary telephones and other normal
means of communication would also be deemed inadequate”
1see also AZ State Bar Ethics Op. 97-04 (Apr 1997); North Dakota State Bar Ethics Op. 97-09 (Sept 1997); S.C. Bar Ethics Op. 97-08 (June 1997); VT Ethics Op 97-5; N.Y.
State 709 (1998), ME Ethics Op. #195 (2008), OH Ethics Op. No. 99-2 (April 9, 1999), Hawaii Ethics Opinion No. 40 (April 26, 2001), Utah Ethics Opinion No. 00-01 (March
9, 2000), Florida Ethics Opinion No. 00-4 (July 15, 2000), Delaware Ethics Opinion No. 2001-2 (2001), and Virginia Ethics Opinion No. 1791 (December 22, 2003)
©2016 MailControl.net
Email for Client Communications (cont.)
 ABA Formal Opinion 99-413 (May 1999)
 “Lawyers have a reasonable expectation of privacy in
communications made by all forms of email, including
unencrypted email sent on the Internet, despite some
risk of interception and disclosure. It therefore follows
that its use is consistent with the duty under Rule 1.6
to use reasonable means to maintain the
confidentiality of information relating to a client’s
representation.”
©2016 MailControl.net
Email for Client Communications (cont.)
 ABA Formal Opinion 11-459 (Aug 2011)
 “Whenever a lawyer communicates with a client by e-mail, the lawyer must first consider
whether, given the client’s situation, there is a significant risk that third parties will have access
to the communications. If so, the lawyer must take reasonable care to protect the confidentiality
of the communications by giving appropriately tailored advice to the client.”
 Ultimate question remains whether there is a reasonable expectation of privacy.
©2016 MailControl.net
Email for client communications (cont.)
Suggestions
 Client retainer agreement:
 Express consent to use of unencrypted email
 Warn about use of employer devices and accounts,
shared accounts, cc’ing third-parties, etc.
 Consider using encryption
 encrypted email (compatibility often an issue)
 A secure client “portal”
©2016 MailControl.net
Agenda
 Rules 1.1 (Competence) and 1.6 (Confidentiality of information)
 Technology overview: cloud computing
 Ethics of cloud computing
 Technology overview: email
 Ethics of email
 Ethics of “spymail”
©2016 MailControl.net
What is Spymail?
©2016 MailControl.net
Firewalls and Spam Filters Do Not Protect Against Spymail
In fact, many spymails are legitimate emails that the recipient wants to read
©2016 MailControl.net
Spymail Does Not Require Your Approval
©2016 MailControl.net
FULL WIDTH TEXT SAMPLE
29
Your subtitle goes hereSpymail is email with hidden tracking code
©2016 MailControl.net
Spymail reveals:
If and when opened
©2016 MailControl.net
Spymail reveals:
How many times opened
©2016 MailControl.net
Spymail reveals:
Where opened
Recipient is here
©2016 MailControl.net
Spymail reveals:
When and where forwarded
Recipient is here
Plaintiff
Attorney
Confidential witness/client
Send
Forward
Identity/
location
revealed
©2016 MailControl.net
Spymail prevalence has increased > 280% since 2013
Since 2013, the number of people using apps with email trackers
has increased to nearly 3 million
- MailTrack, July 2016
©2016 MailControl.net
Spymail risks
©2016 MailControl.net
• Locations of Attorneys and Staff
• Locations of clients
• real-time and historical patterns
• Jay-Z stalked via spymail•
Risk #1:
Privacy and Safety of Clients and Employees
©2016 MailControl.net
• Physical locations
• Email Security vulnerabilities
• Email interests /weak links
• Forward recipient identity
“The attack [used to take down on the Ukrainian power grid] begins with a
spear phishing email containing what is known as a tracking pixel.”
- ESET Security
Risk #2:
Phishing and Cyber Attacks
Leaked Information
• Mossack Fonseca (Panama Papers)
• Mar 2016 – Cravath and Weil
hacked; FBI issues alert to law firms
• Malpractice suits
• Class action suits
Consequences
©2016 MailControl.net
• During Negotiations
Risk #3:
Legal Pitfalls & Disadvantages
If [the opposing party] open [my
settlement offer] once and never open it
again, I know that they are really
uninterested. However, if six people
open it half a dozen times each, then I
know that the offer is getting serious
consideration.
- Saunders Walsh & Beard atty
“
”
©2016 MailControl.net
• Pre-Suit and During Litigation
Risk #3:
Legal Pitfalls & Disadvantages
• Direct evidence of open and time of open
• Fox v. Leland (EDNC)
• Steward v. Keuttel (Benton Cir. Ct.)
• Direct Evidence of knowledge
• E.g., willful patent infringement
©2016 MailControl.net
• Pre-Suit and During Litigation (cont.)
Consequence #3:
Legal Pitfalls & Disadvantages
• Identify defendants
• Identify your clients
• Identify your witnesses
• Identify employee and third-party deponents
• HP caught using it to
identify journalist’s
confidential sources
©2016 MailControl.net
Spymail Competence and Confidentiality
 Be mindful of what emails you open and when and
where you open them
 Be mindful of what emails you forward
 Advise your clients of the same
Rule 1.1 Comment [8]: “a lawyer should keep abreast of changes in the law and its
practice, including the benefits and risks associated with relevant technology”
Rule 1.6(c)1 A lawyer shall make reasonable efforts to prevent the inadvertent or
unauthorized disclosure of, or unauthorized access to, information relating to the
representation of a client.
©2016 MailControl.net
What About Originating Spymail? It is Ethical?
• Ideas?
• Model Rule 4.4(b) – “A lawyer who receives a document or
electronically stored information relating to the representation of
the lawyer's client and knows or reasonably should know that the
document or electronically stored information was inadvertently
sent shall promptly notify the sender.”
• ABA Formal Opinion 11-460 - 4.4(b) Construed very narrowly; Only
inadvertent; only notify.
• ISBA Op. 98-04 - Can use information unless know of inadvertence before
reviewing it
• Basically not an ethical issue; look to rules of evidence and civ pro.
©2016 MailControl.net
Questions?
©2016 MailControl.net
chad.gilles@mailcontrol.net
www.linkedin.com/in/chad-gilles

More Related Content

What's hot

OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON Byrum
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
Ulf Mattsson
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
rajab ssemwogerere
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
lmgangi
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
Ulf Mattsson
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
Ulf Mattsson
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
Ulf Mattsson
 
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Ulf Mattsson
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeo
Giulio Coraggio
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
Ulf Mattsson
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
Ulf Mattsson
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
PECB
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
Ulf Mattsson
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
Maganathin Veeraragaloo
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
Solix Technologies, Inc
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
Ulf Mattsson
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
Eryk Budi Pratama
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Ulf Mattsson
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
Adv Prashant Mali
 

What's hot (20)

OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
 
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeo
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 

Similar to Email and cloud ethics (continuing legal education course)

Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
Robert Ambrogi
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
CloudMask inc.
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
anthonywong
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Tom Kulik
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
Jason Lackey
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesPeister
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
Nicole Black
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
Sookman law society_6_min_business_law
Sookman law society_6_min_business_lawSookman law society_6_min_business_law
Sookman law society_6_min_business_law
bsookman
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the CloudCourtney Fisk
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110guestd7fc9c
 
Cloud
CloudCloud
Cloud
alberto0
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
timmcguinness
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
Janine Anthony Bowen, Esq.
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud Services
This account is closed
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Kresimir Popovic
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodmanjonneiditz
 
Dcg cba legal ethics and the cloud final 06.20.17
Dcg cba legal ethics and the cloud final 06.20.17Dcg cba legal ethics and the cloud final 06.20.17
Dcg cba legal ethics and the cloud final 06.20.17
DENNIS GARCIA ☁
 
Cloud computing: 'everything you always wanted to know (but were aftaid to ask')
Cloud computing: 'everything you always wanted to know (but were aftaid to ask')Cloud computing: 'everything you always wanted to know (but were aftaid to ask')
Cloud computing: 'everything you always wanted to know (but were aftaid to ask')
DLA Piper Nederland N.V.
 

Similar to Email and cloud ethics (continuing legal education course) (20)

Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
Sookman law society_6_min_business_law
Sookman law society_6_min_business_lawSookman law society_6_min_business_law
Sookman law society_6_min_business_law
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the Cloud
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
 
Cloud
CloudCloud
Cloud
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
Putting your practice on cloud 9
Putting your practice on cloud 9Putting your practice on cloud 9
Putting your practice on cloud 9
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud Services
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
 
Dcg cba legal ethics and the cloud final 06.20.17
Dcg cba legal ethics and the cloud final 06.20.17Dcg cba legal ethics and the cloud final 06.20.17
Dcg cba legal ethics and the cloud final 06.20.17
 
Cloud computing: 'everything you always wanted to know (but were aftaid to ask')
Cloud computing: 'everything you always wanted to know (but were aftaid to ask')Cloud computing: 'everything you always wanted to know (but were aftaid to ask')
Cloud computing: 'everything you always wanted to know (but were aftaid to ask')
 

Recently uploaded

怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
KHURRAMWALI
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
johncavitthouston
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
FernandoSimesBlanco1
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 

Recently uploaded (20)

怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 

Email and cloud ethics (continuing legal education course)

  • 1. Email and Cloud Ethics Maintaining Competence and Confidence Without Being a Luddite ©2016 MailControl.net
  • 2. Email and Cloud Ethics Maintaining Competence and Confidence Without Being a Luddite ©2016 MailControl.net
  • 3. Chad Gilles Legal/Marketing/Product at MailControl.net Previous: • 9 years as a patent agent/attorney (J.D. Chicago-Kent) • 3 years as an electrical engineer Introduction ©2016 MailControl.net
  • 4. Agenda  Rules 1.1 (Competence) and 1.6 (Confidentiality of information)  Technology overview: cloud computing  Ethics of cloud computing  Technology overview: email  Ethics of email  Ethics of “spymail” ©2016 MailControl.net
  • 5. Rule 1.1 - Competence Comment [8]: “a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology” A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation. ©2016 MailControl.net
  • 6. Rule 1.6 – Confidentiality of Information Comment [18]: The unauthorized access to, or the inadvertent or unauthorized disclosure of, information relating to the representation of a client does not constitute a violation of paragraph (c) if the lawyer has made reasonable efforts to prevent the access or disclosure. . . 1 IL rule 1.6(e) (c)1 A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client. ©2016 MailControl.net
  • 7. Rule 1.6 – Confidentiality of Information (cont.) Factors to be considered in determining the reasonableness of the lawyer’s efforts include, but are not limited to, • the likelihood of disclosure if additional safeguards are not employed, • the sensitivity of the information, • the cost of employing additional safeguards, • the difficulty of implementing the safeguards, and • the extent to which the safeguards adversely affect the lawyer’s ability to represent clients (e.g., by making a device or important piece of software excessively difficult to use). A client may require the lawyer to implement special security measures not required by this Rule or may give informed consent to forgo security measures that would otherwise be required by this Rule. ©2016 MailControl.net
  • 8. Agenda  Rules 1.1 (Competence) and 1.6 (Confidentiality of information)  Technology overview: cloud computing  Ethics of cloud computing  Technology overview: email  Ethics of email  Ethics of “spymail” ©2016 MailControl.net
  • 9. What is “The Cloud?” “DESKTOP COMPUTING” Data center Network “CLOUD COMPUTING” / “SOFTWARE AS A SERVICE” • “PUBLIC CLOUD” • “PRIVATE CLOUD” • “HYBRID CLOUD” • “REMOTE/HOSTED PRIVATE CLOUD” • “VIRTUAL PRIVATE CLOUD” ©2016 MailControl.net
  • 10. AMERICAN BAR ASSOCIATION: “Broadly defined, cloud computing (or "Software as a Service") refers to a category of software that's delivered over the Internet via a Web browser (like Internet Explorer) rather than installed directly onto the user's computer. The cloud offers certain advantages in terms of minimal upfront costs, flexibility and mobility, and ease of use.“ https://www.americanbar.org/groups/departments_offices/legal_technology_resources/resources/ charts_fyis/cloud-ethics-chart.html What is “The Cloud?” (cont.) ©2016 MailControl.net
  • 11. Agenda  Rules 1.1 (Competence) and 1.6 (Confidentiality of information)  Technology overview: cloud computing  Ethics of cloud computing  Technology overview: email  Ethics of email  Ethics of “spymail” ©2016 MailControl.net
  • 12. Benefits of Cloud Computing  Mobility & Device Independence  Easy updates/upgrades  Scalability  Disaster recovery  Environmentally friendly  Cost savings ©2016 MailControl.net
  • 13. Risks of Cloud Computing American Bar Association:  “Because cloud computing places data--including client data--on remote servers outside of the lawyer's direct control, it has given rise to some concerns regarding its acceptability under applicable ethics rules.”  Cloud provider may have access to the data  Loss of ownership or control of data?  Lack of access if no Internet  More likely to be targeted by hackers? ©2016 MailControl.net
  • 15. Cloud Ethics Opinions (cont.) “Reasonable Care”  Review (and periodically revisit) the provider's terms of service  Confidentiality agreement  Ownership of data; return and deletion of data upon cancellation  Who can access data and under what circumstances?  Encryption practices  Backup practices  Guarantees on access to data (e.g., "uptime")  Notice upon breach or request for access  Clause that data will be stored in the U.S.  What certifications does the provider have? (HIPAA, ISP 27001, FISMA, etc.)  Include cloud clause in retainer agreement with clients  For very sensitive information, consider encrypting before sending to the cloud ©2016 MailControl.net
  • 16.  Service Level Agreement: http://www.microsoftvolumelicensing.com/SLA.  25% refund if they don’t meet 99.9% uptime in a month  50% refund if they don’t meet 99% uptime in a month  Privacy policy: https://www.microsoft.com/online/legal/v2/?docid=43  Security information: https://products.office.com/en-us/business/office-365-trust-center-welcome Example: Microsoft Office 365 ©2016 MailControl.net
  • 17. Agenda  Rules 1.1 (Competence) and 1.6 (Confidentiality of information)  Technology overview: cloud computing  Ethics of cloud computing  Technology overview: email  Ethics of email  Ethics of “spymail” ©2016 MailControl.net
  • 18. On-premises / self-hosted Company A email server Company B email server Company A network Internet Company B network Company A email client Company B email client How Email Works ©2016 MailControl.net
  • 19. Cloud based Email client Email client Company A Local Area Network Office 365 Mail server Google Mail server Internet Company B Local Area Network What is “The Cloud?” ©2016 MailControl.net
  • 20. Agenda  Rules 1.1 (Competence) and 1.6 (Confidentiality of information)  Technology overview: cloud computing  Ethics of cloud computing  Technology overview: email  Ethics of email  Ethics of “spymail” ©2016 MailControl.net
  • 21. Email for Client Communications  State Level opinions Pre-1997  Some states required clients’ informed consent before using unencrypted emails (IA Sup. Ct. Ethics Op. 96-1 (Aug 1996); N.C. State Bar Ethics Op. RPC 216 (July 1995); S.C. Bar Ethics Opinion 94-27 (July 1995); CO Ethics Opinion 90 (Nov 1992)  State level opinions 1997-  IL State Bar Ethics Op. 96-10 (May 1997)1  Reasonable expectation of privacy  18 U.S.C. 2517(4) (“ECPA”) – “No otherwise privileged wire, oral or electronic communication intercepted in accordance with, or in violation of, the provisions of this chapter shall lose its privileged character.”  “Nor is it necessary, as some commentators have suggested, to seek specific consent of the use of unencrypted email.”  “[T]here may be unusual circumstances involving an extraordinarily sensitive matter that might require enhanced security measures like encryption. These situations would, however, be of the nature that ordinary telephones and other normal means of communication would also be deemed inadequate” 1see also AZ State Bar Ethics Op. 97-04 (Apr 1997); North Dakota State Bar Ethics Op. 97-09 (Sept 1997); S.C. Bar Ethics Op. 97-08 (June 1997); VT Ethics Op 97-5; N.Y. State 709 (1998), ME Ethics Op. #195 (2008), OH Ethics Op. No. 99-2 (April 9, 1999), Hawaii Ethics Opinion No. 40 (April 26, 2001), Utah Ethics Opinion No. 00-01 (March 9, 2000), Florida Ethics Opinion No. 00-4 (July 15, 2000), Delaware Ethics Opinion No. 2001-2 (2001), and Virginia Ethics Opinion No. 1791 (December 22, 2003) ©2016 MailControl.net
  • 22. Email for Client Communications (cont.)  ABA Formal Opinion 99-413 (May 1999)  “Lawyers have a reasonable expectation of privacy in communications made by all forms of email, including unencrypted email sent on the Internet, despite some risk of interception and disclosure. It therefore follows that its use is consistent with the duty under Rule 1.6 to use reasonable means to maintain the confidentiality of information relating to a client’s representation.” ©2016 MailControl.net
  • 23. Email for Client Communications (cont.)  ABA Formal Opinion 11-459 (Aug 2011)  “Whenever a lawyer communicates with a client by e-mail, the lawyer must first consider whether, given the client’s situation, there is a significant risk that third parties will have access to the communications. If so, the lawyer must take reasonable care to protect the confidentiality of the communications by giving appropriately tailored advice to the client.”  Ultimate question remains whether there is a reasonable expectation of privacy. ©2016 MailControl.net
  • 24. Email for client communications (cont.) Suggestions  Client retainer agreement:  Express consent to use of unencrypted email  Warn about use of employer devices and accounts, shared accounts, cc’ing third-parties, etc.  Consider using encryption  encrypted email (compatibility often an issue)  A secure client “portal” ©2016 MailControl.net
  • 25. Agenda  Rules 1.1 (Competence) and 1.6 (Confidentiality of information)  Technology overview: cloud computing  Ethics of cloud computing  Technology overview: email  Ethics of email  Ethics of “spymail” ©2016 MailControl.net
  • 26. What is Spymail? ©2016 MailControl.net
  • 27. Firewalls and Spam Filters Do Not Protect Against Spymail In fact, many spymails are legitimate emails that the recipient wants to read ©2016 MailControl.net
  • 28. Spymail Does Not Require Your Approval ©2016 MailControl.net
  • 29. FULL WIDTH TEXT SAMPLE 29 Your subtitle goes hereSpymail is email with hidden tracking code ©2016 MailControl.net
  • 30. Spymail reveals: If and when opened ©2016 MailControl.net
  • 31. Spymail reveals: How many times opened ©2016 MailControl.net
  • 32. Spymail reveals: Where opened Recipient is here ©2016 MailControl.net
  • 33. Spymail reveals: When and where forwarded Recipient is here Plaintiff Attorney Confidential witness/client Send Forward Identity/ location revealed ©2016 MailControl.net
  • 34. Spymail prevalence has increased > 280% since 2013 Since 2013, the number of people using apps with email trackers has increased to nearly 3 million - MailTrack, July 2016 ©2016 MailControl.net
  • 36. • Locations of Attorneys and Staff • Locations of clients • real-time and historical patterns • Jay-Z stalked via spymail• Risk #1: Privacy and Safety of Clients and Employees ©2016 MailControl.net
  • 37. • Physical locations • Email Security vulnerabilities • Email interests /weak links • Forward recipient identity “The attack [used to take down on the Ukrainian power grid] begins with a spear phishing email containing what is known as a tracking pixel.” - ESET Security Risk #2: Phishing and Cyber Attacks Leaked Information • Mossack Fonseca (Panama Papers) • Mar 2016 – Cravath and Weil hacked; FBI issues alert to law firms • Malpractice suits • Class action suits Consequences ©2016 MailControl.net
  • 38. • During Negotiations Risk #3: Legal Pitfalls & Disadvantages If [the opposing party] open [my settlement offer] once and never open it again, I know that they are really uninterested. However, if six people open it half a dozen times each, then I know that the offer is getting serious consideration. - Saunders Walsh & Beard atty “ ” ©2016 MailControl.net
  • 39. • Pre-Suit and During Litigation Risk #3: Legal Pitfalls & Disadvantages • Direct evidence of open and time of open • Fox v. Leland (EDNC) • Steward v. Keuttel (Benton Cir. Ct.) • Direct Evidence of knowledge • E.g., willful patent infringement ©2016 MailControl.net
  • 40. • Pre-Suit and During Litigation (cont.) Consequence #3: Legal Pitfalls & Disadvantages • Identify defendants • Identify your clients • Identify your witnesses • Identify employee and third-party deponents • HP caught using it to identify journalist’s confidential sources ©2016 MailControl.net
  • 41. Spymail Competence and Confidentiality  Be mindful of what emails you open and when and where you open them  Be mindful of what emails you forward  Advise your clients of the same Rule 1.1 Comment [8]: “a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology” Rule 1.6(c)1 A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client. ©2016 MailControl.net
  • 42. What About Originating Spymail? It is Ethical? • Ideas? • Model Rule 4.4(b) – “A lawyer who receives a document or electronically stored information relating to the representation of the lawyer's client and knows or reasonably should know that the document or electronically stored information was inadvertently sent shall promptly notify the sender.” • ABA Formal Opinion 11-460 - 4.4(b) Construed very narrowly; Only inadvertent; only notify. • ISBA Op. 98-04 - Can use information unless know of inadvertence before reviewing it • Basically not an ethical issue; look to rules of evidence and civ pro. ©2016 MailControl.net

Editor's Notes

  1. Hi, Thanks for having me. So today’s presentation is Email and Cloud Ethics – Maintaining competence and confidence without being a luddite. For those who don’t know, the Luddites were 19th century textile workers that destroyed machinery they thought was threatening their job. But the term is now commonly used to refer to people who have a fear or distrust of new technology or
  2. Technophobes, if you will. So I hope this presentation will help alleviate some of the fears and doubts and show you that using email and cloud technologies without violating your ethical obligations is not that daunting of a task.
  3. My name is Chad Gilles, my current role with mailcontrol.net is a bit of a mixed bag. I do some marketing, some legal, and some product. Before coming to MailControl I spent 9 years prosecuting patents And before that I was an electrical engineer for 3 years.
  4. Okay, so what are we going to talk about today. Well, as to-do list says, we are going to talk about being ethical. Specifically we are going to talk about ethical use of email and “The Cloud.” The roadmap looks like this: first we are going to review the two most-applicable rules which are 1.1, competence, and 1.6 Confidentially of information. In both cases the Illinois rules are largely identical to the Model Rules Then, to make sure we are all on the same page we are going to briefly go over when the heck is “The Cloud.” People throw that term around a lot sometimes meaning different things and a lot of times meaning nothing because they don’t really know what it means. So we are just going to establish a basic working definition that will allow us to then Apply rules 1.1 and 1.6 to use of the cloud. Then we’ll talk about how email works and apply rules 1.1 and 1.6 to email in general and then to a specific type of email which has actually become pervasive, yet most people do not know about. We call it spymail.
  5. Okay, so rule 1.1 – competence. Now I know everyone watching can recite all the rule of professional conduct by heart, but if you can just humor me for a second, rule 1.1 says [read rule]. So, on its face, this rule doesn’t seem to say a whole lot about the use of email or the cloud, But if we look at comment 8, then we see a lot of the motivation for why I am here today. It says [read]. This emphasized portion was added in IL 2010 and the same language was added to the ABA model rules in 2012.
  6. And then the other rule that is very important for purposes of our discussion today is rule 1.6: Confidentiality of Information. Specifically paragraph (c) (as noted at the bottom it is paragraph (e) in IL), which reads: [read rule]. So this obviously raises the question of what are reasonable efforts. Comment 18 offers some guidance on that. [read]
  7. And it goes on to provide a non-exhaustive list of factors to be considered. Likelihood of disclosure. Sensitivity of information. So, for example, are we talking about the recipe to coca cola or just marketing materials that will soon be public anyways could make a difference Cost of employing additional safeguards Difficulty of implementing the safeguards Extent to which the safeguards adversely affect the lawyer’s ability to represent clients (e.g., by making a device or important piece of software excessively difficult to use) – so this one is interesting because it accounts for a lot of the reason that, as we will see, use of unencrypted email is considered consistent with our ethical obligations. That is, email has improved attorney-client communications so much (its fast, it provides a written record, its accessible to all, etc.) that the little bit of additional risk it involved was deemed reasonable. Finally, the comment notes that, regardless of these factors, if your client instructs you otherwise, you need to listen to your client.
  8. Okay, so as we just saw, Rule 1.1 requires understanding the benefits and risks associated with any technology that we use. In 2016 this means understanding the benefits and risks of “The Cloud.”
  9. So what is “The Cloud”? Don’t worry- for our purposes of meeting your ethical obligations we can keep it a very basic level. So lets start by pretending we are back in the pre-Internet days. For the younger associates try to remember back to before your kindergarten got that AOL subscription. Back then you had a computer it sat next to you on your desk or on the floor and it was not connected to any network or anything. You pretty much used it for typing. If you wanted to exchange files with someone else you put it on a floppy disk and then transferred that floppy disk. Now let’s just imagine we take that computer, and put it in a data center somewhere – data center is just a fancy word for place that holds a bunch of servers. And now we access that computer over a network and we share it with other people who are also accessing it over a network. For our purposes, that is pretty much cloud computing. So then just a little bit of terminology that you might come across Public Cloud means that that computer right there is owned by a third-party (Amazon, for example) and in public cloud typically that computer is going to be shared among you and other customers of the cloud provider. Public cloud is really what has the ethical implications and references to cloud in this presentation generally mean public cloud. Private cloud, on the other hand, means that you own that computer. So, for example, that data center is a closet down the hall. So since you have full control over the computer in this case, it doesn’t really have the same ethical implications as public cloud does. Hybrid cloud is just a combination of public and private Remote / hosted private cloud is private cloud but you rent space in a third-party’s data center as opposed to housing the computers in your own building. Virtual Private Cloud is a marketing term that is a bit confusing because it is essentially public cloud in that the hardware is shared among multiple organizations – albeit with some enforced isolation between the different organizations (typically each getting its own VPN / encrypted channels)
  10. Since we are talking ethics, it makes sense to look at the definition that the ABA uses when discussing cloud ethics opinions. The ABA’s definition, which you can find at the link shown here, says [read]. So aside from the fact that the access is often not via a web browser – and certainly not Internet Explorer, the first sentence here is basically what we just went over. And the second sentence – the benefits of the cloud – is what we will go over next.
  11. Okay, so now we know what cloud computing is. Next we are going to take that knowledge and apply it to the rules 1.1 and 1.6. In other words, the ethics of cloud computing.
  12. Okay, so it seems all we hear about these days is the cloud -- everybody is moving to the cloud, hey man, you gotta get in the cloud. I mean just look at the smiles on these faces! What about the cloud is making these guys so happy? One benefit is Mobility and device independence. You can work from anywhere you want on any device you want and always have access to your programs and your files. Easy updates/upgrades. With cloud computing, the hardware becomes someone else’s problem. As servers become outdated, that’s on the Cloud provider to fix or replace it. Your costs remain fixed and generally there is little or no downtime for upgrades. Scalability – Cloud allows you to very rapidly increase or decrease resources as needed. And you generally only pay for what you use, so it can be very cost-effective. Disaster recovery – In the cloud everything is virtualized, which means it can very rapidly be moved to different physical servers. Combine that with the fact that cloud providers are automatically providing redundancy and backup for you and that means that (a) disasters are less likely to occur in the first place and (b) even of something does happen to one of their data centers, recovery will typically be faster and cheaper than recovering from a disaster at your own data center. Environmentally friendly. At some level the cloud is basically time sharing. This means fewer servers overall, fewer servers burning power while being underused, and fewer servers running inefficient, outdated software and/or hardware. Cost savings – all of these benefits and others often add up to significant cost savings over hosting your own servers. Ultimately, moving to the cloud is basically outsourcing a lot of the mundane and commoditized aspects of running a data center and this frees up your IT staff to really focus on more high leverage tasks.
  13. Those were the benefits, what are the risks. A good first place to turn is again the ABA. [read] So reading between the lines here, the ABA is calling out at least two risks: (1) the cloud provider may have access to your client data; (2) there may be a question of who owns or controls the data. So, both of these are valid concerns – especially if you are using free tiers of service from companies such as google or dropbox or whatever. But if you are using paid tiers of service, then all good cloud provider’s terms of service will eliminate these concerns because they will include a confidentiality agreement and they will include very clear language that that you retain ownership of any data that you will you will be given opportunity to take your data with you if you cancel your service, and They will include well-defined procedures that they will follow for who is allowed to access the data under what circumstances. Another concern some have had about the use of the cloud is that they will not have access to their data when they have no Internet connection. On one hand, this concern is perhaps trickier than the previous two because it is not something that can be solved through terms of service, but on the other hand (a) there is Wi-Fi and LTE pretty much everywhere now and (b) most providers will provide seamless syncing of recent files to local drives. So you simultaneously have the most-recent version both in the Cloud and on each of your devices. Finally some people feel like big cloud providers are higher profile and thus more likely to be targeted by hackers. This is probably more perception than reality because (1) there has been a major rise in attempts to hack law firms, which will also discuss and (2) these cloud providers have a lot of people focused exclusively on security, they are constantly being audited, etc. So in all likelihood a cloud provider is going to be as secure, if not more secure, than the average self-hosted data center.
  14. So in light of all these benefits and risks, what are ethics bodies saying about the use of cloud computing? Well the ABA actually has a really nice web-page summarizing the cloud ethics opinions from various states. This map is from that page and the states which have issued opinions are shown in blue.
  15. The take away is that all states that have weighed in have adopted a “reasonable care” standard. The various jurisdictions a variety of factors to look at to determine what is reasonable - and I would encourage everyone to visit that webpage and review the various opinions – but what I have tried to do here is synthesize them into some generally-applicable recommendations. First, you – and by you I mean a responsible attorney and a security expert either from your IT team or an outside consultant – need to carefully review the terms of service offered by the cloud services provider. Some things to look for in the agreement are: The provider agrees to treat all your data as confidential You retain ownership of all data and can delete it / take it with you if you cancel your service The agreement clearly spells out who has access to the data and under what conditions Make sure they are using industry-standard best-practices for encryption both for data in transit and at rest They should have sufficient uptime guarantees They should have defined procedures for reporting breaches or requests for access They should agree that the data will be housed only in the U.S. They should have appropriate certifications Health Insurance Portability and Accountability Act, Federal Information Security Management Act, In addition to making sure the terms of service are in order, you probably want to include some explicit language in your client retainer agreements that they agree to your use of cloud services. Explicity consent is not required, but it certainly won’t hurt. For very sensitive information, consider encrypting the data before uploading it to the cloud. So maybe that requires a bit of explanation. So let’s say we have the recipe for coca cola in a pdf and we want to store it to our cloud account. Well, if we upload it directly and rely on the encryption provided by the cloud provider, that means the cloud provider technically could access that pdf. But what we can do is encrypt the file first on our local machine and then upload it to the Cloud. Then the cloud provider has no access. This is essentially end-to-end encryption, which we will discuss in reference to email in a little bit.
  16. Just as one example, Microsoft Office 365 is one of the most popular cloud based services and they have gone to great lengths to assuage attorney’s fears of the cloud. Here are the links to their service level agreement, their privacy policy, and information about the security that they have in place.
  17. Next up is a brief overview of how email works.
  18. First we’ll talk about traditional self-hosted email. Company A’s email server is sitting in some closet at Company A’s office and Company B’s server is sitting in a closet at company B’s office. So a user at company A using Microsoft Outlook, for example, types an email to a user at company B and clicks send. The email goes through Company A’s local network and arrives at Company A’s email server. A’s email server connects to B’s server over the Internet and sends the message over the Internet. B’s server then delivers it to the recipient’s email client, again Outlook in this example. One thing to point out is that, historically, these connections were all unencrypted. That meant anyone with access to any of the routers or servers along the way could read the email. Nowadays most - but still not all - such traffic is encrypted. But the encryption is still generally only per-hop. That is, different encryption keys are used for each of the three segments of this journey. This is certainly a step up from unencrypted email, but it still leaves the message exposed in each of the email servers – in other words, the email message could be read by authorized users of those servers or hackers that have breached those servers. End-to-end encryption is where the message is encrypted in the sender’s client and not decrypted until it reaches the recipient’s client. End-to-end encryption has been very slow to catch on due to usability / customer experience issues. Final thing to note is that even with end-to-end encryption, the to and from is going to be exposed.
  19. So now here is cloud-based email. The difference is that mail servers are now in third-party data centers. In this case Company A uses Office 365 and Company B uses Google. This means that, for per-hop encryption, Microsoft and Google could theoretically read the email.
  20. Now lets look at rules 1.1 and 1.6 as they relate to email.
  21. We’ll start with a sort of history lesson. As I mentioned, email was historically unencrypted. Pre-1997, when email was just gaining widespread adoption, this led a lot of jurisdictions to conclude that informed consent was required before using unencrypted email. But then in 1997 it really became clear that email was not just a fad and that it was in fact incredibly beneficial and thus the tide turned and a bunch of states, including IL, decided that just because there is some theoretical chance that someone might read the email does not mean there was not a reasonable expectation of privacy. Many of these ethics bodies reasoned that it really wasn’t much different than regular mail where there was the theoretical chance that the mailman or somebody in-between could open your letter and read it. Some would argue that this analogy is flawed because paper mail is not easily searchable etc., but nevertheless as you can see here, a bunch of states said unencrypted email is fine even without explicit consent from the client. They did leave a little wiggle room but only for “extraordinarily sensitive matters”
  22. Fast forward to 1999 and the ABA chimed in basically reiterating what IL said. So good news…no need to keep everything in padlocked three-ring binders. So that’s where it stood for a while until a lot of cases started arising where courts were finding that it was okay for employers to monitor employee email. So usually the context was an employee suing his or her employer and the employer would pull up the employee’s emails in building its defense. Courts were generally saying this was fine – especially where it was in the employment contract.
  23. As we can see from this Dilbert, the issue really came to a head around 2010 and 2011 which then prompted the ABA to chime in and refine its stance on email. Formal Opinion 11-459 says [read]. So they basically said, look, email – even unencrypted email – can provide a reasonable expectation of privacy, but not in all cases. You have to consider the particular circumstances. But the ultimate question still remains: is there a reasonable expectation of privacy.
  24. And that’s pretty much where it stands today. And, so in light of that guidance, here are some suggestions to reduce your risk of violating your ethical obligations. In your client retainer agreements put (1) an express consent to use of unencrypted email and (2) a warning not to communicate with you using employer email accounts, or employer-owned devices, or email accounts that are shared with non-privileged parties if. They should also be instructed not to cc or forward the communications to parties that would destroy privilege. Also, consider using encrypted communications, particularly for very high sensitivity stuff. Encrypted email is an option but it hasn’t really caught on because historically it has not been user friendly Another option is to use a secure client portal. Many practice management software suites have these built in.
  25. Okay, so finally we are going to talk about the ethics of spymail, which begs the question
  26. What is spymail?
  27. Well I will actually start with what spymail is NOT. Spymail is not simply spam or marketing emails and it is not a virus or any other type of malware in the traditional sense. Spymail is legitimate email that your spam filter and anti-virus tools are not doing anything to stop. Which is probably good because a lot of spymail is email that you want to receive - this could be email from clients, vendors, opposing parties, etc. – so you want to receive it, you just don’t want to give up a bunch of sensitive information when you do receive it.
  28. As another point of clarification, Spymail is not a read receipt as you may be familiar with in Microsoft Outlook. Who here requests read receipts? Do you ever get any? No, right? First of all it generally only works for intra-office emails. And second everybody checks this box that says don’t ask my about sending receipts again and clicks No. Well spymail is like a read receipt, but you don’t get the option of saying No. Because…
  29. Spymail relies on hidden tracking code to reveal information about you and your interactions with the email without you knowing it is happening. What information does it reveal?
  30. Comment on the confidential witness
  31. The prevalence of spymail is actually skyrocketing. This report from July said spymail was up over 280% since 2013. So we actually built a tool to scan existing email and I scanned 10 years of my gmail account and prior to 2010 I had a handful and this year I already have over 300. The reason its so popular because there has been an explosion of off-the-shelf tools for doing this. They cost basically nothing and install in minutes
  32. Okay, so that’s what spymail can do. Now lets talk about how this creates legal and ethical risk.
  33. So the first risk is that spymail compromises privacy and safety of firm clients and employees As I mentioned, when a spymail is opened, the location of that open is reported to the sender. 2. The same goes for any spymail you forward to a client or witness. As in the example I showed a few slides ago, when your client or witness opens that spymail, the original sender can see where they are. 3. Information exposed by spymail is reported immediately. But then the tools also aggregate it over time to reveal historical patterns. We Attorneys, as much as anyone are “always connected.” All of us are checking our email on our mobile devices and at home. This means where we and our clients are now, where we were, where we live, where we go after work . . . all that can be exposed simply by opening and forwarding totally normal looking emails. And since they are so cheap and easy to use, spymail can be from anyone. 4. And, this is sort of a fun fact, but it helps drive the point home - someone used exactly this technique to stalk Jay-Z across the world.
  34. The second risk of spymail is that it makes firms and clients more susceptible to phishing and other cyber attacks How does it do that? It does it by being a fantastic social engineering tool. Does everybody know what social engineering is? It’s basically learning as much as you can about a person or company so that you can then use that information to trick them into doing something such as wiring them money, sending them sensitive documents, etc.. As we’ve seen, spymail allows them to learn all sorts of stuff about you, your firm, and your clients such as Physical locations. Where people are and where they’ve been is very helpful for scams. Travel reimbursement scams has recently been a very popular one. Security vulnerabilities. Spymail is revealing what emails are making it through corporate existing spam filters, firewalls, etc. So this helps them tailor future emails for future phishing attacks Employees opening various spymails is telling attackers who is interested in what and who are your weak links. Who in your firm is most likely to open a phishing email with pictures of kittens or whatever. Spymail can reveal identities of forward recipients, we already talked about that one So take all of this information, put it together with other publicly available information and it becomes pretty easy to draft a very convincing phishing email or phone call. And the number of phishing attempts being launched at firms is exploding. I think we all remember the Mossack Fonseca hack – the Panama Papers Earlier this year a bunch of firms including Cravath and Weil Gotshal were hacked. Its getting so bad that the FBI issued an alert to law firms to warn them that they are being targeted. Why are firms being targeted? Well, sometimes to rip them off directly, but actually more worrisome is that they are trying to get their hands on all the sensitive client information that can be used for insider trading, bribery, blackmail, etc. Breaches are already leading to malpractice suits And there is even one firm that is specifically targeting law firms with class action lawsuits. They are literally probing firm’s cyber security to build a case for a class action lawsuit. Finally on this topic, here is a quote about how spymail was instrumental in the hack that took down the ukranian power grid.
  35. The third risk of spymail is that it exposes you and your clients to a bunch of legal pitfalls and puts you at a disadvantage. And one situation in which it does this is in negotiations. Here’s a quote from an attorney talking about how someone was trying to sell him on the idea of using spymail in his practice. The sales pitch was [read]
  36. Spymail also creates pitfalls and disadvantages during pre-suit investigations and in litigation. Email tracking is being admitted as direct evidence In Fox v. Leland out of the Eastern District of North Carolina it was admitted to prove time of receipt of an email In Steward v. Keuttel out of Arkansas email tracking was weighed very heavily by the district court in finding sufficient service of process via email and entering a default judgment. The default judgment was ultimately vacated on appeal, but obviously only after the defendant had to spend a bunch of time and money on the appeal. Email tracking can also provide direct evidence of knowledge. That is, the sender now knows that you opened the email. Think about this for willful patent infringement, for example. A patent troll emails a patent to your client and someone at your client opens it, the troll now has evidence that your client had knowledge of that patent as of that date.
  37. Still in regards to pre-suit and in litigation, spymail can help opposing parties: Identify defendants. A troll for example could just blast out demand letters and see who opens. forwards it, etc. – its basically a game of whack a mole Identify you clients and witnesses, we’ve talked about these. And spymail can help opposing parties identify which employees of your clients or which third parties they should depose And here as another real world example: HP was caught using this to identify the confidential source of a journalist
  38. Okay, so now that we understand what spymail is and what it can do, lets look at it from an ethical perspective. Here again is rule 1.1, we need to understand the risks and benefits of email. Well, now we understand that the rise of spymail has introduced new risks. Specifically: the risk that an email sender will see when, where, and how many times we open an email and forward an email.
  39. Okay so last thing I want to talk about is the ethical implications of using a spymail tool in our own practice. Specifically, is it ethical to send spymail to opposing parties in the hopes that it will give you an upper hand in negotiations or litigation? First before I share my thoughts I wanted to hear if anyone else had any theories as to why this would or would not be ethical. Okay, so, in general, I do not think it is unethical. The only thing I could come up with was in relation to rule 4.4(b) in the situation that opposing counsel forwards my spymail to its client and I learn who that client is and I see how often they are forwarding the thread back and forth. In this situation, perhaps this is an inadvertent disclosure that I am obligated to notify them about. But on the other hand, they did intentionally send those emails so maybe its not inadvertent. Now this is not to say that sending spymail to opposing parties is necessarily okay – ethics bodies have construed rule 4.4(b) very narrowly and generally defer to rules of evidence, civil procedure, and local rules for issues of inadvertent disclosure. So that is a topic for another day.
  40. Okay, so that’s what spymail can do. Now lets talk about how this puts us and our clients at risk.
  41. Okay, so that’s what spymail can do. Now lets talk about how this puts us and our clients at risk.