Unit 3: Ethical Issues Surround Electronic Communications.

Slides:



Advertisements
Similar presentations
Intisar O. Hussien Faculty of Computer Studies Arab Open University
Advertisements

Protect Our Students Protect Ourselves
Working with the Internet
Accessibility Awareness Training for Customer Service Representatives © 2014, T-Base Communications Inc. Welcome to Accessibility Awareness Training for.
Privacy and Information Security Training ( ) VUMC Privacy Website
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Week Duty to keep quiet, not talk about cases By product of Fiduciary Duty 2. Right not to be forced to testify about communications --Statutory.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Eliminating Privacy Concerns for Online Access to Public Documents Nick Haralampopoulos April 16, 2003.
Soft Skills for a Digital Workplace: Verbal Communication Unit C: Developing Professional Telephone Skills.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Advanced Civil Litigation Class 6Slide 1 Steps in Filing a Complaint First, the necessary complaint must be prepared. Make sure you attach the: First,
Netiquette Rules.
1.3 Control of Information In this section you must be able to: Describe the legal rights and obligations on holders of personal data to permit access.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Business Plug-In B7 Ethics.
INTERNET and CODE OF CONDUCT
Microsoft Office Word 2013 Expert Microsoft Office Word 2013 Expert Courseware # 3251 Lesson 4: Working with Forms.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Legal Ethics and Social Networks Prof. David W. Opderbeck Seton Hall University Law School © 2011 David W. Opderbeck Licensed Under Creative Commons Attribution.
CPS Acceptable Use Policy Day 2 – Technology Session.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Electronic Use Policies.   Social Media  Internet.
ESCCO Data Security Training David Dixon September 2014.
Google Confidential and Proprietary 1 Advanced Docs Google Apps.
Area Of Study 2 Information And Communications Technology(ICT)
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
NETIQUETTE GUIDELINES FOR DISTANCE EDUCATION COURSES.
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
Word Lesson 13 Sharing Documents Microsoft Office 2010 Advanced Cable / Morrison 1.
Dimensions of E – Commerce Security
Protecting and Sharing Documents Lesson 13. Objectives.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
The Model Rules of Professional Conduct and Electronic Tools: How Ethical Rules Must Adapt to Address Current and Forthcoming Technologies By Melissa Freeman.
Unit 4: Electronic Documents and the Paperless Office.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Reminders Office hours Friday, from 1pm – 3pm EST Complete the Unit 6 test Participate on the discussion.
Chapter Three Confidentiality In this chapter, you will learn about: Basic principles of confidentiality The attorney-client privilege and the difference.
Unit 2/3. Battleship Legal Ethics (Tests 2/3) Rules for Battleship I have a grid with ships (Two battleships (4x), two submarines(3x), five tugboats (2x))
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Functions of Word Processing Software Preparing written forms of communications for clients, other lawyers,
UNIT 7: Using Excel in the Law Office. This Week’s Assignment You should be working on your three-part assignment Part 1 deals with the things you learned.
Team working in distributed environments M253 Communicating, Cooperating & Collaborating on Line Faculty of Computer Studies Arab Open University Kuwait.
Living Online Lesson 3 Using the Internet IC3 Basics Internet and Computing Core Certification Ambrose, Bergerud, Buscge, Morrison, Wells-Pusins.
Session 8 Confidentiality and disclosure. 1 Contents Part 1: Introduction Part 2: The duty of confidentiality Part 3: The duty of disclosure Part 4: Confidentiality.
FRCP & Ethics Money & Ethics Technology & Ethics USPTO & Ethics Advertising Ethics
Unit 2: Practical and Ethical Considerations of a Paperless Law Office.
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
Unit 3: Ethical Issues Surround Electronic Communications.
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Seminar Topics Assignments due this week Functions of word processing software Microsoft Word features.
Unit 2: Practical and Ethical Considerations of a Paperless Law Office.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
[ Direct marketing – an introduction to data protection and privacy] For [insert name of organisation] presented by [insert name of presenter] on [date]
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Functions of Word Processing Software Preparing written forms of communications for clients, other lawyers,
PA 230 Unit 1, Lecture 2: Jeopardy PA 230 Jeopardy Class Rules Confidentiality E-Courthouse Paperless Tech in Law Firm Q $100 Q $200 Q $300 Q $400 Q.
Unit 2/3. Battleship Legal Ethics (Tests 2/3) Rules for Battleship I have a grid with ships (Two battleships, two submarines, five tugboats) You have.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
CANADA’S ANTI-SPAM LEGISLATION (CASL)
Privacy & Confidentiality
1.02 Team Communication.
1.02 Team Communication.
1.02 Team Communication By: Judylyn Hobson
The Issues with Technology in education
Health Insurance Portability and Accountability Act
Information, Communication and Technology
Write Job Applications
Lesson 3: Medical Records
Handling Information Securely
Presentation transcript:

Unit 3: Ethical Issues Surround Electronic Communications

Introduction Today there are volumes of information at your fingertips 24/7 The Internet is used by legal professionals to communicate, market the business, engage in commerce, and research issues. Technology surrounding the Internet and ethical issues that can surround electronic forms of communication are ever evolving

Communication We will spend most of this seminar discussing ethical issues surrounding electronic communications. Through , clients are kept informed of their cases and have questions answered. Legal professionals can become involved in “listservs” to keep apprised of topics of interest and continue their legal education.

Marketing Most law firms have a web site to market the firm electronically rather than in printed form. Usually the site will describe the firm, the type of work it concentrates in, and articles that it has published. Firms need to ensure that their web sites comply with state bar ethics codes.

Commerce and Research Obviously legal material can be purchased online. The Internet and other electronic data bases are also used to conduct legal research to determine the strength of a case and that of an opponent.

What is Electronic Communication? These have arisen over the past few years due to the changing ways that people communicate at work. They are much faster forms of communication than mail, but there are problems that can arise with the use of various forms of electronic communication.

Phones and Voice Mail Conference calls and voice mail are effective ways to communicate, things to consider are what information you can and should leave on a voice mail, and who is on the conference call. You should also ask permission before putting someone on speaker phone, and know if someone else is doing so in order to avoid inadvertent disclosure of confidential information.

Facsimile Most facsimile coversheets contain a “confidentiality” notice indicating that if the fax was received in error he or she should return it to the sender. This is used to maintain the attorney/client privilege and confidentiality. Double check fax numbers before sending.

Avoid the “reply to all” unless you are sure everyone should be receiving the response. Be specific in the subject line so that what the is about will be clear. Confidentiality and security are huge issues in the legal arena with regard to . Type ahead feature should be disabled

Ethical Concerns -- is used between legal staff and clients, and can be used to send documents for a client to review before sending out. Because these documents are sent over networks over an essentially open environment, privacy is a concern. The communications can be intercepted and alteration, so those s need to be secure when they are sent.

Ethical Concerns -- s In order to avoid inadvertent waiver of the attorney client privilege, encrypting the communication that is sensitive is a good idea. Include in the a notice that the communication is intended only for the recipient (just like is used with faxes) If the law firm deals with cyber law, it can also be held to a higher standard. Employers monitor s and usually restrict them for professional use only!

Ethical Concerns – Marketing Does marketing online constitute advertising and solicitation? State bar regulations on attorney advertising must be carefully reviewed to ensure that all materials posted on the Internet or sent out to groups complies with certain rules (you’ll study that in Legal Ethics) Usually these websites are viewed as advertisements instead of solicitations Disclaimers – no attorney client relationship

Metadata Metadata tracks information about documents that are attached to an electronic file. System metadata refers to tracking the file – the file name, size, and where it can be found. Content metadata refers to who created the document, changes, etc.

So … What Can You Do? Encryption – locking information to protect it from being discovered by others would definitely serve to preserve the attorney/client privilege. Encryption software allows scrambling of information that can only be understood with those who have the encryption code. Those who do not have the password or encryption key will only see scrambled messages and files.

Encrypting There are different encryption programs, such as Mail it Safe, that authenticate both parties before the contents of the message are understandable. Because of the confidential matters that are discussed between a lawyer and his client via , this is an invaluable tool to ensure protection.

This Week’s Assignment Propose Guidelines for Ensuring Security in a Sole Practice or Small Firm Imagine you are a newly-hired paralegal working for an attorney in a sole practice. Similar to the paralegal discussed in the eBook, your attorney relies on you to manage the “technology” of the office. Based on your Web research and what you learned from the Discussion Board, develop a set of at least 8-10 guidelines for ensuring security in your office. Include both concerns—what the security issues might be—as well as suggestions for ensuring security.

This Week’s Assignment cont’d Create a table in Word to organize your thoughts. Include three sections: 1) Concerns: What the security issues might be; 2) Why This is a Concern: Justification and Explanation; and 3) Suggestions for Ensuring Security. Highlight the headings in yellow. To create a table in Word, click on Insert, Table, Insert Table, and Change the number of columns to 3, and put as many rows that you will need. If you need to later add or remove rows, right click and either add or delete the row. To highlight the heading, highlight the entire row, click on Design, Shading, and then select the color.

Table CONCERNS WHY THIS IS A CONCERN SUGGESTIONS

Practice Questions Practice makes perfect!

Practice Question # 1 Suppose that Attorney Jones has a conference call with his client. While the phone is ringing, the attorney puts it on speaker phone but leaves his office door open. While talking to the client, people in the waiting room hear the entire conversation. Is this a problem?

Answer to Practice Question # 1 Yes!!! A waiver of the attorney/client privilege can occur when a conversation takes place in the presence of third parties. In this case, the waiver was not done by the client or with the client’s consent, so the attorney would face a potential malpractice suit if private information got into the wrong hands!

Practice Question # 2 Suppose that Attorney Jones decides to send over a summary of a client’s strengths and weaknesses to his client. He does so as an attachment, but does not encrypt the . What is the problem with this?

Answer to Practice Question # 2 Unencrypted s can be intercepted by those who are not supposed to receive it. Unauthorized users can obtain the information and use what was supposed to be protected information to their benefit.

Practice Question # 3 Attorney Jones, who is not having a good day, decides to send a facsimile. He does not use a cover sheet containing a confidentiality notice, and does not double check the fax number before sending it. The fax goes to a competitor’s office by mistake. What happens?

Answer to Practice Question # 3 Attorney Jones runs the risk of a court allowing the opponent to use this information against his client. Fax numbers should always be double checked before sending, and a cover sheet containing the confidentiality notice is a must!

Practice Question # 4 In a crowded courthouse, Attorney Jones uses his cell phone to tell his paralegal what points to argue in a motion in support of his client. Why might this be a problem?