Bar News - November 7, 2003
Don't Abidicate to Technology
By: Emily Eichenhorn
Risk Management Tips
CELL PHONES, PERSONAL computers and e-mail are wonderful tools for helping lawyers increase productivity, communicate more frequently and manage their businesses. Unfortunately, technological innovation has also created many potential risks that are easily overlooked in daily practice. Recognizing these risks and using a little common sense can maximize the benefits and minimize the risks.
When leveraged properly, technology can be a tremendous risk-management asset. Lawyers today have access to computerized calendar and docket systems, including software that calculates and tracks various statutory deadlines. We can monitor conflicts, store files electronically and keep records longer. From word processors and case management systems to e-mail that promotes written communication with clients, technology has improved lawyers' ability to avoid oversights, maintain control and better serve clients. The problem is that technology can also exacerbate some risks or create entirely new ones.
For instance, technology can make procrastination easier. If you've ever figured you could wait a couple of extra hours and still meet your delivery deadline by faxing a document at the last minute, you know what I am talking about. Not so long ago, lawyers were forced to finish briefs several days ahead of filing deadlines to allow for printing or even typing. That gave an attorney time to reflect on the document's contents before sending it off to the court. Now we live in a world where documents can be changed on the fly and e-mailed around the globe in mere seconds, inviting rushed efforts, which lead to mistakes. Just because you can wait until the last minute doesn't mean you should.
In that same vein, just because you can talk to your client while you're on the golf course doesn't mean you should. First, private client discussions ought not to be held in public settings. Second, the sense of urgency in such a setting can prompt you to respond without proper preparation or consideration. Before cell phones, if you felt the client was going to need you, you stayed at the office near the phone - and the files. That is still the best strategy today.
E-mail is another innovation that has quickly become so common that we've become cavalier in its use. Because of its immediacy and simplicity, we tend to dash off notes to our clients and to each other in much the same way that we might make casual comments in the hall or coffee room. What we often fail to consider is that e-mails are written communications that can come back to haunt us later on. In and of itself, sending an e-mail with grammatical errors and poor punctuation or spelling doesn't mean you're incompetent. But it can certainly leave a bad impression if projected on a screen before a jury.
E-mail also offers a host of new ways to lose your client's confidential information. At the touch of a button, you can inadvertently "reply to all" rather than just the sender, or forward an embedded e-mail to a large group. You can erroneously send a message to John Smith, a local reporter, that was intended for Joseph Smith, your client. Your client can even forward your messages to others in exponential proportions without your knowledge.
Also scary are the risks presented by attached files. Before the advent of e-mail, we delivered print copies of draft documents to clients or opponents. Changes or insertions were made by hand and then the document was re-typed. It was easy to differentiate an original from a copy, and it was relatively simple to exercise control over the document. Now, we deliver documents in word processing files that can be manipulated by the recipients on their own computers. Indeed, depending on the word processing and e-mail software, the recipient of the document may be able to reveal all of the changes you made during drafting, including language you may have tried and then discarded, paragraphs you'd duped from other contracts, even comments you made to your colleagues who worked on the document with you.
The potential risks inherent in these technologies can make one wonder whether the benefits are worth it. However, there are effective ways to address these issues and defuse the various technological landmines lawyers face.
With respect to e-mail and inadvertent disclosure, the use of e-mail - encrypted or not, whether sent through a private or public distribution channel - does not in and of itself pose enough of a risk to privacy to make it inappropriate for client-attorney communication. Just exercise careful judgment about whether or not the information you're dealing with requires more than minimum protection. First, before you hit the "send" button, consider whether you're using the appropriate medium for your message. For instance, if you plan to communicate by e-mail with an individual client on the client's employer-supplied computer, consider the fact that most employers have a policy that they may access an employee's e-mail. Could that affect privilege? Usually, the minimal risk of disclosure presented by e-mail - or cell phones - is far outweighed by the convenience they offer, but sometimes, the information is so sensitive or important that the only way to deliver it is face-to-face behind a closed office door, or by hand in a sealed envelope.
Second, do some old-fashioned double-checking. Is your e-mail message addressed to the right person? Are you sure there are no extra addressees or extra attachments? Are you replying only to those people to whom you wish to reply? One helpful tip is to avoid creating address groups, especially ones that include both sides of a litigation.
Third, include privacy statements that ask unintended recipients to ignore the e-mail. In most jurisdictions, if the parties claiming privilege can show that they were, in fact, making reasonable efforts to avoid disclosure, the court will find that the privilege is not waived - or at most, that it's waived regarding the single communication at issue without opening the door to all related communications. Use of a disclaimer is evidence of such reasonable efforts. Still, you cannot count on disclaimers to protect you against ill effects of misdirected e-mails. Their effectiveness depends a great deal on the attitude, integrity and motivations of the inadvertent recipient. To help, put the warning in the subject line of the e-mail where it more likely will be seen immediately by the recipient without his or her having opened the actual message. Similarly, have AutoText disclaimers appear at the top of the message screen where they have a better chance of diverting unintended readers than those that show up only after the reader has scrolled all the way through to the signature block.
Fourth, in regard to attachments, the best solution is arguably the simplest: Tell all involved that they must inform you of any changes made to any document. Always volunteer to keep control of the documents, and declare that there is no such thing as a final or official document except that which is printed from files resident on your computer.
With respect to another party's ability to track changes and view the background information and work product in a document, check with your technology advisor to determine how best to eliminate that information from attachments. Some systems have a filter built in. Other systems may require that you create an entirely new file and cut and paste the old document into the new, or simply rename a file before saving it. Every system has its "quirks."
Finally, resist the inclination to abdicate to technology. We must remember that computers, cell phones and similar technologies are tools designed to help us do things better. They are not designed to do it all for us. Just because technology allows us to do something doesn't necessarily mean we should.
Emily J. Eichenhorn is the director of lawyers' risk management for CNA Financial Corp., a leading provider of lawyers' professional liability insurance for more than 30 years. She resides in West Bloomfield, Mich.
|