Assignment title: Information


ISCG4500 – Introduction to Corporate Counsel CLE Seminar ABA Section of Litigation Corporate Counsel Committee Trump National Doral Miami/Doral, FL Ethical, Privilege, and Practical Issues in Cloud Computing, Privacy, and Corporate Data Protection (Ethics) February 13, 2015; 1:45 pm – 2:45 pm 1 Cloud Computing & Ethical Obligations of Lawyers Associate Professor Veronica Root Notre Dame Law School I. The August 2012 revisions to the ABA Model Rules of Professional Conduct provide guidance regarding a lawyer's use of technology and confidentiality.1 These revisions, while not yet incorporated into many state rules of professional conduct, provide a helpful starting place in determining what lawyers should be considering when utilizing technology like cloud computing. "Because cloud computing places data—including client data—on remote servers outside of the lawyer's direct control, it has given rise to some concerns regarding its acceptability under applicable ethics rules."2 A. Revisions to Model Rule 1.1 Competence, Comment [6].3 1. Comment [6] to Model Rule 1.1 was amended to require competent representation to include keeping abreast of the "benefits and risks associated with relevant technology." 2.This requires lawyers to understand the risks associated with utilizing cloud computing services as part of their duty to provide competent representation to their clients. A basic understanding of what cloud computing is and how it could be of importance to your clients is extremely important. 3.Over the past few years, the use of cloud computing has increased exponentially, and it has "chang[ed] the way much of the technology business works."4 Lawyers must understand and keep up-to-date regarding these changes.5 1 American Bar Association, Commission on Ethics 20/20 Report to the House of Delegates (Aug. 2012) [hereinafter "Ethics 20/20 Report", available at http://www.americanbar.org/content/dam/aba/administrative/ethics_2020/20120808_revised_resolution_1 05a_as_amended.authcheckdam.pdf. 2 American Bar Association Law Practice Division, Cloud Ethics Opinions Around the U.S. [hereinafter, "Ethics Opinions"], available at http://www.americanbar.org/groups/departments_offices/legal_technology_resources/resources/charts_fyi s/cloud-ethics-chart.html. 3 Ethics 20/20 Report, supra note 1. 4 Quentin Hardy, Coming of Age in Cloud Computing NYTimes.com Bits Blog (Oct. 22, 2014), available at http://bits.blogs.nytimes.com/2014/10/22/coming-of-age-in-cloud-computing/. 5 Quentin Hardy, The Era of Cloud Computing NYTimes.com Bits Blog (June 11, 2014) ("Industry analysts . . . figure that if largely cloud-based things like mobile apps, big data, and social media are counted, over the next six years almost 90 percent of new spending on Internet and communications technologies, a $5 trillion global business, will be based on cloud-based technology."), available at http://bits.blogs.nytimes.com/2014/06/11/the-era-of-cloud-computing/.Corporate Counsel CLE Seminar ABA Section of Litigation Corporate Counsel Committee Trump National Doral Miami/Doral, FL Ethical, Privilege, and Practical Issues in Cloud Computing, Privacy, and Corporate Data Protection (Ethics) February 13, 2015; 1:45 pm – 2:45 pm 2 4. Questions to consider:  Do you know if your employer or client(s) utilize cloud computing?  Does the employer or client utilize its own cloud or is it using a cloud computing service provider?  Is the information being stored in the cloud something that is sensitive or that should remain confidential?  Do you know what industry security standards and precautions are for the utilization of cloud computing? Does your employer or client?  Does the service being utilized comply with industry security standards and precautions?  Does your employer or client(s) routinely reassess their cloud computing security precautions to ensure that they are adequately considering new potential threats? B. Revisions to Model Rule 1.6 Confidentiality of Information.6 1.Rule 1.6 was amended to add the following language: "A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client."7 2.Comment [16] was also revised and it provides guidance on how to determine whether a lawyer's efforts were in fact reasonable. It states that Factors to be considered in determining the reasonableness of the lawyer's efforts include, but are not limited to, the sensitivity of the information, the likelihood of disclosure if additional safeguards are not employed, the cost of employing additional safeguards, the difficulty of implementing the safe guards, and the extent to which the 6 Ethics 20/20 Report, supra n. 1. 7 ABA Model Rule of Professional Conduct 1.6(c).Corporate Counsel CLE Seminar ABA Section of Litigation Corporate Counsel Committee Trump National Doral Miami/Doral, FL Ethical, Privilege, and Practical Issues in Cloud Computing, Privacy, and Corporate Data Protection (Ethics) February 13, 2015; 1:45 pm – 2:45 pm 3 safeguards adversely affect the lawyer's ability to represent clients (e.g., by making a device or important piece of software excessively difficult to use). 3.Comment [16] to Rule 1.6 goes on to explain that "A client may require the lawyer to implement special security measures not required by this Rule or may give informed consent to forgo security measures that would otherwise be required by this Rule." 4.The rule text requires "reasonable efforts" to be taken to protect client information. That said, if information is hacked or leaked in some manner, there could be serious consequences even if reasonable efforts have been taken by the attorneys involved to protect information related to the representation. 5.Thus, a good rule of thumb is to preemptively discuss issues related to client file storage with counsel. In-house attorneys should have a strong understanding of how their outside counsel stores client files, so that they can determine if additional security precautions will be needed. Outside counsel should proactively determine whether clients require special security precautions. 6.Questions to consider:  Does your in-house staff utilize a cloud computing service like Dropbox, Box, etc., to facilitate working from home? Or do the associates at your outside counsel utilize a service like Dropbox or Box?8 (This isn't a question tied to official storage policies at your organization? It's prompting you to consider whether there is an unofficial custom to utilize cloud storage providers that are not officially sanctioned by your organization, which may not have sufficiently rigorous security precautions.) 8 See these articles for more information on why a custom of utilizing popular cloud computing services could be problematic. Josh Topal, 6 Reasons Why Dropbox Isn't Secure Enough For Business (Feb. 27, 2014), available at http://www.business2community.com/cloud-computing/6-reasons-dropbox-isntsecure-enough-business-0795298. Sumit Passary, Cloud Computing is the Future but not if Security Problems Persist Tech Times (June 15, 2014) ("When you don't own the network, it's open to the rest of the world . . .the cloud – by definition – is more insecure than storing data on premises."), available at http://www.techtimes.com/articles/8449/20140615/cloud-computing-is-the-future-but-not-if-securityproblems-persist.htm.Corporate Counsel CLE Seminar ABA Section of Litigation Corporate Counsel Committee Trump National Doral Miami/Doral, FL Ethical, Privilege, and Practical Issues in Cloud Computing, Privacy, and Corporate Data Protection (Ethics) February 13, 2015; 1:45 pm – 2:45 pm 4  If so, do they encrypt or password protect documents prior to uploading to these websites?  If your organization uses a third-party to provide cloud storage service, is it possible for the employees of the cloud storage service to access information related to the representation of clients?  If your organization provides an internal cloud storage service, is your IT Department sufficiently staffed and provided enough resources and training to keep up with various security threats? II. State Ethics Opinions. A. Several states have issued ethics opinions addressing the use of cloud computing. The states are Alabama, Arizona, California, Connecticut, Florida, Iowa, Maine, Massachusetts, New Hampshire, New Jersey, New York, Nevada, North Carolina, Ohio, Oregon, Pennsylvania, Vermont, Virginia, and Washington.9 1.Each state that has addressed the issue permits the use of cloud computing and adopts a reasonable care standard, which is in line with the reasonable efforts standard adopted by the ABA Model Rules of Professional Conduct.10 B. Examples of the type of guidance provided by state ethic opinions.11 1.The New York ethics opinion provides the following guidance regarding what constitutes "reasonable care." "Reasonable care" to protect a client's confidential information against unauthorized disclosure may include consideration of the following steps [when utilizing a thirdparty cloud computing provider]: (1) ensuring that the online data storage provider has an enforceable obligation to preserve confidentiality and security, and that the provider will notify the lawyer if 9 Ethics Opinions, supra note 2. 10 See id. 11 Summaries of the different state ethics opinions are available on the ABA website. See Ethics Opinions, supra note 2.Corporate Counsel CLE Seminar ABA Section of Litigation Corporate Counsel Committee Trump National Doral Miami/Doral, FL Ethical, Privilege, and Practical Issues in Cloud Computing, Privacy, and Corporate Data Protection (Ethics) February 13, 2015; 1:45 pm – 2:45 pm 5 served with process requiring the production of client information; (2) investigating the online data storage provider's security measures, policies, recoverability methods, and other procedures to determine if they are adequate under the circumstances; (3) employing available technology to guard against reasonably foreseeable attempts to infiltrate the data that is stored; and/or (4) investigating the storage provider's ability to purge and wipe any copies of the data, and to move the data to a different host, if the lawyer becomes dissatisfied with the storage provider or for other reasons changes storage providers.12 2. The California ethics opinion provides guidelines lawyers should take into account before adopting the use of new technology. Before using a particular technology in the course of representing a client, an attorney must take appropriate steps to evaluate: 1) the level of security attendant to the use of that technology, including whether reasonable precautions may be taken when using the technology to increase the level of security; 2) the legal ramifications to a third party who intercepts, accesses or exceeds authorized use of the electronic information; 3) the degree of sensitivity of the information; 4) the possible impact on the client of an inadvertent disclosure of privileged or confidential information or work product; 5) the urgency of the situation; and 6) the client's instructions and circumstances, such as access by others to the client's devices and communications.13 12 New York State Bar Association Committee on Professional Ethics Opinion 842 (Sept. 10, 2010), available at http://www.nysba.org/CustomTemplates/Content.aspx?id=1499. 13 The State Bar of California Standing Committee on Professional Responsibility and Conduct Formal Opinion No 2010-179, available at http://ethics.calbar.ca.gov/LinkClick.aspx?fileticket=wmqECiHp7h4%3D&tabid=837.