This obligation is waived under certain circumstances listed under Rule 1.6 including: the consent of the client; the attorney’s obligation to comply with a court order; in a situation where the information disclosed will protect the lawyer or the client against a controversy between the lawyer and the client; in a situation of criminal charges.
Honor Code
In addition, the attorney has an obligation to reveal information in the following situations:
1.) When the client plans to commit a crime and the information held by the attorney could prevent the crime, the attorney-client privilege is waived and the attorney has the obligation of revealing the information. However, before the attorney uses this exception of the attorney-client privilege, the attorney shall first advise the client that the attorney must reveal the client’s criminal intention unless the client abandons his plan, and the attorney shall also urge the client not to commit the crime.
2.) When the client plans to commit a crime of perjury, the attorney-client privilege is automatically waived, and the attorney, who has the obligation of revealing the information, also should seek to withdraw as counsel.
3.) When the attorney has information that clearly establishes that his client has perpetrated a fraud related to the subject matter of the representation before a tribunal, the attorney-client privilege is waived and the attorney has an obligation to reveal the information. However, before revealing such information, the attorney shall first advise his client that he must report the fraud to the tribunal.
Changing Technologies
How may new technologies impact this duty of protection that an attorney has toward his clients?
Wireless Communications, Smart Phones, Email and More
Over the historical transition of time, each of the new communications technologies such as the telephone, cordless phone, fax machine and cell phone have received some form of statutory or common-law protection for attorney-client communications. But sometimes, these protections were long in coming. Alexander Graham Bell was awarded a U.S. patent for a telephone in 1876. However, it was not until 1967 that the U.S. Supreme Court recognized, in Katz v. United States, a reasonable expectation of privacy in a telephone conversation.
Pretty quickly, bar associations recognized that email communications needed to conform to an attorney’s duty of confidentiality. Several bar ethics committees have concluded that the expectation of privacy for electronic mail is no less reasonable than the expectation of privacy for ordinary telephone calls.
However, the advent of new wireless devices, such as the BlackBerry and the iPhone, has raised concerns about the exposure of unauthorized interception of an electronic message. Because the unauthorized interception is illegal under federal law, such interception cannot constitute a waiver but it can open the door for malpractice liability. Certain legal opinions have expressed that an electronic mail is susceptible to interception, misdirection and attorney error that could give rise to malpractice liability. It is recommended that the attorney take the following measures:
· Advise the client about the risk associated with the use of email and obtain the client’s consent
· Do not use the internet for communications involving extraordinarily sensitive matters that would be damaging to the client if disclosed to any outside party
· State on email messages that they are privileged communications
· Consider using encryption when working with clients who are comfortable with it
The Employee Expectation of Privacy
The expectation of privacy has changed. While the protection of medical and financial records has been a longstanding concern, employers now are trying to limit the privacy of their employees. The federal Health Insurance Portability and Accountability Act (HIPAA) requires health care providers to maintain the privacy of patient information, requires consent for disclosure of paper and electronic records, and prohibits unauthorized use of patient records for employment purposes. The Gramm-Leach-Bliley Act prohibits financial institutions and their affiliates form disclosing certain personally identifiable financial information. However, in the area of privacy for employees, the evolution of privacy is moving in the opposite direction. Many companies are implementing technology-based policies providing that employees have no expectation of privacy in the employer’s email, Internet, voicemail and network systems. Certain employer codes of conduct require employees to expressly consent to monitoring access and use, and disclosure of unauthorized activities on computer systems. Attorneys should be aware that their client may have consented to such codes of conduct. The attorney should ask in the intake form if confidential information can be sent through the client’s professional email address.
On the other hand, there are instances where the attorney-client privilege has been found to trump an employer code of conduct. For example, in Stengart v. Loving Care Agency Inc. (2010 N.J. LEXIS 241), the New Jersey Supreme Court held in March 2010 that the attorney-client privilege applied to e-mails that an employee sent to her lawyer from the company’s laptop computer through her private email account, despite a company policy disclaiming any right of privacy in the use of the company’s computer systems. The Court found that the employer’s policy was ambiguous and did not clearly permit the employer to access communications otherwise protected by the attorney-client privilege.
Metadata
What is Metadata?
According to the National Information Standards Organization (NISO), metadata is defined as information that makes it easier to retrieve, use or manage an information resource. Wikipedia, the web-based encyclopedia, loosely defines metadata as “data about data.” It is a concept that applies primarily to electronically archived or presented data. Metadata is used to describe the definition (descriptive metadata), structure, and administration of data files with all contents in context in order to ease the use of the captured and archived data for further use. Metadata answers the “who, what, when, where, why, and how” about every facet of the data that are being documented.
The descriptive metadata describes a resource for purposes such as discovery and identification. It includes elements such as title, abstract, and keywords. The structural metadata indicates how compound objects are put together, for example, how pages are ordered to form chapters. The administrative metadata provides information to help manage a resource, such as when and how it was created, file type and other technical information, and who can access it. For example, a web page may include metadata specifying what language it's written in, what tools were used to create it, where to go for more on the subject, and so on. The main two subsets of administrative data are the rights management metadata and the preservation metadata. The rights management metadata deals with intellectual property rights. The preservation metadata contains information needed to archive and preserve a resource.
Metadata can be embedded in a digital object or it can be stored separately. Metadata is often inserted in HTML documents and the headers of image files.
TechTerms.com defines metadata as the description of other data. Metadata provides information about a certain item's content in a document. For example, an image may include metadata that describes how large the picture is, the color depth, the image resolution, when the image was created, and other data. A text document's metadata may contain information about how long the document is, who the author is, when the document was written, and a short summary of the document. It can also include the history of the modifications that occurred in a document.
Web pages often include metadata in the form of “meta tags.” Description and keyword meta tags are commonly used to describe the Web page's content.
A meta tag is a special HTML (HyperText Markup Language) tag that is used to store data about a Web page but is not displayed in a Web browser. For example, meta tags provide information about what program was used to create a Web page, a description of the page, and keywords that are relevant to the page. Many search engines employ the information stored in meta tags when they index Web pages.
What is the Use of Metadata?
An important reason for creating descriptive metadata is to facilitate discovery of relevant information. Metadata can help resource discovery, organize electronic resources, facilitate interoperability and legacy resource integration, provide digital identification, and support archiving and preservation.