• Home
  • About Me
  • Disclaimer

The Researching Paralegal

~ Articles and Research for Legal Professionals

The Researching Paralegal

Category Archives: Emails

Why Automatic Deletion of Spam Email Causing Failure to File a Timely Appeal Is Not Excusable Neglect.

30 Saturday Sep 2017

Posted by Celia C. Elwell, RP in Calendar/Docketing, Emails, Law Office Management, Legal Ethics, Legal Technology, Office Procedures, Technology

≈ 1 Comment

Tags

Appellate Procedure, Email Configuration, Excusable Neglect, Spam

(With hat tip to William P. Statsky)

My home email software has a spam folder where unwanted emails go to die – eventually. I must deliberately choose to send an email to the spam folder. Then, I must decide whether let it remain in perpetual limbo as spam, block it, or delete it.

Imagine the number of emails routinely sent and received by most law firms.  My computer’s email setup would not be practical.  But, when it comes to email configuration, there are good choices and bad ones. A Florida law firm rejected recommended safeguards to snag spam and allow someone, other than the computer, to decide whether to delete the email. That decision, along with others, turned out to be a bad call.

Here are the facts. The trial court’s court clerk served an order by email on the parties. The order awarded a significant amount of attorney fees to the appellee. The appellant claimed it did not receive the emailed order, which is why it failed timely to file an appeal. What happened? The firm’s email system automatically deleted the court clerk’s email and attached order as spam.

The appellant appealed and asked the court to vacate the original order and reenter the order to allow the appellant to appeal. Its email deletion error was “excusable neglect.” Not so said that trial court, and the Florida’s First District Court of Appeal affirmed.

The appellate court gave several specific reasons for rejecting the appellant’s argument.  First, the review of the court clerk’s email logs confirmed that the email with the court’s order was served and received by the law firm’s server. Second, the law firm’s email configuration made it impossible to determine whether the firm’s server received the email. Third, the law firm’s former IT specialist’s advice against this configuration flaw was deliberately rejected by the law firm because its alternative cost more money.

The trial court concluded the law firm made a conscious decision to use a defective email configuration merely to save money, which was not “excusable neglect.”

Another nail in the coffin was testimony by the appellee’s attorney. His firm assigned a paralegal to check the court’s website every three weeks to safeguard that his firm would not miss any orders or deadlines.  The court held that the appellant had a duty to check the court’s electronic docket.

What’s the moral here? Lawyers must configure their computer systems to prevent this costly error. And they must employ a “meaningful procedure” to prevent the series of events that caused this fatal error.

I rather liked the idea of the paralegal assigned to check the court’s online file. In this instance, the paralegal checked it every three weeks. I would modify this depending on the notice time required by your court’s rules.

I recommend reading the entire opinion for its analysis on “excusable neglect.” You can find the opinion here: http://bit.ly/2xI3gGB. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Law Firm Email Encryption – Are You Ethically Compliant?

11 Thursday May 2017

Posted by Celia C. Elwell, RP in Clouds, Confidentiality, Emails, Ethics Opinions, Law Office Management, Legal Ethics, Legal Technology, Rules of Professional Responsibility, Technology, Technology

≈ Comments Off on Law Firm Email Encryption – Are You Ethically Compliant?

Tags

ABA Ethics Opinion, Email, Encryption, Jim Calloway's Law Practice Tips Blog

ABA Issues New Ethics Opinion on Encryption of Attorney-Client Email, Jim Calloway’s Law Practice Tips Blog

http://bit.ly/2qy8J2a

Does your state have an ethics opinion about encryption of your firm’s email? Do you use encryption? Do you use a secure cloud based platform? If you are not sure, don’t you think you should check?

Most law firms frequently use email over fax and regular mail to communicate with their clients, their expert witnesses, and opposing counsel. What is your obligation to ensure confidentiality of your firm’s email, and are you meeting it?

The ABA’s ethics opinion is instructive, as well as the Texas ethics legal opinion referred to by Mr. Calloway at the end of his post. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Do You Use the Cloud for Document Storage or Production? Read This First.

28 Tuesday Feb 2017

Posted by Celia C. Elwell, RP in Attorney Work Product, Attorney-Client Privilege, Clouds, Confidentiality, Discovery, Dropbox, Emails, Encryption, Evidence, Insurance Defense, Legal Ethics, Legal Technology, Litigation, Passwords, Privilege and Confidentiality, Requests for Production, Sanctions, Subpoena Duces Tecum

≈ Comments Off on Do You Use the Cloud for Document Storage or Production? Read This First.

Tags

ABA Journal, Attorney-Client Privilege, Cloud Storage, Confidentiality, Debra Cassens Weiss, Discovery, File Sharing, Legal Ethics, Work Product Doctrine

Upload To File-Sharing Site Was Like Leaving Legal File On A Bench, Judge Says; Privilege Is Waived, by Debra Cassens Weiss, ABA Journal©

http://bit.ly/2mxwEcF

Many use the cloud for file storage and sharing when attachments are too big to send by email. If you use the cloud for storage, file-sharing or transfer, document management, project management, or anything similar, here is a cautionary tale.

The plaintiff insurance company sued the defendants, and sought a declaratory judgment on the defendants’ claim of loss by fire. The plaintiff’s investigator uploaded the entire claims file, including surveillance footage, to a drop-box cloud, Box, Inc. The link had no encryption or password. Access to the link alone allowed anyone to see the file.

He then sent the link by email to the plaintiff insurance company, who sent it to the insurance company’s attorneys, who inadvertently sent it the defendants’ counsel in response to a subpoena duces tecum.

The defendants’ counsel looked at it, but didn’t tell the plaintiff they had seen the privileged and confidential information. Inevitably, the defense sent the information back on a thumb drive to the plaintiff’s attorneys during discovery.

After vigorous arguments about confidentiality, work-product doctrine, attorney-client privilege, and disqualification of defense counsel, the facts and court’s reasoning make this an interesting read. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Email Spam or Have I Got A Deal For You!

25 Friday Nov 2016

Posted by Celia C. Elwell, RP in Emails, Law Office Management, Legal Technology, Technology

≈ Comments Off on Email Spam or Have I Got A Deal For You!

Tags

Emails, Jim Calloway, Jim Calloway's Law Practice Tips Blog, Spam

The Holidays Bring More Email Threats, by Jim Calloway, Jim Calloway’s Law Practice Tips Blog

http://www.lawpracticetipsblog.com/2016/11/holidays-bring-email-threats.html

I may be the luckiest person in the world. I receive emails almost daily from people I do not know who want to give me money. I’ve won the lottery or I’m offered a fantastic job as a “mystery shopper.” And, boy, do I win a lot of stuff! Of course, none of this is true.

On the flip side, the tone may be more menacing. Emails from banks and credit cards saying they need me to respond to address a delinquent account or that someone has used my account. I do not have accounts with these folks.

Even with my firewall and my attempts to avoid viruses, Trojan horses, and other attacks on my computer, bogus emails and spam walk right in. I block these emails, mark them as “junk,” and they still come. I suspect many of you get the same things.

Make no mistake. You and I are targets. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Litgation Hold – Too Little Too Late.

25 Thursday Feb 2016

Posted by Celia C. Elwell, RP in Cell Phones, Discovery, E-Discovery, Emails, Emails, Legal Technology, Litigation Hold, Municipal Law, Open Records Act, Preservation, Requests for Production, Sanctions

≈ Comments Off on Litgation Hold – Too Little Too Late.

Tags

Doug Law, E-Discovery, eDiscovery daily Blog, Emails, Litigation Hold, Police, Sanctions, Text Messages

Our Nation’s Largest City is Not Immune to eDiscovery Sanctions: eDiscovery Case Law, by Doug Law, eDiscovery daily Blog

http://bit.ly/1Rqmnc0

In Stinson v. City of New York, 10 Civ. 4228 (RWS) (S.D.N.Y. Jan. 2, 2016), New York District Judge Robert W. Sweet granted in part and denied in part the plaintiffs’ motion seeking sanctions for spoliation of evidence against the defendants for failure to issue a litigation hold, opting for a permissive inference rather than a mandatory adverse inference sanction against the defendants .

Case Background

In this civil rights class action against the City of New York, it was determined that the City did not issue any litigation hold until August 8, 2013, more than three years after the filing of the Complaint in this case and the litigation hold was not effectively communicated, and none of the officers who were named in the City’s initial disclosures acknowledged receiving it. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Defendant Ordered by Court to Produce Gap-Period Emails on Backup Tapes.

04 Sunday Oct 2015

Posted by Celia C. Elwell, RP in Admissibility, Discovery, E-Discovery, Emails, Emails, Evidence, Federal Rules of Discovery, Forensic Evidence, Gap-Period Emails, Legal Technology, Motion to Compel, Relevance, Requests for Production

≈ Comments Off on Defendant Ordered by Court to Produce Gap-Period Emails on Backup Tapes.

Tags

Backup Tapes, Doug Austin, E-Discovery, eDiscoveryDaily Blog, Gap-Period Emails, Zubulake

Defendant Compelled to Restore and Produce Emails from Backup Tapes: eDiscovery Case Law, by Doug Austin, eDiscoveryDaily Blog

In United States ex rel Guardiola v. Renown Health, No. 3:12-cv-00295-LRH-VPC, (D. Nev. Aug. 25, 2015), Nevada Magistrate Judge Valerie P. Cooke concluded that emails contained on backup tapes held by the defendants was not reasonably inaccessible due to undue cost and, even if the emails were reasonably inaccessible due to undue burden or undue cost, ‘good cause supports their discoverability.’ . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Want To Switch From iPhone to Android But Afraid of Losing Your Data? No Problem!

16 Wednesday Sep 2015

Posted by Celia C. Elwell, RP in Android Phones, Apple, Apps, Cell Phones, Clouds, Emails, iPhones, Legal Technology, Mac

≈ Comments Off on Want To Switch From iPhone to Android But Afraid of Losing Your Data? No Problem!

Tags

Android, Apple, Apps, Bookmarks, Calendar, Contacts, iOS, PC World, Photos, Ryan Whitwan

How To Switch From iPhone To Android And Keep All Your Stuff, by Ryan Whitwan, PC World

http://tinyurl.com/o8p3b28

So you’ve grown tired of Apple’s walled garden of apps and the iron grip it maintains over the iOS platform. Well, the freedom of Android welcomes you with open arms, but don’t forget to bring your data along for the ride!

Apple doesn’t make it particularly easy to move your data from iOS to Android—it’s more interested in moving people in the other direction. Still, with just a few tools and some patience, you can be up and running on Android without missing a beat. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

App Resources – Save Time and Plug In!

27 Thursday Aug 2015

Posted by Celia C. Elwell, RP in Apple, Apps, Cell Phones, Emails, iPhones, Law Office Management, Legal Technology, Time Management

≈ Comments Off on App Resources – Save Time and Plug In!

Tags

Belle Beth Cooper, Buffer Blog, iOS Apps, Law Office Management, Legal Technology, RSS, Shawn J. Roberts, Social media

The Beginner’s Guide to Putting the Internet to Work for You: How to Easily Save 60 Minutes Every Day, by Belle Beth Cooper, Buffer Blog (with hat tip to Shawn J. Roberts)

http://tinyurl.com/ncu683v

So many great ideas and useful apps, even if you are not tech savvy. This is stuff you can, and should, use right now. -CCE

One of the most fun and useful things I’ve been doing lately is automating small processes I do all the time. It took me a while to work up the courage to dive into automation, as it always seemed like a really difficult, technical thing to do, which should be left to programmers.

Luckily, there are lots of tools being created lately to make automation easier for those of us without a solid understanding of how our computers really work. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

How To Avoid The Emails We Wish We Had Never Sent.

25 Saturday Jul 2015

Posted by Celia C. Elwell, RP in Emails, Law Office Management, Legal Technology, Technology

≈ Comments Off on How To Avoid The Emails We Wish We Had Never Sent.

Tags

Email, James B. Levy, Legal Skills Prof Blog, Legal Tips & Technology

Tech Tip Of The Day: Add A Two Minute Delay To Sending Emails, by James B. Levy, Legal Skills Prof Blog 

http://tinyurl.com/oub7e74

This is a great tech tip from the Harvard Business Review blog that most of us should probably implement. It involves programming your email account to wait two minutes before each message is sent. It’s a great fail safe measure to prevent those emails we regret as soon as they’re sent and the typos (and omitted attachments) we don’t catch until it’s too late. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Regret Hitting Send or Hitting It Too Quickly? Finally, A Way To “Undo Send” In Gmail.

05 Sunday Jul 2015

Posted by Celia C. Elwell, RP in Emails, Legal Technology

≈ Comments Off on Regret Hitting Send or Hitting It Too Quickly? Finally, A Way To “Undo Send” In Gmail.

Tags

cloudnine™, Doug Austin, eDiscoverydaily, Email, Gmail, Legal Technology

Think Before You Hit Send (Unless You’re On Gmail and are Really Fast): eDiscovery Trends. by Doug Austin, eDiscoverydaily, powered by cloudnine™

http://tinyurl.com/q8hmrvu

Let’s face it, people make mistakes. However, a new feature from Google may help people who make those mistakes avoid the consequences – if they’re quick to address them.

As covered on Fortune.com (Gmail now officially lets you ‘Undo Send’ those really embarrassing e-mails, by Kia Kokalitcheva), Gmail, Google’s e-mail service, has officially added its ‘Undo Send’ feature to the Web-based version of the service. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Don’t Have A PIN Lock On Your Phone? Hope Your Malpractice Insurance Is Up To Date.

16 Monday Feb 2015

Posted by Celia C. Elwell, RP in Android Phones, Attorney Discipline, Blackberry Phones, Cell Phones, Confidentiality, Cybersecurity, E-Filing, Emails, iPad, iPhones, Law Office Management, Legal Ethics, Legal Technology, Malpractice, Office Procedures, Passwords, Rules of Professional Responsibility, Supervising Support Staff, Technology, Technology

≈ Comments Off on Don’t Have A PIN Lock On Your Phone? Hope Your Malpractice Insurance Is Up To Date.

Tags

Android Phones, Confidentiality, Cybersecurity, DARKReading, Ed Hansberry, InformationWeek©, iPhones, Legal Ethics, Malpractice, PIN Lock, Smart Phones

Most Consumers Don’t Lock Mobile Phone Via PIN, by Ed Hansberry, DARKReading, InformationWeek©

http://tinyurl.com/plw76ut

My guess is that most people who use a smart phone access some kind of confidential information, such as your bank account or conversations with a client or the office. If you do not have a PIN lock on your smart phone, this truly is special kind of stupid.

This is not a hard one to understand. If you use your cell phone to communicate with clients, sync your phone to your office computer and docket, or attach yourself to your office and confidential information – without taking simple, basic security measures – you are  inviting a dangerous breach of confidentiality. -CCE

44% of respondents say it’s too much of a hassle, new survey reports.

People put a lot of sensitive info on their phones, but they often give little though to how secure their data is. In a survey by a security company, over half of the respondents said they didn’t bother with a PIN lock. This takes on a whole new dimension when you begin to understand how many of these people keep corporate data on the device.

Losing an unlocked phone can be far worse than losing a wallet. Emails on the device alone can reveal a wealth of information about the person, including where they bank, where they live, names of family members, and more. If company email is on the device, and it often is, there can be competitive information, salaries, system passwords, etc. If any of those emails contain links, often clicking on it will take you into the website, be it Facebook or a corporate portal.

According to Confident Technologies, 65% of users have corporate data on their phone, even though only 10% actually have a corporate issued device.

For that majority that don’t lock their phone at all, 44% said it is too much of a hassle to lock it and 30% said they weren’t worried about security. These are likely the same people that store things like social security numbers, passwords, and other sensitive information in text files or basic note applications. They may even store their computer’s password on a Post-It Note in their center desk drawer. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Do-It-Yourself E-Discovery? Is There Such A Thing?

08 Sunday Feb 2015

Posted by Celia C. Elwell, RP in Concept Search Tools, Discovery, Document Review, E-Discovery, Emails, Federal Rules of Discovery, Legal Technology, Microsoft Office, Native Format, Outlook, Preservation, Requests for Production, Rule 34

≈ Comments Off on Do-It-Yourself E-Discovery? Is There Such A Thing?

Tags

Ball In Your Court Blog, Computer Forensics, Craig Ball, Discovery, E-Discovery, E-Mail, Evidence, Native Format, PST Files

Do-It-Yourself Digital Discovery, Revisited, by Craig Ball, Ball In Your Court Blog

http://tinyurl.com/ol2urvf

In case you have not noticed, Craig Ball is re-posting older articles, as he explains below. Truly folks, when it comes to e-discovery, when Craig Ball speaks, I listen. Maybe you should too. 

I have posted many of his revisited posts. To find them all, visit his blog, Ball In Your Court at https://ballinyourcourt.wordpress.com/. -CCE

This is the thirteenth in a series revisiting Ball in Your Court columns and posts from the primordial past of e-discovery–updating and critiquing in places, and hopefully restarting a few conversations.  As always, your comments are gratefully solicited.

Do-It-Yourself Digital Discovery [Originally published in Law Technology News, May 2006]

Recently, a West Texas firm received a dozen Microsoft Outlook PST files from a client. Like the dog that caught the car, they weren’t sure what to do next.  Even out on the prairie, they’d heard of online hosting and e-mail analytics, but worried about the cost. They wondered: Did they really need an e-discovery vendor? Couldn’t they just do it themselves?

As a computer forensic examiner, I blanch at the thought of lawyers harvesting data and processing e-mail in native formats. ‘Guard the chain of custody,’ I want to warn. ’Don’t mess up the metadata! Leave this stuff to the experts!’ But the trial lawyer in me wonders how a solo/small firm practitioner in a run-of-the-mill case is supposed to tell a client, ‘Sorry, the courts are closed to you because you can’t afford e-discovery experts.’

Most evidence today is electronic, so curtailing discovery of electronic evidence isn’t an option, and trying to stick with paper is a dead end. We’ve got to deal with electronic evidence in small cases, too. Sometimes, that means doing it yourself.

As a computer forensic examiner, I blanch at the thought of lawyers harvesting data and processing e-mail in native formats. ‘Guard the chain of custody,’ I want to warn. ‘Don’t mess up the metadata! Leave this stuff to the experts!’ But the trial lawyer in me wonders how a solo/small firm practitioner in a run-of-the-mill case is supposed to tell a client, ‘Sorry, the courts are closed to you because you can’t afford e-discovery experts.’

Most evidence today is electronic, so curtailing discovery of electronic evidence isn’t an option, and trying to stick with paper is a dead end. We’ve got to deal with electronic evidence in small cases, too. Sometimes, that means doing it yourself.

The West Texas lawyers sought a way to access and search the Outlook e-mail and attachments in the PSTs. It had to be quick and easy. It had to protect the integrity of the evidence. And it had to be cheap. They wanted what many lawyers will come to see they need: the tools and techniques to stay in touch with the evidence in smaller cases without working through vendors and experts.

What’s a PST?

Microsoft Outlook is the most popular business e-mail and calendaring client, but don’t confuse Outlook with Outlook Express, a simpler application bundled with Windows. Outlook Express stores messages in plain text, by folder name, in files with the extension .DBX. Outlook stores local message data, attachments, folder structure and other information in an encrypted, often-massive database file with the extension .PST. Because the PST file structure is complex, proprietary and poorly documented, some programs have trouble interpreting PSTs.

What About Outlook?

Couldn’t they just load the files in Outlook and search? Many do just that, but there are compelling reasons why Outlook is the wrong choice for an electronic discovery search and review tool, foremost among them being that it doesn’t protect the integrity of the evidence. Outlook changes PST files. Further, Outlook searches are slow, don’t include attachments (but see my concluding comments below) and can’t be run across multiple mail accounts. . . . .

.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Email Etiquette.

24 Saturday Jan 2015

Posted by Celia C. Elwell, RP in Emails, Legal Technology

≈ Comments Off on Email Etiquette.

Tags

Email Etiquette, Judge Gerald Lebowitz, Legal Prof Skills Blog, Louis J. Sirico Jr.

Advice on Email Etiquette, by Louis J. Sirico, Jr., Legal Skills Prof, Legal Skills, Legal Skills Prof Blog

http://tinyurl.com/ksgmsd7

If you are looking for a short article for your students on email etiquette, you might consider “Email Netiquette for Lawyers,” republished in “Senior Lawyer” by the New York State Bar Association (here). Judge Gerald Lebowitz offers sensible and sound advice that should help the reader use email effectively and avoid pitfalls.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Is Email Between You And Your Client Safe? No, And This Is Why.

01 Monday Dec 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Blackberry Phones, Clouds, Confidentiality, Emails, Encryption, iPad, iPhones, Legal Ethics, Legal Technology, Malpractice, PC Computers, Technology

≈ Comments Off on Is Email Between You And Your Client Safe? No, And This Is Why.

Tags

ABA Legal Ethics Opinion, Allen Mihecoby, Email, Encryption, Gmail, Hacking, Internet, Lawyerist Blog, Lisa Needham

How to Encrypt Attorney-Client Communications, by Lisa Needham, Lawyerist Blog (with hat tip to Allen Mihecoby, CLAS, RP!)

http://tinyurl.com/kfrpqz3

If you have decided you need to get serious about client data protection, you will need to consider encrypting both your data and your communications. We have previously covered how to encrypt your data and will focus here on how to encrypt your email communication.

What Is Encryption?

Simply by using the Internet, you are probably using some sort of encryption scheme during some activities, whether you know it or not.

Encryption is simply the act of turning your data into unreadable gibberish. If your data is intercepted or hacked, the thief now has nothing but a pile of garbage.

End-to-end encryption is a must for transferring sensitive data across the internet. In end-to-end encryption, your data is encrypted while it travels towards your intended location and the same encryption occurs on the reverse trip. Your bank (hopefully) uses end-to-end encryption. Your practice management software (hopefully) uses end-to-end encryption if it stores and syncs data remotely. This sort of encryption is done for you without any effort on your part, as it is just a standard feature of the infrastructure you are using to bank or update client data or similar activities.

Why Do You Need to Care?

A few years ago, the ABA issued a formal ethics opinion stating that if there is a significant risk that a third party might gain access to the email, attorneys have to warn clients about that risk.

This poses a problem, because unlike your bank and practice management software, email is usually unencrypted. This is true whether you are using a desktop client or a web-based email like GMail. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Do You Ever CC Clients On Emails? Here’s Why You Shouldn’t.

28 Friday Nov 2014

Posted by Celia C. Elwell, RP in Confidentiality, Emails, Law Office Management, Legal Ethics, Legal Technology, Malpractice, Office Procedures, Rules of Professional Responsibility

≈ Comments Off on Do You Ever CC Clients On Emails? Here’s Why You Shouldn’t.

Tags

Client Confidentality, Email Address, Emails, Lawyerist Blog, Legal Ethics, Rules of Professional Responsibility, Sam Glover

Don’t CC Clients on Emails, by Sam Glover, Lawyerist Blog

http://tinyurl.com/mrm3ucz

This one seems like a no-brainer, but I suspect many lawyers and paralegals alike have not realized the danger in this practice. -CCE

As a general rule, you should not CC your clients on emails.

First, because it gives every other recipient a chance to communicate directly with your client. In fact, it looks like an invitation to do so. Opposing counsel should know better, but even they might use Reply All accidentally, accidentally-on-purpose, or maybe even intending — albeit misguidedly — to be helpful.

In the case of recipients who are not bound by the rules of professional responsibility, you can hardly be surprised if they take the inclusion of your client’s email address as an invitation to keep them in the conversation or communicate with them directly. And remember that the recipient might forward your email, giving anyone not already included the chance to do so. This could be harmless if your email is related to a friendly business transaction. It could also be disastrous.

Don’t forget that clients can make mistakes, too. Even if you BCC your client to avoid the above problems, it could be your client who uses Reply All.

Second, part of your job is to counsel your client, which is difficult to do without providing at least a sentence or two of summary or context or explanation. If all you do is CC your client on every email (or forward every email with little more than “FYI”), you are missing a chance to do your job.

The better practice is usually to wait until the end of the discussion (or at least a decision point), so you can bring your client up to speed with a brief summary, some context, your analysis, the options you need to discuss, etc. Go ahead and include all the back-and-forth if you like, but don’t just hand it off. It is safe to assume given the fact of your representation that your client wants you to use your legal acumen to help them understand what is going on.

So don’t CC your client. There are certainly some exceptions to this ‘rule,’ or times when it doesn’t really matter. But at a minimum you should think twice before adding your client to the CC or BCC field of an email you are about to send.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

iPhone Candy Courtesy of iPhone J.D. Blog’s Sixth Anniversary!

19 Wednesday Nov 2014

Posted by Celia C. Elwell, RP in Apple, Apps, Clouds, Emails, iPad, iPhones, Legal Technology, Microsoft Office, Tablets, Word

≈ Comments Off on iPhone Candy Courtesy of iPhone J.D. Blog’s Sixth Anniversary!

Tags

Apps, GoodReader 4, iCloud, iPad, iPhone, iPhone J.D. Blog, iPin, Jeff Richardson, Powerocks Super Magicstick, Reader 7

Six Years Of iPhone J.D., by Jeff Richardson, iPhone J.D. Blog

http://tinyurl.com/oc2ptjb

Congratulations and thanks to Jeff Richardson for six years of iPhone J.D. Blog. As usual, Jeff shares a sweet collection of apps in honor of his yearly anniversary. Thank you, Jeff! -CCE

iPhone J.D. turns six years old this week.  Seems like it was just yesterday that I wrote the first post on iPhone J.D., explaining why I found the iPhone a valuable tool in a law practice.  Back then, almost no attorneys used iPhones (about 5% according to a 2008 Am Law Tech Survey), but now the majority of attorneys in the U.S. use an iPhone (around 60% according to the ABA).

Over the past six years, I’ve written over 1,200 posts on iPhone J.D., including reviews of over 300 apps, reviews of every major iOS device released by Apple (from the iPhone 3GS to the new iPhone 6 and all models of the iPad) and reviews of over 300 accessories.  I’ve also tried to provide lots of tips and tricks for getting the most out of your iPhone and iPad, and discussed all of the tech news that I think that you might want to know about if you use an iPhone or iPad.

Through the years, I’ve gotten tons of great feedback from iPhone J.D. readers, ranging from emails to over 2,500 comments on the site, and I’ve been honored to share guests posts by attorneys from around the world who use iPhones and iPads in their law practice.  Site traffic has grown steadily every year, and in just a few days, one of you is going to load iPhone J.D. and it will be the 5 millionth page view since the site launched.

Popular posts this year.  It’s a tradition on iPhone J.D.’s anniversary (1, 2, 3, 4, 5) to identify the most popular posts from the prior 12 months.  Perhaps it reveals something about the topics that iPhone and iPad owners have been thinking about lately.  Here are the ten most viewed posts published in the last year . . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Wait! Don’t Click On That Link!

16 Tuesday Sep 2014

Posted by Celia C. Elwell, RP in Computer Virus, Cybersecurity, Emails, Legal Technology, Malware, Trojans

≈ Comments Off on Wait! Don’t Click On That Link!

Tags

Email, Ian Paul, Mail Merge, Malware, PC World, Spam

Three Warning Signs That Email Is Malicious, by Ian Paul, PC World

http://tinyurl.com/lsjgxv7

Email spam filtering is far better than it used to be. There was a time when nearly every scam email would land in your inbox. Thankfully that’s not the case anymore—especially if you’re a Gmail user.

But no system is perfect. Every now and then a scam message will manage to slip into your inbox. But how do you know when you’re looking at a scam or not?

Here are three basic tip-offs you can look for to figure out whether you’re looking at an email with dishonest intentions. They’re hardly an exhaustive list, but more often than not one of these tips will save you from getting suckered. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Government Can Access Individual’s Gmail Account In Money Laundering Probe.

27 Sunday Jul 2014

Posted by Celia C. Elwell, RP in Android Phones, Appellate Law, Apple, Blackberry Phones, Cell Phones, Computer Forensics, Crime Scene Investigation, Criminal Law, Cybersecurity, Discovery, E-Discovery, Emails, Evidence, Experts, Forensic Evidence, Forensic Evidence, Forensic Expert Witness, Fourth Amendment - Search & Seizure, Google, Internet, iPad, iPhones, Legal Technology, Mac, PC Computers, Privacy, Search Warrants, Tablets, Trial Tips and Techniques, U.S. District Court for the District of Columbia, U.S. District Court for the Southern District of New York

≈ Comments Off on Government Can Access Individual’s Gmail Account In Money Laundering Probe.

Tags

Computers, Email, Evidence, Forensic Experts, Gmail, Google, Hard Drives, Magistrate Judge Gabriel W. Gorenstein, Money Laundering, Search & Seizure, Warrants

Federal Judge Rules Gmail Account Can Be Accessed For Investigation, by evanino in Evanino Blog

http://www.evanino.com/federal-judge-rules-gmail-account-can-accessed-investigation/

In a landmark ruling that might fuel a nationwide debate, the New York Court issued a warrant against Google, giving access to user emails.

A New York Court issued a warrant against Google Inc ruling that the government can access all mails of a Gmail account of an individual under a money laundering probe. The judge said that courts have long been waiting for law enforcement to take the required documents in the custody if it is within the purview of the warrant.

Contrary to previous rulings

This decision is not in line with the previous court rulings including courts in the Districts of Columbia and Kansas, Magistrate Judge Gabriel W. Gorenstein of the U.S. District Court for the Southern District of New York noted on Friday. Also, this latest ruling will spark a debate over the privacy, in the country, according to Computer World.

A District of Columbia judge denied from revealing the entire content of the email as this will seize a large amount of emails for which the authorities have not given any reason.

The Court in Kansas, also, did not rule in favor of a similar warrant, stating that it failed to ‘limit the universe of electronic communications and information to be turned over to the government to the specific crimes being investigated.’

However, the New York Court ruled in favor of such warrant, allowing authorities to take into account the emails and other information from a Google inc’s Gmail account, including the address book and draft mails, and also the authority to search the emails for certain specific categories of evidence.

Experts must scan emails, not Google employee

Judge Gorenstein argued that it is not possible to search the hard-disk drives of computers and other storage devices on the spot due to the complexities of electronic searches. Thus, the authorities can seize such storage.

‘We perceive no constitutionally significant difference between the searches of hard drives just discussed and searches of email accounts,’ the judge wrote. He added that in most of the cases data in an email account will be less ‘expansive’ compared to the information contained in the hard drive.

Judge Gorenstein stated that Google employees are not expert enough to know the importance of particular emails without having been given proper training in the substance of the investigation. Judge said this in response to an opinion by the District of Columbia court that gave the government the option of getting the email scanned by the host itself.

He said that an agent, who is completely absorbed in the investigation, will be able to understand the importance of a particular language in emails contrary to the employee.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Is It Time For A “Bring Your Own Device” Policy for Your Law Office?

01 Tuesday Jul 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Blackberry Phones, Cell Phones, Clouds, Computer Forensics, Confidentiality, Cybersecurity, Disaster Preparedness, Emails, Encryption, Google, Intellectual Property, iPad, iPhones, Law Office Management, Legal Blogs, Legal Ethics, Legal Technology, Mac, Management, Marketing, Passwords, PC Computers, Social Media, Supervising Support Staff, Tablets, Technology, Using Social Media

≈ Comments Off on Is It Time For A “Bring Your Own Device” Policy for Your Law Office?

Tags

Apple, Blackberry Phone, Cell Phones, Confidentiality, Curo Legal Blog, Cybersecurity, iPads, iPhones, Legal Ethics, Mobile Device Policy, Passwords, Tablets, Will Harrelson

Mobile Device Security for Lawyers: How Solos and Small Firms can Ethically Allow Bring Your Own Device, by Will Harrelson, Curo Legal Blog (with hat tip to Jeff Richardson, iPhone J.D. Blog!)

http://tinyurl.com/lrrnp7g

The Start of Bring Your Own Device Policies

It really is the iPhone’s fault. Yes, Apple is to blame for designing the most desirable piece of technology of the last decade. So desirable, in fact, that employees of all stripes requested (and, often, begged) their IT departments to toss the increasingly-‘corporate’ Blackberry out the window and allow the use of their personal iPhones for corporate emails and calls. As a result, we have been living in the age of ‘Bring Your Own Device’ where employees use a single personal mobile phone (or tablet) for both their personal email, texting, and social media while also using it for work email, word processing, and other enterprise applications.

Before the Bring Your Own Device era, a company’s greatest out-of-office security concern was an employee who left a briefcase in a taxi. Today, the worry is an employee misplacing a device the size of wallet containing almost limitless amounts of data that criminals or hackers would easily and quickly exploit if given the chance. Clearly, there is an obvious financial motivation for all businesses to protect their own or customer’s sensitive data.

However, lawyers face particular ethical consequences if they fail to take reasonable efforts to either investigate the technologies that they implement or protect their client’s confidential information. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Why Defendant Former Employers Do Not Get Mirror-Image of Plaintiff’s Personal Computer.

30 Monday Jun 2014

Posted by Celia C. Elwell, RP in Computer Forensics, Discovery, E-Discovery, Emails, Employment Law, Evidence, Forensic Evidence, Law Office Management, Legal Technology, Requests for Production, Technology

≈ Comments Off on Why Defendant Former Employers Do Not Get Mirror-Image of Plaintiff’s Personal Computer.

Tags

Bow Tie Law’s Blog, Computer Forensics, Discovery, Employment Litigation, ESI, Joshua Gilliland, Judge James G. Welsh, Proportionality

Proportionality Prevents Mirror Imaging of Family Computers, by Joshua Gilliland, Bow Tie Law’s Blog

http://tinyurl.com/osvw3ws

The Defendants in employment litigation sought the mirror imaging of the Plaintiff’s personal computers three years after she had been terminated. The crux of the eDiscovery centered on the former employee forwarding emails from her supervisors email to her personal account, which the Defendants claimed were lost by the Plaintiff. The Court denied the motion to compel. Downs v. Va. Health Sys., 2014 U.S. Dist. LEXIS 74415, 6-11 (W.D. Va. June 2, 2014).

Judge James G. Welsh did a very nice job of summarizing ESI relevant to a case,proportionality, and the rules for conducting forensic analysis on an opposing party’s hard drive. The Court held the following:

(1) Nothing in the record suggests any willful failure, fault or bad faith by the plaintiff on her discovery obligations that would justify the requested computer forensics examination;

(2) The “mirror-imaging” of the plaintiff’s family computers three years after her termination raises significant issues of confidentiality and privacy;

(3) There was no duty on the part of the plaintiff to preserve her family computers as evidence;

(4) Principles of proportionality direct that the requested discovery is not sufficiently important to warrant the potential burden or expense in this case; and

(5) On the current record that the defendants have failed to justify a broad, and frankly drastic, forensic computer examination of the plaintiff’s two family computers.

Downs, at *9-10, referencing McCurdy Group v. Am. Biomedical Group, Inc., 9 Fed. Appx. 822, 831 (10th Cir. 2001); see also Basile Baumann Prost Cole & Assocs., Inc. v. BBP & Assocs. LLC, 2013 U.S. Dist. LEXIS 51264, *8 (D. Md. Apr. 9, 2013). . . .

 

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

IRS Says It Did Not Back Up Email, But Relied on Employees To Archive Email On Personal Computers.

17 Tuesday Jun 2014

Posted by Celia C. Elwell, RP in Depositions, E-Discovery, Emails, Government, Internal Revenue Service, Legal Technology, Litigation Hold, Microsoft Office, Outlook, PC Computers, Preservation, Requests for Production

≈ Comments Off on IRS Says It Did Not Back Up Email, But Relied on Employees To Archive Email On Personal Computers.

Tags

Computer Backups, Computer Crash, Disaster Preparedness, Emails, Evidence, IRS, Lois Lerner, Outlook, POLITICOPro, Rachel Bade, Ways and Means

GOP: IRS Lost More Emails In Tea Party Affair, by Rachel Bade with contributions by Josh Gerstein and Brian Faler, POLITICOPro

http://tinyurl.com/k9ycgz6

This did not catch my eye because of the politics or that the involved party is the IRS. I was simply in awe that anyone in this day and age of litigation holds and e-discovery could – with a straight face – claim to have irretrievably lost so much computer data.  -CCE

Republicans on Tuesday charged that the IRS has lost emails of a half dozen of its employees involved in the tea party targeting controversy, including a top aide to the now-fired acting IRS commissioner.

In addition to losing two years’ worth of emails sent and received by Lois Lerner, the central figure in the scandal, the IRS ‘cannot produce records from six other IRS employees involved in the targeting of conservative groups,’ Ways and Means Republicans said in a release.

* * *

Ways and Means does not say how the emails went missing or what time specific time periods are involved, though they say it includes the period at issue. In the case of Lerner, for example, her archived emails between 2009 and 2011 were washed away in a 2011 computer crash, the agency says.

* * *

The IRS says that at the time they did not keep records of or back up all emails. Rather, they relied on employees to archive them on their personal computers after they ran out of storage space in their Outlook inboxes. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

When You Share Files, Are They Secure?

31 Saturday May 2014

Posted by Celia C. Elwell, RP in Clouds, Confidentiality, Cybersecurity, Dropbox, Emails, Encryption, Legal Ethics, Legal Technology, Technology

≈ 2 Comments

Tags

Attorney-Client Privilege, Computer Security, Confidentiality, Dropbox, Email, File Sharing, Legal Ethics, Robert Ambrogi's Law Sites

File Sharing by Lawyers Largely Insecure, Survey Suggests, by Robert Ambrogi, Robert Ambrogi’s Law Sites

http://tinyurl.com/pr3apcc

If I were to leave a document on a table entitled, ‘My Deepest, Darkest Secrets,’ under which I wrote, ‘Please do not read this unless you are someone I intended to read this,’ how securely would you think I’d protected myself?

That, effectively, is all the majority of lawyers do to protect confidential documents they share with clients and colleagues, according to a LexisNexis survey published this week. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Mailtracker – A New iPhone App That Monitors Email Analytics.

28 Wednesday May 2014

Posted by Celia C. Elwell, RP in Apple, Apps, Cell Phones, Emails, iPhones, Law Office Management, Legal Technology, Link Rot

≈ Comments Off on Mailtracker – A New iPhone App That Monitors Email Analytics.

Tags

App, Email Management, Gmail, iCloud, iPhones, Legal Productivity Blog, Mailtracker, Outlook, Yahoo

App of the Week: Mailtracker – See When and Where Your Email Was Read, by Lisa Pansini, Legal Productivity Blog

http://tinyurl.com/nwctft6

‘Hey, did you get that email that I sent you?’

With the Mailtracker app from Answerbook, you’ll never have to utter those words again.

It’s not a mail client in itself, but rather a tracking application for monitoring email analytics. It integrates with the native mail app on your iPhone, so it doesn’t impede your current email sending/receiving workflow. The service is compatible with emails sent via Gmail, Yahoo, Outlook.com and iCloud (with additional account support on the way!).

The Mailtracker app will deliver real-time analytics directly to your phone. You’ll be notified as soon as an email had been read. You can also see how many times the email was viewed, how much time was spent reading the email, the recipient’s location information, and device details. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

A Double Treat – Two-Part Posts On Cybersecurity and Outsourcing From Ralph Losey.

19 Monday May 2014

Posted by Celia C. Elwell, RP in Computer Fraud and Abuse Act, Computer Virus, Confidentiality, Document Retention, Emails, Encryption, Heartbleed, Law Office Management, Legal Ethics, Legal Technology, Malpractice, Malware, Technology, Technology, Trojans

≈ Comments Off on A Double Treat – Two-Part Posts On Cybersecurity and Outsourcing From Ralph Losey.

Tags

Cybersecurity, Data Breach, e-Discovery Team®, ESI, Legal Ethics, Legal Technology, Outsourcing, Ralph Losey

The Importance of Cybersecurity to the Legal Profession and Outsourcing as a Best Practice – Part One, by Ralph Losey, e-Discovery Team®

http://tinyurl.com/oalblet

and,

The Importance of Cybersecurity to the Legal Profession and Outsourcing as a Best Practice – Part Two, by Ralph Losey, e-Discovery Team®

http://tinyurl.com/mjek896

It is worth taking the time to read the Comments for both Part One and Part Two. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Craig Ball’s Lawyers’ Guide to Forms of Production.

19 Monday May 2014

Posted by Celia C. Elwell, RP in Adobe Acrobat, Authentication, Bates Numbers, Computer Forensics, Databases, Discovery, Document Review, E-Discovery, Emails, Evidence, Federal Judges, Federal Rules of Discovery, Federal Rules of Evidence, Forensic Evidence, Judges, Legal Forms, Legal Technology, Native Format

≈ Comments Off on Craig Ball’s Lawyers’ Guide to Forms of Production.

Tags

Adobe Acrobat, Ball in Your Court, Bates Numbering, Craig Ball, Databases, E-Discovery, E-Mail, ESI, Evidence, Lawyers' Guide to Forms of Production, Native Format, Redaction

A Guide to Forms of Production, by Craig Ball, Ball In Your Court Blog

http://ballinyourcourt.wordpress.com/2014/05/19/a-guide-to-forms-of-production/

Craig Ball’s Lawyers’ Guide to Forms of Production! Although Mr. Ball says there is much he wants to re-organize and rewrite, I can’t wait to dive in.  You will find the hyperlink to the Guide when you go to the web site. Thank you, Craig Ball! -CCE

Semiannually, I compile a primer on some key aspect of electronic discovery.  In the past, I’ve written on computer forensics, backup systems, metadata and databases. For 2014, I’ve completed the first draft of the Lawyers’ Guide to Forms of Production, intended to serve as a primer on making sensible and cost-effective specifications for production of electronically stored information.  It’s the culmination and re-purposing of much that I’ve written on forms heretofore, along with new material extolling the advantages of native and near-native forms.

Reviewing the latest draft, there is much I want to add and re-organize; accordingly, it will be a work-in-progress for months to come.  Consider it a “public comment” version.  The linked document includes exemplar verbiage for requests and model protocols for your adaption and adoption.  I plan to add more forms and examples. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...
← Older posts
Follow The Researching Paralegal on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Search

Sign In/Register

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Categories

Archives

  • March 2022
  • January 2022
  • November 2021
  • October 2021
  • January 2021
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • June 2020
  • May 2020
  • April 2020
  • January 2020
  • December 2019
  • October 2019
  • August 2019
  • July 2019
  • May 2019
  • March 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…
  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

  • Follow Following
    • The Researching Paralegal
    • Join 455 other followers
    • Already have a WordPress.com account? Log in now.
    • The Researching Paralegal
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.

    %d bloggers like this: