what reasons would a attorney want access to a plantiffs computer

by Robin Jaskolski V 5 min read

What does a lawyer need to know about mobile device law?

Feb 19, 2010 · The case of AdvantaCare Health Partners, L.P. v. Access IV, 2004 WL 1837997 (N.D. Cal. Aug. 17, 2004), is a good example of why it can be advantageous for a plaintiff to have a computer forensic expert. In that case, two employees resigned and began a competing business. The defendants were served with a TRO on the afternoon of October 6, 2003.

Do lawyers need to be competent in technology law?

Plaintiffs' attorneys typically take on corporations, insurance companies, hospitals, business interests and even governmental organizations. When a doctor amputates the wrong body part … When a nursing home resident is abused … When a family member is killed by a drunk driver … That’s when you need to talk to a plaintiff’s attorney.

What does a plaintiff attorney do?

Mar 30, 2010 · Because of the important public policy concerns underlying the attorney-client privilege, even a more clearly written company manual–that is, a policy that banned all personal computer use and provided unambiguous notice that an employer could retrieve and read an employee’s attorney-client communications, if accessed on a personal, password-protected e …

What can a lawyer learn from a digital device examination?

Apr 06, 2016 · The reason I love being a plaintiff’s lawyer is because without us, what legal recourse does the average person have? We protect the injured plaintiff’s Seventh Amendment right to a trial by jury. What these big corporations aren’t telling you about “greedy” plaintiff’s lawyers is that we assume all the risk.

Can a computer be subpoenaed?

Subpoenas could be issued against third parties – A cloud computing provider can be served with a subpoena to produce your company's data. Employees using their own devices – There can also be problems if employees work on personally owned computers and you receive an e-discovery request.

What do lawyers use computers for?

Increasingly, attorneys use computers and the Internet to obtain new clients. Many attorney websites provide valuable general information such as explanations of legal rights and the legal process. Some websites allow a potential client to directly email or chat with an attorney before scheduling a consultation.Dec 27, 2018

Are emails between lawyers discoverable?

Simply put, just telling a lawyer something, or copying a lawyer on an email, does not make the conversation or email privileged. Not all communications with an attorney are privileged from disclosure under the attorney-client privilege.Apr 23, 2018

What does discovery mean in a lawsuit?

To begin preparing for trial, both sides engage in discovery . This is the formal process of exchanging information between the parties about the witnesses and evidence they ll present at trial. Discovery enables the parties to know before the trial begins what evidence may be presented.Nov 28, 2021

What database do lawyers use?

LexisNexis and Westlaw LexisNexis (Reed Elsevier) and Westlaw (Thomson Reuters), the primary legal databases for conducting professional legal research, are largely out-of-reach for academics unaffiliated with a law school.

How are computers applied in law?

Having used a computer to be able to retrieve and keep track of legislation, it is also possible to use the computer to analyze the consistency of legislation. For example, it would be possible to use the computer to ensure that everywhere an idea is referred to in a bill, the same words are used to describe it.

What information is not privileged?

Non-Privileged Records . Means documents and records, whether hard copy or electronic, which are not subject to any legal privilege preventing its discovery and/or disclosure in a legal proceeding.

What happens if privileged information is voluntarily disclosed to a third party?

The attorney-client privilege protects confidential communications between an attorney and a client for the purpose of obtaining legal advice or services. ... Voluntary disclosure of privileged communications to a third party results in waiver of the attorney-client privilege unless an exception applies.

Is the existence of an attorney-client relationship privileged?

The attorney-client privilege is generally recognized as the oldest evidentiary privilege, and has been codified in California in one shape or another since 1851.

What are the three types of discovery?

That disclosure is accomplished through a methodical process called "discovery." Discovery takes three basic forms: written discovery, document production and depositions.Nov 29, 2018

What is exculpatory evidence?

Evidence, such as a statement, tending to excuse, justify, or absolve the alleged fault or guilt of a defendant.

What are the five major methods of discovery?

There are basically six types of discovery in family court: 1) interrogatories; 2) requests for production of documents and inspection 3) requests for admissions; 4) depositions; 5) subpoenas duces tecum; 6) physical and mental examinations.

How do I protect myself from a lawsuit?

You can defend yourself by filing an answer to the lawsuit in court. Special forms are used, which you can get from the court. To see if you have a legal defense, read the packet Legal Reasons Why I Should Not Have to Pay the Money.

How do I redact for attorney-client privilege?

In order for the attorney-client privilege to apply, an agency must demonstrate that: 1) the asserted holder of the privilege is or sought to become a client; 2) the person to whom the communication was made is a member of the bar of a court, or his subordinate; 3) the communication relates to a fact of which the ...Feb 22, 2019

What happens when a lawsuit is filed against you?

The judge will hear from you and the creditor . Then the judge will make a decision. If they decide you don't owe the money, they will dismiss the lawsuit. If they decide you do owe the money, they will enter a judgment against you.

Are communications between co counsel privileged?

In brief, the court ruled that the attorney-client privilege does not merely cover communications from an attorney directly to the client, but also conversations between attorneys who may be representing the client. ... There, the court noted that an attorney's thoughts, impressions, strategies are absolutely privileged.Jul 1, 2011

What assets are protected from a lawsuit?

Various investment accounts, such as individual retirement accounts (IRAs), carry a certain amount of protection in the interest of justice. Federal laws protect numerous retirement plans, but many states also offer asset protection trusts that safeguard homesteads, annuities, and life insurance.

How do you defend yourself against a lawyer?

Research the relevant law. In order to defend yourself in court, you must understand the legal claims or charges against you and prepare your legal defense. This requires that you research the law related to your case and strategize on how best to defend yourself based on the legal claims against you.

Under what circumstances can an attorney reveal information about the client that the attorney obtained during the representation of that client?

(a) A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent, the disclosure is impliedly authorized in order to carry out the representation or the disclosure is permitted by paragraph (b).

Are emails between lawyers discoverable?

Simply put, just telling a lawyer something, or copying a lawyer on an email, does not make the conversation or email privileged. Not all communications with an attorney are privileged from disclosure under the attorney-client privilege.Apr 23, 2018

Are emails between lawyers privileged?

When an attorney and the client discuss the client's case, the conversation between the attorney and client is attorney-client privileged, which means it is confidential. ... It becomes much more difficult when the conversation is via email. Emailed correspondence between attorney and client is privileged.Apr 28, 2021

How do you know if there is a lawsuit against you?

Visit the Court Clerk in your county of residence to find out if anyone has filed a lawsuit against you. The Court Clerk can conduct a record search to see if you have a pending lawsuit or judgment. ... For instance, if the judge ordered a wage garnishment or a lien against your property, the Court Clerk will let you know.

What is prima facie negligence?

The Legal Information Institute at Cornell Law School defines prima facie negligence in this way: “A failure to behave with the level of care that someone of ordinary prudence would have exercised under the same circumstances.May 22, 2021

What is discovery in a lawsuit?

To begin preparing for trial, both sides engage in discovery . This is the formal process of exchanging information between the parties about the witnesses and evidence they ll present at trial. Discovery enables the parties to know before the trial begins what evidence may be presented.Nov 28, 2021

Are conversations between attorneys privileged?

Evidence Code 954 is the California statute that makes communications between attorneys and their clients privileged and confidential. This evidentiary privilege goes hand-in-hand with the right to counsel under the Sixth Amendment to the U.S. Constitution. ...

What happens if privileged information is voluntarily disclosed to a third party?

The attorney-client privilege protects confidential communications between an attorney and a client for the purpose of obtaining legal advice or services. ... Voluntary disclosure of privileged communications to a third party results in waiver of the attorney-client privilege unless an exception applies.

Can a client have two lawyers?

Yes, one defendant can have multiple attorneys. It is important that the attorneys have a good working relationship and find a way to share the work in order to best benefit the client...Mar 17, 2012

What is a plaintiff's attorney?

A plaintiff’s attorney is a lawyer who represents individuals who have been harmed physically or financially. They fight for the rights of the “little guy” against the powerful. Plaintiffs' attorneys typically take on corporations, insurance companies, hospitals, business interests and even governmental organizations.

What are the damages of negligence?

These damages may include medical expenses, lost wages or income, pain and suffering and loss of enjoyment of life. These people did nothing to deserve the suffering they have endured.

What happens if you don't pay out of pocket?

The injured individual pays nothing upfront and nothing out of pocket. If there is no financial compensation in a case, the individual pays no attorney’s fees. This contingency fee arrangement gives average people access to the justice system.

How does Apple protect its devices?

Apple fortified the protections for its devices in 2014 by changing its design to prevent anyone from tapping into its device’s hardware—and thereby accessing protected data—without having a working passcode. Starting with the iPhone 5 model, Apple began using a program designed to automatically erase certain data after ten unsuccessful passcode attempts. Apple has resisted requests from law enforcement to turnover its “key” to allow access to its devices without a working passcode. Whether Apple can be forced by court order to unlock one of its devices was partially litigated in a criminal investigation involving the San Bernardino terrorists. 35 The FBI obtained an order from the federal district court in Riverside, California, directing Apple to help the FBI defeat the passcode requirement. When Apple fought back in court (and in the court of public opinion), the FBI said, in effect, “never mind” and canceled the hearing, after apparently identifying another way to defeat the passcode protection without triggering the auto-erase feature. 36 The move by mobile device manufacturers to develop more sophisticated software to protect data means fewer mobile devices will be readily subject to forensic examination, even as forensic examiners develop countermeasures to try to overcome these protections. 37 The “arms race” appears to squarely favor manufacturers at this point. Even with respect to criminal prosecutions involving terrorists, Congress does not appear ready to legislate a solution by giving law enforcement a permanent “back door” to such devices.

What percentage of Americans own a cell phone?

Ninety percent of American adults own a cell phone. 16 Sixty-four percent own a “smartphone.” 17 One study of consumer behavior reports that 85 percent of people say “mobile devices are a central part of their everyday life,” with consumers revealing they spend on average 3.3 hours per day using a mobile device. 18 According to another poll, “nearly three-quarters of smartphone users report being within five feet of their phones most of the time, with 12 percent admitting that they even use their phones in the shower.” 19 Americans use smartphones for text messages, internet use, voice/video calls, emails, social networking sites, video and music, with usage patterns differing somewhat by age. 20

When was the SCA enacted?

The SCA was enacted in 1986 before the advent of mobile digital devices, social networking sites, cloud computing, and other features of modern digital communication. Its application to current digital technology and storage infrastructure presents uncertainties and challenges to both lawyers and courts.

Can curiosity kill a cat?

If curiosity can kill a cat, it can certainly cause problems for lawyers and forensic investigators who are not attuned to the potential hazards. Lawyers have an ethical obligation to be competent in the matters they handle, including understanding technology involved in litigation.

What is forensic review?

Historically, forensic examiners would image and forensically review the contents of a single hard drive contained within a laptop or desktop computer. Today the data subject to forensic review can span multiple fixed devices, corporate networks, applications, and mobile devices.

Is it ethical to not preserve data?

A single failure to preserve data will not likely constitute an ethical violation that subjects an attorney to grievance committee action, 43 but such behavior can easily result in court-imposed sanctions based on the party’s spoliation of evidence (see, infra, C.4.) and the failure to request discovery of the opposing party’s digital devices likewise may not support a grievance action but could support a malpractice claim if the failure to request discovery falls below a competent lawyer’s standard of care. In other words, for a slew of reasons, every litigator must be sufficiently equipped to know what information is contained on, or accessed through, mobile devices, and be able to evaluate whether those digital files may have evidentiary value. Counsel must be attuned to preserve or request such evidence as part of actual or anticipated litigation. Preservation issues are especially pressing in the context of mobile devices. They not only have volatile data that may be overwritten in short order, 44 but also are routinely upgraded with new models—with the older phones often turned in to the carrier and wiped clean.

What is the first step in forensics?

The first step is to make an exact image of the digital information extant on the device—a virtual snapshot that leaves intact on the device the original data and metadata. The forensic examiner’s oath is to do no harm, to leave the device “as is” and only apply data extraction software to the forensic duplicate image—never to the original data.

What is the duty to notify CFAA in Wisconsin?

Section 134.98 (2) of the Wisconsin Statutes provides that when a company knows that personal information in its computer database has been obtained without authorization, the company must “make reasonable efforts to notify each subject of the personal information.” So, if a departing employee accesses client information without authorization under the CFAA , that action may trigger a duty to notify under Wisconsin law.

Can CFAA be pled as CFAA?

Indeed, at least in the Seventh Circuit, “most employee disloyalty cases can be pled as CFAA cases” – and vice versa – “because a disloyal employee has forfeited his right to access his employer’s computer.” 43 Depending on the facts, other claims may include, for example, misappropriation of trade secrets, 44 injury to business, 45 property damage caused by crime, 46 conversion, breach of fiduciary duty, breach of contract, and breach of the covenant of good faith and fair dealing. Wisconsin also has its own computer-crimes statute. 47

Is CFAA litigation slowing down?

CFAA litigation shows no signs of slowing down. Computers continue to proliferate and commerce continues to become more interconnected. Data collection, storage, and security technologies constantly evolve. The Seventh Circuit’s interpretation of operative statutory terms has extended the CFAA’s reach to a variety of situations, especially in the employment context. With that in mind, Wisconsin employers and employees should be aware of their respective rights and obligations under the CFAA. And whether advising on an employment matter or contemplating action against hackers, Wisconsin lawyers must be familiar with the CFAA and its intersection with analogous state law.

What is CFAA liability?

Liability under the CFAA often hinges on whether a person acted “without authorization” or “exceed [ed] authorized access.” 19 The statute defines exceeds authorized access to mean “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter [.]” 20 The CFAA, however, defines neither “access” nor “authorize.” Without explicit statutory guidance, the courts must decide what it means to act “without authorization.” This has led to an enormous volume of litigation and to multiple interpretations.

Do employees take proprietary data?

This scenario plays out all too often. One recent study found that more than half of all employees take with them proprietary data either knowingly or unwittingly when they leave a company. 1 This really should not be surprising, though, given the ubiquity of computers, smartphones, and tablets in the workplace, as well as the ever-greater frequency of job changes in the professional market.

What court case ruled that an employee's computer was authorized?

The Seventh Circuit Court of Appeals has adopted an agency-based approach in deciding whether an employee’s use of a computer was “authorized” within the meaning of the CFAA. In International Airport Centers v. Citrin, 21 International Airport Centers (IAC) provided a laptop to its employee, Jacob Citrin, for work purposes. Citrin decided to quit working for IAC and go into business for himself, in breach of his employment contract. Before returning IAC’s laptop, Citrin used secure-erasure software to permanently delete company data and evidence of improper conduct he had engaged in before he quit. 22 IAC sued Citrin, alleging claims under the CFAA.

Will the CFAA change?

Consistent with its history so far, the CFAA likely will change in the near future. The circuit split is ripe for U.S. Supreme Court review. Because the CFAA has the potential to affect such a large section of the population, there is a practical need for a uniform interpretation of “without authorization” and “exceeds authorized access.” In addition, at least one scholar believes that the entire CFAA could fall on constitutional void-for-vagueness grounds. 63

B. The Contours of Permissible Snooping: What Not to Do

  • The urge to spy—and the perils of doing so—play out frequently in cases of suspected marital infidelity where one spouse goes looking for evidence of the illicit relationship. These imploding marital cases, involving sometimes extraordinary efforts at espionage, help to define the contours of permissible snooping in other contexts. 1. Wife reads husband’s emails stored on the family h…
See more on americanbar.org

C. The Bonanza of Digital Data

  • 1. Sources and Types of Digital Data
    Ninety percent of American adults own a cell phone.16 Sixty-four percent own a “smartphone.”17 One study of consumer behavior reports that 85 percent of people say “mobile devices are a central part of their everyday life,” with consumers revealing they spend on average 3.3 hours pe…
  • 2. Digital Data from Mobile Devices – Relevance to Civil Litigation
    Smartphones and tablets produce a wide range of digital files that may be relevant to a civil lawsuit. The value of the evidence may run the gamut from modest to smoking gun. The evidence may come in the form of candid statements in emails (and attachments), Short Message Syste…
See more on americanbar.org

D. Primer on Digital Forensic Examination

  • 1. Digital Forensic Examination Explained
    What is digital forensics? Digital forensics is the process of uncovering and interpreting electronic data. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying, and validating the digital informa…
  • 2. The Basics of Forensic Examination
    The first step is to make an exact image of the digital information extant on the device—a virtual snapshot that leaves intact on the device the original data and metadata. The forensic examiner’s oath is to do no harm, to leave the device “as is” and only apply data extraction software to the f…
See more on americanbar.org

E. Ethical Considerations For Lawyers

  • 1. Ethics Rules
    A variety of ethics rules may be implicated by the forensic examination of a mobile device. As an initial matter, a lawyer’s competence will be called into question if he or she does not appreciate the possible evidentiary significance of digital files on mobile devices and does not act to preser…
  • 2. Competence in Mobile Device Discovery
    A single failure to preserve data will not likely constitute an ethical violation that subjects an attorney to grievance committee action,43 but such behavior can easily result in court-imposed sanctions based on the party’s spoliation of evidence (see, infra, C.4.) and the failure to request …
See more on americanbar.org

F. Legal Constraints For Forensic Examination

  • 2. Special Considerations for Collecting Data on Clouds Governed by European Data Privacy Laws
    The European Union has adopted a stringent data protection law that gives “data subjects” control over “processing” of their “personal data.”72The EU data privacy law is a model for modern data privacy legislation. If a lawyer or investigator in the United States seeks access to digital informa…
  • 3. State Wiretapping/Eavesdropping and Privacy Laws
    State laws also provide meaningful limitations on invasions of privacy whether through conventional wiretapping statutes or other laws that apply to the use of eBlaster and other spyware programs that have become popular among amateur sleuths.73It is beyond the scope …
See more on americanbar.org

G. The Scope of Authority to Search

  • After educating yourself on the salient facts, including who owns the subject digital device and what information you believe is stored on it or accessible through it, and securing consent to search—and only after familiarizing yourself with the ethical and legal standards described above—you should ask: “What is the scope of the authorization I possess to look or listen?” Just …
See more on americanbar.org

H. Establishing Legal Authority to Examine Device

  • 1. Ownership of Device Versus Ownership of Digital Files Stored on, or Accessible From, the Devi…
    Just because a lawful owner of a device consents to its forensic examination does not necessarily mean every digital file stored on the device is fair game to inspect—i.e., falls within the scope of the owner’s consent to search. For example, it is possible for a password-protected fil…
  • 2. Post-Mortem Considerations Generally
    Digital files owned by the decedent are considered part of the estate and subject to any provisions in the will. Many digital files have considerable financial value, including iTunes files, downloaded films, and purchased programs like Adobe Lightroom, Illustrator, and other expensive software. …
See more on americanbar.org

I. Case Study of Post-Mortem Forensic Examination

  • A non-party committed suicide and left behind both a smartphone and tablet. The items were physically in possession of the decedent’s surviving spouse. This personal property passed to the spouse through intestate succession, with full rights of ownership, use, and control residing in the spouse. The digital files on the mobile devices belonged to the spouse as a natural corollary of o…
See more on americanbar.org

J. Conclusion

  • Forensic examination of digital devices can be a high-risk, high-reward undertaking. The evidence collected, if admissible,85can be “game-changing.” We just don’t want it to be “career-ending.” Given the many privacy, ethics, and legal considerations that attach to such examinations, including state and federal laws designed to protect against wiretapping, computer abuse, spyin…
See more on americanbar.org

Endnotes

  • 1. Electronic Communications Privacy Act (ECPA) (Wiretap Act), 18 U.S.C. §§ 2510-2522 (2016), discussed infra, Section E(1)(a). 2. Stored Communications Act (SCA) 18 U.S.C. §§2701-2712 (2016), discussed infra, Section E(1)(b). 3. See infra, Section E(1)(c) “State Wiretapping, Eavesdropping and Privacy Laws”; see generally Alison G. Turoff, Spying Spouses and Their Hig…
See more on americanbar.org