Mobile devices such as iPhones, iPads, Android smartphones, and Blackberries have become indispensable for many attorneys. They allow users to e-mail, text, make phone calls, browse the web, access maps, and take photographs. They also often allow users to purchase “apps”—a type of computer program—that can be enormously useful to the practice of law, including apps that enable legal research, file sharing, document scanning, timekeeping, billing, and invoicing.
This helpful technology comes with some risks. Attorneys’ increased use of mobile devices can lead to increased concerns that confidential client information will be lost, stolen, or inadvertently disclosed. Consider the possibilities: a lost iPhone full of attorney-client e-mails and texts; a wireless iPad communication session hacked, allowing the hacker full access to the information stored on the device; a malicious banking app on an Android phone allowing hackers to obtain attorney bank account information.
To date, the ethical risks associated with attorneys’ use of mobile devices have received relatively little attention. Fortunately, however, local, state, and national bar associations have issued a variety of opinions on the ethical risks of technology more generally. These opinions provide a helpful framework for understanding the security risks associated with mobile device technology, how those risks may implicate attorneys’ ethical responsibilities, and how these risks may be minimized.
Ethical Standards
Many local, state, and national bar associations have issued opinions regarding attorneys’ use of technology. While their approach and specific conclusions vary, they generally refer to two overarching ethical responsibilities: the duty of competence and the duty of confidentiality.
The duty of competence, as reflected in the American Bar Association’s Model Rule of Professional Conduct 1.1, provides that an attorney must have “the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.” Bar associations have interpreted this rule to require not only knowledge regarding the particular area of law at issue in the case, but also knowledge of the security issues involved in attorneys’ use of technology.
The duty of confidentiality, as set forth in
Bar association opinions apply these general concepts to many different technologies, including e-mail, cloud computing, document metadata, and wireless internet connections. While it is beyond the scope of this article to discuss the specifics of each opinion, they collectively impart several important themes that are useful to keep in mind.
First, it is no longer acceptable to plead ignorance of technology.
Second, your duty to be “competent” in technology likely will be held to extend not only to educate yourself on technological security issues but in addition, if this self-education is not enough to make you competent, to retain experts who can handle security issues for you.
Third, just being aware of current technological security issues is not enough. You likely will be held responsible for keeping reasonably informed about the rapidly evolving technology, security threats, and legal developments in the field.
Technology
Few, if any, bar association ethics opinions focus explicitly on mobile devices. The opinions instead discuss technologies that are not specific to any particular type of device or product, such as e-mail, cloud computing, metadata, or wireless internet access.
E-Mail:
There are many security issues associated with e-mail, ranging from the simple to the complex. On the simple end of the spectrum are the situations where attorneys simply misaddress an e-mail (or, more notoriously, hit “reply all” instead of reply) and thereby inadvertently send confidential information to unintended recipients. Confidentiality may also be compromised if a client reads personal attorney-client e-mails at work—the employer may have an e-mail usage policy that makes the e-mails fully accessible to the employer, potentially seriously jeopardizing the attorney-client privilege.
Despite these security concerns, most bar associations have concluded that it is generally permissible for an attorney to use unencrypted e-mail to communicate with clients.
Accessing e-mail on a mobile device generally should be equally permissible, with some important caveats. First, attorneys should keep in mind that mobile devices are distressingly easy to lose. Before using a device for client e-mails, attorneys therefore should seriously consider password protecting it and installing a “find” and/or “wiping” feature. A “find” feature, as its name suggests, allows the device’s internal technology to show its geographic location if it gets lost. The owner then can use another computer to look up the location of the lost device and, with luck, retrieve it. A “wiping” feature can be set up to make the device “wipe” or delete all of its contents if someone (i.e., the thief) repeatedly enters an incorrect password or, alternatively, can allow the user to send a command to the lost device instructing it to immediately delete its contents. It is important to note that the choice of a mobile device is critical and security should be a high priority. Certain manufacturers have significantly more sophisticated security measures in place. Attorneys should not consider open service devices.
A second caveat for mobile devices relates to the fact that some attorneys may be tempted to use their “personal” mobile devices for “work” e-mail communications, often because it is simply more convenient to do so. A personal device, however, does not have security features set up in a manner appropriate for confidential transmissions, and the risk of inadvertently transmitting confidential information on a personal device could be greater. If possible, it is generally better to confine work communications to work devices which, in many institutional environments at least, tend to have more advanced security configurations.
Cloud Computing:
Cloud computing can benefit attorneys enormously, enabling them to increase efficiency by “outsourcing” tasks such as hosting electronic discovery, timekeeping, case management, and billing. The entrusting of sensitive data to third parties, of course, can lead to significant security concerns—for example, your data could be intercepted or compromised when you send it to the third party, the third party could mishandle or misuse the data once they receive it, or the third party may not give back or properly dispose of the data when the engagement terminates.
Bar associations generally regard cloud computing as acceptable provided that attorneys sufficiently consider and address the risks.
- Will the attorney have unrestricted access to the stored data? Does the attorney have another copy of the data in case the vendor limits access or goes out of business? Where physically will the data be located in the United States or abroad?
- Is the company reputable? Has the company experienced security breaches in the past? How were they handled? Where is the company located? Are there any limitations or restrictions in the agreement with the vendor regarding liability, choice of law, or limitation of damages?
- What does the vendor agreement provide regarding who has access to or “owns” the data? What happens to the data at the end of the relationship? Will it be “wiped” or otherwise destroyed and, if so, will the vendor provide written confirmation of this destruction?
- Does the vendor agreement provide an enforceable obligation to preserve confidentiality and security? What security measures does the vendor use? If passwords are used, who has access to them? Is encryption used?
- Can the vendor’s employees view the data? What steps does the vendor take to screen its employees to ensure they are trustworthy?
- What is the company’s disaster recovery protocol? Does it keep a backup copy of the data for emergency purposes?
- Will the company notify the attorney if the company is served with process seeking the production of client information?
- What are the company’s data breach notification policies?
- Should the client be consulted regarding the potential risks involved in cloud computing services?
The opinions do not require specific number of “correct” answers for a service to be acceptable. The standard is not one of perfection, but rather of reasonable efforts to ensure data is kept secure. These efforts moreover must extend into the future: attorneys generally are expected to “stay current with the technological advances” to ensure that the vendor’s security procedures remain adequate over time.
Cloud computing manifests itself in mobile devices through “apps,” computer programs that users often can acquire for their mobile devices, usually through an online “app store.” The same considerations that relate to cloud computing generally relate to apps—if you plan to entrust highly confidential data to the app, you likely will be expected to diligently investigate security issues associated with it, consistent with the considerations outlined above. Although certainly not dispositive, it also may be worth keeping in mind that the apps associated with Apple products generally pass through a screening process before Apple approves them for sale in its “app store.” Android apps, on the other hand, proceed from more of an “open source” development model, and therefore do not undergo the same screening process. This has resulted in a few examples of hackers creating malware programs disguised as legitimate apps, and offering them for sale for Android devices.
Metadata:
Metadata is data “embedded” into an electronic document that contains some information about that document. Metadata generally includes the identity of the author, the date the document was created, and the program used to create it, and also can include edits, comments, and prior document drafts. This information can be highly sensitive, and can easily be inadvertently produced, as much of it is hidden during normal document viewing. Opinions dealing with metadata generally advise that attorneys be aware that metadata can contain confidential information and therefore implicate their duties of confidentiality and competence.
An additional metadata-related consideration arises from the fact that many mobile devices have a built-in camera. The software that handles the photography function on some devices may be set up to embed geo-location metadata into a photograph, which could enable someone to determine precisely where a particular photograph was taken. This location information could be highly sensitive in certain situations—it could, for example, reveal the location of a crime victim, an informant, or other sensitive witness. Attorneys would be well advised to keep this in mind and consider “scrubbing” this location information as appropriate.
Wireless Access:
Wireless Internet access is generally less secure than traditional wired access because of the simple fact that a physical “wired” connection to the network is not necessary (among other reasons). A hacker therefore can access a wireless network surreptitiously from the street outside, or anonymously intrude on your wireless session at the local coffeehouse. A recent bar opinion on wireless access therefore warns attorneys using unsecured wireless networks that they risk violating their duties of competence and confidentiality.
- The security of the technology, including how secure it is compared to other technologies and media; whether the security of the technology can be readily increased through measures such as encryption, enabling a personal firewall, or using passwords; and imposing limitations on who is permitted to monitor the use of the technology.
- The legal consequences to third parties of improperly accessing the information, including criminal or civil penalties. The opinion states that the fact that improper access could lead to such penalties would support a claim that an attorney would have a reasonable expectation of privacy in the communication.
- The degree of sensitivity of the information. According to the opinion, the greater the sensitivity of the information, the more careful an attorney should be about how it is conveyed, and the less risk an attorney should take with technology.
- The potential impact on the client of an inadvertent disclosure of privileged or confidential information or work product, including possible waiver of the privileges and embarrassment from the disclosure of sensitive information.
- The urgency of the situation. If exigent circumstances exist, and no alternatives are reasonably available, it may be reasonable for an attorney to use a particular technology that might not be appropriate in other circumstances.
- Client instructions and circumstances. If the client disapproves of the use of the technology, or the attorney is aware of specific risks associated with it under the circumstances (including that others may have access to the client’s e-mail account, for example), an attorney should avoid using it.
The “wireless” security concerns are heightened for mobile devices because they often are designed to communicate through various different wireless technologies, including WiFi, cellular networks, and Bluetooth.
Conclusion
Mobile devices can help make us all more efficient attorneys, but they create risks. While the specific duties and responsibilities vary between jurisdictions, attorneys should assume that they will be held responsible for being “competent” to address the security risks involved in their use of technology, including but not limited to e-mail, cloud computing, metadata, and wireless connections. Their competence, moreover, must continue into the future, as the technology—and the law related to it—will develop over time. As technology changes and improves, so must the attorneys who use it.
Learn more about Bloomberg Law or Log In to keep reading:
See Breaking News in Context
Bloomberg Law provides trusted coverage of current events enhanced with legal analysis.
Already a subscriber?
Log in to keep reading or access research tools and resources.