Matches in SemOpenAlex for { <https://semopenalex.org/work/W256374808> ?p ?o ?g. }
Showing items 1 to 60 of
60
with 100 items per page.
- W256374808 startingPage "271" @default.
- W256374808 abstract "1. Introduction A. The Era ofE-Mail Electronic mail, popularly known as e-mail, is as common a fixture as the telephone in law offices across the nation.' The e-mail proliferation in the legal profession is no wonder; e-mail provides fast, efficient, inexpensive, seemingly instant communication. No more telephone tag. No more overnighting documents via expensive messenger services.... Even the most computer-phobic lawyers have embraced it.2 Indeed, many commentators predict that e-mail will replace paper correspondence and radically alter the practice of law.3 Advances in communications technology often generate debates over the accompanying impacts on legal practice,4 and the attorney-client privilege invariably arises as a primary point of contention? E-mail has proved no exception to this rule. There is a substantial body of scholarship on the attorney-client privilege and the implications of using e-mail in confidential communications.6 In particular, several commentators have investigated the risk of waiving the privilege via electronic disclosure.7 Surprisingly, the overwhelming majority of these treatments ignore a common and complex problem faced by practitioners-the inadvertent disclosure of confidential information. Consider, for a moment, a typical day of a hypothetical lawyer:9 Larry, an attorney for a plaintiffs' mass torts firm, arrives at the Dallas office at 8:00 a.m. after a long night of preparing for a deposition. The in-box on his desk has a fax from opposing counsel; Larry assumes it is a confirmation of today's deposition. Larry sits down at his desk, reaches for his cup of Starbucks coffee, and checks the voice mail. Larry hurriedly listens to the messages-he thinks one message was a little confusing, but he decides to have his secretary follow up on it later. Larry e-mails a partner in the Houston office and attaches the notes from yesterday's meeting regarding the strategy for a new case. Then he asks a summer associate to start reviewing the 500 employee files that a Boston defense firm sent in response to Larry's discovery request in an ongoing case. By 8:30 a.m., Larry is on his way to the deposition. Within the first thirty minutes of Larry's day there were five opportunities for the inadvertent disclosure of confidential information.10 The fast pace and enormous pressure of contemporary ' `legal practice make it easy to understand how inadvertent disclosures occur. I The emergence of e-mail as the preferred method of communication has led several authors to explore the legal consequences of accidentally hitting Reply to All or mistakenly clicking on the wrong name on an address list. Unfortunately, the law governing waiver of the attorney-client privilege through inadvertent disclosure is in a state of flux. The result in any instance of inadvertent disclosure ultimately depends on the jurisdiction in which a case is filed. To make matters worse, the amorphic standard used in most jurisdictions makes it impossible for an attorney to evaluate a case with any degree of certainty. Finally, the unique nature of electronic communication complicates the already murky authority on inadvertent disclosure. Of course, the best advice to any lawyer is to avoid inadvertent disclosures all together. But Larry's situation makes clear that preventing inadvertent disclosures is an intention much easier said than done. B. Approaching the Problem of Electronic Waiver This Note examines the inadvertent disclosure of privileged information delivered by electronic mail. First, it familiarizes readers with the fundamental aspects of e-mail transmission and security. It continues by reviewing the elements of the attorneyclient privilege and analyzing the three approaches currently employed to determine if the privilege has been waived by inadvertent disclosure. 12 It suggests that the obstacles posed by the widespread use of e-mail are symptoms of an overall deficiency in the treatment of inadvertent disclosures in general. …" @default.
- W256374808 created "2016-06-24" @default.
- W256374808 creator A5032668590 @default.
- W256374808 date "2001-01-01" @default.
- W256374808 modified "2023-09-26" @default.
- W256374808 title "Mapping the Information Superhighway: Electronic Mail and the Inadvertent Disclosure of Confidential Information" @default.
- W256374808 hasPublicationYear "2001" @default.
- W256374808 type Work @default.
- W256374808 sameAs 256374808 @default.
- W256374808 citedByCount "2" @default.
- W256374808 crossrefType "journal-article" @default.
- W256374808 hasAuthorship W256374808A5032668590 @default.
- W256374808 hasConcept C108827166 @default.
- W256374808 hasConcept C144024400 @default.
- W256374808 hasConcept C17744445 @default.
- W256374808 hasConcept C199539241 @default.
- W256374808 hasConcept C2780138299 @default.
- W256374808 hasConcept C3020028006 @default.
- W256374808 hasConcept C41008148 @default.
- W256374808 hasConcept C71745522 @default.
- W256374808 hasConcept C97460637 @default.
- W256374808 hasConceptScore W256374808C108827166 @default.
- W256374808 hasConceptScore W256374808C144024400 @default.
- W256374808 hasConceptScore W256374808C17744445 @default.
- W256374808 hasConceptScore W256374808C199539241 @default.
- W256374808 hasConceptScore W256374808C2780138299 @default.
- W256374808 hasConceptScore W256374808C3020028006 @default.
- W256374808 hasConceptScore W256374808C41008148 @default.
- W256374808 hasConceptScore W256374808C71745522 @default.
- W256374808 hasConceptScore W256374808C97460637 @default.
- W256374808 hasIssue "1" @default.
- W256374808 hasLocation W2563748081 @default.
- W256374808 hasOpenAccess W256374808 @default.
- W256374808 hasPrimaryLocation W2563748081 @default.
- W256374808 hasRelatedWork W107333405 @default.
- W256374808 hasRelatedWork W121971742 @default.
- W256374808 hasRelatedWork W1517531207 @default.
- W256374808 hasRelatedWork W156418558 @default.
- W256374808 hasRelatedWork W1566883406 @default.
- W256374808 hasRelatedWork W1817371989 @default.
- W256374808 hasRelatedWork W2328061418 @default.
- W256374808 hasRelatedWork W2463528791 @default.
- W256374808 hasRelatedWork W2775806371 @default.
- W256374808 hasRelatedWork W280527297 @default.
- W256374808 hasRelatedWork W285062094 @default.
- W256374808 hasRelatedWork W3121308370 @default.
- W256374808 hasRelatedWork W3121599572 @default.
- W256374808 hasRelatedWork W3123398648 @default.
- W256374808 hasRelatedWork W3125414098 @default.
- W256374808 hasRelatedWork W3158642166 @default.
- W256374808 hasRelatedWork W347955389 @default.
- W256374808 hasRelatedWork W777573616 @default.
- W256374808 hasRelatedWork W836103467 @default.
- W256374808 hasRelatedWork W218589331 @default.
- W256374808 hasVolume "20" @default.
- W256374808 isParatext "false" @default.
- W256374808 isRetracted "false" @default.
- W256374808 magId "256374808" @default.
- W256374808 workType "article" @default.