How Private Are Your Documents?
A consistently open internet connection can act as an entryway through which various types of hackers or accidental searchers may access and leak confidential information. Failure to safely secure documents and implement efficient policies aimed at overall network and computer protection, can not only lead to the leaking of personal and confidential information, it may often times be used as evidence in a law suit. This reality is compounded by the recently passed amendments to the Federal Rules of Civil Procedure regarding electronic discovery of documents in legal actions. The electronic discovery rules establish a preference toward the discovery of electronic documentation, which will include the trail of metadata that each document modification leaves behind.
Due to the recently passed electronic discovery rules, discovery of electronic information is presumably valid and accepted. Due to this new development in the discovery patterns of adversaries, information and documentation which was once thought to be private and confidential may now be disclosed, often unintentionally through the disclosure of electronic information. A well trained IT department can find embedded information and evidence in disclosed information that was never meant to be disclosed. Such dangers not only subject the company or firm to unintentional disclosure of private information, but may also subject them to personal liability if the information inadvertently disclosed detrimentally impacts a third party whose information was supposedly confidential.
Ordinarily, edits made to a document, while not apparent on the computer screen, are embedded in the document itself and can easily be obtained by a trained IT professional. These changes are recorded as metadata. In respect to document edits, one step that can be taken while using Microsoft Word programs is to render a document as a 'protected document.' To do so, it is necessary to go to the Tools menu and select 'protect document' prior to sending it to anyone else for edits. When you choose to protect a document, the only modifications that can be made to it are Comments and Tracked Changes. These modifications do not become part of the document until you choose to 'unprotect' it and modify the document yourself. This method therefore allows you to ask your reviewers to make comments directly in the Microsoft Word document you send them. This tactic can not ensure against all metadata trails, it is but one method and system which can be employed to help reduce risks. In order to mitigate the risks inevitably faced with the continued expansion of internet use and electronic commerce, combined with the more lenient electronic discovery rules, all types of companies must institute protectionist documentation policy.
While risk of confidential disclosure can never be completely eliminated, the key to implementing the optimally effective system is to find a balance that allows for an efficient managing of the risk. Secure and safe document production, storage, and disposal systems should be used by all firms and companies to help reduce exposure and protect private and confidential information from both legal adversaries and malicious hackers. In addition, an effective legal review system should be used to help determine the status of certain forms of documentation, in order to categorize said documentation as privileged or non-privileged information. Obtaining the assistance of a law firm or attorney experienced in dealing with privacy, document retention and production issues can help ensure a company's protection into the future, and is invaluable in the event of a pending law suit. An attorney with a clear understanding of relevant discovery rules and the emerging technology can serve as a key advisor in designing and determining the appropriate privacy protections contained within the ideal document protection system.
Related Tags: litigation, metadata, meta date, meta-date, cross exam, cross examination, cyberlawyer
This article was drafted by Nicholas Delaunt for the Law Firm of Goldstein and Clegg, LLC. Goldstein and Clegg is a small business representation law firm in Beverly, Massachusetts.
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- Troubling New"spam" to Cell Phones Discovered
Troubling new"Spam" to Cell Phones Discovered In a day and age when spam is rampant on the interne - Sex Offenders - Keep Your Family Protected From Sex Offenders
As a parent, it is your responsibility to protect your family from any type of harm. Most especiall - Criminal Defense Attorney
You've seen them on TV in their black coats; the formidable forces of law, the strong and intense - Critical Analysis of Cyber Law
Critical Analysis of Information Technology Act, 2000 Till year 2000, India did not have any legis - Finding a Good Lawyer Referral
Perform An Online Attorney Search When You Need To lawyer referralHere is a common scenario: You ar - Usa Can Copy All You Have on Your Laptop
USA can copy all you have on your Laptop.American authorities has given airport security control mor - Best And Top New York Immigration Lawyer Of NY?
The term Immigration Lawyer is another very common term people are becoming aware of. But most of th - Domain Name Theft
Are you losing visitors to your domain? Are your search engine rankings still yours?Other people mi - Domain Name Dispute, What To Expect after You've Won
You file a UDRP complaint under ICANN and a panel has ordered a transfer of the stolen domain name. - Is Your Spouse Lying?
You may have noticed some unusual behavior from your significant other such as spending a lot of tim
Most viewed articles in this category:
- Protecting your Website's Content: Just Don't Bother
The internet is the best place if you want to steal content. It makes it really easy to copy any inf - Malaysian Internet Marketer; The Constraints On Internet Transaction
The Problems;There is always an obstacle for everyone when dealing with internet transaction, Malays - A New Music Copyright Lawsuit Against YouTube
In the middle of November, Universal Music filed an extensive copyright lawsuit against YouTube, not - How To Use Metadata As An Examination Tool
In today's computer dependent world, the zealous advocate must be able to navigate his way through - Viacom Sues Google
Viacom, a media company, has recently sued Google for $1 billion, for the copyright infringement on - A Short Synopsis Of Cybercrime
To many involved in criminal dense, cyber crime is the bane of the 21st Century. It accounts for mi - Internet Law in 2007
As we start off the 2007 year, many in the web community probably have questions about what developm - Are We Able to Completely Stop Software Piracy
Software piracy is the illegal reproduction and distribution of software applications, whether for b - Defamation and Slander on the Internet
As social networking sites and internet blogs continue to increase in both popularity and use, the o - Anti-Cyber Squatting Consumer Protection Act Update
Our law firm receives a lot of calls from people and companies who are being threatened with an Anti