Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

John Gaal's Ethics Corner

By ALM Staff | Law Journal Newsletters |
August 01, 2003

Q: I recently received an electronic version of a document from my opponent. It is my understanding that there is a way to “look behind” the visible document sent to me, to discover earlier versions of the document that may have been drafted. This “look-behind” may also reveal who else was sent the document for review, as well as any comments they may have made regarding the document. It seems to me that since my opponent chose to give me the document in this electronic form, it is okay for me to try to discover whatever other information it contains. Is that correct?

A: The New York State Bar Association Committee on Professional Ethics recently addressed this very issue, and concluded that the answer is no, it is not permissible to do so. Formal Opinion 749(2002) concludes that using technology to examine electronically received communications from an adversary (or electronically “bugging” and tracing communications sent to an adversary to see where else they are sent) is a violation of the Code of Professional Responsibility because it may lead to discovery of confidences and secrets of your adversary's client. This is believed to be the first, and only, ethics opinion on this subject.

The Committee's decision focuses on DR 4-101. This Disciplinary Rule requires the protection of client confidences and secrets and, according to the Committee, prohibits an attorney from trying to exploit access to the confidences and secrets of an opponent. The Committee found support for this conclusion in a number of sources that previously have recognized that it is improper for an attorney to attempt to invade the attorney-client confidentiality of an adversary. e.g., Dubois v. Gradco Sys., Inc., 136 F.R.D. 341 (D. Conn. 1991) (counsel must not seek to solicit privileged attorney-client information from former corporate employees even though ex parte contact with such employees is otherwise generally permissible); ABA Formal Opinion 92-368 (improper to take advantage of inadvertently or improperly disclosed confidences and secrets of an adversary); NYSBA Formal Opinion 700 (improper to exploit willingness of another to disclose an opponent's confidential communications). The Committee also concludes that trying to look behind an electronic communication would violate both DR 1-102(A)(4), which prohibits an attorney from engaging in deceitful, dishonest or fraudulent conduct, and DR 1-102(A)(5), which prohibits conduct prejudicial to the administration of justice. The Committee notes that an attorney's obligation to zealously represent his or her client could not overcome the sacrosanct nature of privileged communications.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

Removing Restrictive Covenants In New York Image

In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?

Legal Possession: What Does It Mean? Image

Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.