Policy on Firm Computers, Internet Use and Social Networking

Information related to the firm’s clients and to proprietary information of the Firm are contained in the Firm’s computer data base.  Firm attorneys and staff must be handle the data in the firm’s computers in a manner that will protect the integrity of such information and prevent its disclosure.  Also, the computers and communication equipment be used in a manner that is consistent with the practice of law while adhering to the highest principles of the legal profession and the rules of professional conduct.  Attorneys and staff are required to preserve client confidences and must use the equipment in a manner that will assure that those confidences are preserved.

The Computer Equipment and Software belong to the firm.  Employees using equipment and systems for personal purposes do so with the understanding that the firm management may access and view all information in the computer.  The firm has all passwords and codes that enable authorized firm employees to review all information and communications on each attorney and staff person’s computer.  The firm reserves the right to, and does, monitor and access computer equipment and electronic communications, including sent and stored e-mail and voice mail messages. There is no expectation of privacy on the part of the attorneys and staff in connection with the use of this equipment.  Employees are cautioned that deleting a message or using the “wastebasket” function does not mean that a message has been erased from the system.

    1. Ownership: Computer systems, hardware, software, electronic and telephone communications, including, e-mail, facsimiles, and voice mail messages and the contents of any staff or attorney’s computer, are the sole property of the firm.  When a staff person or attorney leaves the firm, he or she must surrender all computer equipment and must not retain printed or electronic copies of the material contained on such computer and equipment.
    2. Personal Use: The firm provides its staff and attorneys with access to computer equipment, e-mail, Internet access and voice mail systems at the firm’s expense, for their use in conducting firm business.  These systems and equipment are to be used solely for business purposes, with the exception of occasional short informational messages of a personal nature or short use of the internet for personal purposes.
    3. Use of Computers and Equipment by Non-The Firm PartiesUse of firm computers by non-members and non-employees of the firm is absolutely prohibited.  Allowing someone who is not a member or employee of the firm to use a firm computer is no different than allowing that person to review the firm’s files.  This prohibition is absolute and includes activities such as allowing a non-member or non-employee to use the Firm’s computers to send or receive e-mails or access the internet.
    4. Intended Recipients of E-mail and Use of E-mail Lists:  Distribution of internal e-mail address lists to anyone outside of the firm is prohibited, except with the approval of [identify the person designated by the firm for this function].  Non-attorney employees are prohibited from using group lists unless specifically directed to do so by [identify the person designated by the firm for this function].
       
      All personnel should exercise caution in addressing messages to ensure that they are not inadvertently sent to an unintended address.  Electronic communications that may be privileged from disclosure or confidential should be clearly identified as such.
    5. Content of E-mail, Tweets, Blog Postings and Other Internet Material: No one may send or post electronic communications or access Internet sites that may constitute verbal abuse, insult, slander, defamation, or disparagement of other employees, customers, vendors, competitors or any other person or entity.  Content of a sexual nature is prohibited (unless directly related to an issue in a legal matter with which the employee is involved).  Employees should use caution and common sense when communicating electronically and when accessing Internet sites and must do so in a manner consistent with all firm policies, such as the firm’s Sexual Harassment Policy.  For example, accessing pornographic sites is strictly prohibited.  The use of firm computers for shopping is discouraged and should be kept to a bare minimum.
    6. Sensitive Material and Encryption: Highly sensitive information should be encrypted when appropriate.
    7. Access to Another’s E-mailExcept as specifically authorized by the user involved, employees are not authorized to access or attempt to access e-mail, Internet or voice mail system of another user, or to transmit messages from a co-worker’s equipment.  Using unauthorized files or a password to gain access to confidential files is prohibited.  However, as the need arises, firm employees may specifically authorize another firm employee to access their e-mail.
    8. Virus: All employees must be vigilant in protecting against viruses.  This includes both e-mail and floppy diskettes.  As a matter of policy, you should never open an e-mail attachment unless you know the person sending it AND you are expecting the particular document.  If not, you should never open the attachment.  Also, as a matter of course, never open an attachment that is not a document (e.g., any attachment ending in *.exe or *.vbs).  Viruses can do severe damage to your own computer and to others on the network.
    9. Blogs: Blogs that are identified as firm blogs must first be approved by [identify the person designated by the firm for this function].  Personal blogs may not in any way purport to be maintained or in any way connected with the firm.  Personal blogs should make it clear that the views expressed therein are not the views of the firm.
       
      Blogs that are authorized by the firm and identified as firm blogs must comply with all firm policies on confidentiality and Internet usage and must serve a firm purpose.  Authorization may be provided by [identify the person designated by the firm for this function].
       
      Information about firm clients and client matters may not be disseminated on any blog without the prior consent of the client and approval by [identify the person designated by the firm for this function].
    10. Social Networks: Firm equipment is to be used solely for business purposes, with the exception of occasional short informational messages of a personal nature or short use of the internet for personal purposes, including the brief use of Social Networks such as My Space or Face Page.
       
      Personal pages on social networking sites may not in any way purport to be maintained or in any way connected with the firm, although it is appropriate to state that you are employed by the firm.  (Such personal information, however, should not be accessible to the public, but only to those you designate to see such personal information, as it places you at risk should someone want to harm you and you provide them with your place of employment.)
       
      Personal social network pages should make it clear that they are personal pages, not firm pages, and that the views expressed therein are not the views of the firm.  Information about the firm may not be disseminated on any social networking page without the prior approval by [identify the person designated by the firm for this function].
       
      Information about Firm clients and client matters may not be disseminated on any social networking page without the prior consent of the client and approval by [identify the person designated by the firm for this function].