SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
CLIENT NOTICE REGARDING REQUIREMENTS TO PRESERVE EVIDENCE, GUIDELINES REGARDING SPOLIATION, CAREFUL
USE OF ELECTRONIC DEVICES, AND POTENTIAL IMPACT ON ATTORNEY-CLIENT PRIVILEGE
Please note that the law has recently changed to require all parties to litigation, or even just people aware of the potential for litigation, to
protect all potential evidence from being destroyed, erased/deleted, or modified. Such information includes, but is not limited to,
Electronically Stored Information (ESI). Please read these guidelines carefully and check with us with any questions you may have.
 You have a duty to preserve evidence. O.C.G.A. §24-14-22 and Chapman v. Auto Owners Ins. Co., 220 Ga.App. 539 (1996) require
that you refrain from altering, destroying or concealing any evidence (whether in electronic or hard copy form) that may relate to issues
raised (or likely to be raised) in your case. Sanctions for destruction of potential evidence, even if unintentional, can be severe, such as
monetary fines, the Court prohibiting you from presenting certain evidence, or deciding issues without your input. The materials to be
preserved include, but are not limited to: (1) e-mail and attached files including stored, deleted, sent or received mail from any and all e-
mail accounts held in your name or to which you have or had access; (2) all information, records and data on, in or with regard to any
computer owned by you or to which you have or had access; (3) hard drives, flash drives, thumb drives, CDs, DVDs, virtual clouds, or
any other data storage programs, units or devices, as well as any online or wireless data storage accounts in your name or to which you
have or had access; (4) all information, records and data with regard to telephone usage, including, but not limited to, text messages;
and (5) all internet websites operated, accessed and/or used by you, and any associated accounts, including, but not limited to, any mail,
instant messaging functionality, images, video, audio, documents, browsing history or other content in any media format.
 Change your passwords to all computers, cell phones/smartphones, tablets/iPads, email accounts, social media websites, financial
account websites, and merchant websites, to new, secure passwords that the opposing party will not be able to guess. But do not delete
anything from any of these.
 Do not accept a computer, cell phone/smart phone, tablet/iPad as a gift, as it could have pre-installed spyware or keyloggers. Do not
leave any such devices unattended or lend them to anyone. Beware of opening e-greeting cards or suspicious attachments or website
links which could secretly install spyware on your device. Hardware keyloggers can be undetectable by security software, and may take
many forms such as USB devices, keyboard overlays, and innocent-looking plugs connected to computer cables. Spyware and
keyloggers on such devices is becoming a massive problem.
 Do not use spyware or install any keyloggers or other such surveillance programs on any devices belonging to the other party, or
employ anyone else to do so, and do not attempt to guess any of their passwords to access anything of theirs that is password
protected.
 Beware of GPS/location tracking services such as “find my iPhone” or cloud-based services which may show your location through
your phone or tablet, particularly if connected to a virtual cloud. You may be able to disable such services through settings, or you may
want to call you r cell phone service provider to have such services disabled.
 Be careful of anything you do, write or post on any media or websites going forward (even Snapchat photos may be forensically
recoverable), but do not attempt to “clean up” your accounts such as Facebook. That is spoliation and can result in sanctions against
you. You can preserve your Facebook information with the “download my data” feature on their website. Do educate yourself about the
privacy settings and features on social media sites, before you do, write or post anything, think about what a Judge would think if they
eventually see it.
 If you suffer a hardware failure, please let us know right away, so we may notify opposing counsel, and do not dispose of the
damaged hardware until you are specifically authorized to do so. This applies to cell phones, computers, hard drives, tablets/iPads,
iPods/music players, thumb/flash/portable drives, media storage devices, GPS devices, security systems, digital audio and/or video
recorders, etc. If you are uncertain about whether you need to preserve something, err on the side of caution and save it.
 Our communications are protected by the attorney-client privilege. However, if you discuss our communications with a third party, or if
you forward any emails or communications from our law firm to any third party, you may effectively waive the attorney-client privilege
and our communications may then become subject to discovery by your spouse. Likewise, if you communicate with us using a device or
network owned or operated by your employer or any third person or on a public computer, or on a computer to which other family
members have access, there is also a risk of waiver of the attorney-client privilege. Please take care with your communications, and
refrain from disclosing our communications to any third party unless you discuss it with us first.
 The law now requires that we make you aware of these responsibilities to preserve evidence as set forth above until the conclusion of
your case. The Courts take these responsibilities seriously, and it is important that you do too! Taking care to comply with them right
away can protect you from serious sanctions by the Court.
Received and Understood By: Notice Provided And Explained By:
__________________________ Warner, Bates, McGough, McGinnis & Portnoy
_____________ (Client Name)
__________________________ __________________________
Date Traci A. Weiss, Esq.

Weitere ähnliche Inhalte

Andere mochten auch

Autocorreccion, correspondencia y seguridad de un documento
Autocorreccion, correspondencia y seguridad de un documentoAutocorreccion, correspondencia y seguridad de un documento
Autocorreccion, correspondencia y seguridad de un documento
enaj84
 
4 proyecto diseña el cambio yordi
4 proyecto diseña el cambio yordi4 proyecto diseña el cambio yordi
4 proyecto diseña el cambio yordi
dec-admin2
 

Andere mochten auch (15)

Sono ruim e sonolência diurna excessiva na ausência de apnéia obstrutiva do s...
Sono ruim e sonolência diurna excessiva na ausência de apnéia obstrutiva do s...Sono ruim e sonolência diurna excessiva na ausência de apnéia obstrutiva do s...
Sono ruim e sonolência diurna excessiva na ausência de apnéia obstrutiva do s...
 
Primary Research: Questionnaire/Survey/Graphs
Primary Research: Questionnaire/Survey/GraphsPrimary Research: Questionnaire/Survey/Graphs
Primary Research: Questionnaire/Survey/Graphs
 
Autocorreccion, correspondencia y seguridad de un documento
Autocorreccion, correspondencia y seguridad de un documentoAutocorreccion, correspondencia y seguridad de un documento
Autocorreccion, correspondencia y seguridad de un documento
 
Ensayo
EnsayoEnsayo
Ensayo
 
Camila santiago
Camila santiagoCamila santiago
Camila santiago
 
Desnutrição afetiva
Desnutrição afetivaDesnutrição afetiva
Desnutrição afetiva
 
Diabetes mellitus associado à obesidade abdominal,obesidade periférica e doen...
Diabetes mellitus associado à obesidade abdominal,obesidade periférica e doen...Diabetes mellitus associado à obesidade abdominal,obesidade periférica e doen...
Diabetes mellitus associado à obesidade abdominal,obesidade periférica e doen...
 
Instrucciones de Slideshare
Instrucciones de SlideshareInstrucciones de Slideshare
Instrucciones de Slideshare
 
Balance del proyecto de aprovechamiento de la vicuña
Balance del proyecto de aprovechamiento de la vicuñaBalance del proyecto de aprovechamiento de la vicuña
Balance del proyecto de aprovechamiento de la vicuña
 
Social Media Week London 2012: POST - The Path to a Social Intranet
Social Media Week London 2012: POST - The Path to a Social IntranetSocial Media Week London 2012: POST - The Path to a Social Intranet
Social Media Week London 2012: POST - The Path to a Social Intranet
 
Les pièges et opportunités du multi-canal
Les pièges et opportunités du multi-canal Les pièges et opportunités du multi-canal
Les pièges et opportunités du multi-canal
 
Ficha Técnica de In Retail Perú Corp.
Ficha Técnica de In Retail Perú Corp.Ficha Técnica de In Retail Perú Corp.
Ficha Técnica de In Retail Perú Corp.
 
4 proyecto diseña el cambio yordi
4 proyecto diseña el cambio yordi4 proyecto diseña el cambio yordi
4 proyecto diseña el cambio yordi
 
Launching a social intranet - Bettina Hasan and Diane Murgatroyd
Launching a social intranet - Bettina Hasan and Diane MurgatroydLaunching a social intranet - Bettina Hasan and Diane Murgatroyd
Launching a social intranet - Bettina Hasan and Diane Murgatroyd
 
Guía GTC 185
Guía GTC 185Guía GTC 185
Guía GTC 185
 

Ähnlich wie Notice to client form

Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
ashishjoshi
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
Adam Varn
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
PJStarr
 
ECCS Student Admission Hand Book
ECCS Student Admission Hand BookECCS Student Admission Hand Book
ECCS Student Admission Hand Book
Ziaullah Mirza
 

Ähnlich wie Notice to client form (20)

Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Stolen and Lost Wireless Devices
Stolen and Lost Wireless DevicesStolen and Lost Wireless Devices
Stolen and Lost Wireless Devices
 
ECCS V1.0 Student Hand Book
ECCS V1.0 Student Hand BookECCS V1.0 Student Hand Book
ECCS V1.0 Student Hand Book
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
Divorce and Identity Theft
Divorce and Identity TheftDivorce and Identity Theft
Divorce and Identity Theft
 
ECCS Student Admission Hand Book
ECCS Student Admission Hand BookECCS Student Admission Hand Book
ECCS Student Admission Hand Book
 
ECCS v2.0 Student Admission Hand Book
ECCS v2.0 Student Admission Hand BookECCS v2.0 Student Admission Hand Book
ECCS v2.0 Student Admission Hand Book
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 

Kürzlich hochgeladen

一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
bd2c5966a56d
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
Airst S
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
bd2c5966a56d
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
e9733fc35af6
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
F La
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
e9733fc35af6
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
Fir La
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
VarshRR
 

Kürzlich hochgeladen (20)

一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 

Notice to client form

  • 1. CLIENT NOTICE REGARDING REQUIREMENTS TO PRESERVE EVIDENCE, GUIDELINES REGARDING SPOLIATION, CAREFUL USE OF ELECTRONIC DEVICES, AND POTENTIAL IMPACT ON ATTORNEY-CLIENT PRIVILEGE Please note that the law has recently changed to require all parties to litigation, or even just people aware of the potential for litigation, to protect all potential evidence from being destroyed, erased/deleted, or modified. Such information includes, but is not limited to, Electronically Stored Information (ESI). Please read these guidelines carefully and check with us with any questions you may have.  You have a duty to preserve evidence. O.C.G.A. §24-14-22 and Chapman v. Auto Owners Ins. Co., 220 Ga.App. 539 (1996) require that you refrain from altering, destroying or concealing any evidence (whether in electronic or hard copy form) that may relate to issues raised (or likely to be raised) in your case. Sanctions for destruction of potential evidence, even if unintentional, can be severe, such as monetary fines, the Court prohibiting you from presenting certain evidence, or deciding issues without your input. The materials to be preserved include, but are not limited to: (1) e-mail and attached files including stored, deleted, sent or received mail from any and all e- mail accounts held in your name or to which you have or had access; (2) all information, records and data on, in or with regard to any computer owned by you or to which you have or had access; (3) hard drives, flash drives, thumb drives, CDs, DVDs, virtual clouds, or any other data storage programs, units or devices, as well as any online or wireless data storage accounts in your name or to which you have or had access; (4) all information, records and data with regard to telephone usage, including, but not limited to, text messages; and (5) all internet websites operated, accessed and/or used by you, and any associated accounts, including, but not limited to, any mail, instant messaging functionality, images, video, audio, documents, browsing history or other content in any media format.  Change your passwords to all computers, cell phones/smartphones, tablets/iPads, email accounts, social media websites, financial account websites, and merchant websites, to new, secure passwords that the opposing party will not be able to guess. But do not delete anything from any of these.  Do not accept a computer, cell phone/smart phone, tablet/iPad as a gift, as it could have pre-installed spyware or keyloggers. Do not leave any such devices unattended or lend them to anyone. Beware of opening e-greeting cards or suspicious attachments or website links which could secretly install spyware on your device. Hardware keyloggers can be undetectable by security software, and may take many forms such as USB devices, keyboard overlays, and innocent-looking plugs connected to computer cables. Spyware and keyloggers on such devices is becoming a massive problem.  Do not use spyware or install any keyloggers or other such surveillance programs on any devices belonging to the other party, or employ anyone else to do so, and do not attempt to guess any of their passwords to access anything of theirs that is password protected.  Beware of GPS/location tracking services such as “find my iPhone” or cloud-based services which may show your location through your phone or tablet, particularly if connected to a virtual cloud. You may be able to disable such services through settings, or you may want to call you r cell phone service provider to have such services disabled.  Be careful of anything you do, write or post on any media or websites going forward (even Snapchat photos may be forensically recoverable), but do not attempt to “clean up” your accounts such as Facebook. That is spoliation and can result in sanctions against you. You can preserve your Facebook information with the “download my data” feature on their website. Do educate yourself about the privacy settings and features on social media sites, before you do, write or post anything, think about what a Judge would think if they eventually see it.  If you suffer a hardware failure, please let us know right away, so we may notify opposing counsel, and do not dispose of the damaged hardware until you are specifically authorized to do so. This applies to cell phones, computers, hard drives, tablets/iPads, iPods/music players, thumb/flash/portable drives, media storage devices, GPS devices, security systems, digital audio and/or video recorders, etc. If you are uncertain about whether you need to preserve something, err on the side of caution and save it.  Our communications are protected by the attorney-client privilege. However, if you discuss our communications with a third party, or if you forward any emails or communications from our law firm to any third party, you may effectively waive the attorney-client privilege and our communications may then become subject to discovery by your spouse. Likewise, if you communicate with us using a device or network owned or operated by your employer or any third person or on a public computer, or on a computer to which other family members have access, there is also a risk of waiver of the attorney-client privilege. Please take care with your communications, and refrain from disclosing our communications to any third party unless you discuss it with us first.  The law now requires that we make you aware of these responsibilities to preserve evidence as set forth above until the conclusion of your case. The Courts take these responsibilities seriously, and it is important that you do too! Taking care to comply with them right away can protect you from serious sanctions by the Court. Received and Understood By: Notice Provided And Explained By: __________________________ Warner, Bates, McGough, McGinnis & Portnoy _____________ (Client Name) __________________________ __________________________ Date Traci A. Weiss, Esq.