Electronically Stored Information, Social Media and the Rules of Professional Conduct: Are you compliant with your duties of competence and diligence?

Recently published in The National Law Review was an article about Compliance and Diligence and Electronic Media by  Charles H. Gardner of  Much Shelist, P.C.:

Electronically Stored Information and its increasingly complex progeny, social media evidence (collectively, “ESI”) are quickly being woven into the fabric of discovery and the practice of law.  As the cases and rules of professional conduct discussed below demonstrate, lawyers who fail to thoughtfully investigate and use social media evidence (both that of their own client and that of the opposing party(ies)) are not engaged in best practices.

The American Bar Association (“ABA”) Model Rule of Professional Conduct 1.1 (Competence) states that “[a] lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.” (The Model Rules have been adopted in all of the fifty states, except California, and in the District of Columbia and the U.S. Virgin Islands). Comment 5 to Rule 1.1 provides, in part, that “[c]ompetent handling of a particular matter includes inquiry into and analysis of the factual and legal elements of the problem, and use of methods and procedures meeting the standards of competent practitioners. It also includes adequate preparation (emphasis added).” Further, the ABA Standing Committee on Ethics and Professional Responsibility Formal Opinion No. 98-411(1998) states, “[w]e believe the ethical issues are the same whether [involving] substantial legal or procedural aspects of a client’s matter or [a lawyer’s] ethical duties in furtherance of the client’s matter.”

Much has changed since the ABA adopted the Model Rules of Professional Conduct and its predecessor guidelines. Electronic data and communication and social media communities such as Facebook, MySpace, and Twitter have become linchpins of society and discourse. As of December 2011, Facebook alone reported that it had 845 million monthly users and more than 483 million average daily users (http://newsroom.fb.com/content/default.aspx?NewsAreaId=22, last visited Feb. 12, 2012).

In the recent case of Griffin v. Maryland, 192 Md. App. 518, 535 (2010), the court opined, “[i]t should now be a matter of professional competence for attorneys to take the time to investigate social networking sites (emphasis added).” In addition, a 2010 study by the American Association of Matrimonial Attorneys found that an overwhelming eighty-one percent of the nation’s top divorce attorneys said that they have seen an increase in the number of cases in which social media evidence plays a role. Sixty-six percent of those attorneys cite Facebook as the primary source of such evidence. Accepting as an imminent practical reality that an attorney has or will soon have an affirmative duty to investigate social media evidence, what might the cost be to the attorney, the client, or both for failing to do so or, worse, failing to preserve such evidence?

Consider hypothetically the evidentiary value of photographs posted on a disability claimant’s social media page showing her rock climbing, for example. One can see just how persuasive ESI can be.  However, ESI can also be a minefield of professional liability. Consider the case of Lester v. Allied Concrete Company, Nos. CL08-150, CL09-223 (Va. Cir. Ct. Oct. 21, 2011) in which a Virginia attorney was found to have instructed his assistant to tell his client to remove a photograph from a social media website. Finding that the lawyer had violated Virginia’s equivalent of Model Rules 3.3 (Candor toward the tribunal), 3.4 (Fairness to opposing parties and counsel), 5.3 (Responsibilities regarding non-lawyer assistants), 8.4 (Misconduct) and rules of court regarding conduct that tends to defeat the administration of justice or to bring the courts or the legal profession into disrepute, the court sanctioned the attorney with a fine of $540,000. In addition, the court fined the client $180,000 for spoliation of evidence. For the twenty-first century practitioner, a well thought-out ESI discovery plan could mean not only the difference between success and failure in the matter at hand, but may also mean the difference between a grateful client and a client that brings a malpractice claim, a disciplinary complaint or both for ineffectiveness in investigation and preparation. However, case investigation and preparation are not the only source of risk for attorneys and judicial officers.

The case of In re: B. Carlton Terry, Jr., No. 08234 (N.C. Judicial Standards Commission, April 1, 2009) demonstrates how critical it is for attorneys to be savvy in social media and ESI discovery in general. In that family law case, the judge, plaintiff’s counsel and defense counsel were discussing Facebook in a meeting in chambers. Plaintiff’s attorney commented that she did not know what Facebook was and did not have time for it. Following the meeting in chambers, Judge Terry and defense counsel became friends on Facebook and discussed the case in some detail. Judge Terry also conducted independent investigation into plaintiff’s social media pages and quoted from them at the hearing. The judge did not inform plaintiff’s counsel of his actions until after he had entered an oral order. Plaintiff’s counsel immediately sought to and did have the judge’s order vacated. Judge Terry voluntarily disqualified himself and the case was remanded for a new hearing, costing the taxpayers a considerable amount. Ultimately Judge Terry was publicly reprimanded by consent in formal proceedings before the Judicial Standards Committee.

Had plaintiff’s counsel conducted a thorough, or even a rudimentary, ESI investigation, the wrongdoing on the part of defense counsel and the bench could have been addressed promptly which would have spared both Plaintiff and the taxpayers significant costs in having to try the same matter twice.

Furthermore, it is worth noting that the rules of professional conduct apply equally to in-house counsel and transactional attorneys as to litigators. In the more casual in-house and transactional business environments, the line between clients and business colleagues can become easily blurred. These attorneys should be especially mindful of their professional responsibilities and the implications that their actions may have on their organization in the event that litigation ensues.

Following are six simple and practical suggested steps towards developing a strong ESI discovery plan and investigation process:

  1. Educate yourself about social media and ESI in general. If you do not know where to look, you could be lost in a search engine “black hole”. Not only can you place yourself ahead of the pack in the legal community, you will also be able to communicate with your children and grandchildren!
  2. Draft a written ESI discovery plan that includes an immediate request for a discovery hold on ESI.  Be systematic and judicious in your requests. And be mindful of Model Rule 1.3 (diligence).
  3. Draft and circulate acknowledgement forms to all personnel in your organization and obtain their signatures.  These documents should educate your personnel about sound social media practices and emphasize ethical concerns as well as the legal liability to the organization, to you and to the employee, who could also face appropriate discipline for violating company policy.  Be mindful of Model Rule 5.3 (responsibilities regarding non-lawyer assistants). And, with respect to employees, be mindful of the limitations imposed by the National Labor Relations Act when drafting your policies and acknowledgement forms.
  4. Instruct your client that ESI is evidence and that the client should not tamper with or destroy such evidence until the case is completely resolved, including during the time allowed for appeals and in appellate proceedings, if any.
  5. Check your client’s social media pages.  Know what you are up against.
  6. Conduct a thorough review of any and all available ESI of the other party.  Be careful to abide by the “no contact” rules.  For example, do not send a surreptitious friend request to gain access to another party’s ESI, but rather, look only at what is publicly available to you and obtain proper warrants for any additional information.  And be prepared to argue to the court why the evidence is relevant and why it should be produced and admitted.

If you are not making diligent and competent use of ESI, you place yourself and your client at a severe disadvantage and you are arguably breaching your ethical obligations. The immediate future is a rare opportunity to be on the cutting edge of developing law.  With a little knowledge and a reasonable amount of follow-through, you can set yourself apart in the new media frontier by making sound use of the bountiful resources that new media technologies have brought to the practice of law.


Charles H. Gardner is Special Counsel to the Intellectual Property & Technology group at Much Shelist, P.C. and head of its social media practice.  Mr. Gardner is a frequent writer and lecturer on the topic of social media and new media technologies. He has been featured in Crain’s Chicago Business and The Chicago Daily Law Bulletin and will be leading a CLE seminar on the “Laws of Social Media” (tailored for house counsel and business executives) on February 21, 2012.* Before joining Much Shelist, Mr. Gardner served as Director of Legal and Business Affairs for Harpo Studios, Inc. Mr. Gardner has a juris doctorate from Loyola Law School, Los Angeles (Entertainment Law Review) and a bachelor’s degree from the University of California, Berkeley.  He is admitted to practice law in California, New York, Illinois, the District of Columbia and before the United States Supreme Court.

*For more information and/or for complimentary registration, please call or e-mail Mr. Rodney Abstone at CLS Executive Search at (312) 251-2564 or email rabstone@clsexecutivesearch.com. 

© 2012 Much Shelist, P.C.

White Collar Crime

The National Law Review would like to advise you of the upcoming White Collar Crime conference sponsored by the ABA Center for CLE and Criminal Justice SectionGeneral Practice,  &   Solo and Small Firm Division:

Event Information

When

February 29 – March 02, 2012

Where

  • Eden Roc Renaissance Miami Beach
  • 4525 Collins Ave
  • Miami Beach, FL, 33140-3226
  • United States of America
Primary Sponsors
  • Highlight

The faculty includes some of the leading white collar lawyers in the United States.  The keynote panels for the 2012 program will continue to focus on the role of ethics and corporate compliance in today’s business environment.

  • Program Description

Each year the National Institute brings together judges, federal, state, and local prosecutors, law enforcement officials, defense attorneys, corporate in-house counsel, and members of the academic community.  The attendees include experienced litigators, as well as attorneys new to the white collar area.  Attendees have consistently given the Institute high ratings for the exceptional quality of the Institute’s publication, its valuable updates on new developments and strategies, as well as the rare opportunity it provides to meet colleagues in this field, renew acquaintances and exchange ideas.

The faculty includes some of the leading white collar lawyers in the United States.  The keynote panels for the 2012 program will continue to focus on the role of ethics and corporate compliance in today’s business environment.  Once again, we expect excellent representation from the corporate sector.

  • CLE Information

ABA programs ordinarily receive Continuing Legal Education (CLE) credit in AK, AL, AR, AZ, CA, CO, DE, FL, GA, GU, HI, IA, ID, IL, IN, KS, KY, LA, ME, MN, MS, MO, MT, NH, NM, NV, NY, NC, ND, OH, OK, OR, PA, RI, SC, TN, TX, UT, VT, VA, VI, WA, WI, WV, and WY. These states sometimes do not approve a program for credit before the program occurs. This course is expected to qualify for 11.0 CLE credit hours (including TBD ethics hours) in 60-minute-hour states, and 13.2 credit hours (including TBD ethics hours) in 50-minute-hour states. This transitional program is approved for both newly admitted and experienced attorneys in NY. Click here for more details on CLE credit for this program.

The Anatomy of Data Risk Management

An article by Risk and Insurance Management Society, Inc. (RIMS) recently found in The National Law Review focused on Data Risk Management:

Think of data as a living organism.

Just like a human body, data has various components and life support systems that must be maintained to ensure the whole thrives and survives. You can think of a data risk specialist as a doctor trying to keep the organism healthy through its various life stages.

Data, our hypothetical patient, (you’re welcome Star Trek fans) needs a safe and healthy environment, a supportive lifestyle and good hygiene. Just as a doctor has to consider external threats (“do you smoke?”) so does the data risk manager.

Let’s look at what this all means, and how this philosophy can be applied to your businesses policies and practices.

Data, our hypothetical patient, has three basic forms: paper, electronic and human memory.  A good data risk management plan must consider all three.

Controlling paper and electronic data is what we think of most when considering data security. This is your standard (or what should be standard) security policy, access controls procedures, system audits, and the like. It’s where security planning meets IT.

Human memory is a little more elusive. Education, security training and a reward-demotion plan can help control human errors, as can confidentiality agreements, and project-specific security contracts. These are the tools of teachers and lawyers. Generally speaking, there are four key rules to protecting data in all its forms:

  1. Be stingy with sensitive data, internally and externally;
  2. Provide access to data on a need-to-know basis;
  3. Provide access only to that specific data, rather than entire data sets;
  4. Be deliberate in how data is handled, used and shared.

Data has a life cycle. If your data doesn’t, it should. Whether it’s government secrets or an online shopper’s credit card number, data is received or created within your company’s computer systems. It is used, maintained and stored. It is archived or destroyed. That data, in all cases, has three basic states: in action, in motion or at rest. Take the credit card number example: that information can be used, the card charged, or moved to another computer system, or archived. Use, motion, rest.

There are four fundamental rules regarding the life cycle of data:

  1. If the organization doesn’t need it, don’t collect it.
  2. If data must be collected, collect only what is needed.
  3. If data is needed, control it and encrypt it.
  4. When data is no longer needed, get rid of it – SECURELY.

Now that we know what data looks like (paper, electronic, mnemonic) and how it lives (in action, in motion, at rest) we should consider those external threats, namely data breaches. A data breach is an incident (or series thereof) in which sensitive, protected or confidential information has potentially been viewed, stolen or used with unauthorized access. This can be a hacker attack, an internal company mistake that results in exposed information or, in some cases, corporate or government espionage. A data breach can be anything that jeopardizes data.

These threats range from simple user negligence, operating or systemic issues, all the way to highly complex criminal attacks launched against your organization. As anyone who follows the tech news knows, sensitive consumer and business information has become a criminal commodity.

With this hostile environment in mind, it is imperative for the business to plan and prepare not only for the protection of their information, but also for the response and recovery of their data and business in the event of a data breach. For a data manager or security professional to fail to issue such a warning would be akin to that doctor not asking about smoking.

At the end of the day, data as an organism is more than an extended metaphor. It’s a means to look at your company’s data products in an abstract way and understand how it operates. This, in turn, will allow you to develop the proper health plan. Just like with our health, there is no single wonder pill. But there are data doctors out there who can analyze your businesses’ risk posture and recommend ways to get it in shape.

Brian McGinley, senior vice president of data risk management at Identity Theft 911 offers this well-written piece on the timely topic.

Risk Management Magazine and Risk Management Monitor. Copyright 2012 Risk and Insurance Management Society, Inc.

White Collar Crime

The National Law Review would like to advise you of the upcoming White Collar Crime conference sponsored by the ABA Center for CLE and Criminal Justice SectionGeneral Practice,  &   Solo and Small Firm Division:

Event Information

When

February 29 – March 02, 2012

Where

  • Eden Roc Renaissance Miami Beach
  • 4525 Collins Ave
  • Miami Beach, FL, 33140-3226
  • United States of America
Primary Sponsors
  • Highlight

The faculty includes some of the leading white collar lawyers in the United States.  The keynote panels for the 2012 program will continue to focus on the role of ethics and corporate compliance in today’s business environment.

  • Program Description

Each year the National Institute brings together judges, federal, state, and local prosecutors, law enforcement officials, defense attorneys, corporate in-house counsel, and members of the academic community.  The attendees include experienced litigators, as well as attorneys new to the white collar area.  Attendees have consistently given the Institute high ratings for the exceptional quality of the Institute’s publication, its valuable updates on new developments and strategies, as well as the rare opportunity it provides to meet colleagues in this field, renew acquaintances and exchange ideas.

The faculty includes some of the leading white collar lawyers in the United States.  The keynote panels for the 2012 program will continue to focus on the role of ethics and corporate compliance in today’s business environment.  Once again, we expect excellent representation from the corporate sector.

  • CLE Information

ABA programs ordinarily receive Continuing Legal Education (CLE) credit in AK, AL, AR, AZ, CA, CO, DE, FL, GA, GU, HI, IA, ID, IL, IN, KS, KY, LA, ME, MN, MS, MO, MT, NH, NM, NV, NY, NC, ND, OH, OK, OR, PA, RI, SC, TN, TX, UT, VT, VA, VI, WA, WI, WV, and WY. These states sometimes do not approve a program for credit before the program occurs. This course is expected to qualify for 11.0 CLE credit hours (including TBD ethics hours) in 60-minute-hour states, and 13.2 credit hours (including TBD ethics hours) in 50-minute-hour states. This transitional program is approved for both newly admitted and experienced attorneys in NY. Click here for more details on CLE credit for this program.

Trade Secrets – Protecting Your Confidential Information

As seen recently in The National Law Review an article by Harvey Koning of Varnum LLP regarding protecting your confidential information:

Varnum LLP

 

Some of the most valuable intellectual property in the world is not protected by a patent or trademark. A famous example is the formula for Coca-Cola – it is protected as a trade secret. A more recently created trade secret is the algorithm Google uses to rank websites. Google protects it by keeping it secret. But trade secrets are not limited to blockbuster inventions by huge companies – almost every business has trade secrets worth protecting. What if your biggest competitor hired away one of your key employees? What confidential information would you not want this person to take? This article describes how to identify and protect your valuable trade secrets.

What is a “trade secret”?

“Trade secrets” can include customer lists, databases, pricing information, cost and profit margin information, computer programs, the content of contracts and much other valuable information. Basically, anything that gives you a competitive advantage over your competition can be a trade secret. A trade secret is something not generally known or easily discoverable by people outside your business.

If your information has “trade secret” status, then you can take legal action to prevent someone (such as a former employee) using the misappropriated information and, in some circumstances, you can seek a monetary recovery from someone who has misused your trade secrets. Trade secrets offer important advantages. They do not require any patent or trademark filings, fees or government approvals. Trade secret protection does not expire after a fixed amount of time.

How do you obtain trade secret protection?

To get trade secret protection, you must make a reasonable effort to protect your confidential information. A good place to start is by thinking about and listing what information you have that is not known to the public or easily discoverable that you would like to protect. After you have identified your confidential information, here are some of the steps you can take:

  • label the information “confidential” or “proprietary”
  • have employees sign a confidentiality agreement
  • limit access to those who need to know
  • keep the information in a secure location
  • remind departing employees of their obligation not to disclose confidential information

The particulars of your situation help determine the appropriate steps to take. A good place to start is a company policy about protecting confidential information.

Making an effort to protect your confidential information is a wise investment in preventing your important information from falling into the wrong hands (anyone other than you!).

© 2012 Varnum LLP

White Collar Crime

The National Law Review would like to advise you of the upcoming White Collar Crime conference sponsored by the ABA Center for CLE and Criminal Justice SectionGeneral Practice,  &   Solo and Small Firm Division:

Event Information

When

February 29 – March 02, 2012

Where

  • Eden Roc Renaissance Miami Beach
  • 4525 Collins Ave
  • Miami Beach, FL, 33140-3226
  • United States of America
Primary Sponsors
  • Highlight

The faculty includes some of the leading white collar lawyers in the United States.  The keynote panels for the 2012 program will continue to focus on the role of ethics and corporate compliance in today’s business environment.

  • Program Description

Each year the National Institute brings together judges, federal, state, and local prosecutors, law enforcement officials, defense attorneys, corporate in-house counsel, and members of the academic community.  The attendees include experienced litigators, as well as attorneys new to the white collar area.  Attendees have consistently given the Institute high ratings for the exceptional quality of the Institute’s publication, its valuable updates on new developments and strategies, as well as the rare opportunity it provides to meet colleagues in this field, renew acquaintances and exchange ideas.

The faculty includes some of the leading white collar lawyers in the United States.  The keynote panels for the 2012 program will continue to focus on the role of ethics and corporate compliance in today’s business environment.  Once again, we expect excellent representation from the corporate sector.

  • CLE Information

ABA programs ordinarily receive Continuing Legal Education (CLE) credit in AK, AL, AR, AZ, CA, CO, DE, FL, GA, GU, HI, IA, ID, IL, IN, KS, KY, LA, ME, MN, MS, MO, MT, NH, NM, NV, NY, NC, ND, OH, OK, OR, PA, RI, SC, TN, TX, UT, VT, VA, VI, WA, WI, WV, and WY. These states sometimes do not approve a program for credit before the program occurs. This course is expected to qualify for 11.0 CLE credit hours (including TBD ethics hours) in 60-minute-hour states, and 13.2 credit hours (including TBD ethics hours) in 50-minute-hour states. This transitional program is approved for both newly admitted and experienced attorneys in NY. Click here for more details on CLE credit for this program.

10 Tips for Conducting an Internal Investigation

Recently posted in the National Law Review an article by Catherine Salmen Wright of  Dinsmore & Shohl LLP regarding conducting an internal investigation:

The recent news involving Penn State highlights how high the stakes can be when conducting an internal investigation. In fact, Penn State has hired former FBI director Louis Freeh to lead its internal investigation into alleged criminal conduct by a former employee. But while most employers do not face circumstances this challenging, the reality is that employers are presented with circumstances on a regular basis that must be investigated effectively to avoid significant legal liability.

Of course, this begs the question of when an employer needs to investigate. The simplest answer is when the employer has knowledge of misconduct. Misconduct can include a breach of an employer policy, violation of a drug or alcohol policy, theft or other criminal activity, or even misuse of company property. Employers should not, however, too narrowly construe what constitutes “knowledge,” which can include formal and informal complaints, information obtained during exit interviews, anonymous tips and third-party information.

Employers should also keep in mind that an internal investigation may become your defense in any subsequent litigation and therefore may be subject to significant scrutiny by the plaintiff, the plaintiff’s lawyer and possibly a jury. For example, in a sexual harassment lawsuit, the employer’s investigation is what typically shows that the employer exercised reasonable care to prevent and correct any harassing behavior. Another defense used by employers in wrongful termination lawsuits is the “honest belief” rule. Specifically, if the employer can show that it reasonably relied on the particularized facts that were before it at the time the decision was made, it can potentially avoid liability over a challenged decision. The investigation does not need to be perfect, but the employer must make a reasonably informed decision before taking an adverse employment action.

As a result, conducting an effective internal investigation is critically important. Every investigation comes with a unique set of facts and challenges, but the following 10 principles serve as a guide for conducting an effective investigation.

1. Determine the objectives and strategy for the investigation.

At the outset, employers must establish the objectives of the investigation. Questions that should be addressed include:

  • Are you trying to develop a complete record to justify a decision?
  • Are you attempting to avoid litigation?
  • What are your legal obligations?
  • Do you need an attorney involved?

Evaluating the answers to these questions will allow you to tailor your investigation.

2. Maintain confidentiality.

A guiding principle in any investigation is confidentiality, which employers should maintain to the extent possible. However, don’t promise what you can’t deliver. Absolute confidentiality when employees will be interviewed is virtually impossible. Also, employers need to be vigilant when it comes to thoroughness and promptness. For example, if you had to answer questions one year later in a deposition, can you give a reasonable explanation of why it took the amount of time it did to complete the investigation?

3. Determine if immediate actions need to take place to protect the workforce.

Based on what you know at the time the investigation begins, you may need to take immediate steps to protect the complaining party, alleged victim or the workforce in general. For example, an accused harasser may be put on a paid or unpaid leave, supervisory responsibilities could be changed or an employee could be temporarily transferred pending an investigation, but in no case should an employer penalize the alleged victim.

4. Review company policies.

Take an inventory of employer policies that may impact the investigation process. For example, a collective bargaining agreement may provide an employee the right to have a representative present at any interview.

5. Conduct a preliminary search of available records.

This includes reviewing personnel files and any documents relating to the misconduct. Act quickly to retrieve what electronic information is still available, including emails and text messages.

6. Select the appropriate personnel to conduct the investigation.

Investigators should be unbiased and unprejudiced — and perceived as such. Good investigators are skilled at setting people at ease and drawing out reticent witnesses in order to collect facts. They also need knowledge of company policies and procedures, the ability to maintain confidentiality and a level of authority consistent with the significance of the matter being investigated.

7. Control the interview process.

Obtaining detailed statements from interviews with the complaining party and the accused are a critical part of any investigation. Documentation should include the facts, not legal conclusions, or your interpretations and assumptions. Give witnesses ground rules: No conclusion has been reached, no reprisal will be taken, and no discussions about the interview are allowed with anyone.

8. Communicate throughout the process.

Many employers launch an investigation, only to fail to keep the complainant reasonably informed during the process. Unfortunately, this results in the complaining party believing their complaint was ignored, which may prompt them to involve an attorney.

9. Close the investigation properly.

Having invested the time and cost associated with the investigation, protect your investment by properly closing out the investigation. Make a decision, communicate the decision and document the process.

10. Ensure against retaliation.

Employees who make complaints may be legally protected from experiencing an adverse employment action. This includes complaints involving discrimination, harassment, safety violations, wage and hour violations and more. Do ensure against retaliation by continuing to monitor the situation.


As seen in the December 9th issue of Business Lexington.

© 2011 Dinsmore & Shohl LLP. All rights reserved.

White Collar Crime

The National Law Review would like to advise you of the upcoming White Collar Crime conference sponsored by the ABA Center for CLE and Criminal Justice SectionGeneral Practice,  &   Solo and Small Firm Division:

Event Information

When

February 29 – March 02, 2012

Where

  • Eden Roc Renaissance Miami Beach
  • 4525 Collins Ave
  • Miami Beach, FL, 33140-3226
  • United States of America
Primary Sponsors
  • Highlight

The faculty includes some of the leading white collar lawyers in the United States.  The keynote panels for the 2012 program will continue to focus on the role of ethics and corporate compliance in today’s business environment.

  • Program Description

Each year the National Institute brings together judges, federal, state, and local prosecutors, law enforcement officials, defense attorneys, corporate in-house counsel, and members of the academic community.  The attendees include experienced litigators, as well as attorneys new to the white collar area.  Attendees have consistently given the Institute high ratings for the exceptional quality of the Institute’s publication, its valuable updates on new developments and strategies, as well as the rare opportunity it provides to meet colleagues in this field, renew acquaintances and exchange ideas.

The faculty includes some of the leading white collar lawyers in the United States.  The keynote panels for the 2012 program will continue to focus on the role of ethics and corporate compliance in today’s business environment.  Once again, we expect excellent representation from the corporate sector.

  • CLE Information

ABA programs ordinarily receive Continuing Legal Education (CLE) credit in AK, AL, AR, AZ, CA, CO, DE, FL, GA, GU, HI, IA, ID, IL, IN, KS, KY, LA, ME, MN, MS, MO, MT, NH, NM, NV, NY, NC, ND, OH, OK, OR, PA, RI, SC, TN, TX, UT, VT, VA, VI, WA, WI, WV, and WY. These states sometimes do not approve a program for credit before the program occurs. This course is expected to qualify for 11.0 CLE credit hours (including TBD ethics hours) in 60-minute-hour states, and 13.2 credit hours (including TBD ethics hours) in 50-minute-hour states. This transitional program is approved for both newly admitted and experienced attorneys in NY. Click here for more details on CLE credit for this program.

White Collar Crime

The National Law Review would like to advise you of the upcoming White Collar Crime conference sponsored by the ABA Center for CLE and Criminal Justice SectionGeneral Practice,  &   Solo and Small Firm Division:

 

 

Event Information

When

February 29 – March 02, 2012

Where

  • Eden Roc Renaissance Miami Beach
  • 4525 Collins Ave
  • Miami Beach, FL, 33140-3226
  • United States of America
Primary Sponsors
  • Highlight

The faculty includes some of the leading white collar lawyers in the United States.  The keynote panels for the 2012 program will continue to focus on the role of ethics and corporate compliance in today’s business environment.

  • Program Description

Each year the National Institute brings together judges, federal, state, and local prosecutors, law enforcement officials, defense attorneys, corporate in-house counsel, and members of the academic community.  The attendees include experienced litigators, as well as attorneys new to the white collar area.  Attendees have consistently given the Institute high ratings for the exceptional quality of the Institute’s publication, its valuable updates on new developments and strategies, as well as the rare opportunity it provides to meet colleagues in this field, renew acquaintances and exchange ideas.

The faculty includes some of the leading white collar lawyers in the United States.  The keynote panels for the 2012 program will continue to focus on the role of ethics and corporate compliance in today’s business environment.  Once again, we expect excellent representation from the corporate sector.

  • CLE Information

ABA programs ordinarily receive Continuing Legal Education (CLE) credit in AK, AL, AR, AZ, CA, CO, DE, FL, GA, GU, HI, IA, ID, IL, IN, KS, KY, LA, ME, MN, MS, MO, MT, NH, NM, NV, NY, NC, ND, OH, OK, OR, PA, RI, SC, TN, TX, UT, VT, VA, VI, WA, WI, WV, and WY. These states sometimes do not approve a program for credit before the program occurs. This course is expected to qualify for 11.0 CLE credit hours (including TBD ethics hours) in 60-minute-hour states, and 13.2 credit hours (including TBD ethics hours) in 50-minute-hour states. This transitional program is approved for both newly admitted and experienced attorneys in NY. Click here for more details on CLE credit for this program.

Second Circuit's Citigroup Decision Endorses Presumption of Prudence, Upholds Dismissal of Disclosure Claims

Posted this week at the National Law Review by Morgan, Lewis & Bockius LLP regarding the decision that employer stock in a 401(k) plan is subject to a “presumption of prudence” that a plaintiff alleging fiduciary breach:

 

 

 

In a much-anticipated decision, the U.S. Court of Appeals for the Second Circuit joined five other circuits in ruling that employer stock in a 401(k) plan is subject to a “presumption of prudence” that a plaintiff alleging fiduciary breach can overcome only upon a showing that the employer was facing a “dire situation” that was objectively unforeseeable by the plan sponsor. In re Citigroup ERISA Litigation, No. 09-3804, 2011 WL 4950368 (2d Cir. Oct. 19, 2011). The appellate court found the plaintiffs had not rebutted the presumption of prudence and so upheld the dismissal of their “stock drop” claims.

BACKGROUND

The Citigroup plaintiffs were participants in two 401(k) plans that specifically required the offering of Citigroup stock as an investment option. The plaintiffs alleged that Citigroup’s large subprime mortgage exposure caused the share price of Citigroup stock to decline sharply between January 2007 and January 2008, and that plan fiduciaries breached their duties of prudence and loyalty by not divesting the plans of the stock in the face of the declines. The plaintiffs further alleged that the defendants breached their duty of disclosure by not providing complete and accurate information to plan participants regarding the risks associated with investing in Citigroup stock in light of the company’s exposure to the subprime market. On a motion to dismiss, the district court found no fiduciary breach because the defendants had “no discretion whatsoever” to eliminate Citigroup stock as an investment option (sometimes referred to as “hardwiring”). Alternatively, the lower court ruled that Citigroup stock was a presumptively prudent investment and the plaintiffs had not alleged sufficient facts to overcome the presumption.

SECOND CIRCUIT DECISION

Oral argument in the Citigroup case occurred nearly a year ago, and legal observers have been anxiously awaiting the court’s ruling. In a 2-1 decision, with Judge Chester J. Straub issuing a lengthy dissent, the Second Circuit rejected the “hardwiring” rationale but confirmed the application of the presumption of prudence, which was first articulated by the Third Circuit in Moench v. Robertson, 62 F.3d 553 (3d Cir. 1995). The court also rejected claims that the defendants violated ERISA’s disclosure obligations by failing to provide plan participants with information about the expected future performance of Citigroup stock.

Prudence

Joining the Third, Fifth, Sixth, Seventh, and Ninth Circuits,[1] the court adopted the presumption of prudence as the “best accommodation between the competing ERISA values of protecting retirement assets and encouraging investment in employer stock.” Under the presumption of prudence, a fiduciary’s decision to continue to offer participants the opportunity to invest in employer stock is reviewed under an abuse of discretion standard of review, which provides that a fiduciary’s conduct will not be second-guessed so long as it is reasonable. The court also ruled that the presumption of prudence applies at the earliest stages of the litigation and is relevant to all defined contribution plans that offer employer stock (not just ESOPs, which are designed to invest primarily in employer securities).

Having announced the relevant legal standard, the court of appeals dispatched the plaintiffs’ prudence claim in relatively short order. The plaintiffs alleged that Citigroup made ill-advised investments in the subprime market and hid the extent of its exposure from plan participants and the public; consequently, Citigroup’s stock price was artificially inflated. These facts alone, the court held, were not enough to plead a breach of fiduciary duty: “[T]hat Citigroup made a bad business decision is insufficient to show that the company was in a ‘dire situation,’ much less that the Investment Committee or the Administrative Committee knew or should have known that the situation was dire.” Nor could the plaintiffs carry their burden by alleging in conclusory fashion that individual fiduciaries “knew or should have known” about Citigroup’s subprime exposure but failed to act. Relying on the Supreme Court’s decision in Bell Atlantic Corp. v. Twombly, 550 U.S. 544 (2007), the court of appeals held these bald assertions were insufficient at the pleadings stage to suggest knowledge of imprudence or to support the inference that the fiduciaries could have foreseen Citigroup’s subprime losses.

Disclosure

The court’s treatment of the disclosure claims was equally instructive. Plaintiffs’ allegations rested on two theories of liability under ERISA: (1) failing to provide complete and accurate information to participants (the “nondisclosure” theory), and (2) conveying materially inaccurate information about Citigroup stock to participants (the “misrepresentation” theory).

As to the nondisclosure theory, the court found that Citigroup adequately disclosed in plan documents made available to participants the risks of investing in Citigroup stock, including the undiversified nature of the investment, its volatility, and the importance of diversification. The court also emphasized that ERISA does not impose an obligation on employers to disclose nonpublic information to participants regarding a specific plan investment option.

Turning to the misrepresentation theory, the court found plaintiffs’ allegations that the fiduciaries “knew or should have known” about Citigroup’s subprime losses, or that they failed to investigate the prudence of the stock, were too threadbare to support a claim for relief. Though plaintiffs claimed that false statements in SEC filings were incorporated by reference into summary plan descriptions (SPDs), the court found no basis to infer that the individual defendants knew the statements were false. It also concluded there were no facts which, if proved, would show (without the benefit of hindsight) that an investigation of Citigroup’s financial condition would have revealed the stock was no longer a prudent investment.

IMPLICATIONS

Coming from the influential Second Circuit, the Citigroup decision represents something of a tipping point in stock-drop jurisprudence, especially with respect to the dozens of companies (including many financial services companies) that have been sued in stock-drop cases based on events surrounding the 2007-08 global financial crisis. The Second Circuit opinion gives the presumption of prudence critical mass among appellate courts and signals a potential shift in how stock-drop claims will be evaluated, including at the motion to dismiss stage.[2]

Under the Citigroup analysis, fiduciaries should not override the plan terms regarding employer stock unless maintaining the stock investment would frustrate the purpose of the plan, such as when the company is facing imminent collapse or some other “dire situation” that threatens its viability. Like other circuits that have adopted the prudence presumption, the Citigroup court emphasized the long-term nature of retirement investing and the need to refrain from acting in response to “mere stock fluctuations, even those that trend downhill significantly.” It also sided with other courts in holding that the presumption of prudence should be applied at the motion to dismiss stage (i.e., not allowing plaintiffs to gather evidence through discovery to show the imprudence of the stock). Taken together, these rulings may make it harder for plaintiffs to survive a motion to dismiss, especially where their allegations of imprudence are based on relatively short-lived declines in stock price.

Some had predicted the Second Circuit would endorse the “hardwiring” argument and allow employers to remove fiduciary discretion by designating stock as a mandatory investment in the plan document. The Citigroup court was unwilling to go that far, but it did adopt a “sliding scale” under which judicial scrutiny will increase with the degree of discretion a plan gives its fiduciaries to offer company stock as an investment. This is similar to the approach taken by the Ninth Circuit inQuan and consistent with the heightened deference that courts generally give to fiduciaries when employer stock is hardwired into the plan. Thus, through careful plan drafting, employers should be able to secure the desired standard of review. Language in the plan document and trust agreement (as well as other documents) confirming that employer stock is a required investment option should result in the most deferential standard and provide fiduciaries the greatest protection.

Also noteworthy was the court’s treatment of the disclosure claims. Many stock-drop complaints piggyback on allegations of securities fraud, creating an inevitable tension between disclosure obligations under the federal securities laws and disclosure obligations under ERISA. The Second Circuit did not resolve this tension, but it construed ERISA fiduciary disclosure requirements narrowly and rejected the notion that fiduciaries have a general duty to tell participants about adverse corporate developments. The court made this ruling in the context of SPD disclosures under the 401(k) plan that identified specific risks of investing in Citigroup stock. Plan sponsors should review their SPDs and other participant communications to make sure company stock descriptions are sufficiently explicit about issues such as the volatility of a single-stock investment and the importance of diversification. These disclosures may go beyond what is already required under Department of Labor regulations.


[1]. See Howell v. Motorola, Inc., 633 F.3d 552, 568 (7th Cir.), cert.denied, ­­­2011 WL 4530151 (2011); Quan v. Computer Sciences Corp., 623 F.3d 870, 881 (9th Cir. 2010); Kirschbaum v. Reliant Energy, Inc., 526 F.3d 243, 254 (5th Cir. 2008); Kuper v. Iovenko, 66 F.3d 1447, 1459-60 (6th Cir. 1995).

[2]. That said, plan sponsors and fiduciaries should continue to monitor future developments in Citigroup in light of Judge Straub’s dissenting opinion and the likelihood of a petition for rehearing (or rehearing en banc), which the Citigroup plaintiffs have indicated they intend to seek. In his dissent, Judge Straub rejected the Moench presumption in favor of plenary review of fiduciary decisions regarding employer stock. He also disagreed with the majority’s interpretation of ERISA disclosure duties.

Copyright © 2011 by Morgan, Lewis & Bockius LLP. All Rights Reserved.