Yee Haw! Texas lawyers must be competent in technology under revised rule 1.01

The Texas Bar recently became the 36th State to codify what the American Bar Association (ABA) Model Rules of Professional Responsibility did in 2012 by…

Security Center of Excellence profile picture

Security Center of Excellence

May 13, 20195 minutes read

Descriptive text explaining the contents of the image.

The Texas Bar recently became the 36th State to codify what the American Bar Association (ABA) Model Rules of Professional Responsibility did in 2012 by adding very specific language about attorney competency and technology. In the newly revised Texas Rule 1.01, Paragraph 8 states:

“Because of the vital role of lawyers in the legal process, each lawyer should strive to become and remain proficient and competent in the practice of law, including the benefits and risks associated with relevant technology.

This rule comes as lawyers grapple with ethical issues concerning the use of cloud technology, storing privileged documents with outside vendors, and relying on key document review tasks on smart computer algorithms.

What are your ethical duties with using new technology?

Over the last twenty years, a number of new technologies and methods have had a dramatic impact on how legal services are delivered. Fax machines, scanning, e-filing, document review software and machine learning all have changed the landscape of how attorneys work. Each of these changes brings new potential ethical challenges.

When it comes to e-discovery, the issue of whether an attorney has an ethical obligation to understand the risks and benefits of the relevant technology is more probative now than ever before. The goal of any review, whether linear, keyword search or one using technology-assisted review (TAR), is to find relevant documents. When you respond to production requests, there is an affirmative duty to make reasonable efforts to find the requested documents and to produce them.

In fact, Fed. R. Civ. P. 26(g) states that: “Every… discovery request, response, or objection must be signed by at least one attorney of record in the attorney’s own name” verifying that to the best of the lawyer’s knowledge, a reasonable inquiry and efforts were made.

Increasingly, TAR is making document review more efficient and cost-effective. TAR 2.0 — or predictive analytics based on the continuous active learning (CAL) protocol — automatically re-ranks the documents to put the most relevant documents first, continually ranking and surfacing relevant documents based on the previous coding decisions. There’s also continued and significant judicial guidance on its use. For example, in Hyles v. City of New York, No. 10 Civ. 3119 (S.D.N.Y. Aug. 1, 2016), Judge Andrew Peck opined that “[t]here may come a time when TAR is so widely used that it might be unreasonable for a party to decline to use TAR”.

Ethically using TAR to make my review more efficient and cost-effective

To meet the obligations outlined in Fed. R. Civ. P. 26(g), you need to understand the strengths and weaknesses of different approaches to finding responsive documents. For starters, you need to be able to answer questions like these:

  • Have we gone to the right sources to be confident we are securing responsive data?
  • Have we asked the right questions to ensure we are getting responsive data?
  • Have we collected the data in a reasonable way such that we will preserve the right files and related metadata?
  • Did we use reasonable culling methods to weed out obviously non-responsive documents?
  • Did we use a reasonable method to review the remaining documents in order to find responsive ones?
  • Did we find a reasonable percentage of responsive documents?

Not knowing the answers to these questions can put an attorney at risk of violating ABA Model Rule 1.6 which requires lawyers to make “reasonable efforts to prevent inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.” This, of course, includes discovery documents. ABA Model Rule 5.3 also puts the onus on lawyers to ensure that their service providers act ethically.

Whether or not an attorney actually understands the algorithms or the science behind TAR, Texas Rule 1.01, Paragraph 8 states that “a lawyer should engage in continuing study and education.” After all, competency is defined in the Texas Rules of Professional Responsibility as possessing “or the ability to timely acquire the legal knowledge, skill, and training reasonably necessary for the representation of the client.” This can be through sufficient learning and skill before performance is required, or association with discovery consultants or counsel.

Courts are increasingly chastising lawyers for not paying attention to “relevant technology” such as TAR. Ultimately, while perfection isn’t required in e-discovery, the courts expect lawyers to act reasonably. Understanding your obligations surrounding the use of new technology can give you and the client comfort that you have complied with your ethical obligations.

Learn more

To learn more about TAR, take a look at the following educational resources:

Contact us to learn more about how OpenText™ can help.

Are you ready for the Intelligent and Connected Enterprise? Join us at OpenText™ Enterprise World 2019 to hear how we’re enabling the Intelligent and Connected Enterprise with AI and the Internet of Things.

Share this post

Share this post to x. Share to linkedin. Mail to
Security Center of Excellence avatar image

Security Center of Excellence

See all posts

More from the author

Threat alerts

Threat alerts

December 2021 December 14, 2021: Log4j Summary: Top US cybersecurity officials have warned of the zero-day vulnerability found in the Java logging library Apache Log4j….

June 3, 2021 1 minute read
Lessons from the SolarWinds attack: How to protect your business

Lessons from the SolarWinds attack: How to protect your business

By the time it was discovered in December, the SolarWinds cyber attack had evaded the security defenses of and penetrated at least 18,000 government agencies,…

March 25, 2021 5 minutes read
The HAFNIUM Attack on the on-premises Microsoft Exchange Server

The HAFNIUM Attack on the on-premises Microsoft Exchange Server

On March 2, Microsoft announced that its on-premises Exchange Server had experienced multiple 0-day exploits. Microsoft commented: “In the attacks observed, the threat actor used…

March 18, 2021 3 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.