Mining for Embedded Data: Is It Ethical to Take Intentional Advantage of Other People’s Failures?

Download Full Text PDF

Volume 8, Issue 2 (Jun 2012)

Embedded data is information, including metadata, that accompanies many common word processing files, but which is ordinarily not seen on the screen. Unless a lawyer removes embedded data from a file before sending the file to opposing counsel, the embedded data accompanying the file could reveal confidential or privileged information. The authorities disagree on whether the transmission of embedded data is either “inadvertent” or “dishonest” in terms of the disciplinary rules. This Article contends that transmission of embedded data should be at least presumptively inadvertent and that it is dishonest for a lawyer to actively look for embedded data.

David Hricik, Mining for Embedded Data: Is It Ethical to Take Intentional Advantage of Other People's Failures? , 8 N.C. J.L. & Tech. 231 (2007), available at http://ncjolt.org/wp-content/uploads/2016/09/11_8NCJLTech2312006-2007.pdf.

The North Carolina Journal of Law & Technology has adopted the Open Access Program, a part of the Scholar’s Copyright Project created by Science Commons. Authors designate the conditions under which their articles are licensed. By downloading articles, you agree to comply with the license terms specified. Please contact NC JOLT at eic.ncjolt@gmail.com with permissions inquiries.