To Shred Or Not to Shred – That Is the Question by Kathy Parker, CP — Submitted by Humboldt County LPA
Total Page:16
File Type:pdf, Size:1020Kb
KaThy ParKer, CP, has been a member of Humboldt County Legal Professionals Association for 18 years, holding numerous chair and board positions. She is the current Governor and Executive Advisor, most recently sitting as president in 2012-2013. She is a certified paralegal employed in civil litigation and insurance defense at the Law Offices of Mitchell, Brisso, Delaney & Vrieze, LLP, in Eureka, California. To Shred or Not to Shred – That is the Question By KaThy ParKer, CP — suBmitted By humBoldT CounTy lPa e have an annual “cleaning day” at our office, where the staff vaguely become aware that the numerous W and/or voluminous files that have been closed and stored upstairs during the last year have filled storage to capacity and some must either be carted to off-site storage or destroyed. The basic understood principle that ments lose their value and become readily comes to mind has always been obsolete. Keeping them indefinitely “records must be retained for seven can expose your clients to unnecessary years . or is it ten?” -- a vague mis- risks that can be avoided with a docu- understanding that rises to the surface ment destruction strategy. Regulatory annually when contemplating ones compliance and increased emphasis own tax records (for clarification, see: on ethical conduct and accountabil- http://www.irs.gov/Businesses/How- ity demand that you safeguard your long-should-I-keep-records). But what clients’ privacy and administrative does “records retention” mean in the records. i law office and when can documents be The United States Supreme Court shredded? That answer is not as simple determined a case that helped define as it once was considered to be, and for privacy rights relating to material dis- the purpose of this article, will basically carded as trash. (California v. Greenwood, cover the background for requirements 486 U.S. 35 (1988).) In this case, the accessible to animals, children, scaven- pertaining to retention or shredding of Supreme Court held that the Fourth gers, snoops, and other members of the data. Amendment does not prohibit the war- public (including criminals, investiga- The procedures for preservation rantless search and seizure of garbage tors, journalists, garbage collection and non-preservation of information left for collection outside the curtilage agencies, law enforcement, etc.). have become more complex due to the of a home. ii Privacy protection is experiencing a electronic age and privacy issues. Of Greenwood had thrown out informa- rebirth in legislative activity. The run- course, different kinds of documents tion in his trash that incriminated him away crime of “identity theft” is causing require different handling or retention in a crime, and the information was a groundswell of interest in the elector- periods. (For example, a client’s estate used to gain a conviction. Greenwood ate; hence, also in our state and federal plan or corporate records should be claimed that he was the victim of an politicians. “Identity theft” also has a kept in perpetuity, pending death or unlawful search and that his privacy connection to national security issues. dissolution; but a paper file containing rights had been violated. In its ruling, The concept of protecting the a lawsuit that settled a number of years the Supreme Court stated that there privacy of ordinary citizens did not ago may not need to be kept, while its could be no expectation of privacy become significant until the beginning key electronic storage may be useful for in trash left accessible to the public. future or separate litigation purposes.) The Court further stated it is common However, eventually, even legal docu- knowledge that garbage is readily Continued on page 10 a u g u s t 2 0 1 3 | 9 to Shred or not to Shred Continued from page 9 of the information age. Problems arose physical documents; erasure or destruc- sions to be delayed if a law enforce- from increased identity theft. The tion of all electronic media; and enter- ment agency determines that it would U.S. Congress responded with acts to ing into a contract with a third party impede a criminal investigation. The protect privacy: the Social Security Act engaged in the business of information bill would require an agency, person, or of 1934; Privacy Act of 1974; Right to destruction.iii business that maintains computerized Financial Privacy Act of 1978; Health The “Comprehensive Identity Theft data including personal information Insurance Portability and Account- Protection Act” was passed in 2006. owned by another to notify the owner ability Act of 1996 (HIPAA); Economic Almost every state is also passing laws or licensee of the information of any Espionage Act of 1996 (EEA); Gramm- to protect identity and privacy, and at breach of security of the data, as speci- Leach-Bliley Act (GLBA) of 1999; Fair the federal level additional new laws fied. The bill states the intent of the Credit Reporting Act of 2001 (FCRA); are being introduced. California and Legislature to preempt all local regula- Sarbanes-Oxley Act of 2002; and the Georgia are being particularly aggres- tion of the subject matter of the bill. Fair and Accurate Credit Transactions sive, where new laws even require “self- This bill would also make a statement Act of 2003 (FACTA). These legisla- reporting” of any security incident. The of legislative findings and declarations tive acts have reinforced the overall message is clear that private and con- regarding privacy and financial secu- need for organizations to take reason- fidential information should no longer rity. able measures to safeguard private be disposed of in the trash. Thus, if you Civil Code sections 1798.80-1798.84 documents. look up “shredding laws” on the Inter- provide details pertaining to require- The 2003 FACTA expanded several net, you will find numerous shredding ments, violation, rights, and remedies.iv FCRA provisions and provides pro- businesses that provide much more The consequences for failing to main- tection for victims of identity theft detailed information regarding the tain legislative compliance include (and includes one free credit report congressional acts (see sources listed at serious fines and penalties.v per year). The Federal Trade Commis- the end of this article, as well as local So it is clear that basic steps are sion (FTC) utilizes federal law and is advertisers in your area), and offers needed to create and implement an responsible for enforcement. FACTA for professional shredding services are effective document retention policy is a federal law designed to minimize prolific. (a whole separate magazine article in the risk of identity theft and consumer Existing law requires a business to itself). The reader here should utilize fraud by enforcing the proper destruc- take all reasonable steps to destroy a research tools available to effectu- tion of consumer information. The FTC customer’s records containing personal ate a well-designed policy that ceases developed the Disposal Rule in Novem- information when the business will document destruction upon notice of ber 2004 to further implement the poli- no longer retain those records. The a pending lawsuit or governmental cies set forth in FACTA. The Disposal existing laws provide civil remedies for investigation, as well as utilizing Gov- Rule applies to businesses that utilize violations of these provisions. Califor- ernment Code requirements for specific consumer information; however it nia Senate Bill 1386 was introduced in retention periods, depending upon the affects every person and business in July 2003 and was the first attempt by a type of entity, or department within the the United States. The Disposal Rule state legislature to address the prob- entity, for which the document reten- requires disposal practices that are lem of identity theft. In short, the bill tion policy is needed. reasonable and appropriate to prevent introduces stiff disclosure requirements While paper shredding can elicit the unauthorized access to – or use of – for businesses and government agencies information in a consumer report. images of obstruction of justice a lá that experience security breaches that Enron, with today’s technological The FACTA Disposal Rule, effective might contain the personal information advances and the information-sharing June 1, 2005, states that “any person of California residents. It is expected electronic age, the majority of informa- who maintains or otherwise possesses that many organizations in the United tion is now generated electronically, consumer information for a busi- States (and possibly worldwide) are and 60 to 70 percent of all documents ness purpose” is required to dispose now subject to these requirements. are never printed. Hence, discovery of discarded consumer information, SB 1386 comes with the biggest of electronic information is also criti- whether in electronic or paper form. recrimination, allowing for civil ligation cal in litigation today. The California The Disposal Rule further clarifies the against businesses that don’t comply. If state courts, as well as federal courts, definition of compliance as “taking you fail to disclose computer security allow discovery of information stored reasonable measures to protect against breaches, you become liable for civil electronically. Revisions to the Federal unauthorized access to or use of the damages and may face a class action Rules of Civil Procedure to incorpo- information in connection with its dis- lawsuit. However, the bill permits rate electronic discovery continue to posal.” “Reasonable measures” include notifications required by its provi- be updated. It is assumed that state burning, pulverizing, or shredding 1 0 | t H E L E g a L s ECRE TA RY court judges will utilize federal rules to ally be destroyed. By not adhering to a destruction of evidence may have sig- some degree for guidance when dealing program of routinely destroying stored nificant ramifications in litigation. with issues pertaining to discovery of records, a company exhibits suspi- ENDNOTES: electronic evidence.