This is Part 10 of 10 in the eFiling Blog Series, check out Part 9 here.
To conclude this eFiling series, let’s look back at a few pieces posted in the past that dealt with the enhancement of both the audit trail and the control over confidentiality offered by eFiling.
One of the fun pieces I wrote, inspired by a presentation David Slayton, included an explanation of the audit trail provided by a good eFiling system.
[David] says … “… I know EXACTLY where the document came from, and whose profile was used to send it.” Knowing that a document has come from the right place, and knowing whose secure profile was used to send it, constitute security orders of magnitude greater than a written signature on a piece of paper…
Taking David’s point a step further, in an appropriately implemented Enterprise Content Management (ECM) with workflow system, not only do you know where the document came from, you know where it’s been and where it’s supposed to be going. It’s like Billy’s trail in the Family Circus: it leaves its tracks. It keeps track of who has looked at it and when. It keeps track of what was done to it, by whom, and when. And, unlike Hansel and Gretel’s breadcrumb trail, it doesn’t disappear.
…. [I]n a properly implemented ECM with workflow system, not only do we know that the document comes from who it’s supposed to; we know whether or not it’s been altered since it was sent, who has touched it, where it’s been, where it’s heading, whether it’s behavior makes sense, and if not, what would make better sense.
Stalking the Wily Electronic Documents, January 12, 2015
In another piece, I got to use one of my favorite pieces of doggerel (“Last night I saw upon the stair/ A little man who wasn’t there…”) to illustrate how a well-designed ECM system provides auditable Record Integrity:
A reliable document Chain of Custody in the paper world is merely a means of attempting to protect the Principal of Integrity. (Albeit an expensive, labor-intensive, highly unreliable, almost-never-completely followed means). Even with special viewing areas and monitors, do courts control ALL access by ALL staff, ALL attorneys, and ALL judges, not to mention cleaning and security staff? Not usually.
ECM provides a built-in mechanism for maintaining an audit trail of the Chain of Custody for court documents, providing end-to-end assurance of document integrity. ECM users view documents on screen and don’t come in contact with the physical file. From identity and signature authentication (when needed) at the front end, through tracking who accesses each document and when, to ”locking out changes” to prevent tampering, ECM absolutely protects document integrity…
Proving the Negative, October 3, 2011
Confidentiality has several aspects. There’s things like judge’s notes, intended only for the judge or designated persons. Then there’s confidential information, like Social Security Numbers, minors’ names, abuse victims’ addresses, and so on, contained in otherwise public documents. There are totally confidential documents, like Secret Indictments. There are confidential case types, like some juvenile matters or adoptions, where the entire case is confidential.
eFiling and ECM provide greater control of confidential information, at all levels of granularity – from individual data element to entire case. Who can see what can be tightly controlled and administered. So, for example, attorneys on confidential juvenile cases can see their clients’ files, but no others. Court employees and judges with clearance can see confidential data that has been redacted using automated, workflow-enabled tools making it invisible to unauthorized persons.
However, as I noted in the March 14, 2012 posting,
This does not mean courts should not carefully review and, if required, modify rules and statutes to make certain there are no unpleasant surprises … The paper-on-demand court environment IS different than the hard-copy environment. The area of Public Records discoverability has wrinkles in the paper-on-demand environment that never arise in the paper world…
… Recommended best practice:
1) Ensure that disclosure rules call out both electronic and paper work product as their own non-disclosable category of information;
2) Maintain the non-disclosable work product documents in separate document types from formal court records, with security configuration that prevents viewing by unauthorized system users; and
3) Support electronic document annotations that don’t technically alter the original document and have their own security distinct from the document
While the business case for eFiling generally emphasizes the savings, convenience, work process streamlining, and quality improvements, the benefits of having a robust, easily managed audit trail and greatly enhanced control over confidentiality certainly should not be overlooked as additional “low-hanging fruit” when moving to eFiling and ECM.