EMAIL DISCLAIMER AGREEMENT

We are pleased that you desire to contact a person at McCandlish Lillard via e-mail. This website contains information about McCandlish Lillard but not legal advice, and you should not consider it to contain legal advice.  Before you proceed with an e-mail to us, we must caution you that WE CANNOT ACCEPT ANY INFORMATION FROM YOU UNTIL WE KNOW THAT DOING SO WILL NOT BE A CONFLICT OF INTEREST WITH AN EXISTING CLIENT. 

An attorney-client relationship will arise only when there is an express agreement between you and McCandlish Lillard.  PLEASE DO NOT SEND US ANY INFORMATION THAT IS SPECIFIC TO YOUR LEGAL CONCERN OR THAT MIGHT BE CONSIDERED CONFIDENTIAL without first obtaining written confirmation to do so from one of McCandlish Lillard’s attorneys. Information received by McCandlish Lillard prior to McCandlish Lillard providing confirmation for you to send it will not be treated as private, confidential or otherwise be protected from disclosure, and instead MAY BE USED BY McCANDLISH LILLARD AND ITS ATTORNEYS AND EMPLOYEES FOR ANY PURPOSE WHATSOEVER, EVEN IF ADVERSE (CONTRARY) TO YOUR INTERESTS. You are welcome, however, without seeking or receiving the above written confirmation, to e-mail non-confidential and non-specific general inquiries, such as asking whether McCandlish Lillard handles particular types of transactions, or simply asking someone to please contact you.

Please click AGREE if you understand and accept the foregoing conditions and wish to proceed with an e-mail. If you have not understood and accepted the foregoing conditions, you should click DISAGREE, but you remain welcome to browse our web site or to telephone us for more information.

Resources

An Employer Has Leeway to Fashion Policies for Computer Use

An employer has substantial leeway when it comes to fashioning policies governing the use of company computer and communication systems and to monitoring employee use of company systems to ensure compliance with policies?  Having network policies that limit access to competitively sensitive information can help give that information trade secret status.  Having the right kind of email and internet policies allows an employer to monitor employee use of those systems without running afoul of privacy rights and to protect the network from viruses, unlicensed software, and potential hacking.  Our lawyers can help identify what interests are served by having what policies and how safely to write, implement, and enforce such policies.

For further information, contact:

Disclaimer:  This firm only offers legal advice to clients, and the facts of a particular situation usually drive the legal advice we give to clients.  This message is not intended to be legal advice appropriate for all situations.