MEMORANDUM AND ORDER
This matter comes before the .Court on the defendants’
Motion
[2832]
to Strike
Plaintiffs■’
Notice of Supplemental Infor-
BACKGROUND
On December 5, 2001, having been presented with extensive evidence of the lack of security for Individual Indian Trust data housed on or accessed by information technology systems at Interior, the Court entered a temporary restraining order requiring “that defendants shall immediately disconnect from the- Internet all information technology systems that house or provide access to individual Indian trust data [and] that defendants shall immediately disconnect from the Internet all computers within the custody and control of the Department of the Interior, its employees and contractors, that have access to individual Indian trust data.” Temporary Restraining Order [1036], issued Dec. 5, 2001, at 2. 1 At Interior’s urging, the Court entered a consent order on December 17, 2001, outlining a procedure by which Interior could reconnect its IT systems to the Internet only after satisfying the Special Master that those systems were secure. See Consent Order [1063], issued Dec. 17, 2001. The December 17, 2001 Consent Order, not having been modified by any subsequent Order, remains in effect today.
The Special Master’s process for reviewing Interior’s IT security broke down .in late spring, 2003,
see Cobell v. Norton,
Upon reviewing Interior’s certifications for Internet-connected IT systems submitted in accordance with the June 28, 2003 preliminary injunction and finding them to be both procedurally and substantively defective, the Court, on March 15, 2004, entered a preliminary injunction that required Interior to disconnect (or to keep disconnected) from the Internet Interior’s IT systems at certain bureaus and offices, including the BIA, regardless of whether or not they housed or accessed Individual Indian Trust Data.
See Cobell v. Norton,
The D.C. Circuit vacated the Court’s March 2004 preliminary injunction by opinion issued December 3, 2004.
See Cobell v. Norton,
The plaintiffs subsequently filed, as-'an attachment to their Notice of Supplemental Information in Support of Plaintiffs’ Renewed Request for Emergency Status Conference (“Pis.’ Notice”), a copy of a May 7, 2004 memorandum from Kaniah Konkoly-Thege, an attorney in Interior’s Office of the Solicitor, to BIA Chief Information Officer Brian Burns (“the memorandum”). See Pis.’ Notice [2810], filed Jan. 11, 2005, at Ex. 1 (Mem. from Konkoly-Thege to Burns, May 7, 2004). That memorandum recounts the advice of both the Department of Justice (“DO J”)- and the Solicitor’s Office regarding the Secretary of the Interior’s conclusion that the proposal of the Assistant Secretary of the Interior for Indian Affairs and the BIA to “implement Lotus Notes remote dial-up” on BIA IT systems would not violate “any of the Cobell court orders.” 2
The defendants make two arguments in support of their motion to strike the plaintiffs’ Notice and the memorandum. First, the defendants contend that the allegation in the plaintiffs’’ Notice — that the Lotus Notes remote dial-up system at BIA would constitute an illicit Internet connection— has no basis in fact and that the Notice should be stricken for that reason. The Court finds, however, .that the truth of the plaintiffs’ contention in this regard is a question of fact that may only be resolved after the current evidentiary hearing is completed. It follows that the Court cannot summarily strike the plaintiffs’ Notice for lack of evidentiary support on the basis of the unsupported assertions in the defendants’ motion alone.
The defendants’ second argument is that the memorandum is shielded by the attorney-client privilege and thus should not be discoverable or subject to public release by the plaintiffs. Thus, the defendants claim, the memorandum, the plaintiffs’ Notice (which recounts the content of the memorandum in some detail), and any other of the plaintiffs’ filings referencing the content of the memorandum, should be stricken from the record in this case. The plaintiffs respond that the memorandum falls within the “fiduciary exception” to the attorney-client privilege. There is no need to address the applicability of the fiduciary exception, however, as the Court concludes that the defendants have failed, as a threshold matter, to demonstrate that any part of the memorandum is protected by the attorney-client privilege.
DISCUSSION
Federal Rule of Civil Procedure 12(f) provides, in relevant part, that “upon motion made by a party within 20 days of service of the pleading upon the party ..., the court may order stricken from any pleading any insufficient defense or any redundant, immaterial, impertinent, or scandalous matter.” fed. r. Civ. p. 12(f). An allegation may be stricken as “scandalous” under this standard if it is found to be wholly lacking in evidentiary support.
See, e.g., Alexander v. FBI,
The plaintiffs’ Notice alleges that the BIA Lotus Notes remote dial-up system “clandestinely enable[s] thousands of employees and contractors to reconnect to the Internet in direct violation of this Court’s orders”; Pls.’ Notice at 3; and that various Interior and DOJ personnel and officials participated or were complicit in the alleged violation. See, e.g., id. at 1-2. The defendants deny that the Court’s Orders would be violated, insisting that the BIA Lotus Notes remote dial-up system neither constitutes an Internet connection nor requires any Internet connectivity in order to function. In support of this argument, the defendants cite only the memorandum itself, in which various offices conclude that the BIA Lotus Notes remote dial-up system would not violate this Court’s Orders. -See Defs.’ Reply [2861] to Pis.’ Opp. to Defs.’ Mot. to Strike (“Defs.’ Reply”), filed Mar. 3, 2005, at 2 (concluding that plaintiffs’ failure to cite evidence for allegations in plaintiffs’ Notice renders those allegations rebuttable by citation to the memorandum alone).
Unfortunately, the statements in the memorandum, which are unsworn and unverified, are not proper evidence to support the necessary factual predicate for the defendants’ argument — that the BIA Lotus Notes remote dial-up system does not constitute a connection to the Internet within the meaning of this Court’s Orders. No facts are recited in the memorandum in support of this conclusion, the memorandum merely asserts the conclusion and details various agencies’ positions regarding the conclusion’s validity.
Indeed, the only fact in the record related to this issue is the fact that the BIA either has implemented or plans to implement a Lotus Notes remote dial-up system. Because this fact, without more, is insufficient to establish either the defendants’ conclusion that the system does not constitute an Internet connection or the plaintiffs’ conclusion that it does; and because the implementation of Lotus Notes remote dial-up does not, on its face, tend to make either conclusion more likely to be true than the other; it follows that both conclusions are equally likely to be true on the present..record. ■ Put differently, the single relevant fact in the record lends equal support to both parties’ assertions. Thus, the Court cannot conclude that the allegations in the plaintiffs’ Notice should be stricken as wholly devoid of factual support.
The defendants’ second argument in favor of striking the plaintiffs’ Notice and the memorandum is that the content of the memorandum is protected by the attorney-client privilege. This Court has previously removed from the public record in this case documents shown to contain privileged material.
See, e.g., Cobell v.
According to Federal Rule of Evidence 501, “the privilege of a witness ... shall be governed by the principles of the common law as they may be interpreted by the courts of the United States in light of reason and experience.” Fed. R. Evid. 501. The attorney-client privilege — the most venerable of these common law evidentiary privileges,
see Upjohn Co. v. United States,
Generally, the attorney-client privilege will apply where:
(1) the asserted holder of the privilege is or sought to become a client; (2) the person to whom the communication was made (a) is a member of the bar of a court or his subordinate and (b) in connection with this communication is acting as a lawyer;' (3) the communication relates to a fact of which the attorney was informed (a) by his client (b) without the presence of strangers (c) for the purpose of securing primarily either (i) an opinion of law or (ii) legal services or (iii) assistance in some legal proceeding, and (d) not for the purpose of committing a crime or tort; and (4) the privilege has been (a) claimed and (b) not waived by the client.
Cobell v. Norton,
Both the-DOJ and the Solicitor’s Office are in attorney-client relationships with Interior — DOJ is Interior’s trial counsel in this litigation and the Solicitor’s Office is Interior’s general counsel. This observation entails the conclusion that both DOJ and the Solicitor’s Office are in attorney-client relationships with each of Interior’s bureaus, divisions, offices, officials, and employees.
See Mead Data Central, Inc. v. United States Dep’t of the Air Force,
Given the nature of these attorney-client relationships, the attorney-client privilege hypothetically extends to: (1) communica
Having found that these attorney-client relationships exist, it is also clear from the face of the memorandum that Interior, the client, sought and received legal advice from the DOJ and the Solicitor’s Office relating to the activation of a Lotus Notes remote dial-up system at the BIA, a fact about which DOJ and the Solicitor’s Office were undoubtably informed by Interior for the purpose of obtaining the legal advice transmitted in the memorandum. The Court is willing to assume that Interior did not seek the advice given in the memorandum in furtherance of any crime, fraud, or tort; and. Interior has clearly asserted the privilege in its motion to strike. Thus, the memorandum facially satisfies the test for privileged attorney-client communications set forth in
Alexander.
The
Alexander
test is incomplete, however, when applied to communications made by attorneys to clients, like the communications relayed in the memorandum at issue here, as opposed to communications made by clients to attorneys. In the case of attorney-to-client communications, attorney-client privilege may only properly be invoked if the communications “rest on
confidential
information obtained from a client.”
In re Sealed Case,
Thus the proponent must make two additional showings when asserting the privilege for an attorney-to-client communication. First, the claimant must establish that the communication was predicated on information obtained from the client; and second, the claimant must demonstrate that this information obtained from the client was confidential. The prototypical case would involve a client confessing some act, to his attorney and asking for advice on his possible criminal liability for having committed that act. Because “[t]he first step in the resolution of any legal problem is ascertaining the factual background and sifting through the facts with an eye to the legally relevant[,]”
Upjohn,
As in the prototypical case, the memorandum at issue here contains legal advice concerning the client’s possible liability for committing an act — the implementation of Lotus Notes remote dial-up at BIA. Any competent legal advice on this question must be based on the knowledge of DOJ and the Solicitor’s Office concerning BIA’s plan to implement Lotus Notes remote dial-up the detailed workings of such a system in the BIA’s IT environment. Assuming the attorneys whose opinions are relayed in the memorandum exercised the appropriate level of diligence in formulating their opinions, the memorandum facially satisfies the first requirement of the expanded Alexander privilege test for attorney-to-client communications.
What remains is to determine whether the information communicated to DOJ and the Solicitor’s Office by Interior-the fact that BIA was planning to implement Lotus Notes remote dial up and the details concerning how that system would work-was confidential at the time it was communicated. In order for client information to be confidential, the client must communicate the information to the attorney “with the expectation of secrecy,” and the information must not have been “known or. disclosed to any third party” at the time it was communicated.
Mead Data Central,
Bearing in mind that “ ‘[t]he proponent must conclusively prove each element of the .[attorney-client] privilege[,]’ ”
In re Lindsey,
Moreover, it is unlikely that Interior could produce evidence to support the proposition that the information regarding BIA’s Lotus Notes remote dial-up system was confidential within the meaning of our privilege law. The Court of Appeals recently reaffirmed prior holdings that Interior, as trustee-delegate of the Individual Indian Money Trust, is subject to .all the common law fiduciary duties that govern trusteeships generally, so long as the fiduciary duties have some statutory basis.
See Cobell v. Norton (“Cobell XIII”),
Interior’s statutory duty under the 1994 Indian Trust Fund Management Reform Act,
codified in relevant part at
25 U.S.C. § 162a(d), to provide a full and accurate accounting of the Trust to the Indian beneficiaries, recognized by this Court and affirmed by the Court of Appeals,
see Cobell v. Babbitt,
Thus, the Court has no doubt that Interior, as trustee-delegate of the Individual Indian Trust, has a common law fiduciary duty to fully and accurately inform the Indian Trust beneficiaries about Interior’s management of the trust.
See Eddy v. Colonial Life Ins. Co. of Am.,
It has become abundantly clear in the course of this litigation that the security of Interior’s IT systems and the data housed on those systems is of vital interest to the Individual Indian Trust beneficiaries. Indeed, this Court disconnected Interior’s IT systems from the Internet in 2001 precisely because the security weaknesses found to. exist in those systems threatened the integrity of Individual Indian Trust data, which data is of immeasurable importance to the beneficiaries for a variety of reasons. Records of transactions involving trust assets, appraisals, of trust land, and the progression of ownership of the trust corpus are stored on Interior’s IT systems. If this data .is corrupted -or lost, the beneficiaries will have no way of knowing the value of their trust assets or what the government is doing with those assets.
Furthermore, loss or corruption of trust data guarantees that Interior will be forever unable to render the full and accurate accounting of the Trust mandated by this Court, by the Court of Appeals, by federal statute, and by Interior’s common-law fiduciary duties as trustee-delegate. Indeed, the Court of Appeals has affirmed these propositions more than once, recently reiterating its previous conclusion, that “maintaining adequate computer systems, along with staff and document retention policies, is critical to the completion of an adequate accounting.”
Cobell XII,
Accordingly, at the time the information about BIA’s implementation of Lotus Notes remote dial-up was communicated to DOJ and the Solicitor’s Office, Interior, as trusteeLdelegate of the Indian trust, was under a common-law, statutory, and case-law imposed duty to disclose that same information to the Indian Trust beneficia
What is dispositive of the present motion, leaving aside the defendants’ failure to conclusively prove that each requirement for applicability of the privilege is satisfied here, is the observation that the existence of Interior’s duty to disclose this information to the beneficiaries, who are also the plaintiffs in this case, entails that Interior could not have had any reasonable expectation of secrecy at the time the information about BIA’s plans to implement a Lotus Notes remote dial-up system was communicated to the Solicitor’s Office , and DOJ.
Cf. Cobell,
If Interior nevertheless subjectively expected to keep this information secret and thereby breach its fiduciary duty to disclose, the Court can only conclude that such an expectation was “manifestly unreasonable” and cannot support a finding that the information was “confidential” within the meaning of the governing law. After all, the attorney-client privilege is designed to protect the privacy interests of clients in general and thereby promote “the best possible” representation by attorneys.
See Mead Data Cent.,
For example, where a client’s expectation of confidentiality is unreasonable because the information communicated to the attorney is likely to be made public through another channel, such as the discovery process, denying that information the protection of the attorney-client privilege “is in accordance with the purposes of the privilege; a client will not be less likely to show his lawyer important documents, because those documents do not become more easily discoverable by their revela
Here, Interior’s fiduciary duties mandate that the information concerning BIA’s Lotus Notes remote dial-up system should be disclosed to the plaintiff-beneficiaries, and revealing that information to an attorney does not make it any moré “discoverable” — the beneficiaries already have a right to the information. Placing this information outside the attorney-client privilege does not provide any disincentive for clients in general to disclose information to their attorneys, meaning that the underlying purposes of the attorney-client privilege do not support application of the privilege in this instance. Because the client-information underpinning the substance of the attorney-to-client o communications in . the memorandum at issue here is not itself confidential, the attorney-client privilege does not apply to those communications,
8
CONCLUSION
The defendants have failed to satisfy the Court that the plaintiffs’ Notice makes allegations lacking any basis in fact; and the attorney-to-client communications contained in the memorandum are not protected by the attorney-client privilege. Thus, the Court will not strike from the public record in this case the plaintiffs’ Notice, the memorandum, or any subsequently filed document that quotes or references the plaintiffs’ Notice or the memorandum.
Accordingly, it is hereby
ORDERED that the defendants’ Motion [2832] to Strike Plaintiffs’ Notice of Supplemental Information in Support of Plaintiffs’ Renewed Request for Emergency Status Conference is DENIED.
SO ORDERED.
Notes
. Subsequently, on the defendants' motion, the Court modified the December 5 TRO to allow Interior to "reconnect to the Internet, within 24 hours of notice to the Special Master and plaintiffs' counsel with appropriate documentation, any information technology system that does not house individual Indian trust data and that does not provide access to individual Indian trust data.” Order, issued Dec. 8, 2001, at 1.
. All BIA’s IT systems housing or accessing Individual Indian Trust Data were initially disconnected from the Internet pursuant to the December 5, 2001 TRO and remain disconnected today, pursuant to the December 17, 2001 Consent Order, because Interior has never obtained approval from the Special Master or the Court (after the end of the Special Master’s involvement in this litigation) to reconnect those systems.
. Indeed, the American Bar Association's Code of Professional Responsibility indicates
A lawyer should be fully informed of all the facts of the matter he is handling in order for his client to obtain the full advantage of our legal system. It is for the lawyer in the exercise of his independent professional judgment to separate the relevant and important from the irrelevant and unimportant. The observance of the ethical obligation of a lawyer to hold inviolate the confidences and secrets of his client not only facilitates the full development of facts essential to proper representation of the client but also encourages laymen to seek early legal assistance.
Amer. Bar. Assoc., Model Code of Professional Responsibility, Canon 4, Ethical Consideration 4.1 (1969).
. Bogert's explanation bears repeating here:
The beneficiary is the equitable owner of the trust property, in whole or in part. The trustee is a mere representative whose function is to attend to the safety of the trust property and to obtain its avails for the beneficiary in the manner provided by the trust instrument. That the settlor has created a trust and thus required that the beneficiary enjoy his property interest indirectly does not imply that the beneficiary is to be kept in ignorance of the trust, the nature of the trust property and the details of its administration. If the beneficiary is to be able to hold the trustee to proper standards of care and honesty and to obtain the benefits to which the trust instrument and doctrines of equity entitle him, he must know of what the trust property consists and how it is being managed.
From these considerations it follows that the trustee has the duty to inform the bene-ficiaiy of important matters concerning the trust and that the beneficiary is entitled to demand of the trustee all information about the trust and its execution for which he has any reasonable use....
If the beneficiary asks for relevant information about the terms of the trust, its present status, past acts of management, the intent of the trustee as to future administration, or other incidents of the administration of the trust, and these requests are máde at a reasonable time and place and not merely vexatiously, it is the duty of the trustee to give the beneficiary the information which he has asked. Furthermore, the trustee must permit the beneficiary to examine the account books of the trust, trust documents and papers, and trust property, when a demand is made at a reasonable time and place and such inspection would be of benefit to the beneficiary.
Bogert's Trusts & Trustees § 961 (2d ed.1983).
. Of course, the Court does not today announce a final disposition of this issue, as it is not properly presented on the present motion.
. While the defendants adamantly oppose the plaintiffs' implication that Lotus Notes remote dial-up poses a threat to the security of Indian Trust data, that issue is neither properly before the Court nor material to the privilege question addressed here. For the purposes of this disposition, the information Interior gave its attorneys concerning BIA's implementation of Lotus Notes remote dial-up might just as well be information concerning any other material change in Interior’s IT systems — the disposition of the privilege question would likely remain the same.
. In a FOIA case, the D.C. Circuit noted the case-sensitivity of test for applicability of the . attorney-client privilege, explaining that "courts must objectively weigh the merits and requirements of each contention [of the parties], evaluate the contentions in light of all applicable law, and rule in accord with the dominant interest of either confidentiality or public access,” when determining whether the privilege will exempt information from disclosure.
See Mead Data Cent.,
This, of course, is a trust case rather than a FOIA case, but the Mead court's principled approach to evaluating claims of attorney-client privilege is riot restricted to the FOIA context. If courts are to take into account "all applicable law” and "rule in accord with the dominant interest of either confidentiality or public access,” it would be inappropriate to ignore the important fiduciary considerations that are central to this litigation. "All applicable law" in this case includes the law of trusts and fiduciary duties, and the fiduciary duty to disclose information relating to trust administration surely must be added to the number of interests weighing in favor of public access here.
. The relationship between today's holding and the fiduciary exception to the attorney client privilege is not difficult to grasp. This Court has held that communications between attorneys and clients that are fiduciaries, such ’as the trustee-delegates in this case, will not be protected by the attorney-client privilege except "where [the client-fiduciary] seeks legal advice solely in his own personal interest or where the discovery material has been shown to relate exclusively to non-fiduciary matters.”
Cobell v. Norton,
With respect to attorney-to-client communications, it turns out that the expanded
Alexander
test applied herein and the fiduciary exception are likely to yield the same results in most cases. That is, a finding that an attorney-to-client communication relates to trust administration for the purpose of the fiduciary exception will likély be predicated on observations about the trust-related nature of the underlying client information on which
With respect to client-to-attorney communications, the analysis is different. The expanded Alexander test's inquiry into the confidentiality of client-information is relevant only to the privilege status of attorney-to-client communications, while the privilege status of client-to-attorney communications is tested on the basic Alexander test alone. This means that the trust-related nature of the information communicated by the client to the attorney does not bear on the initial finding of privilege for client-to-attorney communications, but rather is relevant only in determining whether the fiduciary exception permits disclosure of an otherwise privileged communication because that communication relates exclusively or partially to trust administration.
The following example further clarifies this distinction. Imagine that the Court is here considering not one, but three memoranda related to BIA’s implementation of Lotus Notes remote dial-up. Aside from (1) the memorandum relaying the opinion of DOJ and the Solicitor’s Office concerning the legality of the system in light of this Court’s Orders; imagine that the Court is also considering the privilege status of (2) a memorandum from the BIA to the Solicitor's Office containing nothing more than a "for your information” notification of BIA’s plan to implement the system; and (3) a subsequent memorandum from BIA to DOJ requesting advice on how to respond to the plaintiffs’ discovery requests concerning the system.
Memorandum (1) does not satisfy the expanded Alexander test for attorney-to-client communications for the reasons discussed herein. Memorandum (2) likely would satisfy the basic Alexander test for a privileged client-to-attorney communication, but nevertheless likely would be subject to disclosure under the fiduciary exception as it relates to the security of trust data, a matter central to trust administration. Memorandum (3) likely would satisfy the basic Alexander test for a privileged client-to-attorney communication, and likely would not fall within the fiduciary exception as it seems wholly related to litigation matters rather than trust administration.
