delivered of the opinion of the Court.
In thе past twenty years, businesses and private citizens alike have embraced the use of computers, electronic communication devices, the Internet, and e-mail. As those and other forms of technology
In the modern workplace, for example, occasional, personal use of the Internet is commonplace. Yet that simple act can raise complex issues about an employer’s monitoring of the workplace and an employee’s reasonable expectation of privacy.
This case presents novel questions about the extent to which an employee can expect privacy and confidentiality in personal emails with her attorney, which she accessed on a computer belonging to her employer. Marina Stengart used her company-issued laptop to exchange e-mails with her lawyer through her personal, password-protected, web-based e-mail account. She later filed an employment discrimination lawsuit against her employer, Loving Care Agency, Inc. (Loving Care), and others.
In anticipation of discovery, Loving Care hired a computer forensic expert to recover all files stored on the laptop including the e-mails, which had been automatically saved on the hard drive. Loving Care’s attorneys reviewed the e-mails and used information culled from them in the course of discovery. In response, Stengart’s lawyer demanded that communications between him and Stengart, which he considered privileged, be identified and returned. Opposing counsel disclosed the documents but maintained that the company had the right to review them. Stengart then sought relief in court.
The trial court ruled that, in light of the company’s written policy on electronic communications, Stengart waived the attorney-client privilege by sending e-mails on a company computer. The Appellate Division reversed and found that Loving Care’s counsel had violated RPC 4.4(b) by reading and using the privileged documents.
We hold that, under the circumstances, Stengart could reasonably expect that e-mail communications with her lawyer through her personal account would remain private, and that sending and receiving them via a company laptop did not eliminate the attorney-client privilege that protected them. By reading e-mails that were at least arguably privileged and failing to notify Stengart promptly about them, Loving Care’s counsel breached RPC 4.4(b). We therefore modify and affirm the judgment of the Appellate Division and remand to the trial court to determine what, if any, sanctions should be imposed on counsel for Loving Care.
I.
This appeal arises out of a lawsuit that plaintiff-respondent Marina Stengart filed against her former employer, defendant-appellant Loving Care, its owner, and certain board members and officers of the company. She alleges, among other things, constructive discharge because of a hostile work environment, retaliation, and harassment based on gender, religion, and national origin, in violation of the New Jersey Law Against Discrimination, N.J.S.A 10:5-1 to -49. Loving Care denies the allegations and suggests they are an attempt to escape certain restrictive covenants that are the subject of a separate lawsuit.
Loving Care provides home-care nursing and health services. Stengart began working for Loving Care in 1994 and, over time, was promoted to Executive Director of Nursing. The company provided her with a laptop computer to conduct company business. From that laptop, Stengart could send e-mails using her company e-mail address; she could also access the Internet and visit websites through Loving Care’s server. Unbeknownst to Stengart, certain browser software in place automatically
On several days in December 2007, Stengart used her laptоp to access a personal, password-protected e-mail account on Yahoo’s website, through which she communicated with her attorney about her situation at work. She never saved her Yahoo ID or password on the company laptop.
Not long after, Stengart left her employment with Loving Care and returned the laptop. On February 7, 2008, she filed the pending complaint.
In an effort to preserve electronic evidence for discovery, in or around April 2008, Loving Care hired experts to create a forensic image of the laptop’s hard drive. Among the items retrieved were temporary Internet files containing the contents of seven or eight e-mails Stengart had exchanged with her lawyer via her Yahoo account. 1 2Stengart’s lawyers represented at oral argument that one e-mail was simply a communication he sent to her, to which she did not respond.
A legend appears at the bottom of the e-mails that Stengart’s lawyer sent. It warns readers that
THE INFORMATION CONTAINED IN THIS EMAIL COMMUNICATION IS INTENDED ONLY FOR THE PERSONAL AND CONFIDENTIAL USE OF THE DESIGNATED RECIPIENT NAMED ABOVE. This message may be an Attorney-Client communication, and as such is privileged and confidential. If the reader o 2 f this message is not the intended recipient, you are hereby notified that you have received this communication in error, and that your review, dissemination, distribution, or copying of the message is strictly prohibited. If you have received this transmission in error, please destroy this transmission and notify us immediately by telephone and/or reply email.
At least two attorneys from the law firm representing Loving Care, Sills Cummis (the “Firm”), reviewed the e-mail communications between Stengart and her attorney. The Firm did not advise opposing counsel about the e-mails until months later. In its October 21, 2008 reply to Stengart’s first set of interrogatories, the Firm stated that it had obtained certain information from “email correspondence”—between Stengart and her lawyer—from Stengart’s “office computer on December 12, 2007 at 2:25 p.m.” In response, Stengart’s
Loving Care and its counsel relied on an Administrative and Office Staff Employee Handbook that they maintain contains the company’s Electronic Communication policy (Policy). The record contains various versions of an electronic communications policy, and Stengart contends that none applied to her as a senior company official. Loving Care disagrees. We need not resolve that dispute and assume the Policy applies in addressing the issues on appeal.
The proffered Policy states, in relevant part:
The company reserves and will exercise the right to review, audit, intercept, access, and disclose all matters on the company’s media systems and services at any time, with or without notice.
E-mail and voice mail messages, internet use and communication and computer flies are considered part of the company’s business and client records. Such communications are not to be considered private or personal to any individual employee.
The principal purpose of electronic mail (e-mail) is for company business communications. Occasional personal use is permitted; however, the system should not be used to solicit for outside business ventures, charitable organizations, or for any political or religious purpose, unless authorized by the Director of Human Resources.
The Policy also specifically prohibits “[c]ertain uses of the e-mail system” including sending inappropriate sexual, discriminatory, or harassing messages, chain letters, “[m]essages in violation of government laws,” or messages relating to job searches, business activities unrelated to Loving Care, or political activities. The Policy concludes with the following warning: “Abuse of the electronic communications system may result in disciplinary action up to and including separation of employment.”
Stengart’s attorney applied for an order to show cause seeking return of the e-mails and other relief. The trial court converted the application to a motion, which it later denied in a written opinion. The trial court concluded that the Firm did not breach the attorney-client privilege because the company’s Policy placed Stengart on sufficient notice that her e-mails would be considered company property. Stengart’s request to disqualify the Firm was therefore denied.
The Appellate Division granted Stengart’s motion for leave to appeal. The panel reversed the trial court order and directed the Firm to turn over all copies of the e-mails and delete any record of them.
Stengart v. Loving Care Agency, Inc.,
408
N.J.Super.
54,
The panel balanced Loving Care’s right to enforce reasonable rules for the workplace against the public policies underlying the attorney-client privilege.
Id.
at 66,
The Appellate Division also concluded that the Firm breached its obligations under RPC 4.4(b) by failing to alert Stengart’s attorneys that it possessed the e-mails before reading them. The panel remanded for a hearing to determine whether disqualification of the Firm or some other sanction was appropriate.
We granted Loving Care’s motion for leave to appeal and ordered a stay pending the outcome of this appeal.
II.
Loving Care argues that its employees have no expectation of privacy in their use of company computers based on the company’s Policy. In its briefs before this Court, the company also asserts that by accessing e-mails on a personal account through Loving Care’s computer and server, Stengart either prevented any attorney-client privilege from attaching or waived the privilege by voluntarily subjecting her e-mails to company scrutiny. Finally, Loving Care maintains that its counsel did not violate RPC 4.4(b) because the e-mails were left behind on Stengart’s company computer—not “inadvertently sent,” as per the Rule—and the Firm acted in the good faith belief that any privilege had been waived.
Stengart argues that she intended the e-mails with her lawyer to be confidential and that the Policy, even if it applied to her, failed to provide adequate warning that Loving Care would save on a hard drive, or monitor the contents of, e-mails sent from a personal account. Stengart also maintains that the communications with her lawyer were privileged. When the Firm encountered the arguably protected e-mails, Stengart contends it should have immediately returned them or sought judicial review as to whether the attorney-client privilege applied.
We granted amicus curiae status to the following organizations: the Employers Association of New Jersey (EANJ), the National Employment Lawyers Association of New Jersey (NELA-NJ), the Association of Criminal Defense Lawyers of New Jersey (ACDL-NJ), and the New Jersey State Bar Association (NJSBA).
EANJ calls for reversal of the Appellate Division decision. It notes the dramatic, recent increase in the use of non-business-related e-mails at work and submits that, by allowing occasional personal use of company property as a courtesy to employees, companies do not create a reasonable exрectation of privacy in the use of their computer systems. EANJ also contends that the Appellate Division’s analysis—particularly, its focus on whether workplace policies in the area of electronic communications further legitimate business interests—will unfairly burden employers and undermine their ability to protect corporate assets.
NELA-NJ and ACDL-NJ support the Appellate Division’s ruling. NELA-NJ submits that an employee has a substantive right to privacy in her password-protected e-mails, even if accessed from an employer-owned computer, and that an employer’s invasion of that privacy right must be narrowly tailored to the employer’s
NJSBA expresses сoncern about preserving the attorney-client privilege in the “increasingly technology-laden world” in which attorneys practice. NJSBA cautions against allowing inadvertent or casual waivers of the privilege. To analyze the competing interests presented in cases like this, NJSBA suggests various factors that courts should consider in deciding whether the privilege has been waived.
III.
Our analysis draws on two principal areas: the adequacy of the notice provided by the Policy and the important public policy concerns raised by the attorney-client privilege. Both inform the reasonableness of an employee’s expectation of privacy in this matter. We address each area in turn.
A.
We start by examining the meaning and scope of the Policy itself. The Policy specifically reserves to Loving Cаre the right to review and access “all matters on the company’s media systems and services at any time.” In addition, e-mail messages are plainly “considered part of the company’s business ... records.”
It is not clear from that language whether the use of personal, password-protected, web-based e-mail accounts via company equipment is covered. The Policy uses general language to refer to its “media systems and services” but does not define those terms. Elsewhere, the Policy prohibits certain uses of “the e-mail system,” which appears to be a reference to company e-mail accounts. The Policy does not address personal accounts at all. In other words, employees do not have express notice that messages sent or received on a pеrsonal, web-based e-mail account are subject to monitoring if company equipment is used to access the account.
The Policy also does not warn employees that the contents of such e-mails are stored on a hard drive and can be forensieally retrieved and read by Loving Care.
The Policy goes on to declare that e-mails “are not to be considered private or personal to any individual employee.” In the very next point, the Policy acknowledges that “[occasional personal use [of e-mail] is permitted.” As written, the Policy creates ambiguity about whether personal e-mail use is company or private property.
The scope of the written Policy, therefore, is not entirely clear.
B.
The policies underlying the attorney-client privilege further animate this discussion. The venerable privilege is enshrined in history and practice.
Fellerman v. Bradley,
99
N.J.
493, 498,
The privilege is codified at
N.J.S.A.
2A:84A-20, and it appears in the
Rules of Evidence
as
N.J.R.E.
504. Under the
Rule,
“[f]or a communication to be privileged it must initially be expressed by an individual in his capacity as a client in
E-mail exchanges are covered by the privilege like any other form of communication.
See Seacoast Builders Corp. v. Rutgers,
358
N.J.Super.
524, 553,
The e-mail communications between Stengart and her lawyers contain a standard warning that their contents are personal and confidential and may constitute attorney-client communications. The subject matter of those messages appears to relate to Stengart’s working conditions and anticipated lawsuit against Loving Care.
IV.
Under the particular circumstances presented, how should a court evaluate whether Stengart had a reasonable expectation of privacy in the e-mails she exchanged with her attorney?
A.
Preliminarily, we note that the reasonable-expeсtation-of-privacy standard used by the parties derives from the common law and the Search and Seizure Clauses of both the Fourth Amendment and Article I, paragraph 7 of the New Jersey Constitution. The latter sources do not apply in this case, which involves conduct by private parties only. 3
The common law source is the tort of “intrusion on seclusion,” which can be found in the Restatement (Second) of Torts § 652B (1977). That section provides that “[o]ne who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person.” Restatement, supra, § 652B. A high threshold must be cleared to assert a cause of action based on that tort. Hennessey, supra, 129 N.J. at 116, 609 A 2d 11 (Pollock, J., concurring). A plaintiff must establish that the intrusion “would be highly offensive to the ordinary reasonable man, as the result of conduct to which the reasonable man would strongly object.” Restatement, supra, § 652B cmt. d.
As is true in Fourth Amendment cases, the reasonableness of a claim for intrusion on seclusion has both a subjective and objective component.
See State v. Sloane,
193
N.J.
423, 434,
B.
A number of courts have tested an employee’s claim of privacy in files stored on
Doe v. XYC Corp.,
382
N.J.Super.
122,
Certain decisions from outside New Jersey, which the parties also rely on, are more instructive. Among them,
National Economic Research Associates v. Evans,
21
Mass. L. Rptr.
No. 15, at 337,
A company manual governed the laptop’s use. The manual permitted personal use of e-mail, to “be kept to a minimum,” but warned that computer resources were the “property of the Company” and that e-mails were “not confidential” and could be read “during routine checks.” Id. at 338.
The court denied the company’s application to allow disclosure of the e-mails that its expert possessed. Id. at 337. The court reasoned,
Based on the warnings furnished in the Manual, Evans [ (the employee) ] could not reasonably expect to communicate in confidence with his private attorney if Evans e-mailed his attorney using his NERA. [ (company) ] e-mail address through the NERA Intranet, because the Manual plainly warned Evans that e-mails on the network could be read by NERA network administrators. The Manual, however, did not expressly declare that it would monitor the content of Internet communications____Most importantly, the Manual did not expressly declare, or even implicitly suggest, that NERA would monitor the contentof e-mail communications made from an employee’s personal e-mail account via the Internet whenever those communications were viewed on a NERA-issued computer. Nor did NERA warn its employees that the content of such Internet e-mail communications is stored on the hard disk of a NERA-issued computer and therefore capable of being read by NERA.
[Id. at 338-39.]
As a result, the court found the employee’s expectation of privacy in e-mails with his attorney to be reasonable. Id. at 339.
In Asia Global, supra, the Bankruptcy Court for the Southern District of New York considered whether a bankruptcy trustee could force the production of e-mails sent by company employees to their personal attorneys on the company’s e-mail system. 322 B.R. at 251-52. The court developed a four-part test to “measure the employee’s expectation of privacy in his computer files and email”:
(1) does the corporation maintain a policy banning personal or other objectionable use, (2) does the company monitor the use of the employee’s computer or e-mail, (3) do third parties have a right of access to the computer or e-mails, and (4) did the corporation notify the employee, or was the employee aware, of the use and monitoring policies?
[Id. at 257.]
Because the evidence was “equivocal” about the existence of a corporate policy banning personal use of e-mail and allowing monitoring, the court could not conclude that the employees’ use of the company e-mail system eliminated any applicable attorney-client privilege. Id. at 259-61.
Both Evans and Asia Global referenced a formal ethics opinion by the American Bar Association that noted “lawyers have a reasonable expectation of privacy when communicating by e-mail maintained by an [online service provider].” See id. at 256 (citing ABA Comm, on Ethics and Profl Responsibility, Formal Op. 413 (1999)); Evans, supra, 21 Mass. L. Rptr. No. 15, at 339 (same).
Other courts have measured the factors outlined in Asia Global among other considerations. In reviewing those cases, we are mindful of the fact-specific nature of the inquiry involved and the multitude of different facts that can affect the outcome in a given case. No one factor alone is necessarily dispositive.
According to some courts, employees appear to have a lesser expectation of privacy when they communicate with an attorney using a company e-mail system as compared to a personal, web-based account like the one used here.
See, e.g., Smyth v. Pillsburg Co.,
914
F.Supp.
97,100-01 (E.D.Pa.1996) (finding no reasonable expectation of privacy in unprofessional e-mails sent to supervisor through internal corporate e-mail system);
Scott v. Beth Israel Med. Ctr., Inc.,
Courts have also found that the existence of a clear company policy banning personal e-mails can also diminish the reasonableness of an employee’s claim to privacy in e-mail messages with his or her attorney.
Compare Scott, supra,
The location of the company’s computer may also be a relevant consideration. In
Curto v. Medical World Communications, Inc.,
99
Fed. Empl. Prac. Cas.
(BNA) 298,
We realize that different concerns are implicated in cases that address the reasonableness of a privacy claim under the Fourth Amendment.
See, e.g., O’Connor, supra,
480
U.S.
at 714-19, 107
S.Ct.
at 1496-98,
Y.
A.
Applying the above considerations to the facts before us, we find that Stengart had a reasonable expectation of privacy in the e-mails she exchanged with her attorney on Loving Care’s laptop.
Stengart plainly took steps to protect the privacy of those e-malls and shield them from her employer. She used a personal, password-protectеd e-mail account instead of her company e-mail address and did not save the account’s password on her computer. In other words, she had a subjective expectation of privacy in messages to and from her lawyer discussing the subject of a future lawsuit.
In light of the language of the Policy and the attorney-client nature of the communications, her expectation of privacy was also objectively reasonable. As noted earlier, the Policy does not address the use of personal, web-based e-mail accounts accessed through company equipment. It does not address personal accounts at all. Nor does it warn employees that the contents of e-mails sent via personal accounts can be forensieally retrieved and read by the company. Indeed, in acknowledging that occasional personal use of e-mail is permitted, the Policy created doubt about whether those e-mails are company or private property.
Moreover, the e-mails are not illegal or inappropriate material stored on Loving Care’s equipment, which might harm the company in some way.
See Muick v. Glenayre Elecs.,
In addition, the e-mails bear a standard hallmark of attorney-client messages. They warn the reader directly that the e-mails are personal, confidential, and may be attorney-client communications. While a pro forma warning at the end of an e-mail might not, on its own, protect a communication, see Scott, supra, 847 N.Y.S.2d at 444, other facts present here raise additional privacy concerns.
Under all of the circumstances, we find that Stengart could reasonably expect that e-mails she exchanged with her attorney on her personal, password-protected, web-based e-mail account, accessed on a company laptop, would remain private.
It follows that the attorney-client privilege protects those e-mails. See Asia Global, supra, 322 B.R. at 258-59 (noting “close correlation between the objectively reasonable expectation of privacy and the objective reasonableness of the intent that a communication between a lawyer and a client was given in confidence”). In reaching that conclusion, we necessarily reject Loving Care’s claim that the attorney-client privilege either did not attach or was waived. In its reply brief and at oral argument, Loving Care argued that the manner in which the e-mails were sent prevented the privilege from attaching. Specifically, Loving Care contends that Stengart effectively brought a third person into the conversation from the start—watching over her shoulder—and thereby forfeited any claim to confidentiality in her communications. We disagree.
Stengart has the right to prevent disclosures by third persons who learn of her communications “in a manner not reasonably to be anticipated.” See N.J.R.E. 504(l)(c)(ii). That is what occurred here. The Policy did not give Stengart, or a reasonable person in her position, cause to anticipate that Loving Care would be peering over her shoulder as she opened e-mails from her lawyer on her personal, password-protected Yahoo account. See Evans, supra, 21 Mass. L. Rptr. No. 15, at 339. The language of the Policy, the method of transmittal that Stengart selected, and the warning on the e-mails themselves all support that conclusion.
Loving Care also argued in earlier submissions that Stengart waived the attorney-client privilege. For similar reasons, we again disagree.
A person waives the privilege if she, “without coercion and with knowledge of [her] right or privilege, made disclosure of any part of the privileged matter or consented to such a disclosure made by anyone.”
N.J.R.E.
530 (codifying
N.J.S.A.
2A:84A-29). Because consent is not applicable here, we look to whether Stengart either knowingly disclosed the information contained in the e-mails or failed to “take reasonable steps to insure and maintain their
confidentiality.”
5
As discussed previously, Stengart took reasonable steps to keep discussions with her attorney confidential: she elected not to use the company e-mail system and relied on a personal, password-protected, web-based account instead. She also did not save the password on her laptop or share it in some other way with Loving Care.
As to whether Stengart knowingly disclosed the e-mails, she certified that she is unsophisticated in the use of computers and did not know that Loving Care could read communications sent on her Yahoo account. Use of a company laptop alone does not establish that knowledge. Nor does the Policy fill in that gap. Under the circumstances, we do not find either a knowing or reckless waiver.
B.
Our conclusion that Stengart had an expectation of privacy in e-mails with her lawyer does not mean that employers cannot monitor or regulate the use of workplace computers. Companies can adopt lawful policies relating to computer use to protect the assets, reputation, and productivity of a business and to ensure compliance with legitimate corporate policies. And employers can enforce such policies. They may discipline employees and, when appropriate, terminate them, for violating proper workplace rules that are not inconsistent with a clear mandate of
public policy.
See Hennessey, supra,
129
N.J.
at 99-100,
VI.
We next examine whether the Firm’s review and use of the privileged e-mails violated RPC 4.4(b). The Rule provides that “[a] lawyer who receives a document and has reasonable cause to believe that the document was inadvertently sent shall not read the document or, if he or she has begun to do so, shall stop reading the document, promptly notify the sender, and return the document to the sender.” According to the ABA Model Rules on which RPC 4.4(b) is patterned, the term “ ‘document’ includes email or other electronic modes of transmission subject to being read or put into readable form.” Model Rules of Prof l Conduct, R. 4.4 cmt. 2 (2004).
Loving Care contends that the
Rule
does not apply because Stengart left
To be clear, the Firm did not hack into plaintiffs personal account or maliciously seek out attorney-client documents in a clandestine way. Nor did it rummage through an employee’s personal files out of idle curiosity. Instead, it legitimately attempted to preserve evidence to defend a civil lawsuit. Its error was in not setting aside the arguably privileged messages oncе it realized they were attorney-client communications, and failing either to notify its adversary or seek court permission before reading further. There is nothing in the record before us to suggest any bad faith on the Firm’s part in reading the Policy as it did. Nonetheless, the Firm should have promptly notified opposing counsel when it discovered the nature of the e-mails. 6
The Appellate Division remanded to the trial court to determine the appropriate remedy. It explained that a hearing was needed in that regard to consider
the content of the emails, whether the information contained in the emails would have inevitably been divulged in discovery that would have occurred absent [the Firm’s] knowledge of the emails’ content, and the nature of the issues that have been or may in the future be pled in either this or the related Chаncery action.
[.Stengart, supra, 408 N.J.Super. at 76-77,973 A2d 390 .]
We agree. The forensically retrieved version of the e-mails submitted to the Court is not easy to read or fully understand in isolation, and no record has yet been developed about the e-mails’ full use. For the same reason, we cannot determine how confiden
tial or critical the messages are. In deciding what sanctions to impose, the trial court should evaluate the seriousness of the breach in light of the specific nature of the e-mails, the manner in which they were identified, reviewed, disseminated, and used, and other considerations noted by the Appellate Division. As to plaintiffs request for disqualification, the court should also “balance competing interests, weighing the ‘need to maintain the highest standards of the profession’ against ‘a client’s right freely to choose his counsel.’ ”
Dewey v. R.J. Reynolds Tobacco Co.,
109
N.J.
201, 218,
We leave to the trial court to decide whether disqualification of the Firm, screening of attorneys, the imposition of costs, or some other remedy is appropriate. Under the circumstances, we do not believe a remand to the Chancery judge is required; the matter may proceed before the Law Division judge assigned to the case.
For the reasons set forth above, we modify and affirm the judgment of the Appellate Division and remand to the trial court for further proceedings.
For affirmance as modification/remandment—Chief Justice RABNER and Justices LONG, LaVECCHIA, ALBIN, WALLACE, RIVERA-SOTO and HOENS—7.
Opposed—None.
Notes
The record does not specify how many of the e-mails were sent or received during work hours. Loving Care asserts that the e-mails in question were exchanged during work hours through the company’s server. However, counsel for Stengart represented at oral argument that four of the e-mails were transmitted or accessed during non-work hours—three on a weekend and one on a holiday. It is unclear, and ultimately not relevant, whether Stengart was at the office when she sent or reviewed them.
In the forensically retrieved version of the e-mails submitted to this Court under seal, the legend is reprinted only up until the location of the footnote in the above text. The retrieved messages also list Stengart’s lawyer’s full name more than a dozen times and his e-mail address—comprised of the lawyer's first initial, full last name, and the law firm’s name—more than three dozen times. Counsel for Loving Care submitted certifications in which they explain that they were aware the e-mails were between Stengart and her lawyer but believed the communications were not protected by the attorney-client privilege for reasons discussed below.
In аddition, a right to privacy can be found in Article I, paragraph 1 of the New Jersey Constitution.
Hennessey v. Coastal Eagle Point Oil Co.,
129
N.J.
81, 95-96,
Under our rules, unpublished opinions do not constitute precedent and "are not to be cited by any court.” R. 1:36-3. As a result, we do not address any unpublished decisions raised by the parties.
Because Stengart’s conduct satisfies both standards, we need not choose which one governs.
See Kinsella v. NYT Television,
370
N.J.Super.
311, 317-18,
The Firm argues that its position was vindicated by the trial court’s ruling that the e-mails were not protected by the attorney-client privilege. That argument lacks merit. Stengart still had the right to appeal the trial court’s ruling, as she did.
