Peter Geraghty, Cybersecurity and the use of emerging technologies, Part 1 and Part 2

YourABA 2014 The article discusses the following topics: Email: To encrypt or not to encrypt? Reference to ABA Formal Opinion 99-413, 11-459  and 11-460; North Carolina Opinion 2012-5 (2012) Portable devices. Reference to California State Bar Opinion 2010-179 Cloud Computing. Reference to

Tags: , , , ,

PUBLISHED – “Something’s Got To Give – Cloud Computing, As Applied To Lawyers – Comparative Approach US And EU …”

Nathan M. Crystal and Francesca Giannoni-Crystal, “Something’s Got To Give – Cloud Computing, As Applied To Lawyers – Comparative Approach US And EU And Practical Proposals To Overcome Differences” published in Opinio Iuris in Comparatione. Read here the full text Abstract What

Tags: , ,

Standardisation Guidelines for Cloud Service Level Agreements released in Europe by Cloud Select Industry Group

Inside the EU Commission’s European Cloud Computing Strategy, dating back September 2012, on June 24, 2014, the Cloud Select Industry Group – Subgroup on Service Legal Agreements, published Standardisation Guidelines for Cloud Service Level Agreements, which the Commission hopes will ease

Tags: , ,

Francesca Giannoni-Crystal, “Something’s got to give” – Cloud Computing, as applied to lawyers – Comparative approach US and EU and practical proposals to overcome differences – My presentation at the Scuola Superiore Sant’Anna (Pisa, Italy) Symposium “Getting around the cloud(s) – Technical and legal issues on Cloud services” (November 30, 2013)

  In my talk I will go ahead analyzing the approach of American will provide some elements to understand benefits and risks of cloud computing from an American lawyer’s perspective. I ethics opinions on cloud computing. Then, I will discuss the different

Tags: , , , , , , , , ,

Alan W. Ezekiel, Hackers, Spies, and Stolen Secrets: Protecting Law Firms From Data Theft, 26 Harv. J.L. & Tech. 649 (2013)

From the Article: “The increasing number of data theft and espionage incidents in cyberspace has been widely reported, and law firms have become particularly attractive targets. One data security company reports that 10% of the advanced cyberattacks it investigated in

Tags: , ,

John M. Barkett, Ethical Challenges on the Horizon: Confidentiality, Competence and Cloud Computing

From the ABA Section of Litigation 2013 Annual Conference   Conclusion: “The message of these ethics opinions is clear: lawyers and law firms can engage third-party vendors in the cloud to store confidential information but they must do so competently

Tags: , , , , ,