Steven C. Bennett, The “Right to Be Forgotten”: Reconciling EU and US Perspectives

30 Berkley J. INT’L L. 161, 164-68 (2012) The European Union is developing its “right to be forgotten”. According to the author, this right could prove particularly harmful toward United States Internet companies. The article outlines the practical implications of the European right to be forgotten, pointing out possibilities to reconcile American and European views […]

Google fined by FTC for by-passing Safari privacy

On November 20, 2012, the FTC bureau approved the proposed settlement according to which Google Inc. has agreed to pay $22.5 million civil penalty settling charges that it misrepresented privacy assurances to users of Apple Inc.’s Safari Internet browser. The settlement resolves allegations that Google made misrepresentations to Safari users about the placement of advertising […]

New York State Bar Opinion 939

Committee on Professional Ethics Topic: Maintaining confidentiality of client information as between independent lawyers sharing office space and computer Digest of the Committee: “Independent lawyers sharing office space may share computer for client-related information if they exercise reasonable care to assure that confidential information is not disclosed.” Rules: New York Rules of Professional Conduct 1.6(a) […]

Alessandro Mantelero, Si Rafforza la Tutela Dei Dati Personali: Data Breach Notification e Limiti Alla Profilazione Mediante Cookies (Strengthening Data Protection in Italy: Data Breach Notification and Regulation of Cookie-Based User Profiling)

Il Diritto dell’informazione e dell’informatica 09/2012; 2012(4-5) ABSTRACT: This Article provides the first analysis of the Italian transposition of Directives 2009/136/EC and 2009/140/EC on cookies and data breaches. The full article is available at: http://www.researchgate…

Philippine Cybercrime Prevention Act

On September 12, 2012, the Republic of Philippines passed the Cybercrime Prevention Act (Act No. 10175). The Act addresses legal issues concerning online interactions and the Internet in the Philippines.  It lists among other cybercrime offenses, identity theft, and illegal access to data. The full text is available at http://www.gov.ph… Open pdf Related documents: ARTICLE: Some have […]

CCBE Guidelines On The Use Of Cloud Computing Services By Lawyers

Scope of the Guidelines: “This paper is intended to create more awareness about the various risks associated with cloud computing. As such, the guidelines in Part II of this paper are addressed to the CCBE’s member bars and law societies drawing attention to the issues which are likely to be faced by individual lawyers in making informed decisions […]

Ira Rubinstein, and Nathan Good, Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents

28 Berkeley Technology Law Journal 1333 (2013) Abstract Regulators here and abroad have embraced “privacy by design” as a critical element of their ongoing revision of current privacy laws. The underlying idea is to “build in” privacy (in the form of Fair Information Practices or FIPs) when creating software products and services. But FIPs are […]

American Bar Association Amendments to Model Rule 1.6

During its August 2012 Annual Meeting, the ABA House of Delegates approved the recommendations sponsored by the ABA Commission on Ethics 20/20. The amendments substantially recognize the evolving use of technology in the advertisement and practice of law and the increasing mobility of lawyers. In particular, the amendments introduced the concept of reasonable efforts to […]

In the Matter of Facebook, Inc., FTC File No. 092 3184 (Nov. 29, 2011)

The Federal Trade Commission (“FTC”) brought a complaint against Facebook, Inc for violation of the Federal Trade Commission Act, 15 U.S.C. § 45 et seq. According to the FTC, Facebook has collected extensive “profile information” about its users violating the FTC Act on eight separate counts of unfair or deceptive acts. Specifically, the FTC found […]

Nicole Black, Will Encrypted Communications Using Cloud Computing Platforms Soon be Commonplace for Lawyers?, mycase.com

From the Article: “Accordingly, because email is outmoded, inherently unsecure, and there are now more secure forms of electronic communication available, I predict that within two years or so, lawyers in most jurisdictions will choose to, or be required to, communicate and collaborate with clients using encrypted communications. And, the platform of choice will be encrypted […]