Focusing on the ethical issues associated with the use of technology by legal professionalsMon, 29 Apr 2013 01:07:04 +0000http://wordpress.org/?v=2.0.7enCloud Services — DropSmack
http://www.legalethics.com/?p=521#commentsMon, 29 Apr 2013 01:07:04 +0000PeterkElectronic FilesInternet UseComputer UseSecurityCloudhttp://www.legalethics.com/?p=521An interesting article describing the use of DropSmack to target networks via DropBox. In addition to broader considerations lawyers should consider before using cloud services, developments like this highlight the need for education regarding technology and security.
http://www.legalethics.com/?feed=rss2&p=521Carrier IQ and security of certain mobile devices
http://www.legalethics.com/?p=507#commentsThu, 01 Dec 2011 02:54:34 +0000PeterkConfidentialityElectronic FilesE-mailInternet UsePrivacySecurityCellular phoneshttp://www.legalethics.com/?p=507An interesting, perhaps troubling, issue raised with respect to security of certain mobile devices. Read more about Carrier IQ (http://www.geek.com/articles/mobile/how-much-of-your-phone-is-yours-20111115/, http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/carrieriq-part2/, http://www.wired.com/threatlevel/2011/11/secret-software-logging-video. A somewhat long video of how this works is available here. http://tinyurl.com/cwcyjoc. Although there will likely be more articles about this in the media in the future, this highlights potential security and related issues for users of mobile devices.
]]>http://www.legalethics.com/?feed=rss2&p=507California Issues Ethics Opinion on Confidentiality and the Use of E-mail and Technology To Transmit Client Information
http://www.legalethics.com/?p=498#commentsSun, 26 Dec 2010 11:44:12 +0000David HricikConfidentialityCaliforniaE-mailInternet UseComputer UseAttorney-client privilegePrivacyRules of ConductEthics OpinionsDisciplineSecurityCloudhttp://www.legalethics.com/?p=498California Formal Opinion 2010-179 outlines the lawyer’s duties when transmitting or storing confidential client information when the underlying technology may be susceptible to unauthorized access by third parties. An attorney’s duties of confidentiality and competence require the attorney to take appropriate steps to ensure that his or her use of technology in conjunction with a client’s representation does not subject confidential client information to an undue risk of unauthorized disclosure. Because of the evolving nature of technology and differences in security features that are available, the attorney must ensure the steps are sufficient for each form of technology being used and must continue to monitor the efficacy of such steps.
]]>http://www.legalethics.com/?feed=rss2&p=498Article Surveys Use of Evidence from Social Networking Sites in Personal Injury Cases
http://www.legalethics.com/?p=496#commentsFri, 17 Dec 2010 11:09:43 +0000David HricikConfidentialityInternet UseComputer UsePrivacySocial NetworkingSecuritySocial ComputingEvidencehttp://www.legalethics.com/?p=496The article is here.
]]>http://www.legalethics.com/?feed=rss2&p=496Wi fi risks: Add-on to Firefox purportedly allows hijacking of social networking user accounts when on unsecured wi fi
http://www.legalethics.com/?p=490#commentsTue, 30 Nov 2010 12:31:39 +0000David HricikSocial NetworkingSecuritySocial Computinghttp://www.legalethics.com/?p=490The article with several links is here.
]]>http://www.legalethics.com/?feed=rss2&p=490Wi Fi on Planes a Security Risk?
http://www.legalethics.com/?p=485#commentsWed, 17 Nov 2010 16:48:13 +0000David HricikSecuritywifiCellular phoneshttp://www.legalethics.com/?p=485Lawyers travel and use wi fi on board planes. This may be a here-and-gone phenomena, however. With the recent hullabaloo over full body scans, a major threat appears to be wi fi: the capability of a terrorist to use an on-board computer to dial up a cell phone in the cargo hold rigged to a bomb and set it off. The story, slightly to the side of our usual focus, is here.