Focusing on the ethical issues associated with the use of technology by legal professionalsMon, 29 Apr 2013 01:07:04 +0000http://wordpress.org/?v=2.0.7enCloud Services — DropSmack
http://www.legalethics.com/?p=521#commentsMon, 29 Apr 2013 01:07:04 +0000PeterkElectronic FilesInternet UseComputer UseSecurityCloudhttp://www.legalethics.com/?p=521An interesting article describing the use of DropSmack to target networks via DropBox. In addition to broader considerations lawyers should consider before using cloud services, developments like this highlight the need for education regarding technology and security.
http://www.legalethics.com/?feed=rss2&p=521Lawyers may use .org suffix in domain name.
http://www.legalethics.com/?p=520#commentsThu, 25 Apr 2013 02:02:08 +0000PeterkAdvertisingInternet UseComputer UseArizonahttp://www.legalethics.com/?p=520For-profit Arizona law firms may use the .org domain name suffix as long as the website is otherwise not false or misleading. See Arizona Ethics Op. 11-04 (December 2011).
]]>http://www.legalethics.com/?feed=rss2&p=520California lawyers may operate virtual law practices in the cloud
http://www.legalethics.com/?p=519#commentsThu, 25 Apr 2013 01:55:39 +0000PeterkCaliforniaInternet UseComputer UseCloudhttp://www.legalethics.com/?p=519California lawyers may maintain a virtual law office in the cloud where communications with the client, and storage of and access to all information about the client’s matter, are conducted solely via the internet using a third-party’s secure servers. The lawyer may be required to take additional steps to confirm that she is fulfilling her ethical obligations due to distinct issues raised by the VLO and its operation. See California Formal Eth. Op. 2012-184 (May 2012).
]]>http://www.legalethics.com/?feed=rss2&p=519Oregon allows attorneys and agents to access private social media data in certain circumstances
http://www.legalethics.com/?p=518#commentsThu, 25 Apr 2013 01:46:53 +0000PeterkInternet UseOregonSocial Computinghttp://www.legalethics.com/?p=518Oregon lawyers may access publicly available information on social networking sites, can request access to non-public information if the person is not represented by counsel in the matter, and may in limited circumstances advise or supervise an agent to access non-public information under Oregon’s Covert Activity Exception (Oregon Rules of Professional Conduct 8.4(b)). See Oregon State Bar Eth. Comm. Op. 2013-189 (Feb 2013) (note there may be an issue seeing the full opinion).
]]>http://www.legalethics.com/?feed=rss2&p=518California lawyer can use unfair competition law against online legal service provider
http://www.legalethics.com/?p=517#commentsThu, 25 Apr 2013 01:38:44 +0000PeterkCaliforniaInternet UseUPLhttp://www.legalethics.com/?p=517A California lawyer’s lawsuit against on online legal service provider alleging unauthorized practice of law withstood a demurrer. See Law Offices of Mathew Higbee v. Expungement Assistance Services, Cal. Ct. App. 4th Dist. No. G046778 (Mar 14, 2013).
]]>http://www.legalethics.com/?feed=rss2&p=517Carrier IQ and security of certain mobile devices
http://www.legalethics.com/?p=507#commentsThu, 01 Dec 2011 02:54:34 +0000PeterkConfidentialityElectronic FilesE-mailInternet UsePrivacySecurityCellular phones
http://www.legalethics.com/?p=507An interesting, perhaps troubling, issue raised with respect to security of certain mobile devices. Read more about Carrier IQ (http://www.geek.com/articles/mobile/how-much-of-your-phone-is-yours-20111115/, http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/carrieriq-part2/, http://www.wired.com/threatlevel/2011/11/secret-software-logging-video. A somewhat long video of how this works is available here. http://tinyurl.com/cwcyjoc. Although there will likely be more articles about this in the media in the future, this highlights potential security and related issues for users of mobile devices.
]]>http://www.legalethics.com/?feed=rss2&p=507Debt Collection Agency Can’t Use Facebook to Contact Debtor, Florida Court Rules
http://www.legalethics.com/?p=505#commentsFri, 11 Mar 2011 11:12:17 +0000David HricikFloridaInternet UseComputer UsePrivacySocial NetworkingSocial Computinghttp://www.legalethics.com/?p=505The story about what it portrays as a growing use of social media by debt collectors is here.
]]>http://www.legalethics.com/?feed=rss2&p=505Autocomplete Causes Misdirection: Court Disqualifies Recipients
http://www.legalethics.com/?p=499#commentsMon, 03 Jan 2011 12:10:13 +0000David HricikConfidentialityCaliforniaE-mailInternet UseComputer UseAttorney-client privilegePrivacyhttp://www.legalethics.com/?p=499The story with a link to the court’s order disqualifying the lawyers who read the misdirected e-mail is here.
]]>http://www.legalethics.com/?feed=rss2&p=499California Issues Ethics Opinion on Confidentiality and the Use of E-mail and Technology To Transmit Client Information
http://www.legalethics.com/?p=498#commentsSun, 26 Dec 2010 11:44:12 +0000David HricikConfidentialityCaliforniaE-mailInternet UseComputer UseAttorney-client privilegePrivacyRules of ConductEthics OpinionsDisciplineSecurityCloudhttp://www.legalethics.com/?p=498California Formal Opinion 2010-179 outlines the lawyer’s duties when transmitting or storing confidential client information when the underlying technology may be susceptible to unauthorized access by third parties. An attorney’s duties of confidentiality and competence require the attorney to take appropriate steps to ensure that his or her use of technology in conjunction with a client’s representation does not subject confidential client information to an undue risk of unauthorized disclosure. Because of the evolving nature of technology and differences in security features that are available, the attorney must ensure the steps are sufficient for each form of technology being used and must continue to monitor the efficacy of such steps.
]]>http://www.legalethics.com/?feed=rss2&p=498Article Surveys Use of Evidence from Social Networking Sites in Personal Injury Cases
http://www.legalethics.com/?p=496#commentsFri, 17 Dec 2010 11:09:43 +0000David HricikConfidentialityInternet UseComputer UsePrivacySocial NetworkingSecuritySocial ComputingEvidencehttp://www.legalethics.com/?p=496The article is here.