Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Reading about the law and information technology these days, you come across a remarkable number of stories describing and discussing IT and privacy. What is fascinating about many of the articles is what information or actions are considered to be “private.” Many judicial opinions, for example, concern law enforcement obtaining cell site location information (CSLI) from cell providers and other sources in order to track the movements of a subject of investigation (CSLI is discussed in greater detail and these opinions infra) and the privacy interests that prevent law enforcement from simply getting the data from providers or creating the data through its own tracking or interception of cell tower information. Other opinions and legal discussions concern what privacy interest a creator or recipient of a digital file (e.g., an email, a Word document) has in that file if it is stored by a third party, as is increasingly the case with cloud storage, particularly as it has come to be relied upon in the age of the pandemic. Still other legal discussions concern the privacy rights of persons whose movements (not spoken words) are captured by surveillance cameras: the single camera outside a building and controlled by the building’s resident or director; cameras in many, or every, room in the building; cameras installed and controlled by law enforcement that survey public streets and other public areas. There are many other contexts in which privacy interests in information accessed by, transmitted by or stored in IT are discussed.
*May exclude premium content
By Mark Sangster
In response to the worst period on record for cyber attacks, the ABA published Formal Opinion 498 to address practicing law outside of the traditional brick-and-mortar office environment. It reminds lawyers that while the ABA Model Rules permit virtual practice, they provide minimum requirements and recommendations for virtual practice, particularly in the areas of competence, confidentiality and supervision.
By Emil Sayegh
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
By Abeer Abu Judeh
There are numerous “gameplays” to reduce risks when selecting and hiring a technology vendor. Whether you are able to accept a risk and to what extent are not always clear. Just know that, like in chess, your opening move to an IT deal can be your most powerful.
By Nicholas Gaffney
A Q&A with Bobby Malhotra of Munger, Tolles & Olson LLP, Los Angeles.