Masur, 1999 - Google Patents
Safety in Numbers: Revisiting the Risks to Client Confidences and Attorney-Client Privilege Posed by Internet Electronic MailMasur, 1999
View PDF- Document ID
- 7764513450590417835
- Author
- Masur J
- Publication year
- Publication venue
- Berkeley Technology Law Journal
External Links
Snippet
Courts have not yet considered the application of the attorney-client privilege to electronic mail transmitted over the Internet. Despite the absence of a definitive ruling on the issue, legal commentators and ethics committees have presented opinions that tend to conclude …
- 238000005516 engineering process 0 abstract description 53
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kim et al. | Fundamentals of information systems security: Print bundle | |
McGarey et al. | Patents, products, and public health: an analysis of the CellPro March-in Petition | |
Goldberg | A pseudonymous communications infrastructure for the internet | |
Goldberg et al. | Privacy-enhancing technologies for the internet | |
Swire et al. | Encryption and globalization | |
Canavan | Fundamentals of network security | |
Fraser | Site security handbook | |
Newman | Computer Security: Protecting Digital Resources: Protecting Digital Resources | |
Stallings | Information privacy engineering and privacy by design: Understanding privacy threats, technology, and regulations based on standards and best practices | |
Secara | Zoombombing–the end-to-end fallacy | |
Suzuki et al. | Prevention and mitigation measures against phishing emails: a sequential schema model | |
Clark et al. | SoK: Securing email—a stakeholder-based analysis | |
Singh | Network Security and Management | |
Paquet | Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide | |
William | Computer security: Principles and practice | |
Fraser | RFC2196: Site security handbook | |
Kapadia | A case (study) for usability in secure email communication | |
Masur | Safety in Numbers: Revisiting the Risks to Client Confidences and Attorney-Client Privilege Posed by Internet Electronic Mail | |
Volini | A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues | |
Strebe | Network security foundations: technology fundamentals for IT success | |
Brown et al. | Security against compelled disclosure | |
Duan et al. | Content moderation on end-to-end encrypted systems: A legal analysis | |
Anderson | Transmitting legal documents over the internet: How to protect your client and yourself | |
Bell | Identifying Financial Loss Caused by Social Engineering | |
Glencora | Defend Dissent: Digital Suppression and Cryptographic Defense of Social Movements |