Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

Securing Technological Privacy: Modernizing The Texas Disciplinary Rules Of Professional Conduct To Protect Electronic Data, Ashley "Nikki" Vega Jan 2020

Securing Technological Privacy: Modernizing The Texas Disciplinary Rules Of Professional Conduct To Protect Electronic Data, Ashley "Nikki" Vega

St. Mary's Journal on Legal Malpractice & Ethics

This comment explains how and why the Texas Disciplinary Rules of Professional Conduct (the “Texas Disciplinary Rules”) should be updated to reflect the modernization of technology. Lawyers must keep abreast of changes in the law and its practices; including those which are technological in nature. The American Bar Association (the “ABA”) recently amended the “technology provisions” of its Model Rules of Professional Conduct (the “Model Rules”); namely Rule 1.1 “Competence” and Rule 1.6 “Confidentiality of Information” in order to keep up with the benefits and risks associated with technology in the legal profession. Additionally, over half of all jurisdictions have …


Digital Direction For The Analog Attorney-Date Protection, E-Discovery, And The Ethics Of Technological Competence In Today's World Of Tomorrow, Stacey Blaustein, Melinda L. Mclellan, James A. Sherer Jan 2016

Digital Direction For The Analog Attorney-Date Protection, E-Discovery, And The Ethics Of Technological Competence In Today's World Of Tomorrow, Stacey Blaustein, Melinda L. Mclellan, James A. Sherer

Richmond Journal of Law & Technology

Over the past twenty years, the near-constant use of sophisticated technological tools has become an essential and indispensable aspect of the practice of law. The time and cost efficiencies generated by these resources are obvious, and have been for years. And because clients expect their counsel to take full advantage, savvy attorneys understand that they must keep up with ever-evolving legal technologies to stay competitive in a crowded marketplace.


Kill The Dinosaurs, And Other Tips For Achieving Technical Competence In Your Law Practice, Antigone Peyton Jan 2015

Kill The Dinosaurs, And Other Tips For Achieving Technical Competence In Your Law Practice, Antigone Peyton

Richmond Journal of Law & Technology

It is a challenge to practice law in the digital age. This is particularly true when a practice involves significant e-Discovery, Intellectual Property, and technology law—areas in which technical issues merge with legal ones. One of the major challenges of bringing a law practice up to twenty-first-century standards relates to dinosaur thoughts, a.k.a. an “old ways are best” mentality.


Cause To Believe What? The Importance Of Defining A Search's Object—Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin Jan 2014

Cause To Believe What? The Importance Of Defining A Search's Object—Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin

Oklahoma Law Review

Courts and scholars have devoted considerable attention to the definition of probable cause and reasonable suspicion. Since the demise of the “mere evidence rule” in the 1960s, however, they have rarely examined how these central Fourth Amendment concepts interact with the “object” of the search. That is unfortunate, because this interaction can have significant consequences. For instance, probable cause to believe that a search “might lead to evidence of wrongdoing” triggers a very different inquiry than probable cause to believe that a search “will produce evidence of criminal activity.” The failure to address the constraints that should be imposed on …


Ubiquitous Privacy, Thomas P. Crocker Jan 2014

Ubiquitous Privacy, Thomas P. Crocker

Oklahoma Law Review

No abstract provided.


Third Party Records Protection On The Model Of Heightened Scrutiny, Marc J. Blitz Jan 2014

Third Party Records Protection On The Model Of Heightened Scrutiny, Marc J. Blitz

Oklahoma Law Review

No abstract provided.


Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson Jan 2014

Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson

Oklahoma Law Review

“Secrets are lies. Sharing is caring. Privacy is theft.” So concludes the main character in Dave Egger’s novel, The Circle, in which a single company that unites Google, Facebook, and Twitter—and on steroids—has the ambition not only to know, but also to share, all of the world’s information. It is telling that a current dystopian novel features not the government in the first instance, but instead a private third party that, through no act of overt coercion, knows so much about us. This is indeed the greatest risk to privacy in our day, both the unprecedented, massive collection and retention …


Big Data Distortions: Exploring The Limits Of The Aba Leatpr Standards, Andrew G. Ferguson Jan 2014

Big Data Distortions: Exploring The Limits Of The Aba Leatpr Standards, Andrew G. Ferguson

Oklahoma Law Review

Before moving on to my contribution about how the growing reliance on big data analytics may necessitate a slight modification to the ABA Standards on Law Enforcement Access to Third Party Records (LEATPR Standards), I would like first to pay a few compliments to the drafters of the LEATPR Standards for producing such a systematic, thoughtful, and elegant framework for considering Fourth Amendment freedoms. As anyone who writes about or teaches the Fourth Amendment knows, the doctrine remains a theoretical muddle. Yet, despite a minefield of conflicting precedent, the drafters of the LEATPR Standards have managed to construct a defensible …


The Aba Standards For Criminal Justice: Law Enforcement Access To Third Party Records: Critical Perspectives From A Technology-Centered Approach To Quantitative Privacy, David C. Gray Jan 2014

The Aba Standards For Criminal Justice: Law Enforcement Access To Third Party Records: Critical Perspectives From A Technology-Centered Approach To Quantitative Privacy, David C. Gray

Oklahoma Law Review

No abstract provided.


United States V. Keystone Sanitation Company: E-Mail And The Attorney-Client Privilege, Karen M. Coon Jan 2001

United States V. Keystone Sanitation Company: E-Mail And The Attorney-Client Privilege, Karen M. Coon

Richmond Journal of Law & Technology

The rapid growth and sophistication of technology have changed the way people communicate. E-mail and the Internet have begun to affect the way attorneys communicate with their clients. E-mail is fast and convenient, but it is not without risks. The risk of illegal interception and the risk of inadvertent disclosure are serious issues that attorneys need to be aware of and try to prevent so that the attorney-client privilege is protected as much as possible. Although communicating with a client by e-mail may be risky, the risks posed by e-mail are no different from those posed by communicating by postal …