As more attorneys now days use the e-mail as their primary source of communication with their clients, new issues arise regarding the potential threat to attorney-client communication privilege resulting from the standard and systematic employer monitoring of their employees e-mails. Indeed employers monitor their employees’ computer use and in some cases terminate employees as result of this monitoring, for various reasons such as to increase of employee productivity and efficiency, protect their public image, prevent workplace harassment, protect their Intellectual Property assets and their network capacity. Given the systematic workplace monitoring but also the fact that contrary to the American Bar Association’s (ABA) assumption, e-mail...
The news story is now familiar: hackers breach a security system and post internal, confidential inf...
The attorney-client privilege is sacrosanct, but its protections are eroding. Always narrowly constr...
I. Introduction II. The Issue III. Author\u27s Summary IV. Factual Background V. Case Law Regarding ...
As more attorneys now days use the e-mail as their primary source of communication with their client...
Emails feel like private, confidential communications. But in the workplace, employers often retain...
Barbara Hall, an administrative assistant, often arrives at work an hour and a half early solely to ...
Recent attorney client-privilege cases ojfer a modern understanding of reasonable expectations of em...
(Excerpt) This Note argues for the use of an objective element that focuses on the experience from t...
Early in the days of attorney-client email, David Hricik wrote a soothing law review article, Lawyer...
The rapid growth and sophistication of technology have changed the way people communicate. E-mail an...
Employer monitoring of electronic mail constitutes an emerging area of the law that is clearly unset...
E-mail and related technology have created multi-faceted issues for public employers and legal pract...
Employers and employees are both highly vulnerable to negative consequences which may result from e-...
Recent court decisions in In re Asia Global Crossing, Ltd., People v. Jiang, and Curto v. Medical Wo...
This study determined that many, perhaps most, public relations executives do not consider real or p...
The news story is now familiar: hackers breach a security system and post internal, confidential inf...
The attorney-client privilege is sacrosanct, but its protections are eroding. Always narrowly constr...
I. Introduction II. The Issue III. Author\u27s Summary IV. Factual Background V. Case Law Regarding ...
As more attorneys now days use the e-mail as their primary source of communication with their client...
Emails feel like private, confidential communications. But in the workplace, employers often retain...
Barbara Hall, an administrative assistant, often arrives at work an hour and a half early solely to ...
Recent attorney client-privilege cases ojfer a modern understanding of reasonable expectations of em...
(Excerpt) This Note argues for the use of an objective element that focuses on the experience from t...
Early in the days of attorney-client email, David Hricik wrote a soothing law review article, Lawyer...
The rapid growth and sophistication of technology have changed the way people communicate. E-mail an...
Employer monitoring of electronic mail constitutes an emerging area of the law that is clearly unset...
E-mail and related technology have created multi-faceted issues for public employers and legal pract...
Employers and employees are both highly vulnerable to negative consequences which may result from e-...
Recent court decisions in In re Asia Global Crossing, Ltd., People v. Jiang, and Curto v. Medical Wo...
This study determined that many, perhaps most, public relations executives do not consider real or p...
The news story is now familiar: hackers breach a security system and post internal, confidential inf...
The attorney-client privilege is sacrosanct, but its protections are eroding. Always narrowly constr...
I. Introduction II. The Issue III. Author\u27s Summary IV. Factual Background V. Case Law Regarding ...