SlideShare a Scribd company logo
1 of 6
Security and Confidentiality of Advocate-
Client Electronic Communication
Prof. Dr. Mindaugas Kiškis
Advocate, FORT Legal
Professor, Mykolas Romeris University
Premises
Security and
Confidentiality of
Advocate-Client is
essential for trust in
rule of law, legal
institutions and human
rights
Advocate-Client
Communication is now
90% Electronic
Modern Threats to Advocate-
Client Communication
• Wire-tapping of mobile communications
• Global data retention
• Extraordinary powers for cybersecurity
• Big data
• Search of digital devices without warrant
• Non-public backdoors to most widely used
platforms
• Lacking and lax judicial oversight of surveillance
• Involvement of third parties (IT support)
What can We do about it?
• Heightened Security and Confidentiality
Awareness
• IT discipline
• Use of distributed communications and
platforms
• Full encryption
• Use of open source solutions
• Sometimes less technology is better
What can the Bar do about it?
• More outreach on security and confidentiality
issues
• More professional warranties in the law
• Wider and more liberal regulation of
professional secrets
• Training for advocates
Thank you!
mindaugas@kiskis.eu
http://www.kiskis.eu

More Related Content

What's hot

Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)YUSRA FERNANDO
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietySarah Granger
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesRónán Kennedy
 
Data protection and smart grids
Data protection and smart gridsData protection and smart grids
Data protection and smart gridsRónán Kennedy
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Ontario Cloud SIG
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT OutsourcingMultiTech IT
 
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LVDSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LVAndris Soroka
 
Cybersecurity Fact Sheet _ Defense in Depth
Cybersecurity Fact Sheet _ Defense in DepthCybersecurity Fact Sheet _ Defense in Depth
Cybersecurity Fact Sheet _ Defense in DepthSue DeRosier
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challengesHadi Fadlallah
 
Looking back and forward: Improving Health Data Security in Utah
Looking back and forward: Improving Health Data Security in UtahLooking back and forward: Improving Health Data Security in Utah
Looking back and forward: Improving Health Data Security in UtahState of Utah, Salt Lake City
 
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...SOCIAM Project
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTCIgor Zboran
 
ICANN Contract vs National Law
ICANN Contract vs National LawICANN Contract vs National Law
ICANN Contract vs National LawBlacknight
 

What's hot (20)

Online security
Online securityOnline security
Online security
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
Pricavy issues
Pricavy issuesPricavy issues
Pricavy issues
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital Rules
 
Data protection and smart grids
Data protection and smart gridsData protection and smart grids
Data protection and smart grids
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT Outsourcing
 
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LVDSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
 
Letter of Participation
Letter of ParticipationLetter of Participation
Letter of Participation
 
Cybersecurity Fact Sheet _ Defense in Depth
Cybersecurity Fact Sheet _ Defense in DepthCybersecurity Fact Sheet _ Defense in Depth
Cybersecurity Fact Sheet _ Defense in Depth
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
 
Looking back and forward: Improving Health Data Security in Utah
Looking back and forward: Improving Health Data Security in UtahLooking back and forward: Improving Health Data Security in Utah
Looking back and forward: Improving Health Data Security in Utah
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTC
 
Week 8
Week 8Week 8
Week 8
 
ICANN Contract vs National Law
ICANN Contract vs National LawICANN Contract vs National Law
ICANN Contract vs National Law
 

Similar to Security and confidentiality of Advocate-Client Electronic Communication

Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria
 
Electronic Signatures - Technical Foundations
Electronic Signatures - Technical FoundationsElectronic Signatures - Technical Foundations
Electronic Signatures - Technical FoundationsTorsten Eymann
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
A balanced perspective on RFID
A balanced perspective on RFIDA balanced perspective on RFID
A balanced perspective on RFIDConsiderati
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfmt5854804210
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
weyai cybersecurity.pptx
weyai cybersecurity.pptxweyai cybersecurity.pptx
weyai cybersecurity.pptxWeyai1
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College WorkshopRahul Nayan
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityS.M. Towhidul Islam
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentalsManesh T
 
Innovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.pptInnovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.pptssuser991de0
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowSophos Benelux
 
Prevent banking frauds through identity management
Prevent banking frauds through identity managementPrevent banking frauds through identity management
Prevent banking frauds through identity managementGARL
 
2014 Update EU Cyber Law & Authentication Legislation
2014 Update EU Cyber Law & Authentication Legislation2014 Update EU Cyber Law & Authentication Legislation
2014 Update EU Cyber Law & Authentication LegislationMartenLinkedin
 

Similar to Security and confidentiality of Advocate-Client Electronic Communication (20)

Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directions
 
Electronic Signatures - Technical Foundations
Electronic Signatures - Technical FoundationsElectronic Signatures - Technical Foundations
Electronic Signatures - Technical Foundations
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
A balanced perspective on RFID
A balanced perspective on RFIDA balanced perspective on RFID
A balanced perspective on RFID
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdf
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
weyai cybersecurity.pptx
weyai cybersecurity.pptxweyai cybersecurity.pptx
weyai cybersecurity.pptx
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Innovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.pptInnovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.ppt
 
dexa.ppt
dexa.pptdexa.ppt
dexa.ppt
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
 
Prevent banking frauds through identity management
Prevent banking frauds through identity managementPrevent banking frauds through identity management
Prevent banking frauds through identity management
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
2014 Update EU Cyber Law & Authentication Legislation
2014 Update EU Cyber Law & Authentication Legislation2014 Update EU Cyber Law & Authentication Legislation
2014 Update EU Cyber Law & Authentication Legislation
 

More from Mindaugas Kiskis

Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigos
Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigosAsmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigos
Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigosMindaugas Kiskis
 
Privatumas Lietuvoje 2015 m.
Privatumas Lietuvoje 2015 m.Privatumas Lietuvoje 2015 m.
Privatumas Lietuvoje 2015 m.Mindaugas Kiskis
 
Lietuvos verslo pasirengimas įgyvendinti GDPR
Lietuvos verslo pasirengimas įgyvendinti GDPRLietuvos verslo pasirengimas įgyvendinti GDPR
Lietuvos verslo pasirengimas įgyvendinti GDPRMindaugas Kiskis
 
Legal implications and consequances of GDPR
Legal implications and consequances of GDPRLegal implications and consequances of GDPR
Legal implications and consequances of GDPRMindaugas Kiskis
 
How to put intellectual property to a good use in your business?
How to put intellectual property to a good use in your business?How to put intellectual property to a good use in your business?
How to put intellectual property to a good use in your business?Mindaugas Kiskis
 
Asmens teisės į privatumą apsauga
Asmens teisės į privatumą apsaugaAsmens teisės į privatumą apsauga
Asmens teisės į privatumą apsaugaMindaugas Kiskis
 
Intelektinės nuosavybės inovacijos
Intelektinės nuosavybės inovacijosIntelektinės nuosavybės inovacijos
Intelektinės nuosavybės inovacijosMindaugas Kiskis
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in CyberspaceMindaugas Kiskis
 
Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)Mindaugas Kiskis
 
Vartotojų teisė atsisakyti nuotolinės sutarties
Vartotojų teisė atsisakyti nuotolinės sutartiesVartotojų teisė atsisakyti nuotolinės sutarties
Vartotojų teisė atsisakyti nuotolinės sutartiesMindaugas Kiskis
 
Išmaniųjų prietaisų naudojimas darbui
Išmaniųjų prietaisų naudojimas darbuiIšmaniųjų prietaisų naudojimas darbui
Išmaniųjų prietaisų naudojimas darbuiMindaugas Kiskis
 
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...Mindaugas Kiskis
 
Vartotojų kuriamas turinys ir intelektinės nuosavybės teisės
Vartotojų  kuriamas turinys ir intelektinės nuosavybės teisėsVartotojų  kuriamas turinys ir intelektinės nuosavybės teisės
Vartotojų kuriamas turinys ir intelektinės nuosavybės teisėsMindaugas Kiskis
 
Iššūkiai intelektinei nuosavybei
Iššūkiai intelektinei nuosavybeiIššūkiai intelektinei nuosavybei
Iššūkiai intelektinei nuosavybeiMindaugas Kiskis
 
Teisiniai iššūkiai vartotojams elektroninėje erdvėje
Teisiniai iššūkiai vartotojams elektroninėje erdvėjeTeisiniai iššūkiai vartotojams elektroninėje erdvėje
Teisiniai iššūkiai vartotojams elektroninėje erdvėjeMindaugas Kiskis
 
Teisė į mokslą Europos Sąjungoje
Teisė į mokslą Europos SąjungojeTeisė į mokslą Europos Sąjungoje
Teisė į mokslą Europos SąjungojeMindaugas Kiskis
 
Features of Canada's Innovation System
Features of Canada's Innovation SystemFeatures of Canada's Innovation System
Features of Canada's Innovation SystemMindaugas Kiskis
 
Biobankų veiklos įteisinimas Lietuvoje
Biobankų veiklos įteisinimas LietuvojeBiobankų veiklos įteisinimas Lietuvoje
Biobankų veiklos įteisinimas LietuvojeMindaugas Kiskis
 

More from Mindaugas Kiskis (19)

Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigos
Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigosAsmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigos
Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigos
 
Privatumas Lietuvoje 2015 m.
Privatumas Lietuvoje 2015 m.Privatumas Lietuvoje 2015 m.
Privatumas Lietuvoje 2015 m.
 
Lietuvos verslo pasirengimas įgyvendinti GDPR
Lietuvos verslo pasirengimas įgyvendinti GDPRLietuvos verslo pasirengimas įgyvendinti GDPR
Lietuvos verslo pasirengimas įgyvendinti GDPR
 
Legal implications and consequances of GDPR
Legal implications and consequances of GDPRLegal implications and consequances of GDPR
Legal implications and consequances of GDPR
 
How to put intellectual property to a good use in your business?
How to put intellectual property to a good use in your business?How to put intellectual property to a good use in your business?
How to put intellectual property to a good use in your business?
 
Asmens teisės į privatumą apsauga
Asmens teisės į privatumą apsaugaAsmens teisės į privatumą apsauga
Asmens teisės į privatumą apsauga
 
Intelektinės nuosavybės inovacijos
Intelektinės nuosavybės inovacijosIntelektinės nuosavybės inovacijos
Intelektinės nuosavybės inovacijos
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
 
Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)
 
Vartotojų teisė atsisakyti nuotolinės sutarties
Vartotojų teisė atsisakyti nuotolinės sutartiesVartotojų teisė atsisakyti nuotolinės sutarties
Vartotojų teisė atsisakyti nuotolinės sutarties
 
Išmaniųjų prietaisų naudojimas darbui
Išmaniųjų prietaisų naudojimas darbuiIšmaniųjų prietaisų naudojimas darbui
Išmaniųjų prietaisų naudojimas darbui
 
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...
 
Creative commons
Creative commonsCreative commons
Creative commons
 
Vartotojų kuriamas turinys ir intelektinės nuosavybės teisės
Vartotojų  kuriamas turinys ir intelektinės nuosavybės teisėsVartotojų  kuriamas turinys ir intelektinės nuosavybės teisės
Vartotojų kuriamas turinys ir intelektinės nuosavybės teisės
 
Iššūkiai intelektinei nuosavybei
Iššūkiai intelektinei nuosavybeiIššūkiai intelektinei nuosavybei
Iššūkiai intelektinei nuosavybei
 
Teisiniai iššūkiai vartotojams elektroninėje erdvėje
Teisiniai iššūkiai vartotojams elektroninėje erdvėjeTeisiniai iššūkiai vartotojams elektroninėje erdvėje
Teisiniai iššūkiai vartotojams elektroninėje erdvėje
 
Teisė į mokslą Europos Sąjungoje
Teisė į mokslą Europos SąjungojeTeisė į mokslą Europos Sąjungoje
Teisė į mokslą Europos Sąjungoje
 
Features of Canada's Innovation System
Features of Canada's Innovation SystemFeatures of Canada's Innovation System
Features of Canada's Innovation System
 
Biobankų veiklos įteisinimas Lietuvoje
Biobankų veiklos įteisinimas LietuvojeBiobankų veiklos įteisinimas Lietuvoje
Biobankų veiklos įteisinimas Lietuvoje
 

Recently uploaded

Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 

Recently uploaded (20)

Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 

Security and confidentiality of Advocate-Client Electronic Communication

  • 1. Security and Confidentiality of Advocate- Client Electronic Communication Prof. Dr. Mindaugas Kiškis Advocate, FORT Legal Professor, Mykolas Romeris University
  • 2. Premises Security and Confidentiality of Advocate-Client is essential for trust in rule of law, legal institutions and human rights Advocate-Client Communication is now 90% Electronic
  • 3. Modern Threats to Advocate- Client Communication • Wire-tapping of mobile communications • Global data retention • Extraordinary powers for cybersecurity • Big data • Search of digital devices without warrant • Non-public backdoors to most widely used platforms • Lacking and lax judicial oversight of surveillance • Involvement of third parties (IT support)
  • 4. What can We do about it? • Heightened Security and Confidentiality Awareness • IT discipline • Use of distributed communications and platforms • Full encryption • Use of open source solutions • Sometimes less technology is better
  • 5. What can the Bar do about it? • More outreach on security and confidentiality issues • More professional warranties in the law • Wider and more liberal regulation of professional secrets • Training for advocates