Open Access

A proactive approach to legal privilege in the light of electronic communication

,  and   
Apr 02, 2025

Cite
Download Cover

Act No. 221/2006 Coll. of the Slovak Republic on the enforcement of detention and on the amendment of certain laws (2006) 15 March. Zbierka zakonov, 78, pp. 1286–1301. Available at: https://www.slov-lex.sk/pravne-predpisy/SK/ZZ/2006/221/20160701 (Accessed: 10 December 2024). Search in Google Scholar

Act No. 475/2005 Coll. of the Slovak Republic on the execution of a prison sentence and on the amendment of certain laws (2005) 22 September. Zbierka zakonov, 191, pp. 4422–4451. Search in Google Scholar

Akhtar, N., Kerim, B., Perwej, Y., Tiwari, A. and Praveen, S. (2021) ‘A comprehensive overview of privacy and data security for cloud storage’, International Journal of Scientific Research in Science Engineering and Technology, 8(5), pp. 113–152. Available at: https://doi.org/10.32628/IJSRSET21852 Search in Google Scholar

‘Akzo Nobel Chemicals and Akcros Chemicals v. Commission’ (2007) Case no. T-125/03; ECLI:EU:T:2007:287, 17 September. Search in Google Scholar

Al-Marsy, A., Chaudhary, P. and Rodger, J.A. (2021) ‘A model for examining challenges and opportunities in use of cloud computing for health information systems’, Applied System Innovation, 4(1), article 15. Available at: https://doi.org/10.3390/asi4010015 Search in Google Scholar

‘Altay v. Turkey’ (2019) Case no. 11236/06, 9 April. Available at: https://hudoc.echr.coe.int/fre?i=001-192210 (Accessed: 15 December 2024). Search in Google Scholar

‘AM and S Europe Ltd. v. Commission of the European Communities’ (1982) Case no. 155/79; ECLI:EU:C:1982:157, 18 May. Search in Google Scholar

Arockiam, L. and Monikandan, S. (2014) ‘Efficient cloud storage confidentiality to ensure data security’, in 2014 International Conference on Computer Communication and Informatics, Coimbatore, India, 3–5 January, pp. 1–5. Available at: https://doi.org/10.1109/ICCCI.2014.6921762 Search in Google Scholar

Bachmaier Winter, L. and Thaman, S.C. (2020) ‘A comparative view of the right to counsel and the protection of attorney–client communications’, in L. Bachmaier Winter, S.C. Thaman and V. Lynn (eds) The right to counsel and the protection of attorney-client privilege in criminal proceedings. Ius Comparatum—global studies in comparative law, 44. Springer, pp. 7–73. Available at: https://doi.org/10.1007/978-3-030-43123-5_2 Search in Google Scholar

Banks, W.C. (2016) ‘Cyber espionage and electronic surveillance: beyond the media coverage’, Emory Law Journal, 66(3), p. 513. Search in Google Scholar

Barton, T.D. (2009) Preventive law and problem solving: lawyering for the future. Vandeplas Publishing. Search in Google Scholar

Bentajer, B., Hedabou, M., Abouelmehdi, K. and Elfazazi, S. (2018) ‘CS-IBE: a data confidentiality system in public cloud storage system’, Procedia Computer Science, 141, pp. 559–564. Available at: https://doi.org/10.1016/j.procs.2018.10.126 Search in Google Scholar

Berger-Walliser, G. (2012) ‘The past and future of proactive law: an overview of the development of the proactive law movement’, in G. Berger-Walliser and K. Østergaard (eds) Proactive law in a business environment. DJØF Publishing, pp. 13–31. Available at: https://ssrn.com/abstract=2576761 (Accessed: 15 December 2025). Search in Google Scholar

Bronstein, J. and Solomon, Y. (2021) ‘Exploring the information practices of lawyers’, Journal of Documentation, 77(4), pp. 1003–1021. Available at: https://doi.org/10.1108/JD-10-2020-0165 Search in Google Scholar

‘Camenzind v. Switzerland’ (1997) Case no. 21353/93, 16 December. Available at: https://hudoc.echr.coe.int/eng?i=001-58125 (Accessed: 15 December 2024). Search in Google Scholar

CCBE (2016) Model article on confidentiality. Available at: https://www.ccbe.eu/fileadmin/speciality_distribution/public/documents/DEONTOLOGY/DEON_Postion_Papers/EN_DEON_20161202_Model_Article_on_Confidentiality.pdf (Accessed: 10 December 2024). Search in Google Scholar

CCBE (2020) CCBE Considerations on the legal aspects of artificial intelligence. Available at: https://www.ccbe.eu/fileadmin/speciality_distribution/public/documents/IT_LAW/ITL_Guides_recommendations/EN_ITL_20200220_CCBE-considerations-on-the-Legal-Aspects-of-AI.pdf (Accessed: 10 December 2024). Search in Google Scholar

Charter of Core Principles of the European Legal Profession and Code of Conduct for European Lawyers (2013). Available at: https://www.ccbe.eu/NTCdocument/EN_CCBE_CoCpdf1_1382973057.pdf (Accessed: 10 December 2024). Search in Google Scholar

Chow, S.S.M., Chu, C.K., Huang, X., Zhou, J. and Deng, R.H. (2012) ‘Dynamic secure cloud storage with provenance’, in D. Naccache (ed) Cryptography and security: from theory to applications. Lecture notes in computer science, 6805. Springer, pp. 442–464. Available at: https://doi.org/10.1007/978-3-642-28368-0_28. Search in Google Scholar

‘Christie v. the United Kingdom’ (1994) Case no. 21482/93, 27 June. Search in Google Scholar

Constitutional Court of the Czech Republic (2010) Ruling no. II. ÚS 889/10, 25 October. Search in Google Scholar

‘Copland v. the United Kingdom’ (2007) Case no. 62617/00, 3 April. Available at: https://hudoc.echr.coe.int/eng?i=001-79996 (Accessed 15 December 2024). Search in Google Scholar

Corrales Compagnucci, M., Fenwick, M. and Haapio, H. (2019) ‘Digital technologies, legal design and the future of the legal profession’, in M. Corrales Compagnucci, M. Fenwick and H. Haapio (eds) Legal tech, smart contracts and blockchain. Springer, pp. 1–15. Available at: https://doi.org/10.1007/978-981-13-6086-2_1 Search in Google Scholar

Dechand, S., Naiakshina, A., Danilova, A. and Smith, M. (2019) ‘In encryption we don’t trust: the effect of end-to-end encryption to the masses on user perception’, in 2019 IEEE European Symposium on Security and Privacy (EuroS&P), Stockholm, Sweden, pp. 401–415. Available at: https://doi.org/10.1109/EuroSP.2019.00037 Search in Google Scholar

DiMatteo, L.A., Janssen, A., Ortolani, P., de Elizalde, F., Cannarsa, M. and Durovic, M. (eds) (2021) The Cambridge handbook of lawyering in the digital age. Cambridge University Press. Available at: https://doi.org/10.1017/9781108936040 Search in Google Scholar

European Commission (2022) Shaping Europe’s digital future: proposal for ePrivacy Regulation. [Press release] 7 June. Available at: https://digital-strategy.ec.europa.eu/en/policies/eprivacy-regulation (Accessed: 10 December 2024). Search in Google Scholar

European Parliament (2022) Pegasus and surveillance spyware. Policy Department for Citizens’ Rights and Constitutional Affairs, Directorate-General for Internal Policies. Available at: https://www.europarl.europa.eu/RegData/etudes/IDAN/2022/732268/IPOL_IDA(2022)732268_EN.pdf (Accessed: 10 December 2024). Search in Google Scholar

Ferrari, E. (2010) ‘Database as a service: challenges and solutions for privacy and security’, in 2009 Asia-Pacific Services Computing Conference (APSCC), Singapore, pp. 46–51. Available at: https://doi.org/10.1109/APSCC.2009.5394141 Search in Google Scholar

Fischel, D.R. (1998) ‘Lawyers and confidentiality’, The University of Chicago Law Review, 65(1), article 1, pp. 1–33. Search in Google Scholar

Gnusowski, M. and Lipiec, S. (2024) ‘Silent boundaries: exploring the limits of legal confidentiality in Poland’, International Journal of the Legal Profession, 31(3), pp. 267–291. Available at: https://doi.org/10.1080/09695958.2024.2401819 Search in Google Scholar

Haapio, H. (2006a) ‘Business success and problem prevention through proactive contracting’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 21–34. Available at: https://scandinavianlaw.se/pdf/49-2.pdf (Accessed: 10 December 2024). Search in Google Scholar

Haapio, H. (2006b) ‘Introduction to proactive law: a business lawyer’s view’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 149–194. Available at: https://scandinavianlaw.se/pdf/49-9.pdf (Accessed: 10 December 2024). Search in Google Scholar

Haapio, H., Barton, T.D. and Corrales Compagnucci, M. (2021) ‘Legal design for the common good: proactive legal care by design’, in M. Corrales Compagnucci, H. Haapio, M. Hagan and M. Doherty (eds) Legal design: Integrating business, design and legal thinking with technology. Cheltenham: Edward Elgar Publishing, pp. 56–81. Available at: https://doi.org/10.4337/9781839107269.00011 Search in Google Scholar

Helgesson, K.S. and Mörth, U. (2018) ‘Client privilege, compliance and the rule of law: Swedish lawyers and money laundering prevention’, Crime, Law and Social Change, 69, pp. 227–248. Available at: https://doi.org/10.1007/s10611-017-9753-8 Search in Google Scholar

Hietanen-Kunwald, P. and Haapio, H. (2021) ‘Effective dispute prevention and resolution through proactive contract design’, Journal of Strategic Contracting and Negotiation, 5(1–2), pp. 3–23. Available at: https://doi.org/10.1177/20555636211016878 Search in Google Scholar

Hofmann, J. and Truong, K.T. (2024) ‘End-to-end encrypted cloud storage in the wild: a broken ecosystem’, in CCS ’24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pp. 3988–4001. Available at: https://doi.org/10.1145/3658644.3690309 Search in Google Scholar

‘Iliya Stefanov v. Bulgaria’ (2008) Case no. 65755/01, 22 May. Available at: https://hudoc.echr.coe.int/eng?i=001-86449 (Accessed: 15 December 2024). Search in Google Scholar

Inam, M.A., Chen, Y., Goyal, A. et al. (2023) ‘SoK: history is a vast early warning system: auditing the provenance of system intrusions’, in 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA. IEEE, pp. 2620–2638. Available at: https://doi.org/10.1109/SP46215.2023.10179405 Search in Google Scholar

Jones, E., Ryan, F., Thanaraj, A. and Wong, T. (2021) Digital lawyering: technology and legal practice in the 21st century. Routledge. Available at: https://doi.org/10.4324/9780429298219 Search in Google Scholar

Kameoka, E. (2023) ‘History of LPP’, in Legal professional privilege in EU competition investigations. Edward Elgar Publishing, pp. 29–38. Available at: https://doi.org/10.4337/9781803922782.00011 Search in Google Scholar

King, B.A. (2001) ‘Preserving the attorney-client privilege in the corporate environment’, Alabama Law Review, 53(2), pp. 621–638. Search in Google Scholar

‘Klaas v. Germany’ (1993) Case no. 15473/89, 22 September. Available at: https://hudoc.echr.coe.int/eng?i=001-57826 (Accessed: 15 December 2024). Search in Google Scholar

‘Kopp v. Switzerland’ (1998) Case no. 23224/94, 25 March. Available at: https://hudoc.echr.coe.int/eng?i=001-58144 (Accessed: 15 December 2024). Search in Google Scholar

Liu, H., Mu, Y., Zhao, J., Xu, C., Wang, H., Chen, L. and Yu, Y. (2017) ‘Identity-based provable data possession revisited: security analysis and generic construction’, Computer Standards & Interfaces, 54(1), pp. 10–19. Available at: https://doi.org/10.1016/j.csi.2016.09.012 Search in Google Scholar

Makhlouf, R. (2020) ‘Cloudy transaction costs: a dive into cloud computing economics’, Journal of Cloud Computing, 9(1), article 1. Available at: https://doi.org/10.1186/s13677-019-0149-4 Search in Google Scholar

Nystén-Haarala, S. (2006) ‘Contract law and everyday contracting’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 263–268. Available at: https://www.scandinavianlaw.se/pdf/49-15.pdf (Accessed: 15 October 2024). Search in Google Scholar

‘Opinion of the European Economic and Social Committee (EESC) on ‘The proactive law approach: a further step towards better regulation at EU level’’ (2009) Official Journal C 175/26, 28 July. Available at: https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2009:175:0026:0033:EN:PDF (Accessed: 15 December 2024). Search in Google Scholar

‘Orde van Vlaamse Balies and Others v. Vlaamse Regering’ (2022) Case no. C-694/20; ECLI:EU:C:2022:963, 8 December. Available at: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:62020CJ0694 (Accessed: 15 December 2024). Search in Google Scholar

‘P.G. and J.H. v. the United Kingdom’ (2001) Case no. 44787/98, 25 September. Available at: https://hudoc.echr.coe.int/eng?i=001-59665 (Accessed: 15 December 2024). Search in Google Scholar

‘Petri Sallinen and Others v. Finland’ (2005) Case no. 50882/99, 27 September. Available at: https://hudoc.echr.coe.int/eng?i=001-70283 (Accessed: 15 December 2024). Search in Google Scholar

Pico i Junoy, J. and López, J.A.A. (2022) ‘Private communication between lawyers as evidence in a judicial process: a comparative journey’, The International Journal of Evidence & Proof, 26(1), pp. 61–80. Available at: https://doi.org/10.1177/13657127211055232 Search in Google Scholar

Pohjonen, S. (2006) ‘Proactive law in the field of law’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 53–70. Available at: https://www.scandinavianlaw.se/pdf/49-4.pdf (Accessed: 12 September 2024). Search in Google Scholar

‘Proposal for a Regulation of the European Parliament and of the Council concerning the respect for private life and the protection of personal data in electronic communications and repealing Directive 2002/58/EC (Regulation on Privacy and Electronic Communications), COM/2017/010 final’ (2017) EUR-Lex. Available at: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52017PC0010 (Accessed: 10 December 2024). Search in Google Scholar

Rady, M., Abdelkader, T. and Ismail, R. (2019) ‘Integrity and confidentiality in cloud outsourced data’, Ain Shams Engineering Journal, 10(2), pp. 275–285. Available at: https://doi.org/10.1016/j.asej.2019.03.002 Search in Google Scholar

‘Saber v. Norway’ (2020) Case no. 459/18, 17 December. Available at: https://hudoc.echr.coe.int/fre?i=001-206519 (Accessed: 15 December 2024). Search in Google Scholar

Saliternik, M. and Agon, S.S. (2024) ‘Proactive international law’, Hastings Law Journal, 75(3), p. 661. Available at: https://repository.uclawsf.edu/hastings_law_journal/vol75/iss3/4 (Accessed: 10 December 2024). Search in Google Scholar

Sandhu, A.K. (2021) ‘Big data with cloud computing: discussions and challenges’, Big Data Mining and Analytics, 5(1), pp. 32–40. Available at: https://doi.org/10.26599/BDMA.2021.9020016 Search in Google Scholar

Schartum, D.W. (2006) ‘Introduction to a government-based perspective on proactive law: a proactive approach’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 35–51. Available at: https://www.scandinavianlaw.se/pdf/49-3.pdf (Accessed: 15 December 2024) Search in Google Scholar

Singh, N. and Singh, A.K. (2018) ‘Data privacy protection mechanisms in cloud’, Data Science and Engineering, 3(1), pp. 24–39. Available at: https://doi.org/10.1007/s41019-017-0046-0 Search in Google Scholar

Smejkal, V. (2015) ‘Ochrana dat advokátů v elektronických úložištích’, Bulletin advokacie, (3), pp. 15–22. Search in Google Scholar

‘Smirnov v. Russia’ (2007) Case no. 71362/01, 7 June. Available at: https://hudoc.echr.coe.int/eng?i=001-80953 (Accessed: 15 December 2024). Search in Google Scholar

Solarte-Vásquez, M.C. and Hietanen-Kunwald, P. (2020) ‘Transaction design standards for the operationalisation of fairness and empowerment in proactive contracting’, International and Comparative Law Review, 20(1), pp. 180–200. Available at: https://doi.org/10.2478/iclr-2020-0008 Search in Google Scholar

Solarte-Vásquez, M.C., Järv, N. and Nyman-Metcalf, K. (2016) ‘Usability factors in transactional design and smart contracting’, in T. Kerikmäe and A. Rull (eds) The future of law and eTechnologies. Springer International Publishing, pp. 149–176. Available at: https://doi.org/10.1007/978-3-319-26896-5_8 Search in Google Scholar

Solarte-Vásquez, M.C. and Nyman-Metcalf, K. (2017) ‘Smart contracting: a multidisciplinary and proactive approach for the EU digital single market’, Baltic Journal of European Studies, 7(2), pp. 208–246. Available at: https://doi.org/10.1515/bjes-2017-0017 Search in Google Scholar

Sorsa, K. (2011) Proactive management and proactive business law: a handbook. Turku University of Applied Sciences. Search in Google Scholar

Supreme Court of the Czech Republic (2015) Opinion no. Tpjn 306/2014, Collection of Court Decisions and Opinions under no. R 35/2015. Search in Google Scholar

‘Taylor-Sabori v. the United Kingdom’ (2002) Case no. 47114/99, 22 October. Available at: https://hudoc.echr.coe.int/eng?i=001-5879 (Accessed: 15 December 2024). Search in Google Scholar

Thaman, S.C. and Bachmaier, L. (2021) ‘Attorney-client confidentiality as a fair trial right in criminal proceedings’, in General reports of the XXth General Congress of the International Academy of Comparative Law – Rapports généraux du XXème Congrès général de l’Académie internationale de droit comparé. Springer International Publishing, pp. 589–610. Available at: https://doi.org/10.1007/978-3-030-48675-4_21 Search in Google Scholar

TikTok (2024) ‘Privacy policy’. Available at: https://www.tiktok.com/legal/page/eea/privacy-policy/en (Accessed: 10 December 2024). Search in Google Scholar

Touma, R. (2022) ‘TikTok has been accused of ‘aggressive’ data harvesting. Is your information at risk?’ The Guardian, 19 July. Available at: https://www.theguardian.com/technology/2022/jul/19/tiktok-has-been-accused-of-aggressive-data-harvesting-is-your-information-at-risk (Accessed: 10 December 2024). Search in Google Scholar

‘Wieser and Bicos Beteiligungen GmbH v. Austria’ (2007) Case no. 74336/01, 16 October. Available at: https://hudoc.echr.coe.int/eng?i=001-82711 (Accessed: 15 December 2024). Search in Google Scholar

‘X v. the United Kingdom’ (1978) Case no. 7215/75, 12 October. Available at: https://hudoc.echr.coe.int/eng?i=001-57602 (Accessed: 15 December 2024). Search in Google Scholar