[
Act No. 221/2006 Coll. of the Slovak Republic on the enforcement of detention and on the amendment of certain laws (2006) 15 March. Zbierka zakonov, 78, pp. 1286–1301. Available at: https://www.slov-lex.sk/pravne-predpisy/SK/ZZ/2006/221/20160701 (Accessed: 10 December 2024).
]Search in Google Scholar
[
Act No. 475/2005 Coll. of the Slovak Republic on the execution of a prison sentence and on the amendment of certain laws (2005) 22 September. Zbierka zakonov, 191, pp. 4422–4451.
]Search in Google Scholar
[
Akhtar, N., Kerim, B., Perwej, Y., Tiwari, A. and Praveen, S. (2021) ‘A comprehensive overview of privacy and data security for cloud storage’, International Journal of Scientific Research in Science Engineering and Technology, 8(5), pp. 113–152. Available at: https://doi.org/10.32628/IJSRSET21852
]Search in Google Scholar
[
‘Akzo Nobel Chemicals and Akcros Chemicals v. Commission’ (2007) Case no. T-125/03; ECLI:EU:T:2007:287, 17 September.
]Search in Google Scholar
[
Al-Marsy, A., Chaudhary, P. and Rodger, J.A. (2021) ‘A model for examining challenges and opportunities in use of cloud computing for health information systems’, Applied System Innovation, 4(1), article 15. Available at: https://doi.org/10.3390/asi4010015
]Search in Google Scholar
[
‘Altay v. Turkey’ (2019) Case no. 11236/06, 9 April. Available at: https://hudoc.echr.coe.int/fre?i=001-192210 (Accessed: 15 December 2024).
]Search in Google Scholar
[
‘AM and S Europe Ltd. v. Commission of the European Communities’ (1982) Case no. 155/79; ECLI:EU:C:1982:157, 18 May.
]Search in Google Scholar
[
Arockiam, L. and Monikandan, S. (2014) ‘Efficient cloud storage confidentiality to ensure data security’, in 2014 International Conference on Computer Communication and Informatics, Coimbatore, India, 3–5 January, pp. 1–5. Available at: https://doi.org/10.1109/ICCCI.2014.6921762
]Search in Google Scholar
[
Bachmaier Winter, L. and Thaman, S.C. (2020) ‘A comparative view of the right to counsel and the protection of attorney–client communications’, in L. Bachmaier Winter, S.C. Thaman and V. Lynn (eds) The right to counsel and the protection of attorney-client privilege in criminal proceedings. Ius Comparatum—global studies in comparative law, 44. Springer, pp. 7–73. Available at: https://doi.org/10.1007/978-3-030-43123-5_2
]Search in Google Scholar
[
Banks, W.C. (2016) ‘Cyber espionage and electronic surveillance: beyond the media coverage’, Emory Law Journal, 66(3), p. 513.
]Search in Google Scholar
[
Barton, T.D. (2009) Preventive law and problem solving: lawyering for the future. Vandeplas Publishing.
]Search in Google Scholar
[
Bentajer, B., Hedabou, M., Abouelmehdi, K. and Elfazazi, S. (2018) ‘CS-IBE: a data confidentiality system in public cloud storage system’, Procedia Computer Science, 141, pp. 559–564. Available at: https://doi.org/10.1016/j.procs.2018.10.126
]Search in Google Scholar
[
Berger-Walliser, G. (2012) ‘The past and future of proactive law: an overview of the development of the proactive law movement’, in G. Berger-Walliser and K. Østergaard (eds) Proactive law in a business environment. DJØF Publishing, pp. 13–31. Available at: https://ssrn.com/abstract=2576761 (Accessed: 15 December 2025).
]Search in Google Scholar
[
Bronstein, J. and Solomon, Y. (2021) ‘Exploring the information practices of lawyers’, Journal of Documentation, 77(4), pp. 1003–1021. Available at: https://doi.org/10.1108/JD-10-2020-0165
]Search in Google Scholar
[
‘Camenzind v. Switzerland’ (1997) Case no. 21353/93, 16 December. Available at: https://hudoc.echr.coe.int/eng?i=001-58125 (Accessed: 15 December 2024).
]Search in Google Scholar
[
CCBE (2016) Model article on confidentiality. Available at: https://www.ccbe.eu/fileadmin/speciality_distribution/public/documents/DEONTOLOGY/DEON_Postion_Papers/EN_DEON_20161202_Model_Article_on_Confidentiality.pdf (Accessed: 10 December 2024).
]Search in Google Scholar
[
CCBE (2020) CCBE Considerations on the legal aspects of artificial intelligence. Available at: https://www.ccbe.eu/fileadmin/speciality_distribution/public/documents/IT_LAW/ITL_Guides_recommendations/EN_ITL_20200220_CCBE-considerations-on-the-Legal-Aspects-of-AI.pdf (Accessed: 10 December 2024).
]Search in Google Scholar
[
Charter of Core Principles of the European Legal Profession and Code of Conduct for European Lawyers (2013). Available at: https://www.ccbe.eu/NTCdocument/EN_CCBE_CoCpdf1_1382973057.pdf (Accessed: 10 December 2024).
]Search in Google Scholar
[
Chow, S.S.M., Chu, C.K., Huang, X., Zhou, J. and Deng, R.H. (2012) ‘Dynamic secure cloud storage with provenance’, in D. Naccache (ed) Cryptography and security: from theory to applications. Lecture notes in computer science, 6805. Springer, pp. 442–464. Available at: https://doi.org/10.1007/978-3-642-28368-0_28.
]Search in Google Scholar
[
‘Christie v. the United Kingdom’ (1994) Case no. 21482/93, 27 June.
]Search in Google Scholar
[
Constitutional Court of the Czech Republic (2010) Ruling no. II. ÚS 889/10, 25 October.
]Search in Google Scholar
[
‘Copland v. the United Kingdom’ (2007) Case no. 62617/00, 3 April. Available at: https://hudoc.echr.coe.int/eng?i=001-79996 (Accessed 15 December 2024).
]Search in Google Scholar
[
Corrales Compagnucci, M., Fenwick, M. and Haapio, H. (2019) ‘Digital technologies, legal design and the future of the legal profession’, in M. Corrales Compagnucci, M. Fenwick and H. Haapio (eds) Legal tech, smart contracts and blockchain. Springer, pp. 1–15. Available at: https://doi.org/10.1007/978-981-13-6086-2_1
]Search in Google Scholar
[
Dechand, S., Naiakshina, A., Danilova, A. and Smith, M. (2019) ‘In encryption we don’t trust: the effect of end-to-end encryption to the masses on user perception’, in 2019 IEEE European Symposium on Security and Privacy (EuroS&P), Stockholm, Sweden, pp. 401–415. Available at: https://doi.org/10.1109/EuroSP.2019.00037
]Search in Google Scholar
[
DiMatteo, L.A., Janssen, A., Ortolani, P., de Elizalde, F., Cannarsa, M. and Durovic, M. (eds) (2021) The Cambridge handbook of lawyering in the digital age. Cambridge University Press. Available at: https://doi.org/10.1017/9781108936040
]Search in Google Scholar
[
European Commission (2022) Shaping Europe’s digital future: proposal for ePrivacy Regulation. [Press release] 7 June. Available at: https://digital-strategy.ec.europa.eu/en/policies/eprivacy-regulation (Accessed: 10 December 2024).
]Search in Google Scholar
[
European Parliament (2022) Pegasus and surveillance spyware. Policy Department for Citizens’ Rights and Constitutional Affairs, Directorate-General for Internal Policies. Available at: https://www.europarl.europa.eu/RegData/etudes/IDAN/2022/732268/IPOL_IDA(2022)732268_EN.pdf (Accessed: 10 December 2024).
]Search in Google Scholar
[
Ferrari, E. (2010) ‘Database as a service: challenges and solutions for privacy and security’, in 2009 Asia-Pacific Services Computing Conference (APSCC), Singapore, pp. 46–51. Available at: https://doi.org/10.1109/APSCC.2009.5394141
]Search in Google Scholar
[
Fischel, D.R. (1998) ‘Lawyers and confidentiality’, The University of Chicago Law Review, 65(1), article 1, pp. 1–33.
]Search in Google Scholar
[
Gnusowski, M. and Lipiec, S. (2024) ‘Silent boundaries: exploring the limits of legal confidentiality in Poland’, International Journal of the Legal Profession, 31(3), pp. 267–291. Available at: https://doi.org/10.1080/09695958.2024.2401819
]Search in Google Scholar
[
Haapio, H. (2006a) ‘Business success and problem prevention through proactive contracting’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 21–34. Available at: https://scandinavianlaw.se/pdf/49-2.pdf (Accessed: 10 December 2024).
]Search in Google Scholar
[
Haapio, H. (2006b) ‘Introduction to proactive law: a business lawyer’s view’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 149–194. Available at: https://scandinavianlaw.se/pdf/49-9.pdf (Accessed: 10 December 2024).
]Search in Google Scholar
[
Haapio, H., Barton, T.D. and Corrales Compagnucci, M. (2021) ‘Legal design for the common good: proactive legal care by design’, in M. Corrales Compagnucci, H. Haapio, M. Hagan and M. Doherty (eds) Legal design: Integrating business, design and legal thinking with technology. Cheltenham: Edward Elgar Publishing, pp. 56–81. Available at: https://doi.org/10.4337/9781839107269.00011
]Search in Google Scholar
[
Helgesson, K.S. and Mörth, U. (2018) ‘Client privilege, compliance and the rule of law: Swedish lawyers and money laundering prevention’, Crime, Law and Social Change, 69, pp. 227–248. Available at: https://doi.org/10.1007/s10611-017-9753-8
]Search in Google Scholar
[
Hietanen-Kunwald, P. and Haapio, H. (2021) ‘Effective dispute prevention and resolution through proactive contract design’, Journal of Strategic Contracting and Negotiation, 5(1–2), pp. 3–23. Available at: https://doi.org/10.1177/20555636211016878
]Search in Google Scholar
[
Hofmann, J. and Truong, K.T. (2024) ‘End-to-end encrypted cloud storage in the wild: a broken ecosystem’, in CCS ’24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pp. 3988–4001. Available at: https://doi.org/10.1145/3658644.3690309
]Search in Google Scholar
[
‘Iliya Stefanov v. Bulgaria’ (2008) Case no. 65755/01, 22 May. Available at: https://hudoc.echr.coe.int/eng?i=001-86449 (Accessed: 15 December 2024).
]Search in Google Scholar
[
Inam, M.A., Chen, Y., Goyal, A. et al. (2023) ‘SoK: history is a vast early warning system: auditing the provenance of system intrusions’, in 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA. IEEE, pp. 2620–2638. Available at: https://doi.org/10.1109/SP46215.2023.10179405
]Search in Google Scholar
[
Jones, E., Ryan, F., Thanaraj, A. and Wong, T. (2021) Digital lawyering: technology and legal practice in the 21st century. Routledge. Available at: https://doi.org/10.4324/9780429298219
]Search in Google Scholar
[
Kameoka, E. (2023) ‘History of LPP’, in Legal professional privilege in EU competition investigations. Edward Elgar Publishing, pp. 29–38. Available at: https://doi.org/10.4337/9781803922782.00011
]Search in Google Scholar
[
King, B.A. (2001) ‘Preserving the attorney-client privilege in the corporate environment’, Alabama Law Review, 53(2), pp. 621–638.
]Search in Google Scholar
[
‘Klaas v. Germany’ (1993) Case no. 15473/89, 22 September. Available at: https://hudoc.echr.coe.int/eng?i=001-57826 (Accessed: 15 December 2024).
]Search in Google Scholar
[
‘Kopp v. Switzerland’ (1998) Case no. 23224/94, 25 March. Available at: https://hudoc.echr.coe.int/eng?i=001-58144 (Accessed: 15 December 2024).
]Search in Google Scholar
[
Liu, H., Mu, Y., Zhao, J., Xu, C., Wang, H., Chen, L. and Yu, Y. (2017) ‘Identity-based provable data possession revisited: security analysis and generic construction’, Computer Standards & Interfaces, 54(1), pp. 10–19. Available at: https://doi.org/10.1016/j.csi.2016.09.012
]Search in Google Scholar
[
Makhlouf, R. (2020) ‘Cloudy transaction costs: a dive into cloud computing economics’, Journal of Cloud Computing, 9(1), article 1. Available at: https://doi.org/10.1186/s13677-019-0149-4
]Search in Google Scholar
[
Nystén-Haarala, S. (2006) ‘Contract law and everyday contracting’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 263–268. Available at: https://www.scandinavianlaw.se/pdf/49-15.pdf (Accessed: 15 October 2024).
]Search in Google Scholar
[
‘Opinion of the European Economic and Social Committee (EESC) on ‘The proactive law approach: a further step towards better regulation at EU level’’ (2009) Official Journal C 175/26, 28 July. Available at: https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2009:175:0026:0033:EN:PDF (Accessed: 15 December 2024).
]Search in Google Scholar
[
‘Orde van Vlaamse Balies and Others v. Vlaamse Regering’ (2022) Case no. C-694/20; ECLI:EU:C:2022:963, 8 December. Available at: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:62020CJ0694 (Accessed: 15 December 2024).
]Search in Google Scholar
[
‘P.G. and J.H. v. the United Kingdom’ (2001) Case no. 44787/98, 25 September. Available at: https://hudoc.echr.coe.int/eng?i=001-59665 (Accessed: 15 December 2024).
]Search in Google Scholar
[
‘Petri Sallinen and Others v. Finland’ (2005) Case no. 50882/99, 27 September. Available at: https://hudoc.echr.coe.int/eng?i=001-70283 (Accessed: 15 December 2024).
]Search in Google Scholar
[
Pico i Junoy, J. and López, J.A.A. (2022) ‘Private communication between lawyers as evidence in a judicial process: a comparative journey’, The International Journal of Evidence & Proof, 26(1), pp. 61–80. Available at: https://doi.org/10.1177/13657127211055232
]Search in Google Scholar
[
Pohjonen, S. (2006) ‘Proactive law in the field of law’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 53–70. Available at: https://www.scandinavianlaw.se/pdf/49-4.pdf (Accessed: 12 September 2024).
]Search in Google Scholar
[
‘Proposal for a Regulation of the European Parliament and of the Council concerning the respect for private life and the protection of personal data in electronic communications and repealing Directive 2002/58/EC (Regulation on Privacy and Electronic Communications), COM/2017/010 final’ (2017) EUR-Lex. Available at: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52017PC0010 (Accessed: 10 December 2024).
]Search in Google Scholar
[
Rady, M., Abdelkader, T. and Ismail, R. (2019) ‘Integrity and confidentiality in cloud outsourced data’, Ain Shams Engineering Journal, 10(2), pp. 275–285. Available at: https://doi.org/10.1016/j.asej.2019.03.002
]Search in Google Scholar
[
‘Saber v. Norway’ (2020) Case no. 459/18, 17 December. Available at: https://hudoc.echr.coe.int/fre?i=001-206519 (Accessed: 15 December 2024).
]Search in Google Scholar
[
Saliternik, M. and Agon, S.S. (2024) ‘Proactive international law’, Hastings Law Journal, 75(3), p. 661. Available at: https://repository.uclawsf.edu/hastings_law_journal/vol75/iss3/4 (Accessed: 10 December 2024).
]Search in Google Scholar
[
Sandhu, A.K. (2021) ‘Big data with cloud computing: discussions and challenges’, Big Data Mining and Analytics, 5(1), pp. 32–40. Available at: https://doi.org/10.26599/BDMA.2021.9020016
]Search in Google Scholar
[
Schartum, D.W. (2006) ‘Introduction to a government-based perspective on proactive law: a proactive approach’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 35–51. Available at: https://www.scandinavianlaw.se/pdf/49-3.pdf (Accessed: 15 December 2024)
]Search in Google Scholar
[
Singh, N. and Singh, A.K. (2018) ‘Data privacy protection mechanisms in cloud’, Data Science and Engineering, 3(1), pp. 24–39. Available at: https://doi.org/10.1007/s41019-017-0046-0
]Search in Google Scholar
[
Smejkal, V. (2015) ‘Ochrana dat advokátů v elektronických úložištích’, Bulletin advokacie, (3), pp. 15–22.
]Search in Google Scholar
[
‘Smirnov v. Russia’ (2007) Case no. 71362/01, 7 June. Available at: https://hudoc.echr.coe.int/eng?i=001-80953 (Accessed: 15 December 2024).
]Search in Google Scholar
[
Solarte-Vásquez, M.C. and Hietanen-Kunwald, P. (2020) ‘Transaction design standards for the operationalisation of fairness and empowerment in proactive contracting’, International and Comparative Law Review, 20(1), pp. 180–200. Available at: https://doi.org/10.2478/iclr-2020-0008
]Search in Google Scholar
[
Solarte-Vásquez, M.C., Järv, N. and Nyman-Metcalf, K. (2016) ‘Usability factors in transactional design and smart contracting’, in T. Kerikmäe and A. Rull (eds) The future of law and eTechnologies. Springer International Publishing, pp. 149–176. Available at: https://doi.org/10.1007/978-3-319-26896-5_8
]Search in Google Scholar
[
Solarte-Vásquez, M.C. and Nyman-Metcalf, K. (2017) ‘Smart contracting: a multidisciplinary and proactive approach for the EU digital single market’, Baltic Journal of European Studies, 7(2), pp. 208–246. Available at: https://doi.org/10.1515/bjes-2017-0017
]Search in Google Scholar
[
Sorsa, K. (2011) Proactive management and proactive business law: a handbook. Turku University of Applied Sciences.
]Search in Google Scholar
[
Supreme Court of the Czech Republic (2015) Opinion no. Tpjn 306/2014, Collection of Court Decisions and Opinions under no. R 35/2015.
]Search in Google Scholar
[
‘Taylor-Sabori v. the United Kingdom’ (2002) Case no. 47114/99, 22 October. Available at: https://hudoc.echr.coe.int/eng?i=001-5879 (Accessed: 15 December 2024).
]Search in Google Scholar
[
Thaman, S.C. and Bachmaier, L. (2021) ‘Attorney-client confidentiality as a fair trial right in criminal proceedings’, in General reports of the XXth General Congress of the International Academy of Comparative Law – Rapports généraux du XXème Congrès général de l’Académie internationale de droit comparé. Springer International Publishing, pp. 589–610. Available at: https://doi.org/10.1007/978-3-030-48675-4_21
]Search in Google Scholar
[
TikTok (2024) ‘Privacy policy’. Available at: https://www.tiktok.com/legal/page/eea/privacy-policy/en (Accessed: 10 December 2024).
]Search in Google Scholar
[
Touma, R. (2022) ‘TikTok has been accused of ‘aggressive’ data harvesting. Is your information at risk?’ The Guardian, 19 July. Available at: https://www.theguardian.com/technology/2022/jul/19/tiktok-has-been-accused-of-aggressive-data-harvesting-is-your-information-at-risk (Accessed: 10 December 2024).
]Search in Google Scholar
[
‘Wieser and Bicos Beteiligungen GmbH v. Austria’ (2007) Case no. 74336/01, 16 October. Available at: https://hudoc.echr.coe.int/eng?i=001-82711 (Accessed: 15 December 2024).
]Search in Google Scholar
[
‘X v. the United Kingdom’ (1978) Case no. 7215/75, 12 October. Available at: https://hudoc.echr.coe.int/eng?i=001-57602 (Accessed: 15 December 2024).
]Search in Google Scholar