Reinstein et al., 2008 - Google Patents
Client-CPA-Attorney Privilege and Information Technology Risk.Reinstein et al., 2008
- Document ID
- 2475429779485808131
- Author
- Reinstein A
- Seward J
- Publication year
- Publication venue
- CPA Journal
External Links
Snippet
The article presents information on client-certified public accountant (CPA)-attorney privilege and information technology risk. Attorney-client privilege, a well-established principle that seeks to ensure open and candid discussions between these parties. Attorneys often hire …
- 238000005516 engineering process 0 title abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ion et al. | Home is safer than the cloud! Privacy concerns for consumer cloud storage | |
| Cundiff | Reasonable measures to protect trade secrets in a digital environment | |
| Pathak | Information technology auditing: an evolving agenda | |
| Erickson et al. | A case of mistaken identity? News accounts of hacker, consumer, and organizational responsibility for compromised digital records | |
| Ganzenmuller | Snap and destroy: Preservation issues for ephemeral communications | |
| Baraja et al. | Implementation and Supervision of Personal Data Protection Law on Online Platforms | |
| Reinstein et al. | Client-CPA-Attorney Privilege and Information Technology Risk. | |
| Beckerman-Rodau | Ethical risks from the use of technology | |
| Bayens | The Search and Seizure of Computers: Are We Sacrificing Personal Privacy for the Advancement of Technology | |
| Toohey | Beyond Technophobia: Lawyers’ Ethical and Legal Obligations to Monitor Evolving Technology and Security Risks | |
| EVERETT et al. | Balancing employee and employer rights: An international comparison of e-mail privacy in the workplace | |
| Bolin | Risky Mail: Concerns in Confidential Attorney-Client Email | |
| Wegman | Computer forensics: Admissibility of evidence in criminal cases | |
| El Emam et al. | An evaluation of personal health information remnants in second-hand personal computer disk drives | |
| Walthall | It Was Here a Second Ago: North Carolina Discovery and Ephemeral Messaging Apps | |
| DiGilio | Electronic mail: From computer to courtroom | |
| Vinjumur et al. | Finding the privileged few: Supporting privilege review for e‐discovery | |
| Ningsih et al. | REPRESSIVE PROTECTION FOR JOURNALISTS FOR LEAKAGE OF PERSONAL DATA BY TELECOMMUNICATIONS SERVICE PROVIDERS | |
| Piatt et al. | Loose Lips Sink Attorney-Client Ships: Unintended Technological Disclosure of Confidential Communications | |
| Herold | The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions | |
| Vaile et al. | Data sovereignty and the cloud | |
| Schwartz et al. | Asper Review of International Business and Trade Law: Special Edition-Cybersecurity and Law Firms | |
| Garfinkel et al. | Non-breach privacy events | |
| Wang | Ethics and electronic discovery: New medium, same problems | |
| Glassberg et al. | Electronic communication: An ounce of policy is worth a pound of cure |