Have a personal or library account? Click to login
A proactive approach to legal privilege in the light of electronic communication Cover

A proactive approach to legal privilege in the light of electronic communication

Open Access
|Apr 2025

References

  1. Act No. 221/2006 Coll. of the Slovak Republic on the enforcement of detention and on the amendment of certain laws (2006) 15 March. Zbierka zakonov, 78, pp. 1286–1301. Available at: https://www.slov-lex.sk/pravne-predpisy/SK/ZZ/2006/221/20160701 (Accessed: 10 December 2024).
  2. Act No. 475/2005 Coll. of the Slovak Republic on the execution of a prison sentence and on the amendment of certain laws (2005) 22 September. Zbierka zakonov, 191, pp. 4422–4451.
  3. Akhtar, N., Kerim, B., Perwej, Y., Tiwari, A. and Praveen, S. (2021) ‘A comprehensive overview of privacy and data security for cloud storage’, International Journal of Scientific Research in Science Engineering and Technology, 8(5), pp. 113–152. Available at: https://doi.org/10.32628/IJSRSET21852
  4. ‘Akzo Nobel Chemicals and Akcros Chemicals v. Commission’ (2007) Case no. T-125/03; ECLI:EU:T:2007:287, 17 September.
  5. Al-Marsy, A., Chaudhary, P. and Rodger, J.A. (2021) ‘A model for examining challenges and opportunities in use of cloud computing for health information systems’, Applied System Innovation, 4(1), article 15. Available at: https://doi.org/10.3390/asi4010015
  6. ‘Altay v. Turkey’ (2019) Case no. 11236/06, 9 April. Available at: https://hudoc.echr.coe.int/fre?i=001-192210 (Accessed: 15 December 2024).
  7. ‘AM and S Europe Ltd. v. Commission of the European Communities’ (1982) Case no. 155/79; ECLI:EU:C:1982:157, 18 May.
  8. Arockiam, L. and Monikandan, S. (2014) ‘Efficient cloud storage confidentiality to ensure data security’, in 2014 International Conference on Computer Communication and Informatics, Coimbatore, India, 3–5 January, pp. 1–5. Available at: https://doi.org/10.1109/ICCCI.2014.6921762
  9. Bachmaier Winter, L. and Thaman, S.C. (2020) ‘A comparative view of the right to counsel and the protection of attorney–client communications’, in L. Bachmaier Winter, S.C. Thaman and V. Lynn (eds) The right to counsel and the protection of attorney-client privilege in criminal proceedings. Ius Comparatum—global studies in comparative law, 44. Springer, pp. 7–73. Available at: https://doi.org/10.1007/978-3-030-43123-5_2
  10. Banks, W.C. (2016) ‘Cyber espionage and electronic surveillance: beyond the media coverage’, Emory Law Journal, 66(3), p. 513.
  11. Barton, T.D. (2009) Preventive law and problem solving: lawyering for the future. Vandeplas Publishing.
  12. Bentajer, B., Hedabou, M., Abouelmehdi, K. and Elfazazi, S. (2018) ‘CS-IBE: a data confidentiality system in public cloud storage system’, Procedia Computer Science, 141, pp. 559–564. Available at: https://doi.org/10.1016/j.procs.2018.10.126
  13. Berger-Walliser, G. (2012) ‘The past and future of proactive law: an overview of the development of the proactive law movement’, in G. Berger-Walliser and K. Østergaard (eds) Proactive law in a business environment. DJØF Publishing, pp. 13–31. Available at: https://ssrn.com/abstract=2576761 (Accessed: 15 December 2025).
  14. Bronstein, J. and Solomon, Y. (2021) ‘Exploring the information practices of lawyers’, Journal of Documentation, 77(4), pp. 1003–1021. Available at: https://doi.org/10.1108/JD-10-2020-0165
  15. ‘Camenzind v. Switzerland’ (1997) Case no. 21353/93, 16 December. Available at: https://hudoc.echr.coe.int/eng?i=001-58125 (Accessed: 15 December 2024).
  16. CCBE (2016) Model article on confidentiality. Available at: https://www.ccbe.eu/fileadmin/speciality_distribution/public/documents/DEONTOLOGY/DEON_Postion_Papers/EN_DEON_20161202_Model_Article_on_Confidentiality.pdf (Accessed: 10 December 2024).
  17. CCBE (2020) CCBE Considerations on the legal aspects of artificial intelligence. Available at: https://www.ccbe.eu/fileadmin/speciality_distribution/public/documents/IT_LAW/ITL_Guides_recommendations/EN_ITL_20200220_CCBE-considerations-on-the-Legal-Aspects-of-AI.pdf (Accessed: 10 December 2024).
  18. Charter of Core Principles of the European Legal Profession and Code of Conduct for European Lawyers (2013). Available at: https://www.ccbe.eu/NTCdocument/EN_CCBE_CoCpdf1_1382973057.pdf (Accessed: 10 December 2024).
  19. Chow, S.S.M., Chu, C.K., Huang, X., Zhou, J. and Deng, R.H. (2012) ‘Dynamic secure cloud storage with provenance’, in D. Naccache (ed) Cryptography and security: from theory to applications. Lecture notes in computer science, 6805. Springer, pp. 442–464. Available at: https://doi.org/10.1007/978-3-642-28368-0_28.
  20. ‘Christie v. the United Kingdom’ (1994) Case no. 21482/93, 27 June.
  21. Constitutional Court of the Czech Republic (2010) Ruling no. II. ÚS 889/10, 25 October.
  22. ‘Copland v. the United Kingdom’ (2007) Case no. 62617/00, 3 April. Available at: https://hudoc.echr.coe.int/eng?i=001-79996 (Accessed 15 December 2024).
  23. Corrales Compagnucci, M., Fenwick, M. and Haapio, H. (2019) ‘Digital technologies, legal design and the future of the legal profession’, in M. Corrales Compagnucci, M. Fenwick and H. Haapio (eds) Legal tech, smart contracts and blockchain. Springer, pp. 1–15. Available at: https://doi.org/10.1007/978-981-13-6086-2_1
  24. Dechand, S., Naiakshina, A., Danilova, A. and Smith, M. (2019) ‘In encryption we don’t trust: the effect of end-to-end encryption to the masses on user perception’, in 2019 IEEE European Symposium on Security and Privacy (EuroS&P), Stockholm, Sweden, pp. 401–415. Available at: https://doi.org/10.1109/EuroSP.2019.00037
  25. DiMatteo, L.A., Janssen, A., Ortolani, P., de Elizalde, F., Cannarsa, M. and Durovic, M. (eds) (2021) The Cambridge handbook of lawyering in the digital age. Cambridge University Press. Available at: https://doi.org/10.1017/9781108936040
  26. European Commission (2022) Shaping Europe’s digital future: proposal for ePrivacy Regulation. [Press release] 7 June. Available at: https://digital-strategy.ec.europa.eu/en/policies/eprivacy-regulation (Accessed: 10 December 2024).
  27. European Parliament (2022) Pegasus and surveillance spyware. Policy Department for Citizens’ Rights and Constitutional Affairs, Directorate-General for Internal Policies. Available at: https://www.europarl.europa.eu/RegData/etudes/IDAN/2022/732268/IPOL_IDA(2022)732268_EN.pdf (Accessed: 10 December 2024).
  28. Ferrari, E. (2010) ‘Database as a service: challenges and solutions for privacy and security’, in 2009 Asia-Pacific Services Computing Conference (APSCC), Singapore, pp. 46–51. Available at: https://doi.org/10.1109/APSCC.2009.5394141
  29. Fischel, D.R. (1998) ‘Lawyers and confidentiality’, The University of Chicago Law Review, 65(1), article 1, pp. 1–33.
  30. Gnusowski, M. and Lipiec, S. (2024) ‘Silent boundaries: exploring the limits of legal confidentiality in Poland’, International Journal of the Legal Profession, 31(3), pp. 267–291. Available at: https://doi.org/10.1080/09695958.2024.2401819
  31. Haapio, H. (2006a) ‘Business success and problem prevention through proactive contracting’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 21–34. Available at: https://scandinavianlaw.se/pdf/49-2.pdf (Accessed: 10 December 2024).
  32. Haapio, H. (2006b) ‘Introduction to proactive law: a business lawyer’s view’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 149–194. Available at: https://scandinavianlaw.se/pdf/49-9.pdf (Accessed: 10 December 2024).
  33. Haapio, H., Barton, T.D. and Corrales Compagnucci, M. (2021) ‘Legal design for the common good: proactive legal care by design’, in M. Corrales Compagnucci, H. Haapio, M. Hagan and M. Doherty (eds) Legal design: Integrating business, design and legal thinking with technology. Cheltenham: Edward Elgar Publishing, pp. 56–81. Available at: https://doi.org/10.4337/9781839107269.00011
  34. Helgesson, K.S. and Mörth, U. (2018) ‘Client privilege, compliance and the rule of law: Swedish lawyers and money laundering prevention’, Crime, Law and Social Change, 69, pp. 227–248. Available at: https://doi.org/10.1007/s10611-017-9753-8
  35. Hietanen-Kunwald, P. and Haapio, H. (2021) ‘Effective dispute prevention and resolution through proactive contract design’, Journal of Strategic Contracting and Negotiation, 5(1–2), pp. 3–23. Available at: https://doi.org/10.1177/20555636211016878
  36. Hofmann, J. and Truong, K.T. (2024) ‘End-to-end encrypted cloud storage in the wild: a broken ecosystem’, in CCS ’24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pp. 3988–4001. Available at: https://doi.org/10.1145/3658644.3690309
  37. ‘Iliya Stefanov v. Bulgaria’ (2008) Case no. 65755/01, 22 May. Available at: https://hudoc.echr.coe.int/eng?i=001-86449 (Accessed: 15 December 2024).
  38. Inam, M.A., Chen, Y., Goyal, A. et al. (2023) ‘SoK: history is a vast early warning system: auditing the provenance of system intrusions’, in 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA. IEEE, pp. 2620–2638. Available at: https://doi.org/10.1109/SP46215.2023.10179405
  39. Jones, E., Ryan, F., Thanaraj, A. and Wong, T. (2021) Digital lawyering: technology and legal practice in the 21st century. Routledge. Available at: https://doi.org/10.4324/9780429298219
  40. Kameoka, E. (2023) ‘History of LPP’, in Legal professional privilege in EU competition investigations. Edward Elgar Publishing, pp. 29–38. Available at: https://doi.org/10.4337/9781803922782.00011
  41. King, B.A. (2001) ‘Preserving the attorney-client privilege in the corporate environment’, Alabama Law Review, 53(2), pp. 621–638.
  42. ‘Klaas v. Germany’ (1993) Case no. 15473/89, 22 September. Available at: https://hudoc.echr.coe.int/eng?i=001-57826 (Accessed: 15 December 2024).
  43. ‘Kopp v. Switzerland’ (1998) Case no. 23224/94, 25 March. Available at: https://hudoc.echr.coe.int/eng?i=001-58144 (Accessed: 15 December 2024).
  44. Liu, H., Mu, Y., Zhao, J., Xu, C., Wang, H., Chen, L. and Yu, Y. (2017) ‘Identity-based provable data possession revisited: security analysis and generic construction’, Computer Standards & Interfaces, 54(1), pp. 10–19. Available at: https://doi.org/10.1016/j.csi.2016.09.012
  45. Makhlouf, R. (2020) ‘Cloudy transaction costs: a dive into cloud computing economics’, Journal of Cloud Computing, 9(1), article 1. Available at: https://doi.org/10.1186/s13677-019-0149-4
  46. Nystén-Haarala, S. (2006) ‘Contract law and everyday contracting’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 263–268. Available at: https://www.scandinavianlaw.se/pdf/49-15.pdf (Accessed: 15 October 2024).
  47. ‘Opinion of the European Economic and Social Committee (EESC) on ‘The proactive law approach: a further step towards better regulation at EU level’’ (2009) Official Journal C 175/26, 28 July. Available at: https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2009:175:0026:0033:EN:PDF (Accessed: 15 December 2024).
  48. ‘Orde van Vlaamse Balies and Others v. Vlaamse Regering’ (2022) Case no. C-694/20; ECLI:EU:C:2022:963, 8 December. Available at: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:62020CJ0694 (Accessed: 15 December 2024).
  49. ‘P.G. and J.H. v. the United Kingdom’ (2001) Case no. 44787/98, 25 September. Available at: https://hudoc.echr.coe.int/eng?i=001-59665 (Accessed: 15 December 2024).
  50. ‘Petri Sallinen and Others v. Finland’ (2005) Case no. 50882/99, 27 September. Available at: https://hudoc.echr.coe.int/eng?i=001-70283 (Accessed: 15 December 2024).
  51. Pico i Junoy, J. and López, J.A.A. (2022) ‘Private communication between lawyers as evidence in a judicial process: a comparative journey’, The International Journal of Evidence & Proof, 26(1), pp. 61–80. Available at: https://doi.org/10.1177/13657127211055232
  52. Pohjonen, S. (2006) ‘Proactive law in the field of law’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 53–70. Available at: https://www.scandinavianlaw.se/pdf/49-4.pdf (Accessed: 12 September 2024).
  53. ‘Proposal for a Regulation of the European Parliament and of the Council concerning the respect for private life and the protection of personal data in electronic communications and repealing Directive 2002/58/EC (Regulation on Privacy and Electronic Communications), COM/2017/010 final’ (2017) EUR-Lex. Available at: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52017PC0010 (Accessed: 10 December 2024).
  54. Rady, M., Abdelkader, T. and Ismail, R. (2019) ‘Integrity and confidentiality in cloud outsourced data’, Ain Shams Engineering Journal, 10(2), pp. 275–285. Available at: https://doi.org/10.1016/j.asej.2019.03.002
  55. ‘Saber v. Norway’ (2020) Case no. 459/18, 17 December. Available at: https://hudoc.echr.coe.int/fre?i=001-206519 (Accessed: 15 December 2024).
  56. Saliternik, M. and Agon, S.S. (2024) ‘Proactive international law’, Hastings Law Journal, 75(3), p. 661. Available at: https://repository.uclawsf.edu/hastings_law_journal/vol75/iss3/4 (Accessed: 10 December 2024).
  57. Sandhu, A.K. (2021) ‘Big data with cloud computing: discussions and challenges’, Big Data Mining and Analytics, 5(1), pp. 32–40. Available at: https://doi.org/10.26599/BDMA.2021.9020016
  58. Schartum, D.W. (2006) ‘Introduction to a government-based perspective on proactive law: a proactive approach’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 35–51. Available at: https://www.scandinavianlaw.se/pdf/49-3.pdf (Accessed: 15 December 2024)
  59. Singh, N. and Singh, A.K. (2018) ‘Data privacy protection mechanisms in cloud’, Data Science and Engineering, 3(1), pp. 24–39. Available at: https://doi.org/10.1007/s41019-017-0046-0
  60. Smejkal, V. (2015) ‘Ochrana dat advokátů v elektronických úložištích’, Bulletin advokacie, (3), pp. 15–22.
  61. ‘Smirnov v. Russia’ (2007) Case no. 71362/01, 7 June. Available at: https://hudoc.echr.coe.int/eng?i=001-80953 (Accessed: 15 December 2024).
  62. Solarte-Vásquez, M.C. and Hietanen-Kunwald, P. (2020) ‘Transaction design standards for the operationalisation of fairness and empowerment in proactive contracting’, International and Comparative Law Review, 20(1), pp. 180–200. Available at: https://doi.org/10.2478/iclr-2020-0008
  63. Solarte-Vásquez, M.C., Järv, N. and Nyman-Metcalf, K. (2016) ‘Usability factors in transactional design and smart contracting’, in T. Kerikmäe and A. Rull (eds) The future of law and eTechnologies. Springer International Publishing, pp. 149–176. Available at: https://doi.org/10.1007/978-3-319-26896-5_8
  64. Solarte-Vásquez, M.C. and Nyman-Metcalf, K. (2017) ‘Smart contracting: a multidisciplinary and proactive approach for the EU digital single market’, Baltic Journal of European Studies, 7(2), pp. 208–246. Available at: https://doi.org/10.1515/bjes-2017-0017
  65. Sorsa, K. (2011) Proactive management and proactive business law: a handbook. Turku University of Applied Sciences.
  66. Supreme Court of the Czech Republic (2015) Opinion no. Tpjn 306/2014, Collection of Court Decisions and Opinions under no. R 35/2015.
  67. ‘Taylor-Sabori v. the United Kingdom’ (2002) Case no. 47114/99, 22 October. Available at: https://hudoc.echr.coe.int/eng?i=001-5879 (Accessed: 15 December 2024).
  68. Thaman, S.C. and Bachmaier, L. (2021) ‘Attorney-client confidentiality as a fair trial right in criminal proceedings’, in General reports of the XXth General Congress of the International Academy of Comparative Law – Rapports généraux du XXème Congrès général de l’Académie internationale de droit comparé. Springer International Publishing, pp. 589–610. Available at: https://doi.org/10.1007/978-3-030-48675-4_21
  69. TikTok (2024) ‘Privacy policy’. Available at: https://www.tiktok.com/legal/page/eea/privacy-policy/en (Accessed: 10 December 2024).
  70. Touma, R. (2022) ‘TikTok has been accused of ‘aggressive’ data harvesting. Is your information at risk?’ The Guardian, 19 July. Available at: https://www.theguardian.com/technology/2022/jul/19/tiktok-has-been-accused-of-aggressive-data-harvesting-is-your-information-at-risk (Accessed: 10 December 2024).
  71. ‘Wieser and Bicos Beteiligungen GmbH v. Austria’ (2007) Case no. 74336/01, 16 October. Available at: https://hudoc.echr.coe.int/eng?i=001-82711 (Accessed: 15 December 2024).
  72. ‘X v. the United Kingdom’ (1978) Case no. 7215/75, 12 October. Available at: https://hudoc.echr.coe.int/eng?i=001-57602 (Accessed: 15 December 2024).
DOI: https://doi.org/10.2478/bjes-2025-0006 | Journal eISSN: 2674-4619 | Journal ISSN: 2674-4600
Language: English
Page range: 83 - 105
Published on: Apr 2, 2025
Published by: Tallinn University of Technology
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2025 Zoltán Gyurász, Ondrej Hamuľák, Petra Dražová, published by Tallinn University of Technology
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.