Wherever You Go, There You Are (With Your Mobile Device): Privacy Risks and Legal Complexities Associated with International “Bring Your Own Device” Programs

DownloadPDF  Cite as: Melinda L. McLellan, James A. Sherer, & Emily R. Fedeles, Wherever You Go, There You Are (With Your Mobile Device): An Examination of Privacy Risks and Legal Complexities Associated with Cross-Border “Bring Your Own Device” Programs, 21 Rich. J.L. & Tech. 11 (2015), http://jolt.richmond.edu/v21i3/article11.pdf.  by Melinda L. …

Continue reading

Beyond Technophobia: Lawyers’ Ethical and Legal Obligations to Monitor Evolving Technology and Security Risks

DownloadPDF Cite as: Timothy J. Toohey, Beyond Technophobia: Lawyers’ Ethical and Legal Obligations to Monitor Evolving Technology and Security Risks, 21 Rich. J.L. & Tech. 9 (2015), http://jolt.richmond.edu/v21i3/article9.pdf.  by Timothy J. Toohey* I.  Introduction [1]       Lawyers and technology have an uneasy relationship.  Although some lawyers are early adapters, others take …

Continue reading

Kill the Dinosaurs, and Other Tips for Achieving Technical Competence in Your Law Practice

DownloadPDF Cite as: Antigone Peyton, Kill the Dinosaurs, and Other Tips for Achieving Technical Competence in Your Law Practice, 21 Rich. J.L. & Tech. 7 (2015), http://jolt.richmond.edu/v21i3/article7.pdf. by Antigone Peyton* I.  Introduction [1]       It is a challenge to practice law in the digital age.  This is particularly true when a …

Continue reading

The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation

DownloadPDF Cite as: Adam Thierer, The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation, 21 Rich. J.L. & Tech. 6 (2015), http://jolt.richmond.edu/v21i2/article6.pdf. Adam D. Thierer* I.  Introduction [1]       The next great wave of Internet-enabled innovation has arrived, and it is poised to revolutionize the …

Continue reading

Merger and Acquisition Due Diligence: A Proposed Framework to Incorporate Data Privacy, Information Security, E-Discovery, and Information Governance into Due Diligence Practices

DownloadPDF Cite as: James A. Sherer, Taylor M. Hoffman & Eugenio E. Ortiz, Merger and Acquisition Due Diligence: A Proposed Framework to Incorporate Data Privacy, Information Security, e-Discovery, and Information Governance into Due Diligence Practices, 21 Rich. J.L. & Tech. 5 (2015), http://jolt.richmond.edu/v21i2/article5.pdf. James A. Sherer,* Taylor M. Hoffman,** & …

Continue reading

An Uneasy Balance: Personal Information and Crowdfunding Under the JOBS Act

mouse-84828_640

DownloadPDF   Cite as: Brice Kindred, An Uneasy Balance: Personal Information and Crowdfunding Under the JOBS Act, 21 Rich. J.L. & Tech. 4 (2015), http://jolt.richmond.edu/v21i2/article4.pdf. Brice Kindred* I.  Introduction [1]        “Crowdfunding” is the raising of small amounts of money from many different sources for a particular purpose.[1]  Today, this usually …

Continue reading

Clapper v. Amnesty International and Data Privacy Litigation: Is a Change to the Law “Certainly Impending”?

Riley v. California: The New Katz or Chimel?

DownloadPDF   Cite as: John L. Jacobus & Benjamin B. Watson, Clapper v. Amnesty International and Data Privacy Litigation: Is a Change to the Law “Certainly Impending”?, 21 Rich. J.L. & Tech. 3 (2014), http://jolt.richmond.edu/v21i1/article3.pdf. John L. Jacobus & Benjamin B. Watson* I. Introduction [1]        On December 19, 2013, the …

Continue reading

The Reasonable Information Security Program

472_690_Gavel%20&%20Keyboard_R

DownloadPDF Peter Sloan* Cite as: Peter Sloan, The Reasonable Information Security Program, 21 Rich. J.L. & Tech. 2 (2014), http://jolt.richmond.edu/v21i1/article2.pdf.    I. Introduction [1]        Our information inhabits a perilous world. Cyber theft, cyber extortion, mobile device loss, misappropriation of confidential business information, and unauthorized disclosures of protected information are real …

Continue reading