<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Law Archives - Dawda PLC</title>
	<atom:link href="https://www.dawdalaw.com/category/privacy-law/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.dawdalaw.com/category/privacy-law/</link>
	<description>Leading Business Law Firm in Metro Detroit</description>
	<lastBuildDate>Tue, 11 Jan 2022 11:03:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Self-Authentication of Electronic Evidence</title>
		<link>https://www.dawdalaw.com/self-authentication-of-electronic-evidence/</link>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Mon, 16 Jul 2018 20:13:43 +0000</pubDate>
				<category><![CDATA[Privacy Law]]></category>
		<guid isPermaLink="false">https://dawdamann.com/?p=3761</guid>

					<description><![CDATA[<p>By David Mollicone. The immense time and energy-saving benefits of technology are no secret, even in the legal field. And the increased use of technology in litigation has created a number of efficiencies related to evidence authentication. Now, amended Federal Rules of Evidence (“FRE”) have been adopted by the federal bar in order to further  [...]</p>
<p>The post <a href="https://www.dawdalaw.com/self-authentication-of-electronic-evidence/">Self-Authentication of Electronic Evidence</a> appeared first on <a href="https://www.dawdalaw.com">Dawda PLC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="alignleft" height="250" width="200" src="/wp-content/uploads/2018/07/IMG_7675-510x510-1.jpg" /><br />
By <a href="https://www.dawdalaw.com/attorney/david-a-mollicone/">David Mollicone</a>.</p>
<p>The immense time and energy-saving benefits of technology are no secret, even in the legal field. And the increased use of technology in litigation has created a number of efficiencies related to evidence authentication. Now, amended Federal Rules of Evidence (“FRE”) have been adopted by the federal bar in order to further enhance these efforts.</p>
<p>Authenticating electronic evidence previously required live testimony from a process that was both costly and time consuming for all parties involved. The introduction of amended FRE 901 and 902, which regulate the authentication of electronic evidence, have streamlined this process. The new FRE 901 dictates the process of extrinsically authenticating or identifying a piece of proposed evidence, while FRE 902 guides the circumstances in which evidence can be self-authenticating.</p>
<p>Under FRE 902, certain types of evidence and collection methods are considered self-authenticating. The circumstances in which this is true, and where parties do not need to introduce extrinsic evidence of authenticity, are as follows:</p>
<ul>
<li>(1) Domestic public documents that are sealed and signed</li>
<li>(2) Domestic public documents that are not sealed but are signed and certified</li>
<li>(3) Foreign public documents</li>
<li>(4) Certified copies of public record</li>
<li>(5) Official publications</li>
<li>(6) Newspapers and periodicals</li>
<li>(7) Trade inscriptions and the like</li>
<li>(8) Acknowledged documents</li>
<li>(9) Commercial papers and related documents</li>
<li>(10) Presumptions under a federal statute</li>
<li>(11) Certified domestic records of a regularly conducted activity</li>
<li>(12) Certified foreign records of a regularly conducted activity</li>
</ul>
<p>Under new federal guidelines, two more circumstances have been added to the list of self-authenticating electronic evidence:</p>
<ul>
<li>(13) Certified records generated by an electronic process or system</li>
<li>(14) Certified data copied from an electronic device, storage medium, or file</li>
</ul>
<p>These amendments to FRE 902 will play a significant role in the courtroom. No longer are live witnesses needed (in most cases) to authenticate certain machine-generated data and/or forensically collected electronic evidence. This will surely create time, money and energy-saving efficiencies for the court and for attorneys.</p>
<p>It’s important to note that these amendments still offer ample opportunities for objection. Authenticating electronic evidence is the first step toward admission. Once authenticated, evidence must be submitted to all parties within a reasonable timeframe that allows adequate time to inspect and/or object to the evidence. If no objections are made, the evidence can be legally admitted.</p>
<p>While the Federal Bar has determined that these amendments to FRE 902 were necessary, the state of Michigan has yet to adopt these changes. Thus, many proposed pieces of evidence must be framed as business reports, which are self-authenticating under FRE 902. Otherwise, FRE 901 dictates that a live witness is needed for evidence to be authenticated.</p>
<p>Although these amendments streamline the process of admitting evidence, they are by no means an “end-all, be-all” when it comes to authentication of evidence. There is still refining to be done in the process of self-authentication, which is why it is important to work with a legal expert who understands the nuances of these situations and can work on your behalf within the rules of the system for a favorable outcome.</p>
<p>The post <a href="https://www.dawdalaw.com/self-authentication-of-electronic-evidence/">Self-Authentication of Electronic Evidence</a> appeared first on <a href="https://www.dawdalaw.com">Dawda PLC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Allocation and Mitigation of Risk: E-Health, Privacy and Security Law</title>
		<link>https://www.dawdalaw.com/allocation-and-mitigation-of-risk-e-health-privacy-and-security-law/</link>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Tue, 28 Mar 2017 14:34:58 +0000</pubDate>
				<category><![CDATA[Privacy Law]]></category>
		<category><![CDATA[American bar association]]></category>
		<category><![CDATA[American bar association law section]]></category>
		<category><![CDATA[brian balow]]></category>
		<category><![CDATA[brian balow author]]></category>
		<category><![CDATA[data security risks]]></category>
		<category><![CDATA[dawda mann]]></category>
		<category><![CDATA[e-health industry]]></category>
		<category><![CDATA[E-Health Privacy and Security Law]]></category>
		<category><![CDATA[e-health treatise]]></category>
		<category><![CDATA[mitigation of risk]]></category>
		<category><![CDATA[telemedicine]]></category>
		<category><![CDATA[unauthorized copyrighted material]]></category>
		<guid isPermaLink="false">https://dawdamann.com/?p=3151</guid>

					<description><![CDATA[<p>Authored by Brian Balow, Member at Dawda At Dawda, going above and beyond in our industries of expertise is important to us. That’s why I have been a contributing author to all three editions of E-Health, Privacy, and Security Law, a comprehensive treatise published by the ABA Health Law Section and Bloomberg/BNA.  The treatise provides  [...]</p>
<p>The post <a href="https://www.dawdalaw.com/allocation-and-mitigation-of-risk-e-health-privacy-and-security-law/">Allocation and Mitigation of Risk: E-Health, Privacy and Security Law</a> appeared first on <a href="https://www.dawdalaw.com">Dawda PLC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft" src="/wp-content/uploads/2022/01/E-Health-Blog-150x150-1.jpg" /><br />
<em>Authored by <a href="https://www.dawdalaw.com/attorney/brian-r-balow/" target="_blank" rel="noopener noreferrer">Brian Balow</a>, Member at Dawda</em></p>
<p>At Dawda, going above and beyond in our industries of expertise is important to us. That’s why I have been a contributing author to all three editions of <a href="https://www.bna.com/ehealth-privacy-security-p17179895708/" target="_blank" rel="noopener noreferrer">E-Health, Privacy, and Security Law</a>, a comprehensive treatise published by the <a href="http://www.americanbar.org/groups/health_law.html" target="_blank" rel="noopener noreferrer">ABA Health Law Section</a> and <a href="https://www.bna.com/" target="_blank" rel="noopener noreferrer">Bloomberg/BNA</a>.  The treatise provides a comprehensive analysis of all things e-health, ranging from an overview of the e-health industry to detailed analyses of intellectual property, antitrust, privacy and data security, and other issues pertaining to the deployment of e-health mechanisms.</p>
<p>E-health providers and users face real and substantial legal and regulatory risks associated with the use of health information technology. These users and providers fall into several categories (some of which may overlap): e-content, e-product, e-connection, e-care, and electronic health record (EHR) system users and providers. The first step in managing the risks these factors face is knowledge of their existence, which is the primary focus of the treatise. Once known, the objective is to minimize, and if possible eliminate, the risks and their attendant liabilities.</p>
<p>This year, I had the pleasure of doing a full re-write of my chapter in the treatise, titled “Allocation and Mitigation of Risk.” The chapter generally identifies the legal and regulatory risks applicable to each e-health provider and user category, provides a detailed summary of the penalties and liabilities potentially deriving from those risks, and offers recommendations and techniques for the allocation and mitigation of those risks.  Topic areas include unauthorized use of copyrighted material, unlicensed and unauthorized practice of medicine, privacy and data security and federal regulation of telemedicine.</p>
<p>If you’re looking for a single resource on the rapidly expanding area of e-health law and regulation, please consider this treatise. We’re only a few months into 2017, but we’re already working on the next publication supplement.</p>
<p><a href="mailto:bbalow@dmms.com" target="_blank" rel="noopener noreferrer"><strong><em>Send me a message</em></strong></a><strong><em> if you’re interested in learning more about e-health or the entire treatise. </em></strong></p>
<p>The post <a href="https://www.dawdalaw.com/allocation-and-mitigation-of-risk-e-health-privacy-and-security-law/">Allocation and Mitigation of Risk: E-Health, Privacy and Security Law</a> appeared first on <a href="https://www.dawdalaw.com">Dawda PLC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FBI vs. Apple and the Rights and Limits of Privacy</title>
		<link>https://www.dawdalaw.com/fbi-vs-apple-and-the-rights-and-limits-of-privacy/</link>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sun, 21 Feb 2016 16:31:02 +0000</pubDate>
				<category><![CDATA[Privacy Law]]></category>
		<guid isPermaLink="false">http://www.dmms.com/?p=2660</guid>

					<description><![CDATA[<p>  Perhaps you have been watching the dance between Tim Cook, CEO of Apple and the Federal Bureau of Investigation. Ostensibly, they are fighting over one phone. But it’s much more complicated than that. THE ONE PHONE: The FBI is understandably frustrated that they have the phone belonging to Syed Rizwan Farwook, the San Bernadino  [...]</p>
<p>The post <a href="https://www.dawdalaw.com/fbi-vs-apple-and-the-rights-and-limits-of-privacy/">FBI vs. Apple and the Rights and Limits of Privacy</a> appeared first on <a href="https://www.dawdalaw.com">Dawda PLC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><a href="http://www.dmms.com/wp-content/uploads/2016/02/iphone6-1013238_1280-2.jpg"><img decoding="async" class="alignleft  wp-image-2661" src="http://www.dmms.com/wp-content/uploads/2016/02/iphone6-1013238_1280-2.jpg" alt="iphone6-1013238_1280 (2)" width="393" height="295" /></a>Perhaps you have been watching the dance between Tim Cook, CEO of Apple and the Federal Bureau of Investigation. Ostensibly, they are fighting over one phone. But it’s much more complicated than that.</p>
<p><strong>THE ONE PHONE</strong>: The FBI is understandably frustrated that they have the phone belonging to Syed Rizwan Farwook, the San Bernadino gunman who was killed by police along with his wife, after murdering 14 people. The FBI, after being criticized for not doing nearly enough intelligence work to prevent the tragedy, is trying to track down any networking or other information from Farwook’s phone, which is locked. The FBI has not only ordered Apple to figure out a way to unlock this specific phone, but they have also asked the courts to force Apple’s hand and to create a “back door”, that is a way to unlock all phones in the future.</p>
<p>Apple is resisting the FBI, although trying to portray themselves as a good citizen at the same time.</p>
<p>Public opinion, at first glance, might seem to be favoring the FBI. After all, this was a heinous crime, and intelligence authorities should have access to every legal avenue of investigation. But there seems to be broad consensus that Apple should stand its ground for a number of reasons.</p>
<p><strong>CRITICISM FROM THE RIGHT</strong>: Those who criticize the US intelligence services as inept or weak point to the events at San Bernadino and are quick to note that the FBI is trying to scapegoat Apple for their own inabilities to prevent the tragedy. They also tend to frown on government intervention in private entrepreneurship.</p>
<p><strong>CRITICISM FROM LIBERTARIANS</strong>: All those who are concerned with privacy rights point out, correctly, that the FBI already has the records of phone calls and texts from Farwook’s phone via the phone service provider. They staunchly support Apple’s default encryption basis (which is not the case with Android phones) and even the Apple “kill switch”, which completely locks the phone after ten incorrect passwords are entered.</p>
<p><strong>CRITICISM FROM THE ACLU</strong>: The American Civil Liberties Union has also sided with Apple, noting that there is already a “digital privacy divide” in the United States with poorer citizens utilizing phones that do not have encryption as the default setting. The ACLU is also concerned with allowing invasions into people’s phones for cases that are far less serious (noting that this is the perfect test case because of its seriousness).</p>
<p><strong>CRITICISM FROM THE PRESS</strong>: Reporters, editors and publishers have raised the red flag of protection of confidential sources. In addition, those reporters (and business travelers) who live, work and travel in far less democratic places like Iran, North Korea, and China think that losing the ability to have encryption would place many Americans and others in danger. Already LGBT travelers to Russia are warned to take different phones when they travel there.</p>
<p><strong>IMPACT ON EU/US PRIVACY SHIELD AGREEMENT: </strong>Dawda attorney<a title="Brian R. Balow" href="http://www.dmms.com/attorney/brian-r-balow/"> Brian Balow </a>particularly notes that there is an impact on the European Union/United States Privacy Shield Agreement, “After months of negotiations the EU and U.S. agreed on February 2, 2016 to adopt a “Privacy Shield” agreement to replace the long-standing (and invalidated) Safe Harbor that enabled U.S. entities to receive protected individual information from EU member states.  An ongoing concern of European privacy advocates has been U.S. Government access to individual information (and this ultimately led to the Safe Harbor invalidation).  This current action could impede the finalization of the Privacy Shield agreement (via “adequacy decision”), and leave U.S. companies in limbo in terms of how to handle protected individual information from the EU states.</p>
<p>This case, however it turns out, has ramifications for the digital privacy legal milieu far beyond the Iphone.</p>
<p>The post <a href="https://www.dawdalaw.com/fbi-vs-apple-and-the-rights-and-limits-of-privacy/">FBI vs. Apple and the Rights and Limits of Privacy</a> appeared first on <a href="https://www.dawdalaw.com">Dawda PLC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
