TechnoLawyer (TL) NewsWire, a provider of legal product reviews, has released its list of the Top 25 Products of 2014, based on lawyer and law firm administrator interest. Here are the products that got the most attention in 2014, with product summaries from TechnoLawyer founder Neil Squillante. 1. pdfDocs 4.1 The PDF format paved the way for the paperless law office, … [Read more...] about Top 25 new products for law firms
Technology
Leaky password managers on Android
By John Simek bio Ars technica recently posted a very scary bit of information. In early 2013, security researchers discovered that some password managers used on Android devices can actually be accessed by other installed apps, even those with extremely low-level privileges. Almost two years later, apparently there is still a problem. The issue seems to revolve around the … [Read more...] about Leaky password managers on Android
What tech toys are on your wish list this year?
By Catherine Jones bio In a recent edition of The Digital Edge, hosts Sharon Nelson, president of the digital forensics, information technology, and information security firm Sensei Enterprises, and Jim Calloway, director of the Oklahoma Bar Association's Management Assistance Program, reviewed approximately two dozen of their favorite tech toys for the holidays. Sharon and … [Read more...] about What tech toys are on your wish list this year?
Here’s what you missed at the ILTA 2014 Conference
Technology and training are the future for law offices, judging by the presentations and exhibits at a recent legal technology conference. When the 2014 conference for the International Legal Technology Association (ILTA) kicked off at Gaylord Opryland in Nashville, TN on August 17, Executive Director Randi Mayes felt like she was at a family reunion. "And," she says, "our … [Read more...] about Here’s what you missed at the ILTA 2014 Conference
The opportunities, concerns, and challenges related to adopting cloud services
According to the New Jersey Institute of Technology, by 2017 two-thirds of all workload will be processed in cloud data centers. Will your firm’s workload be there? Or are you hesitating due to concerns about security, compliance, or management of the services? This infographic created by NJIT’s Online Masters in Computer Science outlines the scale of cloud services and the … [Read more...] about The opportunities, concerns, and challenges related to adopting cloud services
Two quick tips from a cybersecurity expert
By John W. Simek bio 1. You are the product: default settings to “steal” your privacy data It amazes me that nobody seems to read the terms of service or the permission settings when installing software or configuring devices. In this day of instant gratification it seems as though the normal actions are click, click, click on the “I accept” button. That seems to be what … [Read more...] about Two quick tips from a cybersecurity expert
Colorado practice cuts costs by hiring IT staffer
Manager Arlene Zimmerman had an IT cost awakening when the computer went down. She called in the vendor's tech support and paid $100 to find out the computer was simply unplugged. "I told myself 'never again!'" says Zimmerman, who manages a professional office in Colorado. So she started on a path of building up as much IT support as possible in-house—and getting the training … [Read more...] about Colorado practice cuts costs by hiring IT staffer
Model Tool: Client privacy policy
Why you need this policy: As with any other corporate website, law office websites collect and use personal information of site visitors, including "personally identifiable" information, i.e., names and other information that can be traced back to a specific individual. Such use and collection of personal information is subject to requirements under privacy laws. How this … [Read more...] about Model Tool: Client privacy policy
How secure is your content in cyber space?
www.Hackmageddon.com has released its timeline of the most notable cyber security breaches that occurred in the first half of October 2014. According to the timeline, in just 15 days, there were 46 attacks, with a wide range of targets and objectives. If you're concerned about how to protect your law practice against costly and destructive cyber attacks, register now for our … [Read more...] about How secure is your content in cyber space?
Model Policy: Employee computer use and social networking
Why you need this policy: The law governing your right to discipline employees for the things they say on blogs and social networks is still in its infancy stages. But even from the early cases, it has become clear that online conversations are not simply private matters. There's a big difference between bad mouthing a company, supervisor or colleague to a friend in a bar over … [Read more...] about Model Policy: Employee computer use and social networking