Legal Technology
Ransomware warning for law firms from North Carolina insurance company
Lawyer’s Mutual of North Carolina has posted the following warning about law firms being targeted in “ransomware” scams. We’ve seen firms in Ontario fall victim to this type of cyber attack. You can read more about ransomware and other kinds of malware in this previous post. Put Your Hands in the Air and Give Me… Read More »
Categories: Fraud Prevention, Legal TechnologyDoes your firm have a social media policy?
So your firm has one or more social media accounts they use to deliver its message. But do you have a social media policy for your employees to use? In this day and age, many of your employees have personal (Facebook) and professional (LinkedIn) accounts that may be effectively associated with the firm, based on… Read More »
Categories: Legal TechnologyTools and strategies for lawyers with vision impairments
Toronto lawyer Ernst Ashurov was born with limited vision, and an eye injury in childhood left him almost completely blind; yet he runs a criminal and general litigation practice. In the first few years of his career, he was able to read print using extreme magnification glasses; but by 2006 he could no longer read…. Read More »
Categories: Legal TechnologyCybercrime: Be Ready with an Incident Response Plan
Because a cybercrime attack can cause irreparable harm, law firms should be prepared to take action immediately. Being able to do this requires an Incident Response Plan (IRP). An effective IRP can put a firm in a position to effectively and efficiently manage a breach by protecting sensitive data, systems, and networks, and to quickly… Read More »
Categories: Legal TechnologypracticePRO Resource: Creating strong passwords
The following is an excerpt from practicePRO’s Managing the Security and Privacy of Electronic Data in a Law Office booket. Creating “strong” passwords Create passwords that are harder to guess or figure out. These are called strong passwords and they are more difficult for password-cracking tools to determine. Password-cracking software uses one of three approaches:… Read More »
Categories: Fraud Prevention, Legal TechnologyLAWPRO Magazine archives: Strategic resourcing – Thinking differently about delivery of legal services
Strategically sourcing legal services may not be a new phenomenon, but the current economic downturn, coupled with the growing realization that the legal profession needs to rethink its business model to survive in the long term have put one such option – outsourcing – in the spotlight, say two outsourcing providers. Both Gavin Birer, president… Read More »
Categories: Law Practice Management, Legal TechnologyNew Ethics Opinion on Cloud Computing from the Pennsylvania Bar
The Pennsylvania Bar Association’s Committee On Legal Ethics And Professional Responsibility has just released Formal Opinion 2011-200, Ethical Obligations For Attorneys Using Cloud Computing/Software As A Service While Fulfilling The Duties Of Confidentiality And Preservation Of Client Property. As the PA Bar keeps its Ethics Opinions behind a member wall, I’ve attached a copy of… Read More »
Categories: Legal TechnologyHow to remove info from Google
Google’s Webmaster Central Blog has released the first in a series of entries telling people how to removew URLs & directories from Google searches. A hat tip to Simon Fodden over at the www.slaw.ca blog.
Categories: Legal Technology