Advertisement
LPM
Archive | Security RSS feed for this section

What Should Lawyers Know About Information Governance?

In this edition of Digital Detectives hosts Sharon D. Nelson and John W. Simek invite Jason R. Baron, former director of litigation at the U.S. National Archives and Records Administration to discuss Information Governance as it relates to e-discovery, privacy, record keeping and security. Baron connects the dots between all these areas and helps lawyers understand they need to know about […]

Read more

The End of Windows XP – April 8, 2014

Mark your calendar. Put a tickler on your docketing system. The end of Windows XP is coming and it is closer than you think.  Microsoft will end support for Windows XP on April 8, 2014. Is your firm ready? April 8, 2014 This is big news for law firms large and small. Windows XP has […]

Read more

Healthcare Industry Data Breaches

In the latest edition of Digital Detectives, hosts Sharon Nelson and John Simek invite Alan Goldberg to discuss the typical causes of a data breach, likely consequences, prevention, and more.  In particular, Goldberg highlighted was the colossal cost of data breaches. He explained that the minimum cost is $100,000 and it has the potential to amount to millions. Goldberg is a solo practitioner […]

Read more

Encryption Made Easy: A Primer for Mac Users

By now (if you’ve read even one or two Law Technology Today posts), you know the importance of protecting your electronic data.  Encryption, of course, can be utilized to secure your data, and in some jurisdictions, is required to secure certain types of data.  If you are a Mac user, you can encrypt data with […]

Read more

LinkedIn Intro: Potential Security Problems?

The latest new release from LinkedIn is LinkedIn Intro, a mobile product that works in conjunction with the iPhone Apple Mail app, released in English for all users worldwide at the end of October. If you activate LinkedIn’s new Intro service, when viewing email in Apple Mail on your iPhone, a bar will pop up […]

Read more

Video: Digital Signatures 101: Improve Efficiency and Security with Paperless Signing

Whether to simply reduce paper, increase security, or improve efficiency, digital signatures can provide law firms with many benefits. In this webinar from the ABA Legal Technology Resource Center, sponsored by ARX, discover how digital signatures can be used within law firms including processes where they can be applied, the differences between digital and electronic signatures, […]

Read more

Securing Your PDF Files (Free Book Excerpt from “Adobe Acrobat in One Hour for Lawyers”)

Excerpted and adapted from Adobe Acrobat in One Hour for Lawyers by Ernie Svenson, published by the ABA Law Practice Division. PDF files are potentially more secure than paper documents, at least if you apply security to them. PDF security isn’t infallible, but it’s important for lawyers to know how to enable it, and to […]

Read more

Digital Signatures 101: Improve Efficiency and Security with Paperless Signing

With coworkers often on the road, telecommuting, or generally hard to catch in person, digital signatures are becoming more and more valuable, but what all should be considered when moving into this route, and where exactly is it appropriate to use a digital signature? These questions and more will be answered in the Legal Technology […]

Read more

Practical Encryption: Emailing With Your Clients

Scenario:  You need to exchange sensitive documents with your client, but in the digital age, printing and mailing physical documents seems slow, expensive, and not exactly “green.” Typical Solution:  Virtually all lawyers rely on email as a primary communication tool, so when it comes time to send documents, they go right into email along with […]

Read more

Practical Encryption: Backing Up Your Data

Scenario: Like most law firms, your data is growing day by day and you want to make sure you’re both (a) backing up that data, and (b) keeping the data secure. Typical Solution: While most lawyers have developed good habits regarding backup, the security of that backup file is rarely discussed or addressed.  Files are […]

Read more