• Home
  • About Me
  • Disclaimer

The Researching Paralegal

~ Articles and Research for Legal Professionals

The Researching Paralegal

Category Archives: Clouds

Law Firm Email Encryption – Are You Ethically Compliant?

11 Thursday May 2017

Posted by Celia C. Elwell, RP in Clouds, Confidentiality, Emails, Ethics Opinions, Law Office Management, Legal Ethics, Legal Technology, Rules of Professional Responsibility, Technology, Technology

≈ Comments Off on Law Firm Email Encryption – Are You Ethically Compliant?

Tags

ABA Ethics Opinion, Email, Encryption, Jim Calloway's Law Practice Tips Blog

ABA Issues New Ethics Opinion on Encryption of Attorney-Client Email, Jim Calloway’s Law Practice Tips Blog

http://bit.ly/2qy8J2a

Does your state have an ethics opinion about encryption of your firm’s email? Do you use encryption? Do you use a secure cloud based platform? If you are not sure, don’t you think you should check?

Most law firms frequently use email over fax and regular mail to communicate with their clients, their expert witnesses, and opposing counsel. What is your obligation to ensure confidentiality of your firm’s email, and are you meeting it?

The ABA’s ethics opinion is instructive, as well as the Texas ethics legal opinion referred to by Mr. Calloway at the end of his post. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Do You Use the Cloud for Document Storage or Production? Read This First.

28 Tuesday Feb 2017

Posted by Celia C. Elwell, RP in Attorney Work Product, Attorney-Client Privilege, Clouds, Confidentiality, Discovery, Dropbox, Emails, Encryption, Evidence, Insurance Defense, Legal Ethics, Legal Technology, Litigation, Passwords, Privilege and Confidentiality, Requests for Production, Sanctions, Subpoena Duces Tecum

≈ Comments Off on Do You Use the Cloud for Document Storage or Production? Read This First.

Tags

ABA Journal, Attorney-Client Privilege, Cloud Storage, Confidentiality, Debra Cassens Weiss, Discovery, File Sharing, Legal Ethics, Work Product Doctrine

Upload To File-Sharing Site Was Like Leaving Legal File On A Bench, Judge Says; Privilege Is Waived, by Debra Cassens Weiss, ABA Journal©

http://bit.ly/2mxwEcF

Many use the cloud for file storage and sharing when attachments are too big to send by email. If you use the cloud for storage, file-sharing or transfer, document management, project management, or anything similar, here is a cautionary tale.

The plaintiff insurance company sued the defendants, and sought a declaratory judgment on the defendants’ claim of loss by fire. The plaintiff’s investigator uploaded the entire claims file, including surveillance footage, to a drop-box cloud, Box, Inc. The link had no encryption or password. Access to the link alone allowed anyone to see the file.

He then sent the link by email to the plaintiff insurance company, who sent it to the insurance company’s attorneys, who inadvertently sent it the defendants’ counsel in response to a subpoena duces tecum.

The defendants’ counsel looked at it, but didn’t tell the plaintiff they had seen the privileged and confidential information. Inevitably, the defense sent the information back on a thumb drive to the plaintiff’s attorneys during discovery.

After vigorous arguments about confidentiality, work-product doctrine, attorney-client privilege, and disqualification of defense counsel, the facts and court’s reasoning make this an interesting read. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

App Honey Pot for Lawyers and Other Legal Professionals.

13 Saturday Feb 2016

Posted by Celia C. Elwell, RP in Apps, Clouds, Document Retention, Dropbox, Evernote, Google, Law Office Management, Legal Technology, Management, Marketing, Office Procedures, Technology, Time Management

≈ Comments Off on App Honey Pot for Lawyers and Other Legal Professionals.

Tags

Apps, Document Storage, Dropbox, E-Discovery, Law Office Management, Legal Productivity Blog, Marketing, Note Taking, Tim Baran

50+ Apps and Services to Manage and Grow Your Law Practice, by Tim Baran, Legal Productivity Blog

http://bit.ly/1O8iPGC

[H]ere’s a list culled from feedback from solos and small firm lawyers and administrators, my own experience, and lots of research, that will help to optimize the day-to-day management and growth of your practice. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Technology is Great, But Are You Safe?

13 Saturday Feb 2016

Posted by Celia C. Elwell, RP in Clouds, Cybersecurity, Legal Technology, Video, Wi-Fi

≈ Comments Off on Technology is Great, But Are You Safe?

Tags

Internet, Jim Calloway, Jim Calloway's Law Practice Tips Blog, Technology, WiFi

The Unintended Consequences of the Internet of Things, by Jim Calloway, Jim Calloway’s Law Practice Tips Blog

http://www.lawpracticetipsblog.com/2016/02/the-unintended-consequences-of-the-internet-of-things.html

How close is Big Brother – or someone worse? Too darn close, says Jim Calloway. The question? What do we do about it? -CCE

Refrigerators that automatically help you prepare your shopping list. Thermostats that adjust the temperature to your liking when they detect you are heading home on your commute. A device on the front door that sends a picture to you of everyone who rings the doorbell while you are away. All of these ideas seem great and maybe even a bit magical, and they are headed your way right now. The concept of the Internet of Things (IoT) holds a lot of promise.

Unfortunately, as with all things related to technology, it may not be quite that simple. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Want To Switch From iPhone to Android But Afraid of Losing Your Data? No Problem!

16 Wednesday Sep 2015

Posted by Celia C. Elwell, RP in Android Phones, Apple, Apps, Cell Phones, Clouds, Emails, iPhones, Legal Technology, Mac

≈ Comments Off on Want To Switch From iPhone to Android But Afraid of Losing Your Data? No Problem!

Tags

Android, Apple, Apps, Bookmarks, Calendar, Contacts, iOS, PC World, Photos, Ryan Whitwan

How To Switch From iPhone To Android And Keep All Your Stuff, by Ryan Whitwan, PC World

http://tinyurl.com/o8p3b28

So you’ve grown tired of Apple’s walled garden of apps and the iron grip it maintains over the iOS platform. Well, the freedom of Android welcomes you with open arms, but don’t forget to bring your data along for the ride!

Apple doesn’t make it particularly easy to move your data from iOS to Android—it’s more interested in moving people in the other direction. Still, with just a few tools and some patience, you can be up and running on Android without missing a beat. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Take Depositions To The Next Level With High Tech.

13 Monday Apr 2015

Posted by Celia C. Elwell, RP in Clouds, Discovery, Dropbox, iPad, Legal Technology, Presentations, Tablets, Video Deposition

≈ Comments Off on Take Depositions To The Next Level With High Tech.

Tags

Brian Focht, Deposition Exhibits, Depositions, iPad, Live Stream Video, Tablets, The Cyber Advocate, Video Depositions

4 High Tech Ways to Improve Your Depositions, by Brian Focht, The Cyber Advocate Blog

http://www.thecyberadvocate.com/2015/04/08/4-high-tech-ways-improve-depositions/

Last week I had the (good?) fortune to attend two depositions spanning three days in a construction defect case. We represent a fairly peripheral sub-contractor, so despite exceeding 20 total hours, I didn’t get the opportunity to ask a single question. However, we’re not so peripheral that I could completely space out.

Over the course of three days, which included the introduction of about 100 exhibits (I’m impressed at the plaintiff’s counsel’s restraint, except when you consider that many exhibits exceeded 250 pages each), I listened intently. Or as intently as possible.

Until the other part of my brain, the part that writes this blog, kicked in. I analyzed what I thought was an intelligent, if complicated, system put in place that uses Dropbox for sharing exhibits. But that was really it. No video, no digital exhibits, remote participants listening by phone. I couldn’t help but think that there had to be a better way than this. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

What Is A “Zero Knowledge” Cloud And Why You Should Care.

24 Wednesday Dec 2014

Posted by Celia C. Elwell, RP in Clouds, Confidentiality, Document Retention, Law Office Management, Legal Ethics, Legal Technology, Malpractice, Technology, Technology

≈ Comments Off on What Is A “Zero Knowledge” Cloud And Why You Should Care.

Tags

Client Confidentiality, Clouds, Encryption, Legal Technology, SpiderOak, Steven Nelson, U.S. News & World Report, Zero Knowledge

‘Zero Knowledge’ Encrypted Cloud Service Sees Business Boom, by Steven Nelson, U.S. News & World Report

http://tinyurl.com/q9fj4l8

If you have been paying attention, you have heard about “zero knowledge” clouds — and you are thinking about changing from Drop Box or other clouds that can access the information you put in them. If you know nothing about zero knowledge clouds, don’t stop here. Read more about them, and decide whether it is time for your firm to change to a more secure cloud platform. -CCE

File-storing service SpiderOak says it’s experiencing a business boom – rapidly nearing one million users and doubling its site metrics in six months – amid a constant trickle of news reports revealing Internet surveillance by the government.

Files stored using SpiderOak are encrypted and their contents unknown – and unknowable – to the company. Sharing such files will soon be ‘zero knowledge,’ too, as the company prepares to roll out Crypton, its open source app-building framework, which will be publicly available within the next couple months.

‘Essentially what we did was we inverted the Internet,’ says CEO Ethan Oberman. ‘We created a world where the server is actually a big dumb machine. It only sees encrypted data blocks.’

A free version of the file-hosting service offers 2 GB of storage in exchange for a name, email address, username and password.

‘We don’t really fact check that information,’ Oberman says.

The company does know the IP address of users, he says, but IP-masking browsers – such as Tor – can conceal that information as well, making it possible to store files without disclosing any identifying information.

If the government were to come to the company with a valid legal demand for data, Oberman says, ‘We could turn over the data, but it is literally in encrypted data blocks and not decryptable by us. The only way it’s decryptable is if you have the key, which we do not maintain.’ . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

All Types Of 2015 Internet Privacy Protection Sites.

14 Sunday Dec 2014

Posted by Celia C. Elwell, RP in Clouds, Computer Forensics, Computer Virus, Cybersecurity, Document Retention, Health Law, HIPAA, Law Office Management, Legal Ethics, Legal Technology, Technology, Technology

≈ Comments Off on All Types Of 2015 Internet Privacy Protection Sites.

Tags

LLRX.com, Marcus P. Zillman, Privacy Protection

Guide To Privacy Resources 2015, by Marcus P. Zillman, LLRX.com

http://www.llrx.com/features/privacyresources2015.htm

The Guide to Privacy Resources 2015 is a comprehensive listing of privacy resources currently available on the Internet. These include associations, indexes, search engines as well as individual websites and sources that supply the latest technology and information about privacy and how it relates to you and the Internet. These resources and sources will help you to discover the many pathways available to you through the Internet to find the latest privacy sources and sites. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Is Email Between You And Your Client Safe? No, And This Is Why.

01 Monday Dec 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Blackberry Phones, Clouds, Confidentiality, Emails, Encryption, iPad, iPhones, Legal Ethics, Legal Technology, Malpractice, PC Computers, Technology

≈ Comments Off on Is Email Between You And Your Client Safe? No, And This Is Why.

Tags

ABA Legal Ethics Opinion, Allen Mihecoby, Email, Encryption, Gmail, Hacking, Internet, Lawyerist Blog, Lisa Needham

How to Encrypt Attorney-Client Communications, by Lisa Needham, Lawyerist Blog (with hat tip to Allen Mihecoby, CLAS, RP!)

http://tinyurl.com/kfrpqz3

If you have decided you need to get serious about client data protection, you will need to consider encrypting both your data and your communications. We have previously covered how to encrypt your data and will focus here on how to encrypt your email communication.

What Is Encryption?

Simply by using the Internet, you are probably using some sort of encryption scheme during some activities, whether you know it or not.

Encryption is simply the act of turning your data into unreadable gibberish. If your data is intercepted or hacked, the thief now has nothing but a pile of garbage.

End-to-end encryption is a must for transferring sensitive data across the internet. In end-to-end encryption, your data is encrypted while it travels towards your intended location and the same encryption occurs on the reverse trip. Your bank (hopefully) uses end-to-end encryption. Your practice management software (hopefully) uses end-to-end encryption if it stores and syncs data remotely. This sort of encryption is done for you without any effort on your part, as it is just a standard feature of the infrastructure you are using to bank or update client data or similar activities.

Why Do You Need to Care?

A few years ago, the ABA issued a formal ethics opinion stating that if there is a significant risk that a third party might gain access to the email, attorneys have to warn clients about that risk.

This poses a problem, because unlike your bank and practice management software, email is usually unencrypted. This is true whether you are using a desktop client or a web-based email like GMail. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

iPhone Candy Courtesy of iPhone J.D. Blog’s Sixth Anniversary!

19 Wednesday Nov 2014

Posted by Celia C. Elwell, RP in Apple, Apps, Clouds, Emails, iPad, iPhones, Legal Technology, Microsoft Office, Tablets, Word

≈ Comments Off on iPhone Candy Courtesy of iPhone J.D. Blog’s Sixth Anniversary!

Tags

Apps, GoodReader 4, iCloud, iPad, iPhone, iPhone J.D. Blog, iPin, Jeff Richardson, Powerocks Super Magicstick, Reader 7

Six Years Of iPhone J.D., by Jeff Richardson, iPhone J.D. Blog

http://tinyurl.com/oc2ptjb

Congratulations and thanks to Jeff Richardson for six years of iPhone J.D. Blog. As usual, Jeff shares a sweet collection of apps in honor of his yearly anniversary. Thank you, Jeff! -CCE

iPhone J.D. turns six years old this week.  Seems like it was just yesterday that I wrote the first post on iPhone J.D., explaining why I found the iPhone a valuable tool in a law practice.  Back then, almost no attorneys used iPhones (about 5% according to a 2008 Am Law Tech Survey), but now the majority of attorneys in the U.S. use an iPhone (around 60% according to the ABA).

Over the past six years, I’ve written over 1,200 posts on iPhone J.D., including reviews of over 300 apps, reviews of every major iOS device released by Apple (from the iPhone 3GS to the new iPhone 6 and all models of the iPad) and reviews of over 300 accessories.  I’ve also tried to provide lots of tips and tricks for getting the most out of your iPhone and iPad, and discussed all of the tech news that I think that you might want to know about if you use an iPhone or iPad.

Through the years, I’ve gotten tons of great feedback from iPhone J.D. readers, ranging from emails to over 2,500 comments on the site, and I’ve been honored to share guests posts by attorneys from around the world who use iPhones and iPads in their law practice.  Site traffic has grown steadily every year, and in just a few days, one of you is going to load iPhone J.D. and it will be the 5 millionth page view since the site launched.

Popular posts this year.  It’s a tradition on iPhone J.D.’s anniversary (1, 2, 3, 4, 5) to identify the most popular posts from the prior 12 months.  Perhaps it reveals something about the topics that iPhone and iPad owners have been thinking about lately.  Here are the ten most viewed posts published in the last year . . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Apple iCloud’s Two-Step Verification – Why It Didn’t Stop Hackers.

01 Monday Sep 2014

Posted by Celia C. Elwell, RP in Apple, Cell Phones, Clouds, Cybersecurity, Encryption, iPad, iPhones, Legal Technology, Mac

≈ Comments Off on Apple iCloud’s Two-Step Verification – Why It Didn’t Stop Hackers.

Tags

Apple, FireEye, iCloud, iPad, iPhone, Passwords, Two-Step Verification

Apple Says It Is “Actively Investigating” Celeb Photo Hack, by Arik Hesseldahl,

http://tinyurl.com/les3wqe

Apple said Monday it was ‘actively investigating’ the violation of several of its iCloud accounts, in which revealing photos and videos of prominent Hollywood actresses were taken and posted all over the Web.

*     *     *

Security experts said the hacking and theft of revealing pictures from the Apple iCloud accounts of a few celebrities might have been prevented if those affected had enabled two-factor authentication on their accounts.

Apple hasn’t yet said anything definitive about how the attacks were carried out, but security researchers at the security firm FireEye, examined the evidence that has emerged so far, and said it appears to have been a fairly straightforward attack. That said, it is also one that could have been thwarted had some additional steps to secure the targeted accounts been taken.

That additional step is known as two-factor authentication. Apple calls it ‘two-step verification,’ although it doesn’t work very hard to tell people about it, said Darien Kindlund, director of threat research at FireEye.

‘In general Apple has been a little late to the game in offering this kind of protection, and doesn’t advertise it,’ he said. ‘You have to dig through the support articles to find it.’

When enabled, two-factor authentication requires users to enter a numerical code that is sent to their phone or another device, in addition to using their regular password. Since the number constantly changes, it makes it much more difficult for attackers to gain access the account, even if they know the password.

Assuming the compromised accounts were running without the two-step option turned on, it would then have been relatively easy for the attacker to gain access to the accounts.

As The Next Web reported earlier today the attack may be linked to software on GitHub called iBrute that is capable of carrying out automated brute-force attacks against iCloud accounts. In this scenario, an attacker simply guesses a password again and again until they succeed. While tedious and time-consuming for a person, it’s a simple and infinitely faster process for a computer.

The as-yet unknown attacker had one other thing going for him: Apple allows an unlimited number of password guesses. Normally, systems limit the number of times someone can try to log in to a system with an incorrect password before the account is locked down entirely. Apple has since fixed that aspect of the vulnerability.

‘The attackers never should have been allowed to make an unlimited number of guesses,’ Kindlund said. . . . [Emphasis added.]

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Is It Time For A “Bring Your Own Device” Policy for Your Law Office?

01 Tuesday Jul 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Blackberry Phones, Cell Phones, Clouds, Computer Forensics, Confidentiality, Cybersecurity, Disaster Preparedness, Emails, Encryption, Google, Intellectual Property, iPad, iPhones, Law Office Management, Legal Blogs, Legal Ethics, Legal Technology, Mac, Management, Marketing, Passwords, PC Computers, Social Media, Supervising Support Staff, Tablets, Technology, Using Social Media

≈ Comments Off on Is It Time For A “Bring Your Own Device” Policy for Your Law Office?

Tags

Apple, Blackberry Phone, Cell Phones, Confidentiality, Curo Legal Blog, Cybersecurity, iPads, iPhones, Legal Ethics, Mobile Device Policy, Passwords, Tablets, Will Harrelson

Mobile Device Security for Lawyers: How Solos and Small Firms can Ethically Allow Bring Your Own Device, by Will Harrelson, Curo Legal Blog (with hat tip to Jeff Richardson, iPhone J.D. Blog!)

http://tinyurl.com/lrrnp7g

The Start of Bring Your Own Device Policies

It really is the iPhone’s fault. Yes, Apple is to blame for designing the most desirable piece of technology of the last decade. So desirable, in fact, that employees of all stripes requested (and, often, begged) their IT departments to toss the increasingly-‘corporate’ Blackberry out the window and allow the use of their personal iPhones for corporate emails and calls. As a result, we have been living in the age of ‘Bring Your Own Device’ where employees use a single personal mobile phone (or tablet) for both their personal email, texting, and social media while also using it for work email, word processing, and other enterprise applications.

Before the Bring Your Own Device era, a company’s greatest out-of-office security concern was an employee who left a briefcase in a taxi. Today, the worry is an employee misplacing a device the size of wallet containing almost limitless amounts of data that criminals or hackers would easily and quickly exploit if given the chance. Clearly, there is an obvious financial motivation for all businesses to protect their own or customer’s sensitive data.

However, lawyers face particular ethical consequences if they fail to take reasonable efforts to either investigate the technologies that they implement or protect their client’s confidential information. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

When You Share Files, Are They Secure?

31 Saturday May 2014

Posted by Celia C. Elwell, RP in Clouds, Confidentiality, Cybersecurity, Dropbox, Emails, Encryption, Legal Ethics, Legal Technology, Technology

≈ 2 Comments

Tags

Attorney-Client Privilege, Computer Security, Confidentiality, Dropbox, Email, File Sharing, Legal Ethics, Robert Ambrogi's Law Sites

File Sharing by Lawyers Largely Insecure, Survey Suggests, by Robert Ambrogi, Robert Ambrogi’s Law Sites

http://tinyurl.com/pr3apcc

If I were to leave a document on a table entitled, ‘My Deepest, Darkest Secrets,’ under which I wrote, ‘Please do not read this unless you are someone I intended to read this,’ how securely would you think I’d protected myself?

That, effectively, is all the majority of lawyers do to protect confidential documents they share with clients and colleagues, according to a LexisNexis survey published this week. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

2014 Best of Legal Tech from Jim Calloway.

17 Saturday May 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Apps, Cell Phones, Clouds, Computer Forensics, Dashboards, Emails, Encryption, iPad, iPhones, Law Office Management, Legal Technology, PC Computers, Tablets

≈ Comments Off on 2014 Best of Legal Tech from Jim Calloway.

Tags

Jim Calloway, Jim Calloway's Law Practice Tips Blog, Legal Technology, Solo and Small Firms, Weblog

The Best of Legal Tech for Solos and Small Firms 2014, by Jim Calloway, Jim Calloway’s Law Practice Tips Blog

http://tinyurl.com/mjqjp9a

This month’s Digital Edge podcast covers ‘The Best of Legal Tech for Solos and Small Firms 2014.’

John Simek is our guest, who is the business partner and spouse of my podcast teammate, Sharon Nelson. Together with Michael C. Maschke, they were the authors of The 2014 Solo and Small Firm Legal Technology Guide: Critical Decisions Made Simple, published by the American Bar Association. I was quite honored to be asked by them to write the forward for the book.

We discuss all sorts of technology for solo and small firm lawyers, including practice management software, workstations and cloud-based services. Enjoy the podcast.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Cloud App Used By Police and Public To Catch The Bad Guys.

02 Friday May 2014

Posted by Celia C. Elwell, RP in Android Phones, Apps, Cell Phones, Clouds, Criminal Law, iPhones, Law Enforcement

≈ Comments Off on Cloud App Used By Police and Public To Catch The Bad Guys.

Tags

App, Associated Press, Boston Marathon bombings, Clouds, Computers, Forensic Magazine, Large Emergency Event Digital Information Repository, Law Enforcement, LEEDIR, Police, Tami Abdollah

New Tool Helps Police Crowdsource Evidence, by Tami Abdollah, Associated Press, posted by Forensic Magazine

http://bit.ly/1lJps89

An annual spring party in a Southern California beach town devolved into a riot last month when revelers turned violent, rocking cars, smashing windows and throwing rocks. Dozens were injured and about 50 people ended up in the hospital, including several police officers.

Today, as authorities seek help with the investigation in Isla Vista, they’re employing a new online and mobile app that designers say was created specifically for this type of situation.

‘When the public really wants to catch these bad guys as badly as we do, this is the mechanism,’ said Los Angeles Sheriff’s Cmdr. Scott Edson, who helped conceptualize the system in the aftermath of the Boston Marathon bombings. ‘They can help us by sending us pictures and video.’

The innovation, known as LEEDIR, the Large Emergency Event Digital Information Repository, pairs an app with cloud storage to help police use smartphones as tools to gather evidence. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

The Mashable Hit List.

13 Sunday Apr 2014

Posted by Celia C. Elwell, RP in Android Phones, Apps, Cell Phones, Clouds, Computer Virus, Disaster Preparedness, Dropbox, Emails, Encryption, Google, Heartbleed, Identity Theft, Law Firm Web Sites, Law Office Management, Legal Blogs, Legal Technology, Malware, Office Procedures, Passwords, PC Computers, Search Enginges, Technology, Using Social Media

≈ Comments Off on The Mashable Hit List.

Tags

Computer Bugs, Computer Fraud, Heartbleed, Identity Theft, Law Office Management, Password Managers, Passwords, Social media, The Mashable Team

The Heartbleed Hit List: The Passwords You Need to Change Right Now, The Mashable Team

http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/

If you wondered whether any main specific websites are affected, such as Yahoo, this list will help you.  It will also help explain the Heartbleed bug,  and why you should pay attention to what it is. If you want to know whether your specific bank was compromised, this list may not answer all your questions. So, if you’re not sure whether you should change your password, go ahead and do it.

Even better, find a password manager in this list of the best of the best from PC Magazine by Neil J. Rubenking — http://www.pcmag.com/article2/0,2817,2407168,00.asp. If you use one password for more than one website — and lots of people do — this is a good solution and a wise move regardless of the Heartbleed bug. -CCE

 

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

More on Heartbleed.

12 Saturday Apr 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Apps, Cell Phones, Chrome, Clouds, Heartbleed, Malware

≈ Comments Off on More on Heartbleed.

Tags

Computer Virus, Computers, Divorce Discourse, Hackers, Heartbleed, Lee Rosen, Malware, Passwords

Heartbleed Security Flaw Got You Worried? Good., by Lee Rosen, Divorce Discourse

http://www.divorcediscourse.com/heartblead-security-flaw-worried-good/

If I haven’t gotten your attention yet, more on Heartbleed. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

The Heartbleed Bug – What Is It And What To Do About It.

12 Saturday Apr 2014

Posted by Celia C. Elwell, RP in Android Phones, Apps, Cell Phones, Chrome, Clouds, Computer Virus, Legal Technology, Malware

≈ Comments Off on The Heartbleed Bug – What Is It And What To Do About It.

Tags

Computer Security, Fraud Alert, Hackers, Heartbeat Bug, Identity Theft, Passwords, PC Magazine, PCMag, Scammers

Heartbleed: The Complete Rundown, by PCMag Staff http://tinyurl.com/muscrx5 The Heartbeat Bug was THE news this week.  Knowing that it is here, and cannot be avoided is one thing.  Knowing about to do about it is critical. Change your passwords, especially to to online banking, e-mail, apps, and other things we’ve taken for granted. -CCE

The Heartbleed bug is the big news in tech this week, an exploit that has been in the wild since 2012 and has left countless Internet users open to scammers. PCMag and the SecurityWatch team have been keeping tabs on all the news, so check out our coverage below, and check back for updates. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Dropbox Is Making Changes.

21 Friday Feb 2014

Posted by Celia C. Elwell, RP in Arbitration, Clouds, Dropbox, Legal Technology

≈ Comments Off on Dropbox Is Making Changes.

Tags

Arbitration, Clouds, Dropbox, Dropbox Blog, ITProPortal, Jamie Hicks, Ramsey Homsany, Terms and Conditions

Dropbox Publishes New T&Cs That Anger Users, by Jamie Hicks, ITProPortal

http://tinyurl.com/phbdjk3

Dropbox has announced that it plans updates to its Terms of Service and Privacy Policy, effective March 24, 2014. Highlights of these changes are:

•     The addition of an arbitration section  has angered many of its users. Dropbox has provided an online form to opt out of this section 30 days after the new Terms of Service and Privacy Policy go into effect.

•     The Privacy Policy now contains Dropbox’s recently launched Government Data Request Principles. When you allow Dropbox access to your contacts, Dropbox says that it stores them so that you (and only you) can share with others more easily.

•     The Terms of Service and Privacy Policy has been revised to simplify its language and to explain its list of features.

The arbitration clause language added to the Terms and Conditions has generated the most criticism. (See Dropbox Blog @ https://blog.dropbox.com/2014/02/updating-our-terms-of-service/, posted by Ramsey Homsany. This section is viewed by its critics as designed to defeat class action litigation by urging users to opt out. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Legal Research and Writing Resources Worth Bookmarking.

03 Monday Feb 2014

Posted by Celia C. Elwell, RP in Clouds, Corporate Law, E-Discovery, Google, Law Office Management, Legal Technology, Legal Writing, Research

≈ Comments Off on Legal Research and Writing Resources Worth Bookmarking.

Tags

Adams Contract Drafting, Bose Law and Technology Blog, Briefly Writing, Cheryl Niemeier, Corporate Law, eDiscovery Daily, Finance, Internet for Lawyers, Law Office Management, Legal Research, Legal Research Plus, Legal Technology, LLRX, Mergers & Acquisitions, MyCase, Witnesseth

8 Great Legal Research and Writing Resources and Blogs, by Cheryl Niemeier, Bose Law and Technology Blog

http://tinyurl.com/lje3ode

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Robert Ambrogi’s Most Popular 2013 Posts

02 Thursday Jan 2014

Posted by Celia C. Elwell, RP in Adobe Acrobat, Clouds, Law Office Management, Legal Ethics, Social Media, Using Social Media

≈ Comments Off on Robert Ambrogi’s Most Popular 2013 Posts

Tags

Adobe Acrobat, Clouds, Dropbox, Legal Ethics, LexisNexis, LinkedIn, Robert Ambrogi, Ross Kodner, Thomson Reuters

My Most Popular Posts of 2013, by Robert Ambrogi, Robert Ambrogi’s Web Sites

http://www.lawsitesblog.com/2013/12/popular-posts-2013.html

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

A CEO Guide To Just About Everything You Want to Know About Tech.

25 Wednesday Dec 2013

Posted by Celia C. Elwell, RP in Clouds, Disaster Preparedness, Intellectual Property, Legal Technology, Marketing

≈ Comments Off on A CEO Guide To Just About Everything You Want to Know About Tech.

Tags

Bloomberg Businessweek, CEO Tech Guide, Cloud, Disaster Preparedness, Finance, Intellectual Property, Legal Technology and Tips, Marketing

CEO Tech Guide, Bloomberg BusinessWeek

http://www.businessweek.com/reports/technology/ceo-tech-guide

Creative financing, sustainable business practice, clouds, disaster preparedness, protection of intellectual property, mobile advertising and marketing, and more. – CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

A New Way to Access All Your Clouds.

21 Saturday Dec 2013

Posted by Celia C. Elwell, RP in Clouds, Legal Technology

≈ Comments Off on A New Way to Access All Your Clouds.

Tags

CloudKafe., Clouds, Dropbox, Evernote, Flickr, Instagram, Jolidrive, Robert Ambrogi’s LawSites

Access All Your Clouds with One Login, by Robert Ambrogi, Robert Ambrogi’s LawSites

http://tinyurl.com/mtzwpe8

If you’re at all like me, your life is dispersed across multiple cloud platforms. I have documents on Drive, Dropbox and Box. I have notes in Evernote. I have photos on Instagram, Picasa and Flickr. Wouldn’t it be nice if you could access all these cloud services through a single interface and a single login?

Well, you can. In fact, there are a number of applications that let you do this. Some are paid and some are free. I have been trying two of the free services, Jolidrive and CloudKafe.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Cloud Security – What to Look For and Why.

27 Wednesday Nov 2013

Posted by Celia C. Elwell, RP in Clouds, Law Office Management, Legal Technology

≈ Comments Off on Cloud Security – What to Look For and Why.

Tags

Cloud computing, Cloud IQ Blog, Information technology, Joseph Pedano, Legal Technology, Network Security

Cloud Computing

[Part 1] Scary Stories Impart Valuable Lesson for Network Security, by Joseph Pedano, Cloud IQ Blog

http://tinyurl.com/p65fmcv

While I really like the advice in this article for the risks involved in using cloud technology, I have not found a cloud center “strategically located in regions with low risk of natural disasters.” A link to Part 2 of this post is at the end of the article. CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Addictive Tips Blog’s Best of the Best for The Week.

24 Sunday Nov 2013

Posted by Celia C. Elwell, RP in Android Phones, Apps, Cell Phones, Chrome, Clouds, Google, iPhones, Legal Technology, Windows

≈ Comments Off on Addictive Tips Blog’s Best of the Best for The Week.

Tags

Addictive Tips Blog, Android, Apps, Awais Imran, Chrome, DayFrame For Android, Decrap, Espier Dialer iOS7, Instagram, MacroDroid, MediaFire, Office Remote App, Q4, This PC, Vine, Windows, Windows Phone

This is becoming one of my  favorite “go to” blogs whenever I need tech tips or answers to just about anything. It has such a wide diversity. If you’re struggling with learning Microsoft 2013 or any other software or app, I recommend taking a look at this blog for an answer. CCE

Best Apps, Tips And Posts Of The Week [11.24.2013], by Awais Imran, Addictive Tips Blog

http://tinyurl.com/mxauma6

It’s that time of the week again when we round up the most popular (as well as the less-popular but equally useful) apps, tips and tweaks that you may have missed during your hectic workweek. This time around, we discuss a crazy new keyboard for Android, Instagram for Windows Phone, yet another Chrome New Tab page replacement, and a new cloud-syncing service for Windows, among other excellent apps and tips.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...
Follow The Researching Paralegal on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Search

Sign In/Register

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Categories

Archives

  • March 2022
  • January 2022
  • November 2021
  • October 2021
  • January 2021
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • June 2020
  • May 2020
  • April 2020
  • January 2020
  • December 2019
  • October 2019
  • August 2019
  • July 2019
  • May 2019
  • March 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…
  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

  • Follow Following
    • The Researching Paralegal
    • Join 455 other followers
    • Already have a WordPress.com account? Log in now.
    • The Researching Paralegal
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.

    %d bloggers like this: