• Home
  • About Me
  • Disclaimer

The Researching Paralegal

~ Articles and Research for Legal Professionals

The Researching Paralegal

Tag Archives: Technology

How Using Latest Technology Can Lower Stress During Your Child Custody Lawsuit, by J. Benjamin Stevens, South Carolina Family Law Blog (with hat tip to Jim Calloway’s Law Practice Tips)

21 Monday Mar 2022

Posted by Celia C. Elwell, RP in Apps, Divorce, Family Law

≈ Comments Off on How Using Latest Technology Can Lower Stress During Your Child Custody Lawsuit, by J. Benjamin Stevens, South Carolina Family Law Blog (with hat tip to Jim Calloway’s Law Practice Tips)

Tags

Family Law, Technology

https://www.offitkurman.com/blog/2022/03/10/how-using-latest-technology-can-lower-stress-during-your-child-custody-lawsuit/

Family law takes a special breed. How often have you received a call from your client complaining that the soon-to-be-ex-spouse forgot the child’s teacher/parent conference, was late to pick up the child for a doctor appointment, or disagrees how to parent in a given situation? It happens all too often, and punches a divorce client’s button every time.

What if your client had a way to permanently, securely document and communicate with the other party about appointments, vacations, homework assignments, and all the other hot-button issues that pop up?

Mr. Stevens has the best solution I have seen. Online portals, such as Our Family Wizard, provides a color-coded calendar and message board for the parents. The calendar helps to avoid miscommunication about things such as appointments, visitation schedules, and school events. Messages posted on the message board cannot be deleted, redacted, or edited in any way, providing a communication log that can be used in court.

Mr. Stevens’ has generously shared additional online portals and apps for family scheduling, school, and medical communication that make it easier for each parent to stay informed. It helps to cut down on your client’s stress, the parties’ disagreements, and the frequent calls to your office. This technology is easy to use and good for your practice and your client. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Need Free Help With Excel or Word Software?

13 Tuesday Aug 2019

Posted by Celia C. Elwell, RP in Excel, Law Office Management, Legal Technology, Word

≈ Comments Off on Need Free Help With Excel or Word Software?

Tags

Excel, Technology, Word

Tips.net, Sharon Parq Associates©2019

https://www.tips.net/index.html

I stumbled across these technology tips some time ago. I love technology. But, like everyone, if I do not use it often, I often forget a step or get stuck. When I need a hand, I have found the tips on Word and Excel especially helpful. Even better, both the Word and Excel tips have newsletters and answer questions from readers.  -CCE

 

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Technology is Great, But Are You Safe?

13 Saturday Feb 2016

Posted by Celia C. Elwell, RP in Clouds, Cybersecurity, Legal Technology, Video, Wi-Fi

≈ Comments Off on Technology is Great, But Are You Safe?

Tags

Internet, Jim Calloway, Jim Calloway's Law Practice Tips Blog, Technology, WiFi

The Unintended Consequences of the Internet of Things, by Jim Calloway, Jim Calloway’s Law Practice Tips Blog

http://www.lawpracticetipsblog.com/2016/02/the-unintended-consequences-of-the-internet-of-things.html

How close is Big Brother – or someone worse? Too darn close, says Jim Calloway. The question? What do we do about it? -CCE

Refrigerators that automatically help you prepare your shopping list. Thermostats that adjust the temperature to your liking when they detect you are heading home on your commute. A device on the front door that sends a picture to you of everyone who rings the doorbell while you are away. All of these ideas seem great and maybe even a bit magical, and they are headed your way right now. The concept of the Internet of Things (IoT) holds a lot of promise.

Unfortunately, as with all things related to technology, it may not be quite that simple. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

2016 Tech Resolutions.

02 Saturday Jan 2016

Posted by Celia C. Elwell, RP in Android Phones, Cell Phones, Cybersecurity, Legal Technology, Passwords, Windows 10

≈ Comments Off on 2016 Tech Resolutions.

Tags

Ian Paul, Password Managers, PC World, Smart Watch, Technology, Windows 10

7 Technology Resolutions for a Better 2016, by Ian Paul, PC World

http://bit.ly/1R6wrcE

You may be ahead of the tech curve – maybe not. My bet is that you already have a smart phone and you probably have an iPad or some type of tablet reader. What about the rest of the things on this list? You have not want more than the tech you already have, but here’s some food for thought that scrapes the top of the tech iceberg. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Problems With Automobile Security and Privacy Vulnerabilities.

11 Wednesday Feb 2015

Posted by Celia C. Elwell, RP in Cybersecurity, Litigation, Motor Vehicle, Product Liability

≈ Comments Off on Problems With Automobile Security and Privacy Vulnerabilities.

Tags

Automobile Manufacturers, Cyber Attacks, Hacking, Motor Vehicles, Privacy, Security, Technology, Tracking

Markey Report Reveals Automobile Security and Privacy Vulnerabilities, by Sabrina I. Pacifici, BeSpacific Blog

http://www.bespacific.com/markey-report-reveals-automobile-security-privacy-vulnerabilities/

‘New standards are needed to plug security and privacy gaps in our cars and trucks, according to a report released today by Senator Edward J. Markey (D-Mass.). The report, called Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk and first reported on by CBS News’ 60 Minutes, reveals how sixteen major automobile manufacturers responded to questions from Senator Markey in 2014 about how vehicles may be vulnerable to hackers, and how driver information is collected and protected. The responses from the automobile manufacturers show a vehicle fleet that has fully adopted wireless technologies like Bluetooth and even wireless Internet access, but has not addressed the real possibilities of hacker infiltration into vehicle systems. The report also details the widespread collection of driver and vehicle information, without privacy protections for how that information is shared and used. ‘Drivers have come to rely on these new technologies, but unfortunately the automakers haven’t done their part to protect us from cyber-attacks or privacy invasions. Even as we are more connected than ever in our cars and trucks, our technology systems and data security remain largely unprotected,’ said Senator Markey, a member of the Commerce, Science and Transportation Committee. ‘We need to work with the industry and cyber-security experts to establish clear rules of the road to ensure the safety and privacy of 21st-century American drivers.’ Senator Markey posed his questions after studies showed how hackers can get into the controls of some popular vehicles, causing them to suddenly accelerate, turn, kill the brakes, activate the horn, control the headlights, and modify the speedometer and gas gauge readings. Additional concerns came from the rise of navigation and other features that record and send location or driving history information. Senator Markey wanted to know what automobile manufacturers are doing to address these issues and protect drivers.’

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

How Target Missed Malware Alarms and Blew It.

14 Friday Mar 2014

Posted by Celia C. Elwell, RP in Computer Fraud and Abuse Act, Consumer Law, Credit Repair, Criminal Law, Finance and Banking Law, Identity Theft

≈ Comments Off on How Target Missed Malware Alarms and Blew It.

Tags

Bangalore, Bloomberg Businessweek, FireEye, Gregg Steinhafel, Hackers, Internet Security, Jim Walter. McAfee, Malware, Nieman Marcus, Target, Technology, U.S. Department of Justice, Verizon Enterprise Solutions

Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It, by Michael Riley, Ben Elgin, Dune Lawrence, and Carol Matlack, Bloomberg  Businessweek Technology

http://tinyurl.com/njsy4rm

The biggest retail hack in U.S. history wasn’t particularly inventive, nor did it appear destined for success. In the days prior to Thanksgiving 2013, someone installed malware in Target’s (TGT) security and payments system designed to steal every credit card used at the company’s 1,797 U.S. stores. At the critical moment—when the Christmas gifts had been scanned and bagged and the cashier asked for a swipe—the malware would step in, capture the shopper’s credit card number, and store it on a Target server commandeered by the hackers.

It’s a measure of how common these crimes have become, and how conventional the hackers’ approach in this case, that Target was prepared for such an attack. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...
Follow The Researching Paralegal on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Search

Sign In/Register

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Categories

Archives

  • March 2022
  • January 2022
  • November 2021
  • October 2021
  • January 2021
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • June 2020
  • May 2020
  • April 2020
  • January 2020
  • December 2019
  • October 2019
  • August 2019
  • July 2019
  • May 2019
  • March 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…
  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

  • Follow Following
    • The Researching Paralegal
    • Join 454 other followers
    • Already have a WordPress.com account? Log in now.
    • The Researching Paralegal
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.

    %d bloggers like this: