Did you know that, according to Kashmir Hill at Forbes, Facebook is Tracking What Users Buy in Stores to See Whether its Ads Work? How? It has partnered with Datalogix, a Colorado based company that gathers information generated by loyalty cards. You know, those cards that you give the cashier at places like Jewel and Walgreens in order to get special discounts or rebates. So, by comparing e-mail and home address information, Facebook can now tell its advertisers how many of its users who viewed their ad actually purchased the product. It claims that it does not gather an individual's purchase history; but only product data, however. The Electronic Freedom Foundation has delved deeper into the data collection from loyalty cards and provides instructions for opting out of the collection process in its blog: A Deep Dive into Facebook and Datalogix: What's Actually Getting Shared and How You Can Opt Out.
Standing Committee on Legal Technology
-
October 3, 2012 |
Practice News
-
August 28, 2012 |
Practice News
E-mail is a persistent and annoying issue in every lawyer's professional and personal life. To help lawyers manage e-mail, Jim Callaway, the Director of Oklahoma Bar Association's Management Assistance Program, has posted EMail Issues for Lawyers Today. In it, he explores the ethical ramifications, security risks, benefits, and best practices associated with using web based e-mail services such as GMail and Outlook.com. He also gives advice about guarding against security breaches from the client's e-mail service; and considers the potential of insisting that clients set up a new e-mail account dedicated exclusively to communication between the client and lawyer. In addition, he reviews the current debate about encrypting e-mail. Finally, he suggests making up false answers to security questions in 2 step verification systems and the use of password managers.
Along the same lines, Kashmir Hill at Forbes Magazine posted, 10 Incredibly Simple Things You Should be Doing to Protect Your Privacy. It includes such basic security tips as password protecting your mobile devices, such as your smart phone, iPad, and other tablets. She also suggests creating a Google Alerts with your name, being careful about giving out your email address and identifying information in public, encrypting your computer, clearing out your browsing history, and turning on 2 step verification in Gmail.
-
August 15, 2012
At its recent annual meeting, the ABA revised its Model Rules on Professional Conduct. Particularly, it adopted Revised Rule 105A dealing with client confidentiality and technology and Revised Rule 105B on lawyers' use of technology for client development or marketing. Sean Doherty describes the significant changes in his article posted at Law.com, ABA Adopts Ethics Rules on Lawyers' Use of Technology. The changes to the Model Rules dealing with the use of internet for marketing is described in Internet Marketing Tools for Lawyers Addressed by ABA by Gyi Tsakalakis at Lawyerist.com.
One of the most significant changes is the ABA's expectation that lawyers will take time to educate themselves on the uses and potential risks of technology. Applauding this new acknowledgement of the need for lawyers to educate themselves about technology, Sharon Nelson posted at Ride the Lightning, "No more Lawyer Luddites."
-
August 1, 2012 |
Practice News
As computing solutions become more and more mobile and interconnected, questions and concerns about security arise with ever greater urgency, particularly in the context of law, with strict requirements to preserve client confidentiality. To make some sense of all the emerging choices for storing and retrieving client data, International Legal Technology Association (ILTA) Peer Group for Server Operations and Security said Thursday is developing guidelines, according to Evan Koblenz at Law.com, ILTA Developing Law Firm Security Model The guidelines are due out in October. For now, Victoria Stovall suggests Website Security Basics for Lawyers at Attorney at Work. Financial Institutions already have informational guidelines for using outside services to store data (cloud computing) in a white paper published by the Federal Financial Institutions Examination Council Information Technology Subcommittee, Outsourced Cloud Computing posted at Hunt on Privacy Blog. With the emergence of mobile devices, security has become an even more important issue.
-
July 18, 2012 |
Practice News
The race is on between Google, Microsoft, and others to position themselves for dominance in the Cloud. Hence, Microsoft announced this week the beta release of Microsoft Office 2013 as well as Office 365 to mixed reviews. Beta versions of both products are available for free download. According to Evan Koblenz, writing for Law Technology News, Microsoft Office 2013 Bolsters E-Discovery. According to Alexandra Chang at Wired.com the subscription based Office 365 means that, Microsoft Office Finally Gets Serious About the Cloud. However, Scott M.
-
July 13, 2012
Kevin Harris’ recent post in Attorney at Work, It’s About Time You Got Paid, reminds lawyers that they are in business to make money; and that they need to employ good management practices in order to accomplish that goal. However, in today’s economic climate, lawyers are expected to draw up budget and staffing plans at the outset of an undertaking and stick to them using a technique called LPM, or Legal Project Management, as explained by Pam Woldow in her posting, LPM, Going for Broke and Turning up the Heat. However,despite LPM having become the buzzword for law practice management this year, Toby Brown suggests that a better term might be BFC, or “Better, Faster, Cheaper,” in the article he posted at 3 Geeks and the Law Blog: Legal Project Management Versus Process Improvement - Which Drives BFC?.
In order to assist lawyers in their efforts to accomplish these goals, software vendors are constantly offering new products and upgrades, which bloggers then review. Hence, Basha Systems posted a review of a Actionstep, a new legal management program imported from Australia. Also, TL Answers, at Legal Technology Review contains reviews of new products and advice about setting up software. Legal Technology Review is a free subscription e-mail service with several offerings from which to choose.
-
June 26, 2012 |
CLE
Learn to overcome the challenges of admitting Facebook profile information into evidence with this informative webcast!
Join us from the comfort of your home or office at noon on July 17th for this fun and engaging mock evidentiary hearing set around an employment lawsuit in which the defendant is moving for the admission of the plaintiff's Facebook account information to defend against the plaintiff’s breach of employment contract claim. The program opens with a brief overview of the factual and procedural context for the hearing, followed by the speakers serving as plaintiff counsel, witness, expert witness, defense counsel, forensic expert, and judge. The program closes with an analysis of the various challenges in admitting Facebook profiles into evidence. Litigators, employment lawyers, and civil practitioners with advanced practice experience will benefit from this information presented throughout this live webcast.
The program ispresented by the ISBA Standing Committee on Legal Technology and qualifies for 1.0 hour MCLE credit.
-
June 20, 2012 |
Practice News
The recent copyright infringement trial between Google and Oracle brought a surprising series of posts by technical bloggers praising Judge Alsip, who presided over the trial, for showing such mastery of the technology. Glyn Moody posted on Tech Dirt, Should People Learn To Code? Yes – If They Are Judges Ruling On Cases Involving Software. Similarly, Jeff Neubauer concluded in the New Media and Technology Blog, Oracle v. Google Judge Writes the Book on Software Programming Copyright – For Now, Anyway. Closer to home, Judge Posner, in the Seventh Circuit Appellate Court won critical praise for his understanding of the dysfunctional copyright litigation system in the litigation between Apple and Motorola from technical blogs such as Mike Masnick’s article in Tech Dirt, Judge Posner Dumps Ridiculous Patent Fight Between Apple & Motorola As Contrary To The Public Interest. By contrast, the recent New York Court of Appeals decision in People v.
1 comment (Most recent June 21, 2012) -
June 5, 2012 |
Practice News
The legal community struggles to figure out how to best deal with social media evidence, such as Facebook, Twitter, Foursquare and Pinterest. Fortunately, bloggers have posted helpful articles, such as The Four Corners of Social Media and eDiscovery, How Hard is Authenticating Social Media?, The No Fly Zone of Producing An Entire Facebook Profile and Published cases involving social media evidence.For employment lawyers is Hot Off The Press - Today's New NLRB Social Media Guidance, from the Social Media Employment Law Blog.Tort and media lawyers will find How Should We Measure Damages for Defamation Over Social Media? from Citizen Media Law Projectthought provoking.
-
May 31, 2012 |
Practice News
Smart phones such as iPhone and Droid have become ubiquitous tools tools for lawyers; with over 80% of lawyers reporting using them for business use, according to the ABA Journal Law News Now. They have also become rich sources of evidence. The American Academy of Matrimonial Lawyers reports, Survey of Nation’s Top Attorneys Reveals Spike in Smart Phone and Text Evidence During Divorces. Forensics evidence labs are also reporting a spike in requests for retrieval of their data for discovery purposes, according to Ride the Lightning, from Sensei Enterprises.