Copywriter, technical writer, translator (FR>EN, ES>EN, IT>EN), journalist

Posts Tagged information security

Terms and Conditions May Apply

Ever wonder what happens when you agree to the end user licence agreements (or EULAs) that you must abide by to use modern technology? This past weekend, I watched a documentary that explores the chain of events you set in motion when you click things like the “Submit” button

Read more

Hosted solutions shift expenses away

  This is the second instalment in a two-part series in The Lawyers Weekly offering basic advice to law firms that want to make cost-effective technology decisions. This time, we’ll look at hosted solutions. Businesses of all stripes use applications and data storage outside their own (fire)walls, and law

Read more

Prevent unwanted software activity on your computer

All types of malware, from viruses to trojan horses to bots and so on, aren’t particularly mysterious. They’re merely pieces of software. They worry people since they do things to computers their owners don’t want done. Security-conscious computer users have already adopted good habits. They don’t click

Read more

Beacon technology finding footing in Canada

Smartphone-toting film, music and technology fanatics who converged on Austin, Texas, in March for South by Southwest (SXSW) got to connect with the festival and each other a little better than in previous years. The SXSW Go mobile app responded to more than 1,000 beacons deployed at event

Read more

Email and healthy skepticism

For a moment, disregard the message at the top of this email, the one that says “You marked this message as Junk Mail.” (I did that before realizing I could craft a blog post from this email.) Does this message look legitimate to you? How would you handle it?

Read more

Hacking the connected car

Insight into a new threat to auto owners and drivers Today’s cars are computers on wheels. Like their stationary cousins, connected cars run millions of lines of code every day, and that technology delivers a better driving experience. There’s a flip side to progress: like computers, today’s

Read more

Securing the gateway to confidential information

Phones, tablets and notebook computers help lawyers be more productive, since they connect to the law firm network when the lawyer is out of the office. They also represent an information security risk because they connect to the law firm network while the device is out of

Read more

Creating a guest account on your computer

Do you let other people use your computer? It’s a reasonable thing to do. Guests at your office might need directions to their next destination. House guests might want to check their email. That said, you might be letting them check your own email, or contact information, or calendars, or

Read more

Data disasters are waiting to happen

Having a recovery plan is indispensable for your system’s inevitable crash Ben Sapiro well knows the meaning behind the metaphor “like closing the barn door after the horse escapes.” When lawyers call him about disaster recovery, it’s usually because something has already happened. “Very often, questions come after

Read more

The virtual deal room is now more advanced

Used as data rooms, lawyers can share confidential information. Physical “deal rooms” house documents pertaining to confidential activities such as mergers and acquisitions. Access to such rooms is controlled. No photocopiers are found within, and no cameras allowed inside. Brock Smith, a Vancouver-based partner in the technology

Read more