Copywriter, technical writer, translator (FR>EN, ES>EN, IT>EN), journalist

Posts Tagged information security

Sideways technology explanations

Years ago, I regularly taught my then-employer’s clients how to configure my employer’s client software. To do so, I had to explain what a server’s IP address and port number are. Here’s the explanation I used: When you send a letter to a friend who lives in

Read more

Evaluating ethical technology use by outside (law) firms

Automakers vet suppliers exhaustively. One faulty part in a vehicle can cost the automaker dearly, and not just in cash. This need to vet applies to any vendor relationships, including those between companies and law firms. Outside legal help functions as an extension of in-house legal departments.

Read more

Printers invaluable but can be targeted by hackers

Welcome to part two in a two-part series on the role of printers in law firms. In the first instalment, we discussed what firms want in printers. Today we’ll look at keeping printers safe from hackers. Today’s printers offer law firms brilliant labour-saving features. Unfortunately, many of

Read more

In a digital world, paper still matters to law firms

Chuck Rothman has heard of law firms whose offices could be cited by the fire marshal. “They have bankers boxes lining every hallway,” he said. Rothman hastened to add that few firms he’s encountered in his role as director of e-discovery services with information governance, e-discovery and

Read more

Right tools crucial to keep mobile data safe

Brock Smith’s clients regularly send him documents to sign using tools like DocuSign or Adobe Acrobat’s signing feature. The partner at B.C.-based Whiteboard Law also acts as a part-time general counsel for a technology company. He is an authorized user of both their systems and Whiteboard’s. And

Read more

The consequences of forwarding suspicious emails

An acquaintance recently asked me if I had blocked her email address. I was puzzled. She said she received a message from my email service that said her message was blocked. When we talked this through, I began to understand what must have happened.

Read more

Finding a fit for virtual desktops in your firm

Computer users typically keep the software and data they use on their computers. About five years ago, Will Davidson LLP began to access both software and data located on company servers using virtual desktop infrastructure (VDI). Partner Paul Cahill rebels against this change to this day. Virtual

Read more

Troubleshooting a Mac: Beware of Third-Party Utilities

In early June, I gave a one-hour workshop at the Vancouver Editors Canada conference. I spoke about Inbox Zero, the lack of which can be a drag on productivity. Two things happened at this conference that triggered my dreaming up a series of blog posts, the first of which you’re now reading.

Read more

What a phone scam sounds like

Hearing messages like the one in this post annoys me. Before I go into my bullet-pointed rant, click the link below to listen to a 40-second recording I made of a voice mail message early this spring (my apologies for the rough audio quality, but it is all understandable):

Read more

Mobile devices gaining importance in probes

Whether a case centres on employee theft, insurance fraud, intellectual property theft or a range of other matters, cell phones and other mobile devices can contain “relevant information that shouldn’t be ignored,” says Chuck Rothman, director of e-discovery services for Wortzman Professional Corporation. “Information on phones can

Read more