Ever wonder what happens when you agree to the end user licence agreements (or EULAs) that you must abide by to use modern technology? This past weekend, I watched a documentary that explores the chain of events you set in motion when you click things like the “Submit” button
Read more →This is the second instalment in a two-part series in The Lawyers Weekly offering basic advice to law firms that want to make cost-effective technology decisions. This time, we’ll look at hosted solutions. Businesses of all stripes use applications and data storage outside their own (fire)walls, and law
Read more →All types of malware, from viruses to trojan horses to bots and so on, aren’t particularly mysterious. They’re merely pieces of software. They worry people since they do things to computers their owners don’t want done. Security-conscious computer users have already adopted good habits. They don’t click
Read more →Smartphone-toting film, music and technology fanatics who converged on Austin, Texas, in March for South by Southwest (SXSW) got to connect with the festival and each other a little better than in previous years. The SXSW Go mobile app responded to more than 1,000 beacons deployed at event
Read more →For a moment, disregard the message at the top of this email, the one that says “You marked this message as Junk Mail.” (I did that before realizing I could craft a blog post from this email.) Does this message look legitimate to you? How would you handle it?
Read more →Insight into a new threat to auto owners and drivers Today’s cars are computers on wheels. Like their stationary cousins, connected cars run millions of lines of code every day, and that technology delivers a better driving experience. There’s a flip side to progress: like computers, today’s
Read more →Phones, tablets and notebook computers help lawyers be more productive, since they connect to the law firm network when the lawyer is out of the office. They also represent an information security risk because they connect to the law firm network while the device is out of
Read more →Do you let other people use your computer? It’s a reasonable thing to do. Guests at your office might need directions to their next destination. House guests might want to check their email. That said, you might be letting them check your own email, or contact information, or calendars, or
Read more →Having a recovery plan is indispensable for your system’s inevitable crash Ben Sapiro well knows the meaning behind the metaphor “like closing the barn door after the horse escapes.” When lawyers call him about disaster recovery, it’s usually because something has already happened. “Very often, questions come after
Read more →Used as data rooms, lawyers can share confidential information. Physical “deal rooms” house documents pertaining to confidential activities such as mergers and acquisitions. Access to such rooms is controlled. No photocopiers are found within, and no cameras allowed inside. Brock Smith, a Vancouver-based partner in the technology
Read more →