Nicole Black reports that 26 states now require lawyers to stay abreast of changes in legal technology and advises colleagues on how to implement security procedures that will protect your law firm’s data and help to keep client data confidential and secure.
Marcus P. Zillman’s guide is a comprehensive listing of both free and low cost privacy resources currently available on the Internet. It includes associations, indexes and search engines, as well as websites and programs that provide the latest technology and information on Web privacy. This guide will help facilitate a safer interactive environment for your email, your internet browsing, your health records, your data storage and file sharing exchanges, and internet telephony.
According to Conrad J. Jacoby e-mail conversion is done without a second thought in many e-discovery projects, and the results are often satisfactory to both producing and requesting parties. However, each major e-mail archive architecture uses a fundamentally different method for storing information about e-mail messages, and sometimes some collateral damage will occur.
According to e-discovery expert Conrad J. Jacoby, although not all litigation matters or internal investigations gather substantive, unique information by reviewing voice mail messages, at the very least, these electronic documents are now an information source that should be considered in developing any discovery plan.
Features – Treat E-Mail Like Other Communications: An Argument Against Mandatory Encryption of Attorney-Client Communications
Treat E-mail Like Other Communications: An Argument Against Mandatory Encryption of Attorney-Client Communications By Peter R. Krakaur
(Posted January 1, 1998; Archived February 1, 1998)