Nicole Black advises lawyers on a range of applications and technology from which they can choose to establish standardized secure, encrypted email communications for all but the most extreme case-related interaction.
Nicole Black reports that 26 states now require lawyers to stay abreast of changes in legal technology and advises colleagues on how to implement security procedures that will protect your law firm’s data and help to keep client data confidential and secure.
Nicole Black talks about email add-ons to assist busy lawyers respond more effectively to a continuous avalanche of communications that require sorting, prioritizing, tagging and timely actions. She highlights several effective online tools designed to solve these problems by integrating with your Gmail account and other programs as well.
For the 21st century lawyer, mobility is key, since a mobile law practice makes it easier than ever for lawyers to practice law no matter where they happen to be. That’s why, according to the American Bar Association’s 2013 Legal Technology Survey, more lawyers are going mobile than ever before, with nearly 91 percent of lawyers surveyed reporting that they have used smartphones in their practices and 48 percent of lawyers surveyed reported using a tablet at work. Nicole Black explains why you need to have the right accessories to be effectively mobile.
Attorney Nicole Black discusses the rise in the number of lawyers using mobile devices, the growing number of apps developed specifically for lawyers, and how these apps increasingly support lawyers at every stage of the litigation process.
Marcus P. Zillman’s guide is a comprehensive listing of both free and low cost privacy resources currently available on the Internet. It includes associations, indexes and search engines, as well as websites and programs that provide the latest technology and information on Web privacy. This guide will help facilitate a safer interactive environment for your email, your internet browsing, your health records, your data storage and file sharing exchanges, and internet telephony.
Nicole L. Black highlights how our net activities are carefully monitored and meticulously tracked by some of the biggest players, including Google, Amazon, Apple, Microsoft and Facebook. Our individual online footprints, from the Web sites we visit, the items we purchase, the people with whom we communicate, to the locations where we access the Internet, are extremely valuable commodities that are increasingly sought after.
Conrad J. Jacoby discusses his experiences using the Peek mobile e-mail device (Time Magazine’s 2008 Gadget of the Year), which he believes is genuinely useful and an excellent value for its cost.
Heather Colman provides an overview of Hicks Morley’s implementation of ThoughtFarmer, an Enterprise 2.0/wiki style intranet platform, one year ago. Despite a few growing pains, she describes how the application was successful at meeting the primary objectives to decentralize content updates and increase knowledge sharing and collaboration within the firm.
According to Conrad J. Jacoby e-mail conversion is done without a second thought in many e-discovery projects, and the results are often satisfactory to both producing and requesting parties. However, each major e-mail archive architecture uses a fundamentally different method for storing information about e-mail messages, and sometimes some collateral damage will occur.