How big is the Deep Web? It is estimated to comprise 7,500 terabytes – although an exact size is not known, and the figures vary widely on this question. The magnitude, complexity and siloed nature of the Deep Web is a challenge for researchers. You cannot turn to one specific guide or one search engine to effectively access the vast range of information, data, files and communications that comprise it. The ubiquitous search engines index, manage and deliver results from the Surface web. These search results include links, data, information, reports, news, subject matter content and a large volume of advertising that is optimized to increase traffic to specific sites and support marketing and revenue focused objectives. On the other hand, the Deep Web – which is often misconstrued as a repository of dark and disreputable information [Note – it is not the Dark Web], has grown tremendously beyond that characterization to include significant content on a wide range of subject matters covering a broad swath of files and formats, databases, pay-walled content as well as communications and web traffic that is not otherwise accessible through the surface Web. This comprehensive multifaceted guide by Marcus Zillman providers you with an abundance of resources to learn about, search, apply appropriate privacy protections, and maximize your time and efforts to conduct effective and actionable research within the Deep Web.
This guide by Marcus Zillman is a comprehensive listing of free privacy applications, tools and services that users may implement across multiple devices. These applications are from a range of sources that include small and large tech companies as well as subject matter specific websites, consumer industry groups and organizations. The focus of this article is on leveraging the latest technology and information that allows users to: (1) identify privacy issues and (2) implement privacy protections specific to their requirements, that span email, phone calls, chats, text messages, web browsing, computer drives and files, networks, collaboration spaces, and your photos.
Nicole Black reports that 26 states now require lawyers to stay abreast of changes in legal technology and advises colleagues on how to implement security procedures that will protect your law firm’s data and help to keep client data confidential and secure.
Conrad J. Jacoby, Esq. is a member of The Sedona Conference® and a contributing columnist for Fios, Inc. His work focuses on the areas of information management, e-discovery, and litigation support.
E-Discovery Update – by Fios Inc.
Burney’s Gadgets for Legal Pros – Reviews: Treo 700w; Free Personal Firewall; WiFi Security; Free Backup Program
Brett Burney recommends the new Treo 700w to those who prefer the Windows Mobile OS to that offered by Palm. He also talks about free and low cost firewall and and antivirus programs, as well as how to secure your Wi-Fi network at home and on the road. Last but not least, Brett heralds a free, easy to use back-up system for your PC.
Features – Treat E-Mail Like Other Communications: An Argument Against Mandatory Encryption of Attorney-Client Communications
Treat E-mail Like Other Communications: An Argument Against Mandatory Encryption of Attorney-Client Communications By Peter R. Krakaur
(Posted January 1, 1998; Archived February 1, 1998)
Return to Library CongressLine The Fall of Discontent: The Encryption Controversy
by Carol M. Morrissey
Carol M. Morrissey has been the Legislative Specialist for the Washington, D. C. office of Chicago’s Sidley & Austin for 11 years. She is a lawyer and legislative expert who has also authored a Congressional update column for the last 4 years.
(Posted November 1, 1997; Archived December 1, 1997)