Category «Legal Technology»

LLRX New Issue – August 2020

Articles and Columns for August 2020 Statistics Resources and Big Data on the Internet 2020 – This expansive listing by Marcus P. Zillman focuses on statistics and big data datasets available free on the internet, covering multiple disciplines, for teaching, learning and reference. These data are published and maintained by sources that include: the U.S. …

Subjects: KM

Statistics Resources and Big Data on the Internet 2020

This expansive listing by Marcus P. Zillman focuses on statistics and big data datasets available free on the internet, covering multiple disciplines, for teaching, learning and reference. These data are published and maintained by sources that include: the U.S. and foreign governments, academic, corporate, NGOs, and open source communities.

Subjects: AI, Business Research, Competitive Intelligence, Economy, Education, Financial System, Legal Research, Open Source, Search Engines

Mining Data on the Internet 2020

Data mining is a constantly evolving discipline applied in many fields including finance, law, healthcare, marketing, science and engineering, the retail industry, telecommunications, social media, and government. This guide by Marcus P. Zillman encompasses free, fee based and consultancy related sources to assist info pros, researchers, data analysts, knowledge managers and CI/BI experts to effectively identify, analyze and apply reliable, value added data within the scope of their respective work products.

Subjects: AI, Business Research, Competitive Intelligence, Data Mining, Economy, Financial System, Internet Resources, KM, Legal Research, Open Source

Pete Recommends – Weekly highlights on cyber security issues, August 29, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How Smartphone Location Tracking Works, and What You Can Do About It; Deep Fakes and National Security; How Facebook and Other Sites Manipulate Your Privacy Choices; and Voice phishing attacks on the rise, CISA, FBI warn private sector.

Subjects: AI, Civil Liberties, Cybercrime, Education, Email Security, Encryption, Gadgets/Gizmos, Health, KM, Legal Research, Privacy, Social Media

Finding Email Addresses

Across most sectors, customer support is no longer provided by human contacts but rather leads customers into endless telephone loops of menus, dealing with chatbots, or receiving emails from “no-reply” addresses. Finding email addresses for actual people is very difficult but Michael Ravnitzky’s article features proven tools and techniques to locate and use the email address of individuals within organizations who should be responding to your issues and complaints and providing you with a satisfactory resolution.

Subjects: AI, Business Research, E-Commerce, Email, Search Engines, Search Strategies

Webinar Recap: How to Safeguard Your Law Firm Against Future Disruption

As the COVID-19 pandemic continues to surge in various parts of the country, you’re no doubt facing uncertainties on how and when to reopen your law firm. You’re also likely wondering about the future of your law firm and its book of business. One way to directly address these concerns is to prioritize preparing your firm for whatever may come. Whether it’s a pandemic or economic downturn, pre-emptive protocols and a strong technology foundation will help you maintain business continuity in the event of future disruption. Is your firm ready? If not, there’s no better time to ensure that you’re protected, and this free webinar and accompanying transcript by Nicole L. Black are excellent resources to help you mitigate an over abundance of challenges.

Subjects: Case Management, Conferencing Software, Disaster Planning, Health, Legal Marketing, Legal Profession, Legal Technology, Management

Pete Recommends – Weekly highlights on cyber security issues, August 15, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: DHS acting secretary, top deputy were appointed illegally; Strengthening Privacy Protections in COVID-19 Mobile Phone–Enhanced Surveillance Programs; U.S. Postal Service Counters Trump Attacks On Mail-In Voting With A New Blockchain Patent; and Data Security & Privacy Gaps in Video Doorbells.

Subjects: Big Data, Computer Security, Congress, Criminal Law, Cybercrime, Cybersecurity, Encryption, Government Resources, Leadership, Legal Research, Privacy, United States Law

Pete Recommends – Weekly highlights on cyber security issues, August 8, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: This Tool Could Protect Your Photos From Facial Recognition; NSA Releases Guidance on Limiting Location Data Exposure; Lawsuit claims TikTok steals kids’ data and sends it to China; and Data isn’t just being collected from your phone. It’s being used to score you.

Subjects: AI, Big Data, Cybercrime, Cybersecurity, Email, Email Security, KM, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, August 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: New ‘Shadow Attack’ can replace content in digitally signed PDF files; Election admins vulnerable to email attacks; A Test and Trace Strategy for Reconnecting to Government Networks; and Is That ‘Contact Tracer’ Really a Scammer? How to Tell.

Subjects: AI, Competitive Intelligence, Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Healthcare, KM, Privacy, Social Media