No 878 If you are interested in using your iPad as a document scanner (I am) heres a link to a post on the subject from the Time Management Ninja. CLT
No. 849 Electronic discovery is so expensive that it has heretofore been confined to cases involving high stakes. However, a variety of technologies have emerged that sometimes enable searchers to cull out a vast number of documents. The Pittsburgh Post-Gazette reported on a Virginia federal case in which the court authorized the use of Predictive [...]
No. 801 As 2012 has just begun, and I have just passed the 800th post in this blog, a late New Year’s Resolution. Less paper. Lots less. Actually, I’ve been working on this one for a while, but now is the time to press onward and upward. I resolve not to send anything by mail [...]
772 I have a reliable report that a lawyer using Macintosh’s OSX Lion was drafting a will calling for an executrix. While proofing, he discovered that the ever-helpful operating system had “corrected” the word “Executrix” to read — no kidding — “Dominatrix.” Computer as Dominatrix. Photo: John Lund.com
For lawyers, who carry around a lot of client information, Prey, or something like it, seems to be an imperative. In the comments it is suggested that you have a password protected section for confidential information and another section that is not protected. Read the article and learn why.
At a recent closing in Florida, a seller walked out of the closing room with a large proceeds check . A minute later, he returned and requested a wire instead. The title agent took back the check, marked it “Void” and initiated a wire. Later, after the wire had cleared, the title agent learned that the check had cleared, too. How could that have happened? After all, the agent still had the check and it was marked void. Right?
No. 691 What ethical issues are there for lawyers who do or don’t invade adversary’s Facebook pages looking for evidence? I have heard various pronouncements that it may be malpractice for a lawyer to fail to investigate the opponent’s Facebook Page. But what about the subterfuge that might be required to gain access? I am [...]
No. 689 Have you noticed that word processing software has been trying to finish your words lately? Like in the last sentence, it wanted to complete the partial word that became “processing” to “procession”? If you look at your keyboard all the time like I do because I never learned to type [it suggested "tip" [...]
No. 644 With the advent of all that cloud based stuff and free wifi, etc etc comes the specter of hacker threats and data security. Here’s a pretty good checklist of things you might wan’t to consider in this era of cybertheft. Hat tip to my friend Lance Godard of the always-worth-reading Are You Reading [...]
No. 632 If you’ve been disappointed by Google Scholar for legal research, try the advanced version. It enables you to select jurisdictions, such as Third Circuit and Pennsylvania Courts. Once you find a case you like, click on the “How Cited” tab. Of course, there is no statute search, but you may be able to [...]
keep looking »