Volume 20, Number 4
June 2003

COLUMNS

Road Warrior
Jeffrey Allen
Buying a Digital Camera

The Chair's Corner
William T. Hogan III
What's Next?

General Practice, Solo and Small Firm Division News
Lara Trujillo

GP Mentor
Brian T. Hermanson
Voices of Experience

Mac User
Victoria L. Herring
Alternatives to Timeslips Billing Software

Being Solo
David Leffler
Domain Names: This One's for You

Product Review
Florencio (Larry) Ramirez
CaseSoft Maps the Future

Product Review
Jeffrey Allen
A Tale of Two Presenters

FEATURES

Encryption
Joseph M. Hartley
Encryption can add a layer of security to your operations and protect client confidences and other secrets. But it's not cheap. Here's how to determine whether you need encryption and what kind makes sense for your practice.

Ten Ways to Risk Ethical Nightmares with Your Computer
Lise Pearlman
Using online resources and electronic documents can raise ethical problems. Review these hypothetical situations to learn how to avoid malpractice claims, disqualification from a pending case, and ethics violation charges.

Keep Up or Face Peril
Diane Karpman
Internet accessibility is profoundly changing a lawyer's research obligations-do not risk falling behind.

Not Using New Technology: Ethical and Liability Risks?
This issue's special point/counterpoint looks at whether you will soon be at risk if you do not keep up with technological changes.

A Lawyer's Judgment Will Never Be Automated
Mark Tuft
Just because technology provides greater efficiencies and may afford lawyers a competitive advantage does not mean that it is unethical not to use technology. It's the quality of the legal work-not the speed at which it is done-that matters.

"What, Me Worry?" Recovering after a Virus Without a Backup
Michael Trittipo
Backing up your computer files is best, but you still may be able to recover data in electronic form after a virus infection. The key is avoiding early missteps while trying to diagnose the problem.

Lawyers, Cell Phones, Ethics, and Security
David J. Bilinsky and Laura Calloway
Information transmitted via cell phones, PalmPilots, and other devices may not be as secure as you think. It's your duty to learn what legal protection is afforded to communications and what precautions you should take when using these devices.

Cybersleuthing for People Who Still Can't Program Their VCRs
Craig Ball
The Internet's speed and affordability can't be beat for tracking down witnesses, defendants, agents for service, and the occasional wayward client. Includes website addresses for online vendors of personal data and locator information.

Adult Learning Styles
Storm Evans
Some dos and don'ts for effective teaching in the business setting.

How to Protect Electronic Documents-from Yourself
Wells Anderson
Word documents and other files contain hidden information known as metadata that someone else can uncover. But it's easy to clear out hidden text and protect your electronic documents.

Parting Is Such Dangerous Sorrow: What to Do When Employees Leave
David L. Masters
Steps to take to make sure departing employees don't sabotage or misappropriate confidential information in digital form.

 

Back to Top

< /