Volume 20, Number 4
Buying a Digital Camera
The Chair's Corner
William T. Hogan III
General Practice, Solo and Small Firm Division News
Brian T. Hermanson
Voices of Experience
Victoria L. Herring
Alternatives to Timeslips Billing Software
Domain Names: This One's for You
Florencio (Larry) Ramirez
CaseSoft Maps the Future
A Tale of Two Presenters
Joseph M. Hartley
Encryption can add a layer of security to your operations and protect client confidences and other secrets. But it's not cheap. Here's how to determine whether you need encryption and what kind makes sense for your practice.
Ten Ways to Risk Ethical Nightmares with Your Computer
Using online resources and electronic documents can raise ethical problems. Review these hypothetical situations to learn how to avoid malpractice claims, disqualification from a pending case, and ethics violation charges.
Keep Up or Face Peril
Internet accessibility is profoundly changing a lawyer's research obligations-do not risk falling behind.
Not Using New Technology: Ethical and Liability Risks?
This issue's special point/counterpoint looks at whether you will soon be at risk if you do not keep up with technological changes.
A Lawyer's Judgment Will Never Be Automated
Just because technology provides greater efficiencies and may afford lawyers a competitive advantage does not mean that it is unethical not to use technology. It's the quality of the legal work-not the speed at which it is done-that matters.
"What, Me Worry?" Recovering after a Virus Without a Backup
Backing up your computer files is best, but you still may be able to recover data in electronic form after a virus infection. The key is avoiding early missteps while trying to diagnose the problem.
Lawyers, Cell Phones, Ethics, and Security
David J. Bilinsky and Laura Calloway
Information transmitted via cell phones, PalmPilots, and other devices may not be as secure as you think. It's your duty to learn what legal protection is afforded to communications and what precautions you should take when using these devices.
Cybersleuthing for People Who Still Can't Program Their VCRs
The Internet's speed and affordability can't be beat for tracking down witnesses, defendants, agents for service, and the occasional wayward client. Includes website addresses for online vendors of personal data and locator information.
Adult Learning Styles
Some dos and don'ts for effective teaching in the business setting.
How to Protect Electronic Documents-from Yourself
Word documents and other files contain hidden information known as metadata that someone else can uncover. But it's easy to clear out hidden text and protect your electronic documents.
Parting Is Such Dangerous Sorrow: What to Do When Employees Leave
David L. Masters
Steps to take to make sure departing employees don't sabotage or misappropriate confidential information in digital form.