ABA TECHSHOW.blogThe Latest Information About ABA TECHSHOW - The World's Premier Legal Technology ConferenceABA TECHSHOW Tip: Jim I. Keane Memorial Award- February 29, 2008 On Friday during ABA TECHSHOW, well be presenting the first annual Jim I. Keane Memorial Award, for excellence in e-lawyering. The award will be presented to a lawyer or law firm that has demonstrated innovation in the delivery of legal services over the Internet. Well be having a special plated luncheon for this event, which is included in the price of registration for our attendees. Dont miss it!http://www.abanet.org/techshow/blog/022908b.shtml Dont Let Sleeping Laptops Lie- February 29, 2008 Just when it seemed safe to leave your laptop computer in "sleep" or "hibernation" mode, comes a startling report that a computer left in such a mode is extremely vulnerable to confidentiality breaches. A research team that includes researchers from Princeton University and the Electronic Frontier Foundation (EFF) have found a security flaw in disk encryption technology used in many PCs and Apple computers, allowing unauthorized access to the data. According to the EFF report, "laptops are...http://www.abanet.org/techshow/blog/022908.shtml Pocket Guide to ESI For Federal Judges Urges Proactivity- February 28, 2008 In January 2008, the Federal Judicial Center published Managing Discovery of Electronic Information: A Pocket Guide for Judges. The primary author is Judge Barbara Rothstein, Director of the Federal Judicial Center, along with Judge Ronald J. Hedges (a former Magistrate Judge in New Jersey, now an e-discovery lawyer with Nixon Peabody), and assisted by Elizabeth C. Wiggins, who often educates federal judges and serves as a Project Director and Senior Research Associate at the Federal Judicial..http://www.abanet.org/techshow/blog/022808.shtml Integrate Fedex Shipments Into Outlook With Quickship- February 27, 2008 f you ship a lot of Federal Express packages, you might find this free download helpful. The big benefit is being able to generate a shipping label from your contacts without having to manually enter the address. You can also track packages, look up rates, schedule pickups and find the nearest Fedex location from within Outlook. These are functions you can handle right now in a web browser so if you dont want to clutter up Outlook, you might not want this plug in. But if you spend lots of time..http://www.abanet.org/techshow/blog/022708.shtml Use the 80:20 Rule to Set Information Security Priorities- February 27, 2008 The 80:20 Rule is a rule of thumb for setting information security priorities. It says that implementation of 20% of the key technical security steps will address 80% of the risk. While it has been stated in different ways, Symantec, a leading security vendor, includes in the 20% of technical steps: removing unneeded services, patch management, and enforcing strong passwords. The 80:20 Rule helps to identify priorities, but it is important to address all key information security steps,...http://www.abanet.org/techshow/blog/022508.shtml Attendee Tip: ABA TECHSHOW After Dark- February 27, 2008 For those of you attending ABA TECHSHOW, weve got lots of opportunities for you to have fun and get to know your fellow attendees, TECHSHOW faculty, and exhibitor representatives. Our first event takes place on Thursday night, March 13, in the Grand Ballroom of the Hilton Chicago. The first-ever ABA TECHSHOW After Dark promises to a great way to end your first day at the conference with a live band, food and drink, and some great door prizes. Whatever you end up doing in Chicago Thursday...http://www.abanet.org/techshow/blog/022608.shtml Surveillance Recordings- February 19, 2008 10182007: Bockar v. Tartler dba Rocky Mountain Limousine This is a personal injury case involving a car accident. Plaintiff, a radiologist, is claiming significant money damages for his loss of income, claiming that he can no longer work or do any physically demanding activities. Defendant has performed surveillance over a period of three years, and the video shows the Plaintiff doing yardwork, loading various items into cars and walking. Defendants attorney has prepared DVDs with the...http://www.abanet.org/techshow/blog/022208.shtml Overcoming Barriers to Implementing Technology in Your Practice- February 19, 2008 More often than not, I find that I am the greatest impediment to implementing new technology in my practice. Even where a new technology promises to speed up efficiency or reduce costs for clients, I realize that there's always a short term cost - the time required for me to come up to speed. For example, personal resistance accounted for my reluctance to switch back to using a Mac even though I wasted at least an hour a day waiting for my balky Windows machine to reboot. (in case you're...http://www.abanet.org/techshow/blog/021908.shtml Missing Personal Information- February 19, 2008 Numerous news sources began reporting on January 18th that data storage service Iron Mountain had lost a stored backup tape belonging to GE Money. Although there was no record that the tape had been checked out, Iron Mountain discovered it was missing when GE Money requested it in October. It took GE Money almost two months to reconstruct what data the tape had contained, after which they began notifying almost 230 national and regional retailers that the tape contained personal information..http://www.techshow.com/blog/020608.shtml CIA Not A Role Model For Evidence Preservation- February 15, 2008 On December 6th, the CIA admitted that it had destroyed videotaped evidence of detainee interrogations. The taped interrogations occurred in 2002, and the tapes were destroyed in 2005, allegedly after they were of no value to the CIA and were not needed for investigations. PC World writes that though the CIA is a government agency and not subject to the Federal Rules of Civil Procedure, private companies engaging in the same actions could be subject to severe sanctions for destruction of...http://www.abanet.org/techshow/blog/021508.shtml |