Law Journal Newsletters

An ALM Website

LEGAL TECH NEWSLETTER

April 2013

Technology and Other People-Driven Endeavors

By Alan Feller

Social networking has become the primary means of sharing knowledge and information for increasing numbers of individuals and organizations. Traditionally, businesses and law firms especially have been more concerned with the potential risks of adopting social network models into their workflows than with the potential profit-impacting benefits on their organizations.

Log In

Subscribers: Log in below to read the full story

Already subscribe but haven't registered for all the benefits of the website?

Subscribe

Click below to subscribe to
LEGAL TECH NEWSLETTER

Subscribe

Pay-Per-View

You can purchase this article for $20.00
Click below

Purchase Article

ARTICLES FROM RELATED NEWSLETTERS

THE CORPORATE COUNSELOR

Data Sharing in the Cloud

The practical and economic advantages of cloud computing are clear — it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house. But is the attorney-client privilege at risk?

THE CORPORATE COUNSELOR

The Ethical Duty to Be Competent in Technology and eDiscovery

Lawyers understand that they have an ethical duty to remain competent in the law and its practice. But far fewer are aware that an emerging body of legal-ethics rules and opinions say that lawyers also have a duty to be competent in relevant technology. And e-discovery, an area of law practice many lawyers still consider a niche, is quickly becoming more relevant to every type of litigation.

INTERNET LAW & STRATEGY

Digital Ubiquity and the Fourth Amendment

Pick up pretty much any 21st century smart phone, tablet or PC, and in minutes, a treasure trove of information about its owner can be uncovered. Missives to a significant other, photos from summer vacation, browsing history that spans years; all of this information, generally considered of the most intimate nature, is easily accessible with even a rudimentary technical knowledge of the device's operating system. Needless to say, unwanted disclosure of such information can be highly damaging.