Posts tagged with: "technology"
Results 1 - 20 of 103,427
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
4 Dec 0001, 4:00 pm by Michael Reiter, Attorney at Law
By Michael Reiter, Attorney at Law Yesterday, I posted this appearance by “the Sword” on August 21, 1989 at the Mayor and Common Council hearing: PUBLIC COMMENTS – THE SWORD A citizen identifying himself as the Anti- Christ Spiritual Leader of the House of Ying, also known as the Sword, appeared before the Council with a mask. He stated that the mask is to prevent a robbery, not to commit one. He spoke regarding time allotted at Council Meetings for public comments. City Attorney… [read post]
4 Dec 0001, 4:00 pm by Michael Kline
Elizabeth Litten and Michael Kline write: For the second time in less than 2 ½ years, the Indiana Family and Social Services Administration (the “FSSA”) has suffered a large breach of protected health information (“PHI”) as the result of actions of a business associate (“BA”).  If I’m a resident of Indiana and a client of FSSA, I may have received a surprise in the mail sometime between April 6th and late May or early June of this year.  I… [read post]
18 Apr 2014, 4:16 pm by Alexander Major
The federal government sector has been abuzz lately with whispers and shouts about pending cybersecurity regulations, frameworks, and requirements. This attention is not particularly surprising, especially given the recent high-profile data breaches, the litigation threats surrounding those breaches, the recent identification of the encryption-disabling, consumer data threatening “Heartbleed SSL” OpenSSL vulnerability, and recent reports that the September 2013 cyber-incursion into the… [read post]
18 Apr 2014, 3:54 pm by By MICHAEL J. DE LA MERCED
Airbnb has closed a new round of financing from a group led by TPG Growth that values the home-sharing company at about $10 billion, people briefed on the matter said. [read post]
18 Apr 2014, 2:51 pm by
Hosts: Denise Howell and Evan Brown. Regulating robots, remixing music and fair use, the Aereo Supreme Court case, and more! Guests: James Barrat, Brandon Butler Download or subscribe to this show at twit.tv/twil. We invite you to read, add to, and amend our show notes. Public list of discussion points TWiL on Friendfeed TWiL on Facebook Attorneys may submit a self-study form to their local CLE board seeking MCLE credit approval. Please check the rules and requirements for your… [read post]
18 Apr 2014, 2:10 pm by Kathryn Hughes
Today's issue of Fat Friday contains these articles: Karl M. Rowe, Review: WordPerfect X7 (iPad and Windows); WordPerfect Workflows Lee D. Cumbie, Legal Fees: Beware the Race to the Bottom Bill McFarlane, Forget Lawyers: Here's Who Really Needs Multiple Monitors Harold Burstyn, One or Two Spaces After Periods: A History Lesson Don't miss this issue — or any future issues. How to Receive Fat Friday Our most serendipitous offering, Fat Friday consists of unsolicited contributions by… [read post]
18 Apr 2014, 12:01 pm by Jared Correia
handshake isolated on business background (Photo credit: SalFalko) On June 5, we will host our fourth annual ‘super’ marketing conference: Building Relationships to Build Business. Suffolk University Law School will host, and the event is co-sponsored by Suffolk’s Center for Advanced Legal Studies, the Massachusetts Bar Association and the Chicago Bar Association, among others. This year’s conference will focus on the underlying relationships that generate successful… [read post]
18 Apr 2014, 10:56 am by James Cohen
Earlier this month, the FDIC issued guidance to financial institutions to help them address risks associated technology outsourcing and cyber security. On April 7th, the FDIC issued FIL-13-2014 entitled “Technology Outsourcing: Informational Tools for Community Bankers.” Three days later, on April 10th, the FDIC issued a press release entitled “FDIC Urges Financial Institutions to Utilize Available Cyber Resources.” [read post]
18 Apr 2014, 10:00 am
We have previously blogged about different ways technology can be used to gain an advantage or gather evidence in a dissolution proceeding. However, ex-spouses are now learning how to use the advances in technology to foster cooperation and harmony post-separation. Many divorcing couples would prefer to sever the ties between them completely after their divorce is final. This goal is unattainable for ex-spouses who will continue to share custody of minor children for years after separation. The… [read post]
18 Apr 2014, 9:34 am by Lawyerist
Passwords are often the weak link in data security. You can build the most secure system in the world, but as soon as someone sets their password to 12345, you might as well leave the front door open.Good passwords are essential to data security, and this article has everything you need to know about creating and keeping track of good passwords.IndexWhy Are Password Important?What Makes a Good PasswordExtra SecurityScramble Your UsernameMulti-Factor AuthenticationBiometricsPassword ManagersThe… [read post]
18 Apr 2014, 9:34 am by Lawyerist
Passwords are often the weak link in data security. You can build the most secure system in the world, but as soon as someone sets their password to 12345, you might as well leave the front door open.Good passwords are essential to data security, and this article has everything you need to know about creating and keeping track of good passwords.IndexWhy Are Password Important?What Makes a Good PasswordExtra SecurityScramble Your UsernameMulti-Factor AuthenticationBiometricsPassword ManagersThe… [read post]
18 Apr 2014, 9:27 am by Keith Lee
Email sucks. How can you make it suck less? [read post]
18 Apr 2014, 9:15 am by John Hopkins
In any document search allowing defendants’ custodians to conduct their own searches is much like allowing the fox to guard the henhouse. Even focused and disciplined custodial collections can be fraught with problems. Example Email sent during product development: “ Jim – I am writing to you because of the problems I have found during my evaluation of project 249, preliminarily named Mustang. I really think you should talk to Carla Basher about the detailed engineering aspects to… [read post]
18 Apr 2014, 9:15 am by John Hopkins
In any document search allowing defendants’ custodians to conduct their own searches is much like allowing the fox to guard the henhouse. Even focused and disciplined custodial collections can be fraught with problems. Example Email sent during product development: “ Jim – I am writing to you because of the problems I have found during my evaluation of project 249, preliminarily named Mustang. I really think you should talk to Carla Basher about the detailed engineering aspects to… [read post]
18 Apr 2014, 8:01 am by Techdirt
Mama said knock you out. Or actually she probably didn't. Whatever, lawmakers are going to waste time and money pretending she did. [read post]
18 Apr 2014, 7:53 am by Sean Gallagher
Microdrones Gmbh Fans of The Wire will remember how the fictional Omar Little made a livelihood off robbing drug dealers. Now imagine how much easier his job would have been if he had his own eye in the sky. While police departments in the US are now starting to adopt drone technology for surveillance, some criminals in England have been turning the technology to their advantage to target victims—specifically, marijuana growers. According to a report in The… [read post]
18 Apr 2014, 5:43 am by Adam Weinstein
The law offices of Gana LLP recently filed a claim on behalf of couple that invested and lost millions in Advanced Equities private equities and other speculative private placements.  The investments were made with brokerage firm First Allied Securities, Inc. (First Allied) and recommended by their broker Cynthia “Cindy” Couyoumjian (Couyoumjian).  The complaint alleged that the investments were unsuitable for the couple, were sold through false and misleading statements, and… [read post]
18 Apr 2014, 5:30 am by Ben Stevens
Though cheating on a spouse would appear to be a pretty clear cut thing, new research indicates that people have very different ideas of what behavior qualifies as crossing the line and what does not. A recent poll that was discussed in the Huffington Post found which found that not only do people regard different activities with different degrees of suspicion, but men and women often have different ideas about what behavior qualifies as inappropriate. The survey found that kissing appears to be… [read post]
18 Apr 2014, 2:22 am by legalinformatics
Dr. Adam Wyner of the University of Aberdeen has posted slides of his presentation entitled Annotating, Extracting, and Linking Legal Information, given 11 March 2014 at the University of Edinburgh. Topics covered in the presentation include: Resources for marking up legal texts, including LegalRuleML, Oracle Policy Automation, and TSO’s OpenUp Platform Sources of marked up legal texts, such as Legislation.gov.uk, Google Scholar’s case law database, and Dr. Rinke Hoekstra‘s MetaLex… [read post]