Category «Email»

Privacy Resources and Sites on the Internet

Marcus P. Zillman’s guide is a comprehensive listing of both free and low cost privacy resources currently available on the Internet. It includes associations, indexes and search engines, as well as websites and programs that provide the latest technology and information on Web privacy. This guide will help facilitate a safer interactive environment for your email, your internet browsing, your health records, your data storage and file sharing exchanges, and internet telephony.

Subjects: Computer Security, Email, Email Security, Internet Resources, Internet Resources - Web Links, Legal Research, Legal Technology, Mobile Tech, Privacy, Search Engines

Social media, geolocation and privacy, oh my!

Nicole L. Black highlights how our net activities are carefully monitored and meticulously tracked by some of the biggest players, including Google, Amazon, Apple, Microsoft and Facebook. Our individual online footprints, from the Web sites we visit, the items we purchase, the people with whom we communicate, to the locations where we access the Internet, are extremely valuable commodities that are increasingly sought after.

Subjects: E-Commerce, Email, Features, Intellectual Property, Privacy

Navigating the Enterprise 2.0 Highway

Heather Colman provides an overview of Hicks Morley’s implementation of ThoughtFarmer, an Enterprise 2.0/wiki style intranet platform, one year ago. Despite a few growing pains, she describes how the application was successful at meeting the primary objectives to decentralize content updates and increase knowledge sharing and collaboration within the firm.

Subjects: Email, Features, Intranets, KM, Law Firm Marketing, Legal Research, Legal Technology, Litigation Support, Technology Trends, Wiki

Conrad Jacoby’s E-Discovery Update: Minimizing E-Mail Archive Data Conversion Issues

According to Conrad J. Jacoby e-mail conversion is done without a second thought in many e-discovery projects, and the results are often satisfactory to both producing and requesting parties. However, each major e-mail archive architecture uses a fundamentally different method for storing information about e-mail messages, and sometimes some collateral damage will occur.

Subjects: Case Management, Computer Security, Conflicts, Digital Archives, Disaster Planning, Discovery, E-Discovery, Email, Email Security, Information Architecture