Category «Encryption»

Deep Web Research and Discovery Resources 2019

How big is the Deep Web? It is estimated to comprise 7,500 terabytes – although an exact size is not known, and the figures vary widely on this question. The magnitude, complexity and siloed nature of the Deep Web is a challenge for researchers. You cannot turn to one specific guide or one search engine to effectively access the vast range of information, data, files and communications that comprise it. The ubiquitous search engines index, manage and deliver results from the Surface web. These search results include links, data, information, reports, news, subject matter content and a large volume of advertising that is optimized to increase traffic to specific sites and support marketing and revenue focused objectives. On the other hand, the Deep Web – which is often misconstrued as a repository of dark and disreputable information [Note – it is not the Dark Web], has grown tremendously beyond that characterization to include significant content on a wide range of subject matters covering a broad swath of files and formats, databases, pay-walled content as well as communications and web traffic that is not otherwise accessible through the surface Web. This comprehensive multifaceted guide by Marcus Zillman providers you with an abundance of resources to learn about, search, apply appropriate privacy protections, and maximize your time and efforts to conduct effective and actionable research within the Deep Web.

Subjects: Big Data, Business Research, Competitive Intelligence, Discovery, Encryption, Privacy, Search Engines, Search Strategies

Guide to Privacy Resources 2019

This guide by Marcus Zillman is a comprehensive listing of free privacy applications, tools and services that users may implement across multiple devices. These applications are from a range of sources that include small and large tech companies as well as subject matter specific websites, consumer industry groups and organizations. The focus of this article is on leveraging the latest technology and information that allows users to: (1) identify privacy issues and (2) implement privacy protections specific to their requirements, that span email, phone calls, chats, text messages, web browsing, computer drives and files, networks, collaboration spaces, and your photos.

Subjects: Computer Security, Cybersecurity, Email Security, Encryption, Privacy, Social Media, Viruses & Hoaxes

Cybersecurity For Lawyers: The Nitty Gritty

Nicole Black reports that 26 states now require lawyers to stay abreast of changes in legal technology and advises colleagues on how to implement security procedures that will protect your law firm’s data and help to keep client data confidential and secure.

Subjects: Cybersecurity, Email, Email Security, Encryption, Legal Marketing, Legal Profession, Legal Research

E-Discovery Update – by Fios Inc.: Controlling the Accidental Release of Digital Information

Conrad J. Jacoby, Esq. is a member of The Sedona Conference® and a contributing columnist for Fios, Inc. His work focuses on the areas of information management, e-discovery, and litigation support.

E-Discovery Update – by Fios Inc.

Subjects: E-Discovery, E-Discovery Update, Email, Encryption, Legal Research, Litigation Support

Burney’s Gadgets for Legal Pros – Reviews: Treo 700w; Free Personal Firewall; WiFi Security; Free Backup Program

Brett Burney recommends the new Treo 700w to those who prefer the Windows Mobile OS to that offered by Palm. He also talks about free and low cost firewall and and antivirus programs, as well as how to secure your Wi-Fi network at home and on the road. Last but not least, Brett heralds a free, easy to use back-up system for your PC.

Subjects: Burney's Legal Tech Reviews, Encryption, Firewalls, Gadgets, Gadgets/Gizmos, Legal Research, Viruses & Hoaxes, Web Utilities, WiFi

Features – Treat E-Mail Like Other Communications: An Argument Against Mandatory Encryption of Attorney-Client Communications

Treat E-mail Like Other Communications: An Argument Against Mandatory Encryption of Attorney-Client Communications By Peter R. Krakaur

(Posted January 1, 1998; Archived February 1, 1998)

Subjects: Email Security, Encryption, Features

CongressLine – The Fall of Discontent: The Encryption Controversy

Return to Library CongressLine The Fall of Discontent: The Encryption Controversy

by Carol M. Morrissey

Carol M. Morrissey has been the Legislative Specialist for the Washington, D. C. office of Chicago’s Sidley & Austin for 11 years. She is a lawyer and legislative expert who has also authored a Congressional update column for the last 4 years.

(Posted November 1, 1997; Archived December 1, 1997)

Subjects: CongressLine, Encryption
CLOSE
CLOSE