Thursday, January 3, 2008

From Law.com



Simplifying E-Mail and Group Scheduling
Special to Law.com

After considering groupware like IBM Lotus Notes and Microsoft Exchange to handle its communication and collaboration needs, Grimes & Smith decided on the Google Apps service for e-mail, calendaring, instant messaging and document creation. Law firm partner Charles Smith takes us on a tour of the Google-hosted suite of services.

SPONSOR SPOTLIGHT

Save hours of time with ALR on Westlaw
ALR delivers an objective, in-depth, analysis of your specific legal issue, together with a complete list of every case – in every jurisdiction – that discusses it. With thousands of attorney-authored articles covering the entire breadth of US law, it takes you deeper, faster. Go deeper faster – and find every key case. Starting 1-1-08, this huge timesaver is available online only on Westlaw.

Managing Ethics in E-Discovery
New York Law Journal

Cases like Qualcomm Inc. v. Broadcom Corp. have highlighted the dangers to lawyers and their clients of not properly managing electronic discovery. Pillsbury partner David Keyko reviews some key steps for collecting, processing and producing information during litigation.

SPONSOR SPOTLIGHT

New Podcast with Monica Bay
In the new monthly podcast Law Technology Now, editor-in-chief of Law Technology News Monica Bay interviews key experts of the legal technology community on top issues confronting the legal profession, from e-discovery to network infrastructure and launching "green law" programs. Check out the podcast now!

'Auld Lang Syne' for Dictation
Law Technology News

Dictation is an old friend for lawyers and should not be forgotten as manufacturers move from analog to digital dictation systems. Michael Barnas, Sonnenschein Nath & Rosenthal's director of application services, provides helpful tips and tactics for evaluating specific vendors.

Tools for an Unconventional Lawyer
The Recorder

There are about 1,000 blind lawyers in the U.S., but only a few at major law firms, despite the assistance that contemporary technology offers. Kirkland & Ellis associate William Grignon stays on top of his practice with some additional software, including a speech synthesizer that reads aloud text displayed on a computer screen.

Beware of Export Law Violations
The Legal Intelligencer

Lawyers working on international transactions should beware of exports that include services, software and technical data. The U.S. government is stepping up its enforcement of export laws and ratcheting up related penalties. Dilworth Paxson's Margaret Gatti and David Laigaie offer 10 tips to fend off costly fines.


Free and Easy Desktop Management
Spiceworks
Free Spiceworks IT Desktop. Designed, tested and used by IT pros with everyday IT features for desktop management, including automatic PC and software inventory and IT asset reporting to simplify your job; network monitoring and troubleshooting to keep things running smoothly; and an IT help desk for your company that's easy to use and the fastest-growing IT community.


User's Guide to Securing External Devices for Telework and Remote Access
U.S. Department of Commerce, National Institute of Standards and Technology
This publication provides recommendations for securing external devices used for telework and remote access. Many organizations limit the types of external devices that can be used for remote access and which resources they can use, such as permitting teleworker-owned laptops to access a limited set of resources and permitting all other external devices to access Web-based email only. This allows organizations to limit the risk they incur from external devices. When a telework device uses remote access, it is essentially a logical extension of the organization's own network. Therefore, if the telework device is not secured properly, it poses additional risk to not only the information that the teleworker accesses but also the organization's other systems and networks.

Guide to Storage Encryption Technologies for End User Devices
U.S. Department of Commerce, National Institute of Standards and Tedhchol
This publication explains the basics of storage security, which is the process of allowing only authorized parties to access and use stored information. The primary security controls for restricting access to sensitive information stored on end user devices are encryption and authentication.