Favorable mention for the latest Collaborista Blog post from Jeffrey Brandt at PinHawk.
Technology Strategies for Law
Favorable mention for the latest Collaborista Blog post from Jeffrey Brandt at PinHawk.
In my latest post on the Collaborista Blog, I explore how to begin a matter employing sufficient security, especially for email communication. I wrote,
There are legal matters deserving “Highly Confidential” or even “Top Secret” treatment from the start. However, more common matters such as secret merger negotiations also need protection.
Read the full post at Practicing Law Securely — Security from the Start.
The Practicing Law Securely series on the Collaborista blog now includes current developments reports. Here are Practicing Law Securely current developments for October 2015.
Follow the link to the full collection of Practicing Law Securely blog posts.
To practice law securely, we can add the capability of “information rights management” (or IRM, for short) to our toolbox.
This blog post will begin to answer these three questions:
Read the story at http://blogs.intralinks.com/collaborista/2015/06/practicing-law-securely-information-rights-management-what-when-how/
In the news from a favorite source, Office Watch – “Presidential Passport Details Leaked – Outlook Is Blamed” citing a story in The Guardian, Personal details of world leaders accidentally revealed by G20 organisers. Has the time has come to shed this email crutch (pardon, feature) and (at least) reduce the risks of sending email messages to the wrong person. For instructions, see the Office Watch article.
First, before we get to what happens in the address fields, great advice from the legacy of my late colleague, Gerard Haubrich. Write the message first, check it (twice), then add addressees. That prevents the embarrassment of sending an incomplete message by a slip of the finger. Adopt and master this good habit on any and all devices. If the content of address field helps focus writing the message, try starting “Hi [Bob].” Formality may occasionally demand “Dear [Mr. Blacksberg],” that would be a rare emails. I am fond of “Good morning, [Bob]” (it’s always morning somewhere, no?).
Now what?
Start typing in the address field and nothing happens. Where are all the names that used to appear? Do you have to open Contacts and find a name? Do you need to remember how to type a long email address correctly? In Outlook, there is another shortcut solution. Start typing the name or email address, and press CTRL K. If there is only one match in your contacts, that will autocomplete. If there are many, you are supposed to see a list of all of them. That’s better. You only need part of the name, so long names should not be a challenge. If you must pick the name from a list, you are more likely to make a correct selection than Autocomplete, since the act of choosing requires more detailed focus and care. That’s what we sought, even if there is a bit of a price in time.
BUT…
CTRL K lookup has a different matching pattern than Autocomplete. Autocomplete matches first names, but lookup does not. So far, last name matching seems much more successful.
Stay tuned for further developments.
The Practicing Law Securely series on the Collaborista blog explores in greater depth issues arising from working with a secure shared repository in the latest post, “Practicing Law Securely – Working with the Shared Repository.”
Jeff Brandt’s March 25, 2015, PinHawk blog post features my new blog post on Collaborista, Practicing Law Securely – Living with Links. Jeff wrote, “Bob rightfully acknowledges that “The ‘No More Attachments’ rule will be adopted and sustained only if people can work with documents in a Secure Repository in a practical way, easily mastered with low frustration.” While he ends with a focus on Intralinks VIA, his features that matter and assumptions for a secure repository apply to several other tools in the legal space.”
March 24, 2015. Following up on the “No More Attachments” theme, read my latest post on the Collaborista Blog, which explores and illustrates “Practicing Law Securely – Living with Links.”
Under the title, “Fighting Back“, the February 5, 2015 Pinhawk Blog featured the Collaborista Blog post, “Practicing Law Securely – No More Attachments.” As Jeff Brandt wrote, “It all sounds ‘reasonable’ to me.”
February 4, 2015 – A serious and professional response to today’s cybersecurity risks for law practice – stop attaching documents to email messages. Share links to secure repositories. Read the blog post, “Practicing Law Securely – No More Attachments” at the Collaborista Blog.
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
« Mar | ||||||
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 | 31 |
Copyright © 2025 · Genesis Framework · WordPress · Log in