Technologist - The FindLaw Legal Technology Blog

Recently in Computer Networking & Storage Category

Megaupload Data Trapped on Servers for Five Years

Kyle Goodwin, a videographer of high school sports, got T-boned along the information super highway.

He was stopped at an information intersection when a reckless driver rear-ended him and sent him helplessly into internet traffic. A crossing vehicle smashed into him and there he sat -- or at least his video information sat -- stuck in a third-party server.

Unfortunately, it's been five years and his digital videos are still trapped in the same place. In internet years, that is like five lifetimes.

You want to protect your firm and your client data from cyberattacks. An ounce of prevention, as they say, is worth a pound of cure. But prevention is only one part of a full cybersecurity plan.

Detection is just as important. After all, if you can't tell when someone's gotten through your defenses, you can't properly respond to a cyberattack. And for many organizations, detection is a serious weakness. Most companies don't recognize that their data has been breached until months after the event.

Age Discrimination Is Built Into Some Job Search Websites

It makes some sense that a technical gaffe caused online job sites to winnow out older workers.

The drop down menu on one job site only scrolled back to 1956 for applicants to indicate a graduation date on their resumes. Most tech workers these days weren't even born back then.

Unfortunately for the online companies, the math did not work out right for Illinois' top prosecutor. Attorney General Lisa Madigan sent letters to six job sites about the problem, which involved potential violations of the Illinois Human Rights Act and the federal Age Discrimination in Employment Act.

"Today's workforce includes many people working in their 70s and 80s," Madigan said. "Barring older people from commonly used job search sites because of their age is discriminatory and negatively impacts our economy."

Will Electronic Wills Be Legal Soon?

This is not your father's will.

Electronic wills, as proposed in the Florida Electronic Wills Act, are created in an electronic form, including e-signatures for testators with remote witnesses and notaries. In other words, the document will be made in a virtual world.

If Florida enacts the law, it will become the second state in the country to expressly authorize electronic wills. While technology is pushing legal innovation everywhere, not all probate lawyers are ready to adopt the electronic will just yet.

When is a search warrant valid for documents stored in the cloud? That's not a simple question to answer, particularly given to recent, divergent rulings. In July, the Second Circuit ruled that the federal government could not force Microsoft to turn over emails stored on the cloud -- or rather, Microsoft's server in Ireland. Just a week after an equally divided Second Circuit declined to rehear the case en banc, a U.S. district court in Philadelphia came to the opposite conclusion, ordering Google to comply with a warrant for documents stored on the cloud.

Can these two rulings be reconciled?

Espionage Charges Leveled at Former NSA Contractor for Stealing Hacking Tools

Harold T. Martin III has been facing up to 10 years in prison for allegedly stealing classified government information, but he may soon face another 30 years as prosecutors plan to file espionage charges against him.

In any case, the former contractor for the National Security Agency is not going anywhere for a long time. Unlike Eric Snowden who fled the country after he leaked classified information, Martin is in jail.

Dispel Cybersecurity Myths at the Law Firm

In Greek mythology, Phobos was the bloody god of fear in war. Worshipers built him a temple of skulls. His name brought panic and flight.

Thousands of years later, Phobos spawned the word "phobias." It means an irrational fear of something or someone. Today, fears of being hacked and encountering cyber-terrorism have created their own myths.

The cybersecurity threats are real, but not all fears were created equal. Here are a few myths:

Top 3 Tips to Keep Legal Documents Secure

Not so long ago, cybersecurity was not even a word in the dictionary. Type the word into a Google search now and you will see more than 25 million results in less than a second.

Punctuated by the occasional 1.5 billion email hacks at Yahoo or other internet service provider, cybersecurity is probably the main concern in information technology today. It is the word in IT.

For attorneys, whose profession is built on tenets such as attorney-client confidentiality, cybersecurity is more important than ever. Client files, financial information, and endless stores of digital documents must be safeguarded.

Here are some top tips to keep your legal documents secure:

New Data Company Releases Analytics on International Commercial Arbitration

A new database has been published with more than 66,000 data fields on thousands of commercial arbitration cases in 136 countries, enabling legal professionals to analyze international arbitration in new ways.

No, it's not from Wikileaks or Edward Snowden. It's from a start-up company called Dispute Resolution Data, which has contracts to collect and release the information from some 20 arbitration institutions.

This is a significant release of information because, historically, commercial arbitration has been confidential. Commercial arbitrators have closely guarded case information to maintain participant privacy. Dispute Resolution Data takes that information and creates research analytics.

5 Tech Mistakes Lawyers Make

All mistakes are not created equal. For lawyers, one faux pas may cause trouble with a co-worker. A different misstep may upset a client. And you don't want to think about stepping on a judge's toes.

But in the cyberworld, mistakes can reach global proportions with the speed of a mouse-click. The essence of any error may be the same, but the potential is magnified by the medium.

Here are five tech errors that are so common, you probably have made a few of them: