Canada’s online legal magazine.
Solo lawyer start-up guide
LexisNexis Legal Products

Archive for ‘Technology: Internet’

LSBC Clears Up Cloud of Confusion

Last Monday, I asked if the LSBC has just killed cloud computing for lawyers in BC. My question was prompted by statements made by the LSBC’s President, Jan Lindsay, that led me and others to believe that the LSBC had come down against non-BC-based cloud computing providers.

Ms. Lindsay has published a response to this question on the LSBC President’s Blog, and clarifies that non-BC-based providers are permitted, with the caveat that lawyers acting for clients that are prohibited from out-of-jurisdiction data storage must act accordingly.

David Bilinsky, also of the LSBC, posted a helpful response on Slaw with . . . [more]

Posted in: Practice of Law, Practice of Law: Future of Practice, Practice of Law: Practice Management, Technology, Technology: Internet, Technology: Office Technology

Frequently Asked Questions (And Answers) on BC Lawyers’ Use of Cloud Computing

It’s coming down, it’s coming down, it’s coming down
These clouds could never hope to save us…

Lyrics, music and recorded by Thrice.

On Nov. 17, 2014 Jack Newton posted on Slaw: “Did the LSBC Just Kill Cloud Computing for Lawyers in BC?

To set the record straight, the death of cloud computing for BC lawyers has been greatly exaggerated. In fact, quite the opposite is true. Cloud computing for BC lawyers is alive and well. What the Benchers have recently done is adopt rule changes based on the report and recommendations of the Cloud . . . [more]

Posted in: Technology: Internet

Did the LSBC Just Kill Cloud Computing for Lawyers in BC?

As a frequent public speaker, I’ve seldom found myself speechless on stage, however, last week I stood in front of an audience of over 200 lawyers in stunned silence for the first time in recent memory. I did so after the Law Society of British Columbia (LSBC) President, Jan Lindsay, boldly pronounced that, in no uncertain terms, BC lawyers are prohibited from using US-based cloud computing providers.

To set the stage, let me rewind to Friday, November 14. I was invited to talk at the CBABC Annual Meeting in Scottsdale, AZ. My topic, “The Security and Ethics of Cloud Computing,” . . . [more]

Posted in: Practice of Law, Practice of Law: Future of Practice, Practice of Law: Practice Management, Technology: Internet, Technology: Office Technology

Ontario Consults on a Potential E-Signature Regulation for Real Estate

The Ontario government is consulting on whether to make a regulation under the Electronic Commerce Act to govern electronic signatures to be used on agreements of purchase and sale of real estate.

Draft Regulation

1. For the purpose of subsection 11(4) of the Act, the following class of documents is prescribed: agreements of purchase and sale of land in Ontario.

2. A legal requirement that a document of the prescribed class be signed is satisfied by an electronic signature only if the method of signature used:

a. Is reliable for the purpose of identifying the person who signs;

b. Ensures . . . [more]

Posted in: Substantive Law: Legislation, Technology: Internet, ulc_ecomm_list

International Standard for Treating Personal Information in the Cloud

The International Standards Organization (ISO) and the International Electrotechnical Commission (IEC) have adopted a new international standard for the protection of personally identifiable information by public cloud computer service providers.

It is intended to set out best practices for companies operating in this area, such as Amazon Web Services and Google Compute Engine.

Here is a description of the standard by a privacy advice site.

Is this likely to be helpful to your clients, either those having their information stored and treated in the cloud or those who offer cloud services? Will it influence your contracts?

In particular, will it . . . [more]

Posted in: International issues, Technology: Internet, ulc_ecomm_list

Net Neutrality Zone Trap

The dead puck era in the National Hockey began roughly in 1995 and lasted through the lockout of 2004. The dead puck era was marked by stifling defense and low scoring games as teams employed a defensive strategy known as the “neutral zone trap” (sub nom the trap). The basics of the neutral zone trap was that a team would dump the puck into the offensive zone and then mount little or no forecheck in the offensive zone in favour of placing all of their players in the neutral zone in order to impede the other team from advancing through . . . [more]

Posted in: Substantive Law: Legislation, Technology: Internet

Of Adobe Digital Editions Version 4 Privacy Snafu and Why Lawyers Would Care

It seems Adobe Digital Editions (ADE) version 4.0 could be more than it appears. If you thought it was just an innocuous little digital rights management tool for balancing intellectual property interests with your modest entitlement to enjoy downloaded ebooks from public libraries and vendors in rustic peace and seclusion, you might think again. Last week news started to spread that Adobe Digital Editions version 4.0—released about a month earlier in September— was actually an overactive and prolific snitch, reporting back to Adobe on a daily basis about every ebook title you downloaded, every ereader device you used, every page . . . [more]

Posted in: Legal Information: Information Management, Technology, Technology: Internet, Technology: Office Technology

LODLAM Training Day Videos Available

The Linked Open Data in Libraries, Archives and Museums (LODLAM)* training day videos have been posted. The presentations focussed on “hands-on applications and examples” sharing “approaches to both publishing and reusing Linked Open Data in library, archive, and museum settings.” The organizers saw this session as an “amazing prototype” and plan to apply the experiences gained here to their first official LODLAM Training Day in 2015.

The session was organized by Jon Voss (Historypin and co-founder of the International LODLAM Summit) and took place at the 10th Annual Semantic Technology & Business Conference (SemTechBiz), August 19, 2014 in San Jose, . . . [more]

Posted in: Technology: Internet

Clio Announces “Next” UI at User Conference

For many legal software companies, major announcements and product enhancements have traditionally been saved up for release at ABA Techshow or LTNY. But with the advent of their own user conference last year, Clio looks to be borrowing from the tech sector (think Apple or Google) and utilizing their own annual event for these types of product releases.

This morning’s opening of the Clio Cloud Conference showcased two new such announcements, namely: a revamp of the product’s UI, dubbed Clio Next; and the release of the company’s new smartphone app for Android.

Clio Next updates include:

  • A revamp of
. . . [more]
Posted in: Technology: Internet

Facebook ‘likes’ as Protected Speech (More)

You will probably recall the litigation in the US a couple of years back about whether someone’s ‘like’ on a Facebook page was constitutionally protected ‘speech’.

An employee of a municipal sheriff had Liked the page of a candidate running against the incumbent sheriff. When the incumbent was re-elected, he fired the employee. The court of first instance held that the Like was not political expression and not protected against retaliation. On appeal, that decision was reversed – the Like was political speech – but the firing was upheld for other reasons.

The US National Labour Relations Board has recently . . . [more]

Posted in: Technology: Internet, ulc_ecomm_list

Hackers Fast to Take Advantage of Fears Created by Celebrity Nude Photo Leak

This morning I got the following email, purportedly from Apple Support, telling me to take steps to update my Apple ID information (click ‘more’ to expand this post and see the screenshot):

It is a text book example of a phishing scam – the very type of scam that was likely used for tricking some of the celebrities caught in the nude photo leak into disclosing their personal account login information to hackers. (see this Verge article for a detailed timeline and explanation on how the celebrity nude photo leak likely happened.)

Wow – that didn’t take long. Here the . . . [more]

Posted in: Technology: Internet