Canada’s online legal magazine.
Rogers OutRank
Canadian Bar Association

Archive for ‘Technology’

New Privacy Policies at Microsoft

Those of us who keep our confidential information in the Cloud will be pleased with the announcement last week by Microsoft General Counsel & Executive Vice President, Legal & Corporate Affairs, Brad Smith that “effective immediately” Microsoft will no longer inspect their customers’ private content.

The change is to be included in Microsoft’s Terms of Service and will be binding on Microsoft.

The new policy is the result of criticism of Microsoft over its investigators accessing Hotmail content in connection with alleged theft of Microsoft’s intellectual property.

Although, according to Smith, Microsoft was lawfully entitled under its terms of service . . . [more]

Posted in: Technology

From Perogies to Law Trucks – With Love

Maybe it’s something that happens to your brain at 5,000 feet above sea level. Maybe it’s the fresh mountain air. Or maybe it’s the frontier, no-one’s-gonna-help-me-so-I-just-gotta-do-it-myself, spirit of the West. Whatever it is, some of the most entrepreneurial Canadian lawyers I’ve met to date, are from Calgary.

Over and over again I’ve heard that if you have a great idea in Calgary, you can find partners to help make it happen.

We live in an age of cloud computing, greying of the bar, and underserved populations living on mobile devices, and many of us have also been commenting on the . . . [more]

Posted in: Practice of Law, Practice of Law: Future of Practice, Practice of Law: Marketing, Practice of Law: Practice Management, Technology, Technology: Internet, Technology: Office Technology

Clio Secures $20M Funding Round

A note of congratulations to fellow Slaw contributor Jack Newton, whose company Clio has successfully secured a C Series funding round; led by Bessemer Venture Partners and valued at $20M.

Launched here on the West Coast of Canada in the Fall of 2008, Jack and his co-founder Rian Gauvreau are now working through their sixth year of Clio operations. According to Clio’s blog, the newest round of funds will be used to accelerate product development and to expand the size of their internal team. (Recruiting efforts already look to be underway.)

I write this offering my full . . . [more]

Posted in: Technology: Internet

Would You Take the Bait in a Phishing Scam?

“Phishing” is one of the most common scams that cyber criminals use because it can produce spectacular results with very little effort or expense on the part of the hacker. Phishing involves the use of an email, text message or phone call that appears to come from a trusted source or institution, vendor or company, but is actually from a third-party impostor. Phishing messages are intended to trick you into giving cyber criminals your information by asking you to update or confirm personal or online account information. Personal information and identity theft and/or payment scams are the motives behind most . . . [more]

Posted in: Technology: Internet

Open Refine and the ALCTS eForum on Library Linked Data

The Association for Library Collections & Technical Services (ALCTS) held an eForum on Library Linked Data earlier this month. An eForum is a great way to participate in a topical discussion because, unlike a webinar or live chat session, it allows you to drop in and out of the discussion as you have the time.

Theodore Gerontakos, Metadata Librarian, University of Washington and Co-Chair of the ALA Linked Library Data Interest Group, provided a couple of very useful summaries of the two days:

Posted in: Technology: Internet

Electronic Evidence Case – Criminal Law and Social Media

The New Brunswick Court of Queen’s Bench recently admitted into a criminal case screenshots of a Facebook conversation that took place the day after an alleged sexual assault between the complainant and the accused. R v Nde Soh, 2014 NBQB 20

The court held – properly, in my view – that the screenshots were electronic documents within the meaning of ss. 31.1ff of the Canada Evidence Act, which reflect the Uniform Electronic Evidence Act. It found that the documents were properly authenticated. It decided that the computer system was sufficiently reliable in the absence of any evidence from . . . [more]

Posted in: Substantive Law: Judicial Decisions, Technology: Internet, ulc_ecomm_list

Facial Recognition Software: As Good as Your Brain

In case you needed another reason to get paranoid about your growing loss of privacy, Facebook has now successfully developed facial recognition software that performs to the same standard as the human brain. [Cited FB research paper.]

The project is called “DeepFace”, and its recognition rate of 97.25 is closely comparable to human accuracy at 97.53%. Even with variances in lighting; and even when the angle of the shot is different. If you’d like to get into the detail, the link above gives a nice condensed summary.

What could this mean in the future? It’s hard to predict, of . . . [more]

Posted in: Technology: Internet

Computer Virus Locks Up American Law Firm’s Files

The ABA Journal has a story about a law firm falling victim to a cyber attack that locked up the firm’s computer files for ransom. Here’s the text of the article:

The good news: No law firm or client data was taken.

The bad news: Attorney Paul Goodson and his staff can’t access his Charlotte, N.C., law firm’s files after they were locked up by a computer virus, WSOC reports.

Like other businesses in the city, the firm was targeted via email. Once an attachment was opened, the Crypto Locker virus took over. Thousands of documents stored on his computer

. . . [more]

Posted in: Technology: Internet

Tell Me a Story Data?: The Linked Data Platform Use Cases and Requirements

The W3C (World Wide Web Consortium) Linked Data Platform Working Group is working on “a specification [that] describes the use of HTTP for accessing, updating, creating and deleting resources from servers that expose their resources as Linked Data. It provides clarifications and extensions of the rules of Linked Data.” Last week they released Linked Data Platform Use Cases and Requirements. This new Working Group Note builds on the working draft they released in October 2013 and aims to “motivate a simple read-write Linked Data architecture” through a collection of stories and use cases.

We all love stories right? Unfortunately . . . [more]

Posted in: Technology: Internet

The Internet Web Is 25: How Do We Keep It Open and Free?

This week is the 25th anniversary of the creation of the Internet a.k.a. the World Wide Web. Yesterday Google shared a message from the Internet’s Web’s inventor Sir Tim Berners-Lee. In March 1989 he shared a proposal for “a ‘web’ of notes with links between them” or a non-linear system using “hypertext” which I remember (as someone who used the precursors of the Internet) as a hot topic at the time.

Berners-Lee takes the opportunity to ask some important questions in urging us to keep the Internet open and free:

So today is a day to celebrate. But it’s also

. . . [more]

Posted in: Justice Issues, Legal Information: Libraries & Research, Technology: Internet

Is Custom Satellite Imagery or Crowdsourcing in Your Future?

Digital Globe, a commercial satellite image company, has started a crowdsourcing campaign to help find the missing Malaysia Airlines Flight 370. You can go to their Tomnod site, look at satellite imagery of where the plane might be, and tag anything that may look like wreckage or life rafts.

It doesn’t seem that long ago that satellite imagery, especially high resolution near real time imagery, was exclusively for government spy agencies.

Now anyone can obtain up to date satellite imagery with remarkable resolution. (The best resolution is still reserved for government use.) If a recent image is not available . . . [more]

Posted in: Technology

Cybercrime: Be Ready With an Incident Response Plan

Because a cybercrime attack can cause irreparable harm, law firms should be prepared to take action immediately. Being able to do this requires an Incident Response Plan (IRP).

An effective IRP can put a firm in a position to effectively and efficiently manage a breach by protecting sensitive data, systems, and networks, and to quickly investigate the extent and source of the breach so that operations can be maintained or promptly restored. Many firms design IRPs so that they address inadvertent breaches as well – for example, a lost USB key, or a misdirected email. An IRP can help avoid . . . [more]

Posted in: Technology