Canada’s online legal magazine.

Protecting Yourself From Cybercrime Danger: Address Security Vulnerabilities by Installing Operating System and Program Updates

Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the specific cybercrime dangers law firms need to be concerned about, and how they can mitigate their risks.

There are millions of lines . . . [more]

Posted in: Technology

Thank Goodness for the NSA! — a Fable

If it weren’t for the U.S. National Security Agency’s trying to spy on everyone in the world, Bleeker Street Law would have been a cooked goose.

Back in 2013, we had a group of clients from a particular country applying for refugee status here in Canada. Because the NSA spying was in the news, we did a forensic audit of our computers, just to be safe. We promptly discovered that we had been hacked. Not by our clients’ former national security service, or by the NSA, but by a for-profit organization. A set of aspiring criminals had broken our security . . . [more]

Posted in: Technology: Office Technology

Ever Cuddled an Aardvark? Ever Studied Zymurgy?

A hitherto senior colleague, a mentor in legal publishing, speaking more allegorically than in truth, I imagine, recalled a difficulty that his wife allegedly suffered. Although an intelligent, urbane and charming person, she did not find herself always comfortable with some of the duties of the corporate spouse, particularly when it came to institutional dining. Her heart would sink at the prospect of an evening trapped between two crusty old judges with whom she had little in common. Her tactic, it was said, in trying to maintain conversation when it did not flow naturally, was to use alphabetic sequence to . . . [more]

Posted in: Legal Publishing

Protecting Yourself From Cybercrime Dangers: Lock Things Up by Using Passwords Properly

Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the specific cybercrime dangers law firms need to be concerned about, and how they can mitigate their risks.

Like the keys that start . . . [more]

Posted in: Technology

Protecting Yourself From Cybercrime Dangers: Avoid Infections With Antivirus And/or Antimalware Software

Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the specific cybercrime dangers law firms need to be concerned about, and how they can mitigate their risks.

Good behaviour alone will not . . . [more]

Posted in: Technology

Protecting Yourself From Cybercrime Dangers: Lock Down Your Browser and Avoid Surfing Dangers

Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the specific cybercrime dangers law firms need to be concerned about, and how they can mitigate their risks.

After email, your Internet browser . . . [more]

Posted in: Technology

Protecting Yourself From Cybercrime Dangers: Avoid the Dangers of Email

Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the specific cybercrime dangers law firms need to be concerned about, and how they can mitigate their risks.

Email has become a primary . . . [more]

Posted in: Technology

2013 Canadian Law Blogs Awards (Clawbies) Announced

If you haven’t done so already, head on over to the Clawbies website to get the full story on this year’s winners. I’ll only say here that the award for the “Best Canadian Law Blog” goes to First Reference Talks piloted by the wonderful (and Slaw blogger, too) Yosie Saint-Cyr.

Oh, and the three Best Practitioner Blogs are David Fraser’s Canadian Privacy Law Blog, Lisa Stam’s Employment and Human Rights Law in Canada, and Russell Alexander’s Family LLB.

And the Legal Culture Award this year goes to Andrew Langille’s great Youth and Work. . . . . . . [more]

Posted in: Announcements

Polycentric Conversations and Rules to Keep Them Going

Four weeks ago I was in Abu Dhabi, at the annual meeting of the Global Agenda Councils of the World Economic Forum. The Council on Rule of Law, which I chair, issued a report on the fast increase of governance outside purely state structures that is aimed at dealing with complex transnational issues such as human rights, labour standards, the environment, cybercrime, health, and corruption. Situations where the state is not enough. There’s a lot of that kind of governance around when you start looking for it and it will increase. Many examples of transnational, multi-stakeholder governance flounder. Why? At . . . [more]

Posted in: Practice of Law

Sensible Judgments

I don’t often write about court decisions. As a law librarian and not a lawyer, I try to leave this to the legal experts of Slaw. Sometimes, though, I feel compelled to point out specific decisions from the Alberta Courts.

Since it is New Year’s Eve, this day of frequent imbibing, I draw your attention to a relatively recent decision from Alberta Provincial Court Judge Bart Rosborough: R. v. Omeasoo, 2013 ABPC 328 (CanLII). In this decision, Judge Rosborough writes about bail conditions frequently imposed on alcoholics – refraining from consuming that which they are addicted to. Paula . . . [more]

Posted in: Substantive Law: Judicial Decisions

Powering Your Practice With Databases

I recently met with my elderly mother’s Accountant who had a Financial Planner in attendance. When I told them of my legal IT consulting work, they were almost sympathetic as the lawyers they knew were averse to the use of databases. This was in stark contrast to themselves, and most members of their profession. Their view was that lawyers were archaic in their information management practices.

It is not just referral sources who are speaking up, clients are also losing patience with lawyers, with one corporation, KIA Motors developing a test of their IT skills.

Although I am not privy . . . [more]

Posted in: Legal Technology

Cyber Risk Insurance Options: Do You Have the Coverage You Need?

The prevalence of cyber-related crime has been steadily increasing for a number of years. Many businesses invest heavily in the necessary IT infrastructure to protect their data, but despite best efforts and intentions, the frequent news stories in the press should serve as confirmation that breaches do occur.

The cost implications of having personal or financial information stolen are significant, especially for law firms, because the information they hold can be confidential and even privileged, and is often very sensitive. When you consider all the potential first- and third-party liabilities a major breach could place on a law firm, the . . . [more]

Posted in: Practice of Law: Practice Management, Technology

3li_EnFr_Wordmark_W

This project has been made possible in part by the Government of Canada | Ce projet a été rendu possible en partie grâce au gouvernement du Canada