By Nerino Petro at 9 October, 2015, 3:25 pm
One of the easiest ways to start automating document creation is to use the tools already included in the programs or platform we use daily. For most of us, this will be using text expansion or text replacement. With text expansion or replacement, you type a special word, series of letters or characters and it is replaced with something else, such as a name, phone number, phrase or even an image. While there are third party text expansion programs, you can easily get started using the auto correction feature built into your program such as Word, Outlook or WordPerfect or included in your operating system such as iOS and OS X.
By Nerino Petro at 21 September, 2015, 1:40 pm
Most lawyers forget that their websites are viewed by disciplinary authorities as a form of client communications. Firms that update their website or delete it for whatever reason may run afoul of ethics rules if they do not maintain a copy of it. Anna Massoglia over at Lawyerist.com has a good post on this topic Deleting Your Website Can Come Back to Bite you in the Assets . Some folks believe that since the Internet Archive Wayback Machine grabs snapshots of websites that they do not need to be concerned about this, but Anna's article should disabuse you of this thought.
According to Anna's article:
ABA Standing Committee on Ethics and Professional Responsibility Formal Opinion 10-457 expressly states that any website with background information about a law firm or lawyers constitutes a “communication about the lawyer or the lawyer’s services,” subject to the requirements of Model Rule 7.1. Model Rules 7.1, 7.2, and 7.3 provide further guidance on communications and advertising, but do not explicitly impose record-keeping requirements on either. The Model Rules serve as outer limits of regulations and restrictions on attorney advertising but leave specific restrictions to the regulation of state bar associations, whose opinions on the matter vastly differ.
Something else I found useful in her article is the state by state chart of whether maintaining a record of your website is required or recommended and how long you need to keep that record. So check out her article and make sure you're following the rules.
By Nerino Petro at 10 September, 2015, 10:16 am
If you have a Mac, you already have some sophisticated screen capture tools built into the OS. How-To Geek has a great "How to" tutorial on using Grab in Mac OS X for more advanced screen captures. Check it out here.
By Nerino Petro at 30 October, 2014, 9:38 am
Today's quick "How To" is useful if you are you are trying to create a whitelist in Gmail or any other time you want to insert a vertical pipe symbol "|" into a document or form. In Gmail you use the filter creation tool to whitelist a domain or domains. Rather than create multiple rules, you can add several domains all at once in one filter. However, the domains need to be separated by a pipe to whitelist multiple domains or email addresses. Most modern keyboards do not include the pipe as an option on any of the keys. However, the answer is really easy, Push and hold the Shift key and then push the backslash key "\". This inserts the pipe rather than the backslash. For full instructions on how to crate your whitelist entries in Gmail checkout this step by step guide from About.Com's Technology section here.
By Nerino Petro at 6 August, 2014, 10:30 am
Since late 2013 an insidious program that encrypts a users computer and then holds it for ransom unless the victim pays Hundreds of dollars by Bitcoin has been spreading throughout the globe. Cryptolocker and its variants have become the bane of computers users worlwide.Once infected, users had 72 hours to pay the ransom or the price went up; however, even paying the ransom was no guarantee of getting a valid decryption key. The only other option that worked was to restore from a protected backup, which too many people didn't have. BBC news is reporting in its story Cryptolocker victims to get files back for free that security experts were able to infiltrate and capture the database of victims. If you are afflicted with Cryptolocker it may now be possible to get the decryption key needed to restore their files according to this story.