Texas Bar Journal Technology Column

Find out how the latest trends, newest apps, and developing technology will affect your practice.

2019

07/01/2019 - Are You Ok? Amazon files new patent to detect emotions

06/01/2019 - Must Websites Comply With the ADA? A look at caselaw

05/01/2019 - New From the Start-Up Alley: What I learned from this year’s ABA TECHSHOW

04/01/2019 - Course of Action: Why plaintiffs’ attorneys should start early when suing providers of custom-designed industrial software

03/01/2019 - In Style: The onset of smart clothing and the rise of privacy concerns

02/01/2019 - Lost in Translation: Google Translate might not always be the best way to obtain search consent

01/01/2019 - Living Spaces: Is your smart home friend or foe when litigation starts?

2018

12/01/2018 - Is a Video of a Video Admissible in a Criminal Trial? A look at Texas Rule of Evidence 901

11/01/2018 - Travel Tip: Expect warrantless digital device searches at the border

10/01/2018 - The Battle Over Biometrics: A look at the law in Texas and two other states

09/01/2018 - Running With the Machines: Artificial intelligence in the practice of law

07/01/2018 - Time Out: Mind the COPPA Rule protecting children online or expect to hear from the FTC

06/01/2018 - Privacy Matters: Is accessing a spouse’s cellphone without consent against the law?

05/01/2018 - Cryptocurrencies: An evolving ecosystem is changing the way society transfers value

04/01/2018 - File Sharing: A district judge holds that an e-discovery fluke did not waive privileges

03/01/2018 - In Style: The onset of smart clothing and the rise of privacy concerns

02/01/2018 - Alternative Solutions: How to exchange large files (or numbers of files) with your client and keep your peace of mind

01/01/2018 - Product Review: A look at a new keyboard designed just for lawyers

2017

12/01/2017 - Cybersecurity Compliance: Why the new rules in New York are important to businesses everywhere

11/01/2017 - Critical Operations: Why securing your law firm’s website is vital to success

10/01/2017 - E-discovery: Protect the contents of cloud file-sharing accounts with fused hyperlinks

09/01/2017 - Software and Liability: How companies can minimize unauthorized disclosures by technology teams and third parties

07/01/2017 - Advertise With Care: Should you use a search engine marketing company?

06/01/2017 - Prepare and Beware: Why your law firm employees need security training

05/01/2017 - Databases in Discovery: Tips on how to request the information you need

04/01/2017 - The Future Is Now: How artificial intelligence is affecting your practice and how to leverage it

03/01/2017 - Work Better: How a new tool can improve the efficiency of transactional lawyers

02/01/2017 - Don’t Let the Cloud Rain on Your Parade: Emerging issues with software-as-a-service providers and ethical obligations

01/01/2017 - Going Paperless: Using a tablet for appellate arguments

2016

01/01/2016 - Meaning of a Message: Emojis and emoji hashtags become new visual evidence

02/01/2016 - Social Hour: Ten ways for in-house counsel to protect the company

03/01/2016 - Best Practices: The FTC signals its intent to police big data

04/01/2016 - Authenticating: Can cellphone text messages stand up in court?

05/01/2016 - What Will You Do When Your Law Firm Is Breached? Putting together an incident response plan

06/01/2016 - To Encrypt or Not to Encrypt? The changing consensus on email confidentiality

07/01/2016 - More Than Meets the iOS. Three important takeaways from the Apple/FBI standoff

09/01/2019 - Stay Aware: Five cybersecurity worries you should know about

10/01/2016 - A Modern Whodunit: Takedown notifications’ impact on identifying alleged copyright infringers

11/01/2016 - All Thumbs? Mobile biometrics, your data, and the law

12/01/2016 - Performance Review: What you need to know to survive a cyberaudit

We use cookies to analyze our traffic, enhance functionality, provide social media features and personalize ads. More Information agree