The Hytech Lawyer Mourns the Loss of Steve Morrison


Steve Morrison was my teacher, mentor, law partner and friend.  Steve died yesterday morning at only 64 years of age.  It’s been less than 24 hours since we learned the news, but my law firm, Nelson Mullins Riley & Scarborough, already misses him terribly.  You see, Steve Morrison was never ordinary- no ordinary lawyer, no ordinary person, no ordinary partner, no ordinary friend. He was in every respect bigger than life.

To describe Steve Morrison as a talented trial lawyer is an extreme understatement. Steve’s ability to connect with the jury and judge bordered on the mystical. He was a lawyer called upon to try the most difficult and unwinnable cases – more often than not, he won them.   To prepare for trial with Steve was the best legal education that a young trial lawyer could have.  A few years ago, I was first chair on a difficult commercial case with large exposure. I asked Steve if he would consult with me on the case. In reality, Steve was too busy to do so, but characteristically he agreed anyway. This was a new dynamic for me (and for him) because previously Steve had always been lead in any case I worked on with him.  Steve was a gracious teacher, never undercutting my “role” in the case, but instead engaging me–  “What are your themes?”  “What will your jury care about?” “what is the right outcome and why?”   We had a mock trial in the case with Steve playing the role of opposing counsel–  Steve dominated with the mock jury as was typical.  However, I took comfort in the fact that our opposing counsel was no Steve Morrison.  This is just one example of the many times Steve Morrison mentored me.   I know Steve was just as generous with many of my colleagues, many of the law students he taught as an adjunct professor at the University of South Carolina School of Law, and with many others both inside and outside the profession.

Steve was not only a lawyer, but an activist.  He not only talked about doing the right thing and making a difference – he went out and did it.  Over his career, Steve invested thousands of hours in pro bono work advocating for the underdogs of our society, from poor school districts, to incarcerated youth, to the homeless.  Morrison was a man of action.  This boy from Michigan, embraced his new home of South Carolina, and in particular the city of Columbia, and determined to make them better—he did.  Steve was active in everything – the arts, education, and community welfare.  He dreamed of what Columbia and South Carolina could be – then put his shoulder into pushing in that direction. He left his adopted home a much better place than he found it.

As a law partner, year after year Steve was more often than not the most productive lawyer in the Firm. He asked much of himself, and much of his colleagues. He continually pushed us to be better.  He shared Claude Scarborough’s vision of a national firm, headquartered in South Carolina, but with influence throughout the world.  As a member of our Firm’s Executive Committee, he pushed us to dream– to dare to be great.  Steve Morrison was a key contributor to what this Firm has become and what it will be in the future.

Finally, Steve was a devoted friend.  Although he had reached a level of national prominence, he always had time to speak to you.  He treated the high and the mighty and the poorest among us as Christ would have us treat one another.  That is not to say that he suffered fools lightly—but Steve had a big, compassionate heart.  He was a giver and sharer.  The State newspaper has a wonderful tribute to Steve on the front page of today’s edition. The title refers to Steve as “a force of nature.”  That is so very true.  Steve—we will miss you, but your spirit will always be with us.  Thank you.  Rest in peace my friend.

Cloud Computing Basics for Lawyers (Niki Black Interview)


I recently had the privilege to interview one of the pioneers of the legal blogosphere, Niki Black.  Niki is Director of Business Development at MyCase, a cloud based law practice managment system.  She is combination cloud computing guru and legal technology cheerleader.  In this recorded slide show, Niki gives a basic overview of “the cloud” including ethics issues, security precautions, and advantages for lawyers.

ABA Editorial Niki is also the author of the ABA publication  “Cloud Computing for Lawyers”

Niki Book





Other Recommended resources:

This is the first in a series of interviews we plan to conduct with some of the interesting personalities in the law technology business.

Presenting Witnesses at Trial or Hearing using Skype, Facetime, iPad, etc.



In the relentless drive to reduce litigation costs, it is becoming more and more common for witnesses to testify at trials and hearings via two-way video/audio feed as opposed to travelling long distances to testify in person.  At the same time, the technical challenges and costs of live video feeds have fallen drastically– to the point that they are hardly a consideration.   I have presented witnesses at hearings and bench trials using various combinations of Skype, FaceTime, GoToMeeting, the iPad, projectors, electronic courtrooms, etc.  With proper prior planning, adequate backups, the cooperation of the tribunal and opposing counsel, video testimony can be almost effective as live testimony.  The converse is also true, as was evident in the high profile Zimmerman trial where counsel did not understand the necessity of turning off the notification features in Skype, and the testimony was so disrupted by text messages that the court was forced to shut it down.   See Skype Fiasco.

In the below linked video, I demonstrate several configurations of video feeds, and share some of my experiences using them.  For questions or to share your own video witness presentation experiences, please comment to this post.

Video Presentation of Witnesses



Okay, the breaking glass part is for dramatic effect and is optional.  However, once the specter  of a data breach rears its ugly head, your company should  immediately retain breach counsel before it hires cyber security and forensics firms to access the scope of the breach.  Why?  Because if the law firm truly directs and manages the internal investigation and any loss  mitigation efforts, the attorney-client privilege and protections of the work product doctrine  should apply.  Given that litigation often follows a data breach, the ability to investigate with an  assurance of confidentiality will promote more candid communications with company personnel  and will allow the company to better control the flow of information and public relations  messaging.  If outside counsel are not directing the investigation and loss  mitigation efforts, the whole process will be discoverable in litigation and information may be  misconstrued or mischaracterized.

The rationale behind the attorney-client privilege is to encourage free and open communication between the client and his or her lawyer, thus promoting informed, effective representation. The privilege protects communications between a lawyer and a client, or an agent of either, that are made in confidence for the purpose of obtaining or providing legal advice for the client. There is a serious question as to whether the privilege applies in the case of in-house lawyers interviewing company employees.  Clearly, if no lawyer is involved in the communication, or if a third party is present when the communication is made, there is no privilege

In comparison, the work product doctrine protects an attorney’s mental impressions, opinions and legal conclusions from disclosure based on the rationale that an attorney should be afforded privacy to prepare her client’s case. Work product protection is provided to documents or tangible things, prepared by or for a party, and prepared in anticipation of litigation or for trial. See FED. R. CIV. P. 26(b)(3).  Unlike the attorney-client privilege, the work product doctrine confers a qualified privilege and if the opposing party can show compelling reasons that requested information should be produced, for example, if it is not available anywhere else, the court in its discretion may order production.

For the “hire counsel first” strategy to work, the law firm retained must be prepared to respond almost immediately and to hit the ground running.  Preferably, the firm will have the capability of fielding a rapid reaction team of experienced attorneys that can rapidly assess the situation, retain the appropriate experts from a pre-vetted panel, properly conduct an internal investigation and promptly provide cogent legal advice on damage control strategies.  Your prospective  breach counsel should be able to discuss up front a proposed plan of action (“POA”).  The POA will vary depending upon the circumstances, but might look something like this:

  1. Retain breach counsel;
  2. Obtain high level overview of factual circumstances;
  3. Retain appropriate forensic experts;
  4. Ensure data is no longer being compromised  (retain expert for determination as needed);
  5. Identify scope of breach if possible and type of data (e.g., financial, personal, medical, etc.);
  6. Physically secure the data systems, data and documentation;
  7. Implement document and data retention plan;
  8. Conduct interviews with key personnel to determine circumstances of breach;
  9. Determine how the breach occurred and whether it was  accidental or malicious (inside or outside job);
  10. Assess security factors and improvements neded going forward;
  11. Retain public relations experts as appropriate;
  12. Assess legal and regulatory requirements;
  13. Determine if law enforcement, or other officials should be alerted;
  14. Provide detailed opinion to client on legal and regulatory obligations, as well as loss mitigation action plan;
  15. As appropriate retain data breach response firm;
  16. Provide hotline and on line information resources for affected personnel;
  17. As appropriate provide notification of breach to regulators, government and affected persons;
  18. As appropriate provide mitigation resources to affected persons (e.g., credit monitoring), and,
  19. Provide assessment of steps needed to avoid or reduce the risk of future data breaches.

The POA above is bare-bones and generic. The bottom line is that breach counsel should be retained soon as a potential breach is discovered, and that once retained should be prepared to immediately implement a plan of action agreed upon with the client.  If that plan is properly executed by the law firm, the protections of the attorney-client privilege and work product doctrine should apply to most of the investigation and mitigation efforts.  Preservation of the privilege could prove to be vitally important in future litigation.

Bill Latham is the self-proclaimed Hytech Lawyer. He is also partner in the law firm of Nelson Mullins Riley & Scarborough, LLP.

How To Create Your Own Secure Private Cloud

Pogo brandMany lawyers send and receive confidential client information via the “cloud” everyday. This includes popular services such as Dropbox, Box, Evernote, iCloud, SkyDrive, etc., etc. Despite the mysterious connotations engendered by the word “cloud,” cloud storage is really nothing more than a collection of servers and storage devices accessible via the internet.

There are a number of advantages to cloud computing. Besides having access to your files anywhere there is an internet connection, saving data in the cloud permits the backup storage of key documents in multiple locations lowering the risk of data loss. There is also the ability to share documents with others in a collaborative fashion.  This is significant because it allows computers and tablets (e.g., the iPad) with limited memory capability to access vast amounts of information that is actually housed externally.

One concern with traditional cloud computing, is that someone else has physical control of the equipment on which your data is stored and usually the data itself. This data can be stolen, hacked, destroyed, etc., or as we have seen recently, turned over to the government in response to a secret FISA subpoena.

Pogo backPogo Plug is an economical alternative cloud storage solution that allows access to data over the internet just like other cloud services, but instead of the data being stored on a server farm in India, Indiana, or Timbuktu, the data resides on your own computer storage device(e.g., thumb drive, external hard drive), at your home, office or other location of your choosing. In other words, you can access your own backup hard drive by the Internet. Like other cloud options, Pogo Plug allows you to securely share links to designated files with others. You can also stream music and videos. Access to Pogo Plug can be slow at times as compared to cloud services such as DropBox; however, in most cases this is a reasonable trade-off for the security of having physical possssion and control of your data,

Pogo Plug has been around since 2009. I have a model that is two years old. Several newer models of Pogo Plug devices are currently available and range in price from $25.00-99.00 and are available at most computer electronics retailers. You simply plug the Pogo Plug into an available Ethernet port on the rear of your wireless router. Then, plug one or more storage devices into one of the four USB ports on the Pogo Plug (e.g., a USB thumb drive or a backup hard drive). Once set up, you can upload data to or download data from almost any device via the cloud, including the iPad. The data is encrypted in transmission. When using Pogo Plug you have the choice of saving data to the Pogo Plug Cloud server (5 GB free– you can purchase additional storage capacity), or your own storage devices up to their full capacity. In my setup, I have a 1 TB ( = 1000 Gigabyte) drive and 32 GB thumb drive plugged into my PoGo Plug at home. I can access this drive from any computer, smart phone or tablet that is Internet capable. There is no additional cost beyond the initial purchase price of the device, so long as you are using your own storage (as opposed to buying storage capacity on the optional Pogo Plug cloud). Pogo Plug also has a free App for the iPhone and iPad allowing access to your Pogo Plug files.  Below are screen shots for showing Pogo Plug access via an iPad:








Finally, Pogo Plug system appears to be sufficiently secure for lawyer use:

Files stored locally on your Pogoplug-connected hard drives remain safe in your home or office, and we do not keep a copy of any of your files on our servers. We also do not store your account password on our servers. When you transmit files to Pogoplug they are encrypted using 256-bit SSL, which is the same encryption protocol that your online banking system uses to protect access to your account.

So if you want the convenience of cloud access, but are concerned about the security of your data, Pogo Plug may be just the solution you need.  Questions? Leave a comment and we will reply on the site.

In-flight Wi-Fi- Gogo is a No No for Sensitive Info


In my practice, I frequently fly back and forth between the East and West coasts of the United States.   Consequently, I do a lot of work on planes and was delighted when several years ago my favorite carrier Delta introduced the Gogo Internet service on cross-country flights.  However, because my practice includes cyber security and data breach mitigation, I did what few lawyers do when they open a Gogo account — I actually read the Terms of Service.  It turns out that Gogo is very upfront about the lack of security on its in-flight Wi-Fi service.  Gogo explains :

The connection through which users purchase Gogo is an SSL-encrypted link. However, following such purchase, due to multiple users of our In-flight Wi-Fi access point, Gogo does not provide an encrypted communication channel (Wired Equivalency Protection known as “WEP”) or (Wi-Fi Protected Access known as “WPA”) between our in-flight Wi-Fi access point and the user’s computer. Gogo does support secure Virtual Private Network (VPN) access. If you have VPN, Gogo recommends that you use that channel for greater security. SSL-encrypted websites or pages, typically indicated by “https” in the address field and a “lock” icon, can also generally be securely accessed through the Gogo In-flight service. Users should be aware, however, that data packets from un-encrypted Wi-Fi connections can be captured by technically advanced means when they are transmitted between a user’s device and the Wi-Fi access point. Wi-Fi customers should therefore take precautions to lower their security risks.

Gogo recommends that users follow good security practices, such as ensuring file-sharing is not enabled while accessing the Internet from an un-encrypted public network and that laptops have firewall and other protection against malware. Gogo recommends that sensitive or private information should not be accessed via or transmitted over an un-encrypted connection.

Gogo Customer Help (emphasis added).

The bottom line is that Gogo lacks even the most rudimentary encryption capabilities.   So listen and heed Gogo’s own advice:— “Gogo recommends that sensitive or private information should not be accessed via or transmitted over an un-encrypted connection” (i.e, Gogo).”   This means don’t sign into your bank or financial institution while using the Gogo service. This also means not accessing confidential client information via Gogo.

So to sum it all up, be wary of airborne Wi-Fi, and let’s be careful out there



In this five minute video, I share my wonder at the rapid advances in computer processing and memory capability and ponder on what it will mean for the practice of law in the next ten years as artificial intelligence and true legal expert systems become a reality.

The concept of artificial intelligence (“AI”) and the potential impact on the human species is fascinating to me.  The ramifications for our profession and the society at large are huge– I think. In the literature there is much fear mongering in the discussions of AI, such as the idea that machines will take over most of the jobs and leave human beings without meaningful occupations or sources of income (or worse).

Fear of the unknown is understandable.  Historically, however, advancements in technology have largely benefited the human condition and improved life.  For example, in 1900, 50% of the US population lived on farms and farming, or farming related work, occupied the majority of US workers.  Contrast that with today where less than 2% of the population lives on farms and less than 4% of the population is employed in farm related work.  If you were a farm worker in 1900 and knew that so many farm jobs would be lost in the upcoming century, you might be very afraid for the ensuing generations– “what will they do for a living?”  As it turned out, such fear of widespread unemployment would have been unwarranted. As technology disrupts and destroys old economic systems, it creates new ones from the rubble.  The trick is to adapt to the new normal.

Like farming in the 1900s, I believe that technology and economic efficiency pressures will force a transformation in the way we practice law. There will likely be fewer lawyers, working more efficiently and at a lower cost. which is probably a good thing for society, if not for us as individuals living through the change.   There will be winners and losers–  those that can adapt and innovate will thrive. Those that cannot will find employment elsewhere.

Below are links to some thought provoking references related to AI and the impact of technological change.   Do you think the practice of law will be fundamentally different in 10 or 20 years?  I invite your comments.

The Hytech Lawyer’s Tips and Tricks for Smooth Sailing on Your iPad, Part 1


Every year or so since the iPad’s introduction, we have run a “tips and tricks” article.  It’s that time again.  This is part one of a planned three part series – starting with the basics.

How to Keep Your iPad Up-to-Date and Running Smooth     iPad updates are used to fix bugs in the software, add functions and make improvements.  You need to have the latest version of iOS (the iPad operating system) to get the most out of your iPad.   The same thing goes for updating Apps.  To see if your iOS is up to date,  first make sure your iPad has a good Wi-Fi connection and a charged battery (or is plugged up to a power source).  Second, find the “Settings” icon

Snapseedand select.  On the next screen, select the “General” icon on the left had side–same icon as used for settings.


Snapseed22Then select “Software Update” found near the top of the right hand column.  You will be told your iPad is up to date or provided instructions on how to update.   As of the date of this entry, the Version should be 6.1.3.   A major upgrade, iOS 7.0, is due to be released sometime in September 2013.  Keep in mind that if you have not updated recently, it may take an hour or more to load the update(s).

The next question is whether all of you individual apps are up to date.  If your App Store indictor has a number on it then the answer is no.  The icon here indicates that 25 Apps need to be updated.


Select the App Store icon and then select update all.  You will be asked for your Apple password, however, application upgrades are free. This is the beauty of the App Store.  You can always have the latest version of the application. It is also important to install these upgrades because this is how bugs are fixed by the developers.

Screenshots    – did you know that you can take a screenshot of whatever is on your iPad screen?  Briefly push the home button and power button at the same time and a picture will be taken of your current screen. You can find the picture in your camera roll with your other photos.  You can then export the picture by email, insert it in other documents, Etc.  That is how I was able to insert the photo of my blog below.

Timesaving Shortcuts

Shortcuts – – do you find yourself typing out lengthy e-mail addresses, conference call instructions, addresses, or other repetitive information?  The iPad has a shortcut feature that allows you to type a few letters for a long phrase?  To activate, select the “Settings” icon.  Go to the right side toward the bottom and select “Keyboard.” At the bottom you will see “add a new shortcut.”  Select it, and then add the shortcut, (e.g., “em”  for your “longwindedemail”). Now, when ever you type “em” the long email address will pop up as choice that you can select by simply pressing the space key.

Resetting Frozen or Malfunctioning Apps

Resetting Malfunctioning Applications—No need to reset your whole iPad when an App hangs up or malfunctions.  Simple double click the home button.  Locate the offending App among the icons presented at the bottom. Push and hold the icon of the App you want to close, until the icon starts jiggling- then push the – to the left of the icon.  This closes (but does not delete) the App.

When Your iPad Needs a Reboot

When I encounter a frozen iPad or one that is not working correctly (e.g., like not picking up Wi-Fi), many times the problem can be straightened out by doing a hard reboot of the iPad.  Simply press the home key and the power key (on the side near the volume control) and hold both until the screen goes dark (but no longer).  Then, if the iPad does not start to power up by itself, push the power key until the Apple logo appears.  When the iPad resets, check to see if your problem is fixed.

Sending Multiple Photos via Email

Sending multiple pictures in an e-mail:  It is simple to send multiple pictures in an e-mail from your camera roll. First, press the “Photos” icon.  If you have your photographs in albums, select the album containing the pictures you want to send.  Select the “Send” icon in the top right corner—it will turn blue.  Then tap each photo you want to send.  A check mark will appear on each selected photo. Tap share and you will be presented a menu to Email, print or message.

Your iPad Can Read to You

Do you want your iPad to read to you on occasion (for example while driving)?  Select “Settings”.  In the left hand column select “General” and then in the right hand column toward the bottom select “Accessibility.”  Then select “Speak Selection” and turn it on.  You can select the pace of speech.  Now, when you select any text (for example word documents, emails or books) you can have it read to you by tapping “Speak.”   Note, that for those that are visually impaired, the iPad can be set to read everything displayed  (Settings–>General–> Accessibility –>VoiceOver).  Be sure to read the instructions on the screen because selecting this VoiceOver option changes the iPad commands (of course you can reset them).


Finally, a word on security.

So you want to use it an iPad your law practice.  That likely means using it to store and communicate confidential client information.  You may also be accessing your firm’s internal and cloud based systems.  It is also quite possible that unlike your traditional work desktop/laptop, you may be tempted to share this repository of client secrets with your spouse, children or friends—because after all, the iPad is first and foremost a super cool entertainment machine—right?

STOP!  LOOK!  LISTEN! If you want to use the iPad as a law practice tool and you value your license, clients and firm, then some basic security precautions are mandated:

Set a strong passcode.  In my opinion, it is malpractice to not have the passcode feature activated if confidential client information is on your device.  The default 4 digit code feature is inadequate if you are going to use the iPad out of the office (which of course you are).    By default (unfortunately), the iPad comes with the Passcode off.  Here’s how to turn it on and set it:

  • Press Settings, then General. To the right, Passcode Lock should show Off, if you have not already enabled it.  Press it; if you have already created a 4-digit passcode, you’ll be asked to enter it now.
  • On the Passcode Lock page, you’ll see Turn Passcode On. Don’t touch that yet. First, go to Simple Passcode and move it to the Off position.  If it’s turned on, you can only create a simple, wholly inadequate 4-digit passcode.
  • Once Simple Passcode is turned off, press Turn Passcode On.  You’ll be presented with a dialog box to enter your Passcode.  Set a strong passcode!  You can check out the strength of your pass word at this site: How Secure is My Password? You can enter any combination of number, letters, symbols – you are not limited in the length of your passcode. You’ll be asked to enter it twice, after which your passcode will be turned on. Also, press Require Passcode, and choose the time interval after which your iPad will require a Passcode to get back in.  Choose a time period that isn’t so often that you are constantly having to enter your Passcode, but is short enough so that if you leave it alone for a short time no one can get into it.

Activate the free “Find My iPad” and “Remote Wipe” features.  Apple’s find your iPad feature through iCloud enables you to find your iPad (its location will be displayed on a map) if it is lost, send a loud location sound, post a message on the screen, and if need be the ability to remotely wipe all of the data from the device. Detailed set up instructions Link.

Set a time for your iPad to lock up if not used.   In “Settings” choose “General” and then select the “Auto-Lock” feature.  Pick a time limit.  The shorter the better.  This feature protects your client data if the iPad is not used for the specified period of time. Set Your iPad to Auto-Wipe after Ten Failed Password Attempts.  Your device can be set to Auto-Wipe all data after 10 failed password attempts.  To access this feature in settings choose “Passcode Lock” and you will be prompted for your Passcode.  After entering the Code, turn “Erase Data” on.


Individually Password  Protect Client Information If You “Must” Share Your iPad with Others.   If you are going to allow your spouse, significant other, children, friends, random strangers or others to “play” with your “work” iPad  (BAD IDEA!), then at a minimum secure confidential client information with an Application password.  Many applications have their own password feature that will protect data in that application. For example:  GoodReader, Evernote, SpiderOak.  Just keep in mind that letting someone use your iPad without protecting your confidential client information is like handing someone a brief case of client documents so that they can retrieve the magazine among the client papers. USE COMMON SENSE!   Treat your iPad like you would a paper file of highly confidential client documents.  Do not leave it unattended in unsecure areas.  Keep it locked up when not in use.

If you follow these tips, confidential information on your iPad should be “reasonably” secure.  Ignore them and your license may not be.


Part 2 of our tips and tricks series will focus on having fun with the iPad.  As always, we welcome your suggestions and comments.

Hytech Lawyer Recommended Professional Desktop Microphone for use with Dragon Naturally Speaking 12 (Video Demo)

I have used Dragon Dictation in my legal practice for over 10 years.  Dragon converts dictation to type in real time.  Year by year the program has been improved by its developer Nuance to the point that its accuracy is in the high 90% range–if used properly.  Nuance is no casual player in the voice recognition field, and its software powers many of the voice recognition applications we encounter in everyday life.

One thing that has held true over the past ten years is that the quality of the microphone used with Dragon Dictation directly correlates with the transcription accuracy of the program.  For this reason, I have tried all manner of microphones and headsets to find the perfect fit.  Now I have found that microphone – and it’s a stylish one too.



The Yeti series from Blue brand microphones is big, heavy, and beautiful.  It is styled like those microphones used by professional radio personalities and studio singers.  Not only does the whole series of microphones look really neat, the sound quality is wonderful.  I purchased the Silver Edition of the Yeti microphone which cost me $89 (on sale regularly $149) at

Seeing and hearing is believing.  So I recorded a short video demo showing the microphone, and demonstrating the sound quality and the accuracy of dictation using it with Dragon Naturally Speaking 12.  Features of the Yeti include:

*     Tri-capsule array – 3 condenser capsules can record almost any situation

*     Multiple sound pattern selection – cardioid, bidirectional, omnidirectional and stereo

*     Gain control, mute button, zero-latency headphone output

*     Perfect for vocals, musical instruments, podcasting, voiceovers, interviews, field recordings, conference calls and Dragon Dictation

*     USB Plug ‘n play – Mac and PC compatible

This is one of my favorite tech toys of the past year—and that is saying something.  Highly Recommended!

Some of the Best of Hytech Lawyer- Readers’ Choice

Boat-sun.jpgAs Summer winds down we present ten (in no particular order) of the most viewed posts from the last three years of hytech lawyer:

1.     The Lawyer’s Toolbox: How to Make a Wireless Presentation with an iPad using Apple TV (HDMI) with a VGA Projector, Monitor, or Smartboard


2.   The Lawyer’s Toolbox:  How to Convert PowerPoint Presentations to Keynote and Transfer to the iPad (Video)

3.   The Hytech Lawyer Recommends Thirty-One Great Apps for Lawyers – SUMMER 2013

4.   The Lawyer’s Tool Box: Video Demo of Dragon Naturally Speaking 12 (with Service Pack 12.5) made with Camtasia Studio 8

5.   Avoid Legal Malpractice— How to Select a Reasonably Secure Password

6.   Lawyer Ethics- Is Your Head in the Cloud?– The Ethical Implications of Using Dropbox and Other Cloud Services

7.   Litigation War Stories– Using the iPad and TrialPad in a High Stakes Class Certification Hearing

8.   Presenting Witnesses via iPad, Skype and Facetime—Video

9.  How to create Your Own Law Blog (Blawg) in an Hour or Less

10. iPad Tips and Tricks Useful to Lawyers



Is there a topic you would like to see us cover?– send your ideas to