I’ve written about VPNs before on this site and how they can provide a layer of security for mobile attorneys. A few weeks ago, Ars Technica published an article entitled Die, VPN! We’re all “telecommuters” now—and IT must adjust. The thrust of the article is that, with the rise of mobile devices and other technologies (like cloud storage), the VPN is obsolete. It doesn’t suit the way we work.
Today, Ars published an op-ed piece disagreeing with that article. It’s worth the read for anyone who does make or may make future security and IT infrastructure decisions.
The author points out the ever-increasing number of corporate data breaches and suggests that VPNs can alleviate a lot of the problems. After walking through a real-life corporate breach and how it might have been prevented, the author warns, “while VPNs might not be a perfect solution to every problem, they serve a critical purpose in today’s world where, indeed, we’re all telecommuters. Abandoning VPNs because you heard they are inconvenient is, frankly, a reckless and potentially devastating mistake.”
This post is not legal advice; it’s only my opinion. And unless you’ve retained me by a signed contract after an in-person consultation, I’m not your lawyer. If you’re considering printing this project, hire a lawyer who knows the area of law — both federal law and your particular state/county/city/whatever’s law) and consult him. Or better yet: buy a lower. It’s cheaper than hiring a lawyer and probably more fun!
Now onto the interesting stuff.
Recently, a Thingiverse user posted a file that can be printed on a 3d printer to create a (theoretically) functional AR-15 lower receiver. This upset some members of the Thingiverse community, as you can see from the lively discussion on the project page. Tech Crunch covered the controversy and asked a few important questions. Is printing a gun the same as buying a gun? Is the printed lower receiver a weapon? Is it a part? Is it Illegal?
In short, no, printing a gun isn’t the same as buying one because the user is a manufacturer instead of a consumer. The lower receiver is still a firearm under federal law (and probably state law) as opposed to being just a part. And, finally, printing a lower is not prohibited under federal law for those allowed to own firearms, but your state’s law may vary. Continue reading
Recently, the Electronic Frontier Foundation released the 1.0 version of its Firefox extension, HTTPS Everywhere.
HTTPS Everywhere makes Firefox use the SSL-encrypted version of certain websites automatically. It works in the background to redirect your regular HTTP traffic to HTTPS if it’s available. So, for example, when you click a link on http://facebook.com that someone sent you, the extension automatically rewrites your request to connect to the encrypted version of the site instead.
Sadly, the extension only protects you when the websites you access support HTTPS. But it’s a great start for secure web browsing.
I ran across Ernie the Attorney’s post about mobility and security a while back, and some of the comments talked about using a VPN for network security outside the office. But they assumed you know what a VPN is and what it’s for.
VPN stands for Virtual Private Network and refers to a family of technologies that work together to connect two or more remote computers to one another as if they were attached to the same physical network. Usually the connection is encrypted and provides other security features to verify the identities of the computers involved.
But what’s that mean for you? As used by most mobile attorneys, a VPN will let an internet-connected mobile user connect to his office network and use its resources as if here were physically connected to it. For example, if you set up a VPN connection to your office network from a public airport wifi network, you can use the networked printer in your office or connect to the fileserver stashed in your wiring closet as if you were there.
Properly set up, a VPN can also help you protect sensitive data and conceal your online activity when you use unencrypted public wireless networks. In addition to using network resources like your office printer, you can also use your office’s internet connection, making it appear to the outside world that all the surfing and emailing you do outside the office originates from the office. Continue reading
When we opened our firm, I had no idea how to run a law office; they don’t teach that in law school. Early on, my girlfriend gave me Jay Foonberg’s How to Start & Build a Law Practice. And while some of the information in it is painfully outdated (first edition © 1976), it was a good starting point.
But I put off setting up a formal file management system. Why bother? It was easy to keep track of three files with nothing in them. After a while, it got harder. Did I send a disengagement letter for that case? When you asked for the Smith file, did you mean his divorce file or his estate plan? Is that case open or closed? What’s the next step in that case over there?
So I broke out the Foon’s book and turned to the chapter entitled “Simple Hard-Copy Filing Systems for the New Lawyer.” I like simple, and the Foon was serious about the simple part. Continue reading