article thumbnail

Dealing with Data in Dispute Resolutions

LawTechnologyToday

Traditionally ephemeral communication such as telephone calls and in-person meetings can now be recorded and preserved in short message formats like text messages, chats, and video conferencing tools. Communication is moving from an ephemeral format to a tangible format. Clients are creating more discoverable content than ever before.

article thumbnail

How to Successfully Run A Virtual Law Firm

MyCase

What is a Virtual Lawyer or Virtual Law Firm? A virtual lawyer is an attorney who provides services without a brick-and-mortar office. We aren’t fake lawyers; we are just lawyers who deliver services via the phone and the internet. Benefits of a Virtual Law Practice. Greater Work Flexibility .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Clean Up Your Docs with Microsoft’s Document Inspector

LawTechnologyToday

Other types of information that you can miss out on are headers and footers in Word documents and watermarks that you might have added. Document server properties. Custom XML data that is not accessible in the document itself can be found in documents. What Information Does Document Inspector Remove?

Metadata 140
article thumbnail

Secure Remote Work and the Legal Field

LawTechnologyToday

Over the last year, meetings that were once exclusively held in courtrooms or law firms were suddenly happening in kitchens and home offices. Hard-wired desk phones were replaced with cloud telephony, and in-office firewalls and security protocols needed to be transformed for home WiFi. So where do we go from here?

article thumbnail

Secure Remote Work and the Legal Field

LawTechnologyToday

Over the last year, meetings that were once exclusively held in courtrooms or law firms were suddenly happening in kitchens and home offices. Hard-wired desk phones were replaced with cloud telephony, and in-office firewalls and security protocols needed to be transformed for home WiFi. So where do we go from here?