On a recent trip to South Africa, where Symantec sponsored an event with PricewaterhouseCoopers (PwC) entitled The Protection of Personal Information (POPI) Drives Information Governance, customers and partners shared important insights. One major concern the attendees had was how they will comply with the newly proposed privacy legislation set to pass any day now.
Read the full article at Clearwell Systems...
Windows takes some 40 to 60 seconds to boot from when it starts displaying the “starting windows” logo. A computer fitted with an SSD? From 6 to 20 seconds depending on the drive you buy, your computer speed, age of technology and on what operating system you are running.
Read more at Kondura Technologies' Blog...
Cloud computing is a hot topic in every boardroom and technology conference (like ABA TECHSHOW) right now. Firms are asking how they can (and if they should) take advantage of this wave of new old technologies to drive efficiencies and cut costs.
In South Africa it is not possible to get uncapped ADSL Internet without installing and renting a normal telephone line, which is only available through Telkom. You also need to rent an ADSL line, which comes at an additional charge. Luckily, most ISP’s (Internet Service Providers) allow you to rent an ADSL line directly through them. So if you are planning to get uncapped ADSL, it’s a good idea to know the total costs associated with it.
Read more at Money Smart...
The advent of the Protection of Personal Information (POPI) Bill, which is set to be enacted this year, will change the way companies have to approach data handling strategies, processes and procedures.
Well, the Samsung Note II _is_ big (it reminds me of the Big Korn Bites ad) – some people say "too big", I say that I can read what is on the screen and use it practically without me having to grab my glasses every time I need to use the phone!
An examination of the current state of legal agreement drafting and review and recommendations for improving the process. Additionally, new technology designed for lawyers to improve the agreement drafting and review process is presented. By Robert Blacksberg.
You might have noticed that whenever you open any document in Word 2010 and try to edit it, you just can't. To edit or save a document you have to click on the yellow bar that contains Enable Editing button. Here are the instructions to disable the irritating feature.
Read more at Repair Corrupt Files Blogspot...
Every time I do a smartphone review, I try to imagine what features would be important to lawyers in the field. So I decided that the best way to find out would be to ask lawyers what they think important in a simple poll.
Among other things, IT Leaders in law firms are tasked with keeping the lights on and driving innovation in the name of making our attorneys and users more efficient. So, the question needs to be asked: Why are firms continuing to install and advance SharePoint when in reality it has never really lived up to all the hype?
Read more at LTN...
In this article I will attempt to compare the three most exciting new smart phones which are currently available on the South African market for consumers. The phones which I will be comparing are the Apple iPhone 5, RIM Blackberry Bold 9930 and the Samsung Galaxy S3.
Read the full article at Cell Phone Deals...
If there’s one word that will be the key for the year in marketing, it is “data”. The reason for this is simple: budgets are tight, competition is fierce, and companies will want to use accurate information to benchmark return on investment (ROI) and value for money in their marketing spend. Here are five trends I expect to shape the market in 2013.
Microsoft has committed a very large chunk of its development budget to make Windows 8 the product which will firmly establish Microsoft as a dominant player in the computer and mobile market.
During the past few weeks we discussed each of the 8 principles, and we investigated what they mean to your firm.
SQL or Structure Query Language is a programming tool which is used for database programming and backend to a number of software systems.
If you read none of the others, read this. The Protection of Personal Information bill, soon to be enacted, will define the conditions under which personal information is lawfully processed. As the business of lawyers involves working with personal information on a daily basis the impact is obvious.
This week’s article on the Protection of Personal Information bill addresses the sixth condition which is Openness. There are two elements to this condition: 1 – Notification to the Regulator and 2 – Notification to the Data Subject.
The Protection of Personal Information bill, soon to be enacted, will define the conditions under which personal information is lawfully processed. As the business of lawyers involves working with personal information, sometimes on a daily basis, it is obvious that PoPI will have a definite impact on how law firms operate.
The Internet is amazing. It allows us to communicate instantly, search for and find information on nearly anything, stay abreast of current events and, of course, watch the latest cute animal video. But how does it actually work? The infographic illustrates just how the Internet sends these packets from one place to another.
This week’s article addresses Condition 4 of the 8 listed in Chapter 3 of the Protection of Personal Information Bill , titled Further Processing limitation. The fundamental principle underlying this condition is that the purpose for the further processing must be compatible with the original specified purpose.
In the past, where the law required a signature, statement or document to be notarised, acknowledged, verified or made under oath, that requirement was, until recently, typically only met if the handwritten signature of the person authorised to perform those acts was used.
In this week’s article we continue to look at the conditions governing the lawful processing of personal information, as stated in Chapter 3 of the Protection of Personal Information Bill, and how this will practically affect your organization.
This week’s article continues to look at the conditions governing the lawful processing of personal information as stated in Chapter 3 of the Protection of Personal Information Bill and how this will practically affect your organisation.
The ‘bring your own device’ (BYOD) trend has taken root in South Africa, with workers increasingly relying on their personally-owned smartphones, tablets and computers in their day to day work rather than on devices issued to them by their companies.
Gojee makes a lot of sense to me, normally I start rummaging through my kitchen cupboards to find what I have, before I decide what to cook. Gojee seems to think just like me…
In a world of constant technological growth, attorneys need to be aware of all the possible solutions that the tech-world can offer their offices and work production. Let’s just think back for a moment about how a simple technological development like Internet Banking has streamlined our lives.
Over the next 8 weeks this article series will provide a practical overview of each of the conditions for lawful processing of personal information as stated in Chapter 3 of the Protection of Personal Information Bill.
The long anticipated Protection of Personal Information act, commonly known as PoPI, seems to finally be in the home stretch. Initiated in 2009, the bill was approved by all parties during its second reading at the National Assembly on 11 September 2012.
I just took a random sampling of 82 lawyers, of whom 54 reported that they have a LinkedIn account. However, most of them admitted that their use is ineffective. Respondents wrote: "I am a member of LinkedIn, but don't really see the benefit of that site;" "I do have a LinkedIn account but have done nothing with it;" or "I still have not figured out how to effectively use LinkedIn."
A great deal has been said about cloud computing – although companies still have a limited understanding of what it is and how it impacts their business. Simply put, the cloud is a set of services and technologies that enable the delivery of computing services over the Internet in real-time, allowing end-users instant access to data and applications from any device with Internet access.
Apple says that this new version for your Apple devices will make your day to day tasks even easier. We have summarised what the new features are but have not done extensive tests on these features. The idea is to allow you to make a better informed decision whether to upgrade or not.
It's easy to forget about computer security. Unfortunately, by the time you realize there's a problem with your computer, you could be in deep trouble. Most users recycle the same passwords, never update their computer's software, and, worst of all, don't back up. Take a few minutes out of your day and educate yourself on how a firewall works, what Java is and how to disable it, and a few other measures you can take to increase your computer's security.