Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

How to Add Extra Security Layers to Your Phone or Tablet

The New York Times [no paywall]: “Losing a smartphone or tablet stuffed with your life’s details can be a nightmare, but your privacy may also be at risk in less obvious situations — like if you leave your unlocked phone unattended or if the children know your tablet’s passcode. While apps for financial or medical… Continue Reading

How Google Spent 15 Years Creating a Culture of Concealment

The New York Times [free article] – “Trying to avoid antitrust suits, Google systematically told employees to destroy messages, avoid certain words and copy the lawyers as often as possible…How Google developed this distrustful culture was pieced together from hundreds of documents and exhibits, as well as witness testimony, in three antitrust trials against the… Continue Reading

Use These 4 Apps and Tools to Detect Phishing Emails

MakeUseOf: “Phishing emails are no longer exclusively sent by Nigerian princes needing financial assistance. Scammers are now tech-savvy criminals who leverage state-of-the-art tools to con their victims. But it’s not like they’re the only ones with an arsenal of tools to pull from. Most phishing emails will send you attached files and links or try… Continue Reading

If You Fall for a Phishing Email, Here’s What Happens Next

MakeUseOf: “Most people receive a lot of spam emails, calls, and other messages daily. These usually represent some phishing attempt and try as you might, you’ll likely accidentally put yourself in a sketchy position eventually—it’s not your fault; it happens to everyone. If you get phished, it’s important not to worry too much. While it’s… Continue Reading

Gun Companies Gave Customers’ Sensitive Personal Information to Political Operatives

ProPublica: “For years, America’s most iconic gun-makers turned over sensitive personal information on hundreds of thousands of customers to political operatives. Those operatives, in turn, secretly employed the details to rally firearm owners to elect pro-gun politicians running for Congress and the White House, a ProPublica investigation has found. The clandestine sharing of gun buyers’… Continue Reading

The 37signals Guide to Internal Communication

The how, where, why, and when we communicate. Long form asynchronous? Real-time chat? In-person? Video? Verbal? Written? Via email? In Basecamp? How do we keep everyone in the loop without everyone getting tangled in everyone else’s business? It’s all in here. Rules of thumb, and general philosophy – Below you’ll find a collection of general… Continue Reading

Heritage Foundation Staffers Flood Federal Agencies With Thousands of Information Requests

ProPublica: “Three investigators for the Heritage Foundation have deluged federal agencies with thousands of Freedom of Information Act requests over the past year, requesting a wide range of information on government employees, including communications that could be seen as a political liability by conservatives. Among the documents they’ve sought are lists of agency personnel and… Continue Reading