The Internet and Electronic Mail - Pearson...

24
—Jack Welch, Chairman and CEO, General Electric LEARNING OBJECTIVES After studying this chapter you should be able to: 1. Understand conceptually how the Internet works. 2. Describe the use of Internet browsers for finding information on the World Wide Web. 3. Discuss issues in the use of the Internet for sending and receiving electronic communications and documents. 4. Understand issues in downloading and installing software from the Internet. 5. Define metadata. 6. Understand the role of list serves and the etiquette in using them. 7. Describe the use and need for encryption technology. The Internet and Electronic Mail The Internet is the Viagra of big business. 47 3

Transcript of The Internet and Electronic Mail - Pearson...

Page 1: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

—Jack Welch, Chairman and CEO, General Electric

L E A R N I N G O B J E C T I V E SAfter studying this chapter you should be able to:

1. Understand conceptually how the Internet works.2. Describe the use of Internet browsers for finding information on the

World Wide Web.3. Discuss issues in the use of the Internet for sending and receiving

electronic communications and documents.4. Understand issues in downloading and installing software from the

Internet.5. Define metadata.6. Understand the role of list serves and the etiquette in using them.7. Describe the use and need for encryption technology.

The Internet andElectronic MailThe Internet is the Viagra of big business.

47

3

Page 2: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

48 Chapter 3

Specialized SearchEnginesSearch engines that usehighly developed algorithmsto search for relevantinformation and return alisting in order of relevancywith amazing accuracy.

InternetThe interconnecting globalpublic network made byconnecting smaller sharedpublic networks. The mostwell-known is the Internet, theworldwide network ofnetworks, which uses theTCP/IP protocol to facilitateinformation exchange.

O P E N I N G S C E N A R I OOwen Mason felt really fortunate in many ways. He had landed a federalclerkship after law school and was trained in the use of the Internet for legaland factual research to the point of spending hours on the Internet daily. Hehad hired the best paralegal manager,Mrs.Hannah, from downtown to helphim set up his own practice.He was getting appointed counsel by the judgeshe had met as a clerk and was keeping busy, if at a significantly reduced fee.The realities of managing a practice soon became evident. First there wasthe cost of buying the basic computers needed, and then the reality ofrent and the Internet costs he had never had to think about before startedto hit home.

Mrs. Hannah reminded him that there were alternatives in using theInternet that might save costs.They were sharing the Internet connection withanother lawyer,Ariel Marshall,who was subletting space in the office,and herparalegal, Emily.

She expressed a potential ethical concern to both attorneys after seeingon Emily’s computer screen a trial attorney list server posting a similar factpattern to a case on which both attorneys appeared to be working.

Mrs. Hannah also expressed concern that Ms. Marshall and Emily wereboth addicted to the Internet for legal and factual research as well as forpersonal activities like playing fantasy sports and constantly checking thestock market to the point the whole system slowed down using the dial-upconnection that they shared. And, if they did not stop downloading informa-tion and freeware and saving everything on the file server, they would be outof computer storage space very soon.

INTRODUCTION TO THE INTERNETAND ELECTRONIC MAILThe number of online, or Internet, resources available increases daily. Finding thedesired information is easy when you know the specific source and particular piece ofinformation. In these cases you can enter the computer address of the specific page ordocument, and have your results almost instantly. More frequently, the need is to locateinformation about a specific item without knowing where to find it. The solution is theuse of Internet browsers such as Netscape, Firefox, or Internet Explorer. The MicrosoftInternet Explorer is shown in Exhibit 3.1.

These browsers provide a search feature, usually referred to as a search engine, thatallows a search of available Web resources. These searches require only the input of aword or phrase into the search engine to obtain a listing of potential relevant informa-tion. Also useful are specialized search engines, accessible through the Internetbrowsers such as Google and Yahoo! that use highly developed algorithms to search forrelevant information and return a listing in order of relevancy with amazing accuracy.

THE INTERNETIn its most basic form, the Internet or the World Wide Web may be thought of as noth-ing more than a group of computers linked together with the added ability to search allthe connections for information. It has been described as a network of networks. If youwork in an office in which all of the computers are networked, you have a small versionof the Internet. Each person’s computer is connected to other people’s computers,

Page 3: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

The Internet and Electronic Mail 49

World Wide WebThe WWW is made up of all ofthe computers on the Internetthat use HTML-capablesoftware (Netscape, Explorer,etc.) to exchange data. Dataexchange on the WWW ischaracterized by easy-to-usegraphical interfaces, hypertextlinks, images, and sound.Today the WWW has becomesynonymous with the Internet,although technically it is reallyjust one component.

NetworkedA group of computers ordevices that is connectedtogether for the exchange ofdata and sharing of resources.

Exhibit 3.1 Microsoft Internet Explorer.

usually with a central or main computer on which reside the frequently shared datafiles, and the network operating system software that controls the connections andhow the requests from each computer are handled and directed. In the local areanetwork (LAN) this main control computer is usually referred to as the file server.

The office or LAN search tool is usually a program such as Microsoft WindowsExplorer—not to be confused with the Internet browser Internet Explorer—whichpermits files to be found on the local computer or the other computers with sharedaccess, by location or other characteristics. Exhibit 3.2 shows the Explorer screen, andExhibit 3.3 shows the Windows search companion.

INTERNET FUNDAMENTALSHow the Internet works is a mystery to many who use the World Wide Web. It may bethought of as a network of networks, a huge collection of networks all linked togetherand sharing information.

At the highest level is a large collection of high capacity, interconnected, academic,commercial, and government routes and routers that carry information around theworld. This high level connection is called the Internet backbone. The term is also usedto refer to the highest level individual countries’ Internet connections. For the averageuser, this is many layers above their connection. User connections are made throughlocal or national Internet service providers (ISPs) who themselves connect to a higherlevel national service, as shown in Exhibit 3.4.

Page 4: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

50 Chapter 3

Exhibit 3.2 The Windows Explorer screen of a workstation.

Digital Subscriber Line(DSL)Digital subscriber line that isalways connected usingexisting telephone lines.

Internet service providers (ISPs) are companies that provide users access to theWorld Wide Web. ISPs provide local or toll-free access numbers that many people useto connect to their service. In many communities this is a service provided by the localcable company or telephone service provider. In the past only larger offices, schools,and companies had a direct connection (hardwired, cable, fiber optic line or dedicatedtelephone line, such as a digital subscriber line [DSL]) that eliminated the need todial up the ISP. Increasingly, small offices and homes are able to obtain the same dedi-cated service from their cable or telephone company, eliminating the need to dial up aconnection.

There are special computerized devices, such as modems and routers, and soft-ware that enable computers to “talk” with each other and send and receive messagesover networks and the Internet. Exhibit 3.5 shows a modem in a network connectionto the Internet, of the devices.

MODEM

A modem is a device used to translate the electrical signals for transmission over theseconnections so the computers can “talk” to each other. The modem converts (modu-lates) the information from the keyboard and computer into a form that can be trans-ferred electronically over telephone lines, cable connections, fiber optic cable, and radiowaves.

MO DEM

Modulate Demodulate

Network Operating SystemComputer software that con-trols the functions and flow ofinformation over the network.

Internet BrowserA program that allows theuser to access the Internet.

Internet Service Provider(ISP)Internet service provider, acompany that provides userswith local access to theInternet.

Page 5: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

The Internet and Electronic Mail 51

Exhibit 3.3 The Windows Search Companion on a workstation.

Internet Backbone

NationalInternet Service

Company

NationalInternet Service

Company

LocalInternet Service

Provider

LocalInternet Service

Provider

ResidentialArea Clients

BusinessClients

GovernmentClients

SchoolClients

Exhibit 3.4 Typical network connected to the Internet.

Dial-up AccessUses a modem connected to aPC to connect to the Internetby dialing a phone number.

Page 6: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

52 Chapter 3

Telephone Lines

Modem Modem

Computer Computer

Exhibit 3.5 Modem Connection.

ModemA piece of hardware that lets acomputer talk to anothercomputer over a phone line.

WWW MINI EXERCISEUse the Internet to find yourlocal cable company andtelephone company websiteand compare the levels ofservice and the prices for theInternet connection theyprovide.

HubA device used for sharing asignal among multiplecomputer devices.

At the receiving end of the signal is another modem that reconverts (demodulates)the signal into a form usable by the computer. Depending on the modem and the ISPservice, speeds of transmission vary widely. The slower the connection provided by themodems and the service, the longer it takes to transmit and receive information. Aswith most services, the higher the speed, the higher the cost. It is easy to see that amultipage document will take longer to transmit or receive than a single-pagedocument. The reasonableness of the cost of a high-speed connection depends uponthe volume of pages regularly sent or received.

Perhaps less obvious is the size of the files and the number of files that are in graphicformat. Most government forms are available in a graphic form rather than a text form.A single one-page form in graphic format may be the equivalent of a ten-page textdocument. Depending upon the frequency of downloads of forms, it might be advisableto upgrade to a high-speed line or higher speed service level.

Higher speed access is rapidly becoming available in most parts of the country andin many parts of the world at relatively affordable prices. In the past most connectionsdepended on the limited capacity copper wires of the telephone company. Cable andtelephone companies are installing higher speed infrastructures using fiber optics andsatellite technologies to deliver higher speeds and capacity.

HUBS

A hub is a device for connecting multiple computer devices. If you have a singlecomputer, you plug your Internet connection directly into the computer. With twocomputers in a small office or home network, the computers can be connected directlywith one wire and they can send information back and forth. When there are more thantwo computers or computerized devices, like printers or fax machines on a network, ahub is used as a central connection so all the devices that are plugged into the hub cancommunicate with each other. One of the connections can be an Internet connectionthat all the devices share. The Internet connection is connected to the hub and thenseparate wires or connections are made to the other computers or devices. Whatevercomes in one of the connections is sent to all the other connections. The hub broad-casts what comes in to all the other connections. Exhibit 3.6 shows a hub broadcast-ing to and from each connection.

Page 7: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

The Internet and Electronic Mail 53

Hub

Exhibit 3.6 A hub in a small office network.

SwitchA high-performancealternative to a hub.

RouterA piece of hardware that routesdata from a local area network(LAN) to a phone line.

SWITCHES

A switch is a high-performance alternative to a hub. Where a hub broadcasts everysignal to every other connection, a switch determines the destination of each messageand selectively forwards it to the computer or device for which it is intended. Insmaller systems like a home network with less than four connections, a hub may bejust as efficient as and less costly than a switch. In a network of more than fourconnections, the switch is more efficient. By directing the message to the intendedrecipient and not the entire network there is less total traffic, resulting in higherspeed connections.

ROUTERS

In its most basic function a router is a specialized computing device that routesmessages, like a coin sorter sorts and sends coins to the proper slot or bin. Eachmessage sent over a network has an address where it is to be delivered. Some messagesare directed to other computerized devices in the local office network. Others aredestined for some computerized device located out of the local network somewhere onthe Internet. Routers use software to make the decision where to send the message byinterpreting the address and “looking” at the devices attached to the hardwarecontaining the routing software to see if the message is to be sent to a device in the localnetwork or sent to a higher level router outside the local network somewhere on theInternet. The routing software may be on a computer or in a separate stand-alonedevice called a router. When you send a message, the routing software in your com-puter looks at the address to see if the address of the device to which it is to be sent isof one of the devices attached to your computer or if it should be sent to another devicefor additional routing, like forks in a road with directions to another fork in the roadwith more directions, and so forth.

The first decision the router makes is whether the message stays inside the localnetwork or goes outside the network. If the decision is that it does stay inside the localnetwork, the router sends it to the intended device. If it is not intended for a local device,the message is then sent or passed to a router further along the Internet, where the decision

Page 8: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

IPInternet protocol address.A string of four numbersseparated by periods used torepresent a computer on theInternet.

BrowserA software program thatallows a person to use acomputer to access theInternet.

is made again whether to send the message to another router or to a device that is attachedto the current router’s network. The process is repeated until the message gets to a networkwith a router that has the intended recipient device attached to it.

You are probably thinking that a router sounds much like a switch. The reality isthat a switch does perform some routing functions, sending traffic from one device to theintended device connected to the switch. Modern switches may contain the necessarysoftware to act as modem, router, and high-performance hub all in one device.

ADDRESSES

Routing software found on computers, routers, and switches uses addresses for deliveringmessages the same way as the post office or parcel delivery service uses the state, city, andstreet name and number to locate and deliver the mail or parcel. This is a logical address;it gives information on how to find the place. This is different than the physical address.

Every computerized device has a unique physical address that is stored in a specialmemory location in the device. This physical address is called the media accesscontrol (MAC) address. Since each device has a different MAC or physical address,the router can direct the incoming message to the particular device intended.

INTERNET ADDRESSES

The Internet uses an address to deliver data to a specific computer or computerizeddevice like a printer, just as a mail carrier uses an address to deliver a letter to a specificpost office box. Each computerized device that connects to the Internet or is part of anetwork is assigned a numeric address; this is called the IP address. The IP addresscontains a set of numbers separated by periods. For example, the numeric address forthe website for Technology in the Law Office is 192.111.222.2.2.

Most people do not remember or use the numeric IP address. Each location on theWorld Wide Web also has a text version of the address to access the website; this is calledthe domain name. An interpretation service on the Internet called a domain name service(DNS) converts the text name to the numeric IP address. For example, the domain namefor the Technology in the Law Office website is www.technologyinthelawoffice.com.

The domain is the entryway to the computers and devices in that particular website.In addition to the Internet service provider that maintains and provides access to

the Internet, in the local office of the author, there is a server, a router, three worksta-tions and several computerized devices. Each of these computerized devices is assignedan IP address when it connects to the Internet.

Each computerized device also has a physical address, the MAC address. Therouting software in the router, switch, or computer takes the IP address and translatesit into the MAC address of the devices connected to that routing device. In short, everydevice, whether connected or not to the Internet, has a MAC address. When it isconnected to the Internet it is assigned an IP address. The router stores this informationin a look-up table and translates the IP address of the Internet to the physical MACaddress of the particular device. Each address assigned is as unique as the post officebox in the local post office. Exhibit 3.7 shows a network with IP address and MACaddress that is connected to the Internet through an Internet service provider.

INTERNET BROWSERS

An Internet or Web browser is a software program that allows a person to use a com-puter to access the Internet. The two most popular Web browsers are Microsoft InternetExplorer and Netscape, both of which provide content as well as tools for searching theInternet.

54 Chapter 3

Logical AddressAddresses for deliveringmessages.

Physical AddressThe physical address is themedia access control, orMAC, address.

Media Access Control(MAC) AddressA physical address that isunique that is stored in aspecial memory location in acomputerized device.

WWW MINI EXERCISEFind the MAC address of aWindows PC using WindowsXP:

Go to the Start menuClick on RunType cmdWhen the window opens, type IPCONFIG/all

Page 9: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

Internet

Internet Service Provider

Domain Name Textwww.technologyinthelawoffice.com

Router/SwitchIP Address 192.11.11.11

MAC Address 00095ba75d92

Workstation 3IP Address 192.11.11.22

MAC Address 000856341100

Workstation 2IP Address 192.11.11.23

MAC Address 002924840fWorkstation 1

IP Address 192.11.11.21MAC Address 0011D81B18DC

File ServerIP Address 192.11.11.2

MAC Address 0022D62B18DC

Peripheral Ink Jet Color PrinterMAC Address 0014625567g5

Peripheral Laser PrinterMAC Address 0013212339f3

Numeric Address192.168.242.234

Exhibit 3.7 Network with IP and MAC addresses.

WWW MINI EXERCISEReview the information aboutFirefox and its features atwww.firefoxuserguide.comand download a copy ifdesired. Or, visit the websiteof the Mozilla Foundation, anonprofit corporationestablished to promoteinnovation on the Internet thatalso provides a version ofFirefox at www.mozilla.org.

The Internet and Electronic Mail 55

These browsers are typically used with Internet service providers that do notthemselves provide any content but, rather, act as an intermediary, or connection,between the user and the World Wide Web. Some services, such as America Online(AOL), Netscape, and MSN, in addition to providing the traditional Internet connec-tions and e-mail, provide content, such as news and weather and specialty sections forsharing information.

Firefox is another Internet browser that is gaining rapid acceptance. The prin-cipal advantage claimed is that it is more secure than the Internet Explorer browser.The developers claim the additional security comes from the fact that it is, unlikeInternet Explorer, not attached to the operating system and therefore maliciouscode in the form of viruses and similar computer code cannot enter the operatingsystem from the browser and cause problems with the operating system on thecomputer.

All browsers basically provide two main screens—one to display e-mail (seeExhibit 3.8) and one to display content and Internet search results (see Exhibit 3.9).

Page 10: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

56

Exhibit 3.8 Example of e-mail display.

Exhibit 3.9 Example of Internet search results screen.

Page 11: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

The Internet and Electronic Mail 57

.org organizations

.edu educational institutions

.com commercial operations

.gov government agencies

.bus business

.mil military

.jp Japan

.fr France

.uk United Kingdom

LOCAT ING INFORMAT ION

Obviously, finding something requires knowing where it is located. We find people bylooking for their home or business address or by their telephone number. The modernequivalent of a telephone number is the e-mail address. A Web page also has anaddress, known as a URL (uniform resource locator).

The URL is made up of three parts, separated by the symbols shown:

Protocol://Computer/Path

The protocol is usually http (hypertext transfer protocol). The computer is the In-ternet computer name, such as www.bucks.edu. And the path is the directory or sub-directory on the computer where the information can be found.

The URL may be thought of as a file cabinet, in which the protocol is the name ofthe file cabinet, the computer is the drawer in the file cabinet, and the path is the filefolder in the drawer. Not all URLs have a path as part of the address.

Part of the naming protocol is the domain nomenclature, with extensions suchas the “edu” in www.TESC.edu. Common domain extensions are:

In addition, there are extensions such as

URL (Uniform ResourceLocator)The Internet address for awebsite.

Domain NomenclaturePart of the URL namingprotocol.

These designations refer to the country where the computer is located.In determining the authenticity of information found on the Internet, knowing if

the computer is a commercial site (.com or .bus) or a government site (.gov) is some-times useful. Some websites may appear to be official government websites or mayappear to contain official information but actually are private sites.

For example, the official URL for the Internal Revenue Service is www.irs.gov. Thisis not to be confused with the unofficial private website, www.irs.com. To obtain theofficial Internal Revenue Service forms and information, you must use the official site,www.irs.gov.

Potentially, one of the biggest time-savers for the legal team is the ready availabil-ity of information, forms, and files on the Internet or World Wide Web. Public infor-mation that would have required a trip to the courthouse or other government office isinstantly available, 24 hours a day, 7 days a week, without leaving the office. Thisinformation may come from public or private sources. Government informationtypically is available without cost or at minimum cost. Private information may be freeto all, or at a cost per use, per page, or per time period (such as a minute, hour, day, ormonth). These charges are like the cost of cell phone usage, by the minute, month, orother prepaid plan.

Page 12: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

58 Chapter 3

MailboxAn electronic storage locationfor e-mail messages.

AttachmentAn attachment is a record orfile associated with anotherrecord for the purpose ofstorage or transfer.

E-MAILE-mail has become a standard method of communication across the globe and not justfor the legal team. Legal teams face issues that other businesses do not face. Mostobvious are the issues of confidentiality and privilege. Who will see it and who willread it? Will it be sent only to the correct person or will it be accidentally sent to a largelist of recipients, or to a single recipient that should never get it?

According to a survey by the International Legal Technology Association (ILTA),91 percent of firms have not disabled the automatic type-ahead feature in their e-mailprogram. This feature completes the address after a few letters of the address are typed.For example, you type Jones, and the program finishes it by adding the @ sign and anye-mail address in your address book with Jones as part of the address. If you have morethan one Jones in your e-mail address book, accidentally hitting the Enter or the Sendkey could send the message to the wrong Jones, like attorney Jones, the opposingattorney, instead of client Jones. And according to the survey, 92 percent do not give theuser a prompt to warn users about “Reply to All” being selected for sending an e-mail(i.e., “Are you sure you want to Reply to All?”).

E-mail documents are a large part of the discoverable documentation in cases.How long they should be retained becomes an important question for the firm and forthe client, particularly when attachments are part of the e-mail. As e-mail becomeseasier to use on all types of devices, more files are sent with attachments of larger andlarger files. The issue of size limitations becomes an issue depending on the devicesused. With the exploding use of e-mails is the tendency to save everything.

E-mail is saved on a computer or a file server in a file or folder called a mailbox.Mailbox size limits may restrict how much may be saved. This is a double-edgedsword. With e-mail as the standard for correspondence, larger mailboxes are needed tostore the e-mails unless some other offline storage is provided, together with the train-ing to perform the task.

One of the issues for the legal team is the question of making the e-mails part ofthe file. In the days of paper letters, copies routinely were printed and filed with thefile. With an e-mail management program they may also be made a part of theelectronic file and potentially part of the discoverable record in case of trial.

FILE ATTACHMENTS

A popular method for transmitting text files and graphic images is by including the file aspart of an e-mail. An attachment is a file that is sent with an e-mail. This is much easierthan it sounds. Today, almost everyone has an e-mail address, whether at home or at work,or both. To send or receive e-mails requires the use of an Internet service provider and abrowser such as Internet Explorer, Netscape, or one of the other specialty e-mail programs.In traditional e-mail, text is entered on the keyboard and transmitted to the e-mail accountof a recipient, who reads it online. Virtually any file can be attached (linked) and sent withan e-mail. The receiver needs only to double-click the mouse on the attachment, whichmay appear as an icon. In most cases, the file will open using the same program from whichit was created, such as Microsoft Word, Corel WordPerfect, or Adobe Acrobat. Occasionallya file may be transmitted in a format that the receiver does not have the software to open.This is particularly true with regard to graphic images, pictures, and drawings.

RECE IV ING AND DOWNLOADING FILES AND ATTACHMENTS

The method for downloading files and attachments is the same. Users must first deter-mine the directory (folder) into which they will be downloading these files. In Windowsthis usually is a folder called My Download Files or My Files. If there is no existing folder,

Type-ahead FeatureThis feature completes theaddress after a few letters ofthe address are typed.

WWW MINI EXERCISEILTA is a peer networkingorganization providinginformation resources tomembers in order to maketechnology work for the legalprofession. The full ILTA’s2006 E-Mail Survey isavailable at www.ILTAnet.org,or check for the latest e-mailwhite paper at www.iltanet.org.

Page 13: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

The Internet and Electronic Mail 59

Static FilesA file that contains only data.

MacrosSmall programs that executesoftware functions whenactivated.

Antivirus ProgramsPrograms for finding,removing, or isolating filesthat contain computer viruses.

ISDNIntegrated services digitalnetwork, uses digitaltelephone lines.

Windows Explorer can be used to create a folder with a name such as Download.Windows Explorer is a program in the Start directory under Programs. (This is not thesame as Windows Internet Explorer, which is an Internet browser.)

Most of the files attached as part of e-mail will be document files created and savedas either Microsoft Word documents or WordPerfect documents. The user may wantto save these files directly into the Word or WordPerfect directory. Saving them in thecomputer download folder is one option, as is opening the file on the screen immedi-ately instead of saving it for later use.

Normally, text files and graphic images are static files; that is, by themselves theydo not perform any function but are merely data-usable within another program suchas a word processor or graphic image viewer. It has become common, however, to sendas attachments, files that have within them mini-programs such as macros thatperform functions when activated, such as those used to calculate sums in spread-sheets. Others are self-contained software programs such as screensavers containinganimation and animated cartoons.

Some program files have an extension of either “.exe” or “.com.” Files with theseextensions may run automatically after downloading. Therefore, greater caution must betaken in downloading any file, particularly files with these or other unknown file exten-sions, which may contain macros (mini-files), such as Excel files, which may containformulas that run automatically and may contain computer viruses, as discussed later inthis chapter. Remember that it is not enough to rely on the sender being a reliable source,as even the most reliable source can have a security breach that allows a virus to beattached to a file, or the source may be forwarding files from other, less reliable sourceswithout checking the files before sending them to you.

PRINT ING

Most of the items that are displayed can be sent to a printer attached to a computer. At thetop of most Web browsers is a printer icon or a Print command in the File selection inthe menu or toolbar at the top of the page. Clicking on the printer icon or on the wordPrint in the File pulldown menu will initiate the print process. Patience may be neces-sary, as the computer may have to take some time to access the original source of theinformation. Clicking several times will not speed up the process and actually may resultin several copies of the same information being printed.

SENDING FILES

Some Internet service providers (ISPs) limit the amount of information that may besent at one time depending on the speed of the connection and how busy the systemis at different times of the day. This may limit the number of pages that may be sent atone time. With increased transmission speed, also referred to as bandwidth, comes theability to transmit much larger files and more pages in the same time.

Increasingly, large-size graphics files and images such as photographs are sent orattached to e-mails. The larger files being transmitted require more bandwidth (thepipeline) to avoid slowing down the system. Bandwidth may be thought of as theamount of data that can be sent in a given timeframe.

For example:

Dial-up access uses a modem connected to a PC to connect to the Internet bydialing a phone number provided by the Internet service provider. Typicaldial-up connection speeds range from 2400 bps to 56 Kbps.

ISDN (integrated services digital network) uses digital telephone lines ornormal telephone wires to transmit typically at 64 Kbps to 128 Kbps.

Page 14: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

60 Chapter 3

ZIP FileAn open standard forcompression anddecompression used widelyfor PC download archives. ZIPis used on Windows-basedprograms such as WinZip andDrag and Zip. The fileextension given to ZIP filesis .zip.

WWW MINI EXERCISEFull description and informationon types of service availablecan be found athttp://www.webopedia.com/quick_ref/internet_connection_types.asp

CableOperates over cable TV lines.

DSL (digital subscriber line) is always connected using existing telephone lines.

ADSL (asymmetric digital subscriber line) is the most common type of DSL.Typical speeds range from 1.5 to 9 Mbps for receiving data and 16 to 640Kbps when sending data.

Cable uses a modem that operates over cable TV lines. Typical cable speedsrange from 512 Kbps to 20 Mbps.

T-1 lines (T for terrestrial, as opposed to satellite) are leased, dedicated phoneconnections. Typical speed is 1.544 Mbps.

Satellite or Internet over Satellite (IoS) allows a user to access the Internet via asatellite. Typical Internet over satellite connection speeds range from 492 to512 Kbps.

FIOS (fiber optic service) uses a dedicated fiber optic connection with typicalspeed up to 30 megabits (Mbps) download (receiving) speed and 5 Mbpsupload (sending) speed.

As with any pipeline, only a limited amount of product can be transmitted at anyone time. To more equitably share the limited pipeline resource, ISPs and network op-erators may permanently or temporarily during peak usage times, limit the number offiles or the size of files that one user may transmit. In some offices, the same limitationsmay be imposed to overcome the size limitation; files may be transmitted in a com-pressed format, frequently referred to as ZIP files. Large files are run through a pro-gram that compresses them before being sent. The recipient of the compressed file thenmust uncompress the file before being able to read it.

A number of programs are available to compress and decompress files. Some ofthese require several steps, and other programs perform the task automatically. For oc-casional use, the manual method is acceptable, but with the increasing number of com-pressed files, it may be more time-efficient to purchase one of the automatic programs.Limited time-trial versions of some of these decompression programs may be down-loaded without charge over the Internet from software companies who are encourag-ing users to buy the full version after the trial period expires.

OBTA IN ING SOFTWARE ON THE INTERNET

Software may be purchased locally, by mail order, or from an Internet source. Manysoftware vendors sell their software directly from their Internet websites in immedi-ately downloadable form or on a CD mailed to the buyer. The advantage of thedownloadable version is immediate delivery and the ability to use it without waitingfor the mail or express package delivery service.

Downloading software can be a simple operation. Select the option to download and,after payment with a credit card, the software is downloaded to a computer over theInternet. The software usually allows the recipient to designate where on the user’s com-puter the software file should be downloaded, in a particular folder location or on aspecific disk drive. Those with a download manager will find the software downloaded tothe default location for downloads, usually a location on the main hard drive in a folderlabeled as Downloads. These programs are usually not in usable form but must still beinstalled on the computer. One of the options in a download manger is to launch the soft-ware. Prudent practice is to make a backup copy of the program before installing it.

Download IssuesEnough Memory for the ProgramDoes the computer have enough random access memory (RAM) to run the program aswell as the other programs normally opened and used at the same time?

Page 15: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

The Internet and Electronic Mail 61

MetadataInformation about a particulardata set, which may describe,for example, how, when, andby whom it was received,created, accessed, and/ormodified, and how it isformatted.

System MetadataThe data such as file names,size, and location.

Content MetadataInformation about thecontents of a document.

WWW MINI EXERCISEFor a more detaileddescription of metadata, seehttp://en.wikipedia.org/wiki/Metadata#Types_of_metadata

List ServesAn automatic mailing list,usually for specific topics.

Speed of the Internet ConnectionIf large numbers of documents or graphic-intense files or programs are to be down-loaded from another location over the Internet, is the Internet connection fast enoughto accomplish the job in a reasonable period of time?

Continual ConnectionDownloading long documents may take time. If the connection is interrupted or termi-nated the download may have to be started over.

FirewallsFirewalls are installed to prevent unauthorized access to computer systems andnetworks. In some cases they are set up to block everything that is not preauthorizedor not recognized as coming from an allowed source. This type of firewall restriction islike the parental blocking of undesirable Internet content.

Trusted SourcesDownloading anything from a website has dangers. The document or program mayhave intended or unintended viruses, Trojan horses, or other spyware attached orembedded. Downloading from strangers only increases the potential for problems.Downloading from a trusted site may not eliminate the potential for problems but itdoes minimize the risk. For example, viruses may be attached to a document from atrusted site like another law firm. They may be trusted but someone may have sent thevirus to them and they may not have checked their incoming documents for virusesand other problems.

METADATAMetadata is frequently referred to as data about data. Every electronic document hasinformation about that document attached to the electronic file. Metadata is the infor-mation about the document, such as who created it, the date it was created, modified,or accessed, and other information related to its existence and location.

Metadata is divided into two areas: the resource or system metadata, or informa-tion, and the content or application information. The resource metadata is used totrack or locate the file containing the data such as file names, size, and location.Content metadata is in the file itself such as who the author of the document is, anytracked changes, and the version.

Each time a file is sent as an e-mail or an attachment to an e-mail, metadata is partof the transmission. The recipient can frequently see the content or application meta-data like the author and version by use of the properties function in the program usedto view the documents such as in Word or WordPerfect for word processing documents.

LIST SERVESList serves, or as they are more commonly referred to, “list servs” are, according towebopedia (www.webopedia.com):

An automatic mailing list server developed by Eric Thomas for BITNET in 1986.When e-mail is addressed to a LISTSERV mailing list, it is automatically broadcast toeveryone on the list. The result is similar to a newsgroup or forum, except that themessages are transmitted as e-mail and are therefore available only to individuals onthe list.

Page 16: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

62 Chapter 3

NetiquetteRules of behavior for usingthe Internet.

WWW MINI EXERCISEFor full text of the guidelinesof the National Lawyers Guild,go to http://www.nlg.org/members/listserv.htm

National Lawyers Guild Listserv Guidelines

The following guidelines are designed to help ensure that we maintain a productive,professional (albeit informal) and enjoyable discussion forum.

Purpose: these list servs are for current members of the National Lawyers Guild.Its purpose is to provide a forum for the exchange of information of interest to Guildmembers and their work. Personal information is not generally posted unless itpertains to someone well known in the Guild, such as an obituary, an award, or anewsworthy event.

In order to ensure that these list servs remains (sic) an effective mean of sharingGuild-related information, we ask that you adhere to the following guidelines.Disregarding these guidelines may distract from the overall effectiveness and will beenforced through the following process:

Guidelines:

1. Present postings in a professional and courteous manner.2. Subject lines should be clear and descriptive.3. Messages should be brief and to the point.4. If posting a reply to a message, include original subject line or reference it

briefly at the beginning of the message.5. Respect the rights of others to have different opinions.6. Do not forward or ‘copy’ interact postings to non-Guild members or

organizations without first obtaining permission from the poster and anyindividual(s) mentioned by name in the text.

7. Refrain from sending messages that say “I agree” unless there is a poll ofopinion. These messages add little to the content of the list.

8. When you are forwarding information that you have received in an emailplease format the message so it will be easy to read.

Examples of postings that may be deemed inappropriate include:

■ Offensive or profane language■ Hateful, racially or ethnically objectionable content■ Advertising or solicitation■ Misleading or intentionally erroneous information

LISTSERV is currently a commercial product marketed by L-Soft International.Although LISTSERV refers to a specific mailing list server, the term is sometimes used in-correctly to refer to any mailing list server. Another popular mailing list server is Majordomo,which is freeware.

The Internet has spawned the creation of communities of people with commoninterests who use the Internet to exchange information. There are list serves formost of the sections of the American Bar Association, the American Trial LawyersAssociation, and many other special interest groups. Exhibit 3.9, for example,shows list serve guidelines of the National Lawyers Guild. Some of these groupsare moderated by a list manager. These are members who screen the postings to besure they comply with the rules or the guidelines of the list. Others are openedwith no limitation on what is posted other than the list members’ own sense ofpropriety. Exhibit 3.10 shows the ABA’s netiquette guidelines when using listserves.

The ABA hosts over 1,900 e-mail lists (both discussion and broadcast distribution)(see Exhibit 3.12). Subscription to the majority of these is a benefit of ABA/SectionMembership.

Page 17: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

The Internet and Electronic Mail 63

Exhibit 3.10 ListServ guidelines of the National Lawyers Guild.Source: http://www.nlg.org/members/listserv.htm. Reprinted with permission from the NationalLawyers Guild.

■ Disruptive activity, such as sending multiple messages in an effort tomonopolize the forum

■ Frivolous, or non-informational content■ Spam

On the first instance of disregarding the guidelines, the subscriber will benotified and cautioned by the listserv administrator via private email. If thesubscriber continues to post in violation of the guidelines, he or she may be imme-diately and permanently removed from the list serv.

Any conflicts about the list serv will be dealt with by the leadership of theappropriate NLG entity such as a committee, chapter, and region. Any nationalconflicts will be dealt with by the national executive director or the officers.

Exhibit 3.11 ABA’s list serve guidelines.Source: Netiquette for List Serve Users, 2006, published by the American Bar Association, located at http://www.abanet.org/discussions/netiquette.html. © 2006 by the American Bar Association. Reprinted withpermission.

ABA Netiquette for List Serve UsersList Serves or electronic mailing lists are one of the most useful means of communica-tion, since they enable their members to instantly transmit or receive information andopinions on matters of common interest. When a message is sent to a mail list the ListServer immediately distributes it to all subscribers. Conversely, when replies to thatmessage are “mailed,” they too, are broadcast to the entire list of subscribers in a matterof minutes or seconds, making this a highly interactive form of communication.

The following brief set of suggested guidelines is intended to make the use ofelectronic mail lists as valuable and productive as possible, for all subscribers.

1. Be germane.2. Know your audience.3. Brevity is important4. Identify yourself.5. Provide a subject line.6. If possible avoid attachments.7. Be careful with replies.8. Please do not use auto-reply.9. Keeping it simple is your best bet.

ENCRYPTION TECHNOLOGYEncryption technology permits a computer user to basically put a lock around itscomputer information to protect it from being discovered by others. Encryption tech-nology is like a lock on a house. Without the lock in place, unwanted persons can easilyenter the house and steal its contents; with the lock in place, it is more difficult to enterand take the house’s contents. Encryption software serves a similar function in that it

EncryptionScrambling documents usingalgorithms (mathematicalformulas).

Page 18: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

64 Chapter 3

Exhibit 3.12 Home page of the ABA’s discussion board and e-mail list information.

Source: © 2007 by the American Bar Association. Reprinted with permission.

lets computer users scramble information so only those who have the encryption codecan enter the database and discover the information.

ENCRYPT ION

Confidential or privileged information sent over the Internet is frequently encrypted bythe sender and unencrypted by the receiver because of the concerns that it will beintercepted when transmitted over the Internet. Encryption programs use algorithms(mathematical formulas) to scramble documents. Without the proper password orencryption key, unauthorized persons are not able to read the files and determine theircontent.

To understand the levels of protection offered by the different encryptionprograms, think of the protection offered by a combination lock. The least security isprovided by the type of two-number combination lock frequently found with inex-pensive luggage. As the numbers required for opening the lock increase to two, three,four, or more numbers, the security also increases. It is not hard to see how the two-digit combination lock can be quickly opened while the four-digit lock requires moretime and effort. For an amateur computer hacker with a simple encryption-breakingprogram, a basic encryption program might be thought to be the equivalent of a two-or three-number combination lock. The higher-level program, with tougheralgorithms designed to thwart a professional code-breaker, would require the four ormore number combinations. As computers become faster, more sophisticated meth-ods will be required.

Page 19: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

The Internet and Electronic Mail 65

Exhibit 3.13 Mail it Safe Send options.Source: Reprinted with permission from MailitSafe.com.

E-MAIL ENCRYPT ION

The use of e-mail for communication in the legal environment presents one of thebiggest potentials for breach of confidentiality. E-mails between attorney and clientfrequently contain confidential information. Clients provide details necessary for theattorney to give legal advice and answer legal questions. Attorneys reply with legaladvice intended solely for the client. A misdirected or intercepted e-mail with confi-dential content may be a breach of attorney–client confidentiality and void theattorney–client privilege.

One of the ways to protect confidential e-mail is to use a program, such as Mail it Safe,that can encrypt the e-mail and authenticate both parties. As shown in Exhibit 3.13, Mailit Safe provides options that allow notification of messages on cell phones, Blackberry, orto an alternative e-mail address.

Page 20: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

66 Chapter 3

EXPORT OF ENCRYPT ION TECHNOLOGY WORLDWIDE

Software companies in the United States led the development of encryption technol-ogy. For years, the U.S. government permitted American software companies to sell itsencryption software domestically but prohibited export of the most powerful encryp-tion technology to foreigners. The U.S. government worried that powerful encryptionand data scrambling technology would fall into the hands of criminals and terroristswho would use it to protect their illegal and clandestine activities.

Based on this fear, President Bill Clinton issued an executive order prohibiting theexport of much of the most powerful encryption technology developed in the UnitedStates. These export restrictions remained in effect during most of the 1990s. InSeptember 1999, after much lobbying by software companies located in the UnitedStates, the Administration changed its export policy to allow the export of the mostpowerful American-made encryption technology. The export rule was changed becausecriminals and terrorists could obtain similar data scrambling technology from softwareproducers in other countries.

SUMMARY

THE INTERNET A group of computers linked together with the addedability to search all the connections for information: a network of networks.

INTERNET FUNDAMENTALS

LOCATING INFORMATION

Internet backbone: The highest level connection.ISP: Internet service providers who provide access to theInternet at a local level for users.Modem: A device that translates electrical signals socomputers can communicate over public connections liketelephone, cable, and satellites.Hubs: Devices for sharing signals in a local network.Switch: A high efficiency hub. May also include softwarethat allows it to act as a modem and router.Router: Software and computerized devices that translateInternet addresses and route signals by translating IPaddresses into MAC addresses using a look-up table ofthe conversions.Computer and Internet addresses: Each computerized devicehas an address for use in getting messages, referred to asthe logical address.Media access control: Each computerized device has animbedded address called a MAC address, referred to asthe physical address.Internet protocol: Each computerized device is assigned anInternet protocol (IP) address when it accesses the Internet.Domain name service: Translates the numbers of an IPaddress into more familiar word names.Internet browsers: Software programs that allow a person touse a computer to access the Internet.Uniform resource locator (URL): The Internet equivalent ofa phone number that identifies the protocol used, thecomputer, and the extension called the domain nomenclature.

Local networks are searched with Windows Explorer.The Internet is searched with Internet browsers.

Page 21: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

The Internet and Electronic Mail 67

E-MAIL

Type-Ahead Feature

Mailbox

File Attachments

Receiving and Downloading Files andAttachments

Sending Files

Electronic communication that raises issues of confidentiality and privilege for the legal team.

A feature of e-mail that anticipates the desired remainingletters based on entries in an address book. May result inwrong party receiving confidential information.

E-mail is received and stored in an electronic mailbox. Thenumber of items is determined by the available memory.

A popular method for transmitting text files and graphicimages is by attachment of the file to an e-mail.

Users must first determine the directory (folder) intowhich they will be downloading these files.Most of the files attached as part of e-mail will be document files created and saved as either Microsoft Worddocuments or WordPerfect documents.

Some Internet service providers (ISPs) limit the amount ofinformation that may be sent at one time.A number of programs are available to compress anddecompress files.

PRINTING Most of the items that are displayed can be printed by aprinter attached to a computer.

OBTAINING SOFTWARE ON

THE INTERNET

Software may be obtained and downloaded over theInternet.

Download Issues 1. Having enough memory for the program.

2. Speed of the connection will determine how long ittakes to download. Large files may take a long timewith slow connection.

3. Interruption in connection will require a restart of thedownload.

4. Will the firewall allow the download to come into thenetwork?

5. Is it from a trusted source?

METADATA

Resource Metadata

Content or ApplicationMetadata

Data about data. Information about a document attachedto the electronic file.

Used to track or locate the file containing the data such asfile names, size, and location.

Content metadata is in the file itself such as who the authorof the document is, any tracked changes, and the version.

LIST SERVES Communities of people with common interests who usethe Internet to exchange information.

ENCRYPTION TECHNOLOGY

Encryption

E-mail Encryption

Export of EncryptionTechnology Worldwide

Permits a computer user to basically put a lock around hisor her computer information to protect it from being discovered by others.

Encryption programs use algorithms (mathematicalformulas) to scramble documents.

One of the ways to protect confidential e-mail is to use aprogram that encrypts the e-mail and authenticates theparties before transmission.

The U.S. government worried that powerful encryptionand data scrambling technology would fall into the handsof criminals.

Page 22: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

68 Chapter 3

CONCEPT REV IEW QUEST IONS AND EXERC ISES1. Why should passwords be changed on a regular basis?

2. Describe how a computer network may be used by a law firm.

3. Explain the importance and the steps that may be taken to maintaincomputer and network security.

4. What are some of the ways the Internet can be used in the law office?

5. What is an Internet browser? Give several examples.

6. Describe the use of Internet browsers for finding information on the WorldWide Web.

7. Explain some of the issues in obtaining and installing software.

8. What is a list serve?

9. Why are list serve etiquette rules important?

10. How can list serves benefit the legal team?

11. What is the difference between the functions of the network server and theusers’ workstations?

12. Give examples of how network security can be breached and the possibleways to prevent the breach of network security in the future.

INTERNET EXERC ISES1. Conduct a search on the following topics using four different Internet or

search browsers for the same term or item. Are all results shown in the sameorder? Why or why not?

Search topics

a. Legal ethicsb. Law office technologyc. Presentation graphicsd. Internet securitye. Metadataf. Encryption technology in the law office

KEY TERMINOLOGYAttachmentBrowserContent metadataDial-upDigital subscriberline (DSL)

Domain nomenclatureEncryptionHubInternetInternet browserInternet service provider (ISP)

List serves (list servs)

Logical addressMacroMailboxMedia access control (MAC) address

MetadataModemNetiquetteNetworkedNetwork operating system

Physical addressRouterSpecialized search engines

Static filesSwitchSystem metadataType-ahead featureURL (uniform resource locator)

World Wide WebZIP file

Page 23: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

The Internet and Electronic Mail 69

2. Use the Internet to locate a definition of the term metadata; what is itsimportance to the legal team?

3. Find list serves available for lawyers through the American Bar Association.

4. Use an Internet search engine to find organizations involved withtechnology in the law.

5. Use the Internet to find and download a free firewall program.

6. Use the Internet to find Internet service providers in your area and preparea list of available services and prices.

7. Use the Internet to locate a list of the ABA list serves that might be of valueto a litigator.

PORTFOL IO ASSIGNMENTS1. Prepare an office policy on the use of passwords in the law office. Explain the

reasons and methods to be used for the most and the least secure passwords.

2. Prepare an office policy on the use of the Internet for sending and receivingelectronic communications and documents.

SCENARIO CASE STUDYUse the opening scenario for this chapter to answer the following questions. Thesetting is the attorney and paralegal discussing renting space to another attorney whois not a member of the same firm.

1. What additional hardware or software will be required to support a newperson in the office? Does it matter if it is a lawyer or a paralegal or secretary?

2. Prepare a memo requesting a faster-than-dial-up Internet connection andexplain why the cost is justified.

3. What procedures should be set up to protect data but allow use of theInternet by others in the office?

4. Is there any additional hardware that should be considered or purchased? Isthis different from the list prepared in Chapter 2?

5. What are the ethical issues in sharing a common website to attract clientsfor the plaintiff and defense attorney in this office? See the firm websiteexhibit (1.2) in Chapter 1 for reference.

6. Are there any ethical issues in unrelated attorneys sharing an Internet connection?

7. Are there any ethical issues in sharing a Web page for attracting clients?

CONT INU ING CASES AND EXERC ISES1. Update the Internet resources list from Chapter 1.

2. Continue to maintain a time record as outlined in Chapter 1.

3. Review the information presented in Advanced Exercises for the First Client.

a. Set up a file for the client for use in answering the questions andpreparing the documents.

b. This exercise will require information found in future chapters and is acontinuing exercise.

c. Your instructor may give you additional instructions.

Page 24: The Internet and Electronic Mail - Pearson Educationwps.prenhall.com/wps/media/objects/4468/4575324/M03_GOLD...had hired the best paralegal manager,Mrs.Hannah,from downtown to help

ADVANCED EXERC ISES1. Use Tabs3 to enter and maintain the time records assigned in Chapter 1.

a. You will need to add yourself as a timekeeper and set a rate. For thiscontinuing exercise, list yourself as timekeeper 30, at a rate of $40 hour.

b. Create a list of functions to be billed.c. Enter a client for billing purposes; you may use your instructor with the

college information as the client.

2. Enter all of the calendar information for the course (see the list of suggesteditems in the exercise in Chapter 1) in the calendar functions in AbacusLaw.

70 Chapter 3

First Client

The first client for a young attorney is always someone that will be remembered.Suddenly all the textbook theory comes face-to-face with reality. In a modern lawoffice a series of decisions must also be made on law office management issues.

1. The client has requested information on preparing an advance medicaldirective, also referred too as a living will. What is the applicable law inyour jurisdiction?

2. Are forms available from the Internet for your state? Locate any free formsavailable and download a copy to use as a template.

3. Use the following information to create a new client interview form thatcan be saved as a template in a word processing program.

4. How should the office files be set up? Some of the options include filing byclient’s name, by type of documents prepared, or a combination of both.What recommendations would you make to Mr. Mason?

5. How should time records be maintained for billing individual clients?6. Should the office be a paperless environment, with copies of all client

materials maintained electronically, or should paper copies be retained?

Note: As a reference, a sample Advance Medical Directive brochure is available from theUniversity of Arkansas for Medical Sciences at http://www.uams.edu/patienteducation/Handouts/advance_medical_directives.pdf.

Client Information

Adam First1 Major RoadNew Hope, Your State and ZipPhone 555 123-4567

Mr. Mason spends thirty minutes interviewing the client.Mr. Mason reviews information with the client and disburses $5.00 to have thedocument notarized.