tag:blogger.com,1999:blog-25530619422793651612024-03-06T01:58:49.298-05:00Graham W. Syfert - Jacksonville LawyerGraham Syfert is a Criminal Defense Attorney in Jacksonville, FL<br>
904-383-7448Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.comBlogger36125tag:blogger.com,1999:blog-2553061942279365161.post-63329246631343793052017-08-08T14:43:00.001-04:002017-08-08T15:44:03.484-04:00Florida Workers Compensation (Part 1) - What they don't want you to know.If you are here, it is because you are looking for information on how Workers' Compensation works in Florida. This is going to be a little different than me selling my services giving you a slight overview of workers' compensation and asking you to call. Nevertheless, if you want to have your work comp case handled, you can call me at 904-383-7448. I generally pick up the phone- but I won't be interested in giving you any more free advice than below. I wanted to hit the top 10 issues that I see on a daily basis. I practice in Jacksonville, Florida.<br />
<div>
<br /></div>
<div>
For the past year and a half, I have been working for a high volume large firm handling only workers' compensation cases. This is based on my experience and is not to be construed as legal advice- although I will be dealing with the questions where most people have asked for advice.</div>
<div>
<br /></div>
<div>
<u>The only thing that the insurance company has to do is give you the benefits of the policy. They can always decide that they don't want to give you a lump sum settlement.</u></div>
<div>
<br /></div>
<div>
<b><br /></b></div>
<div>
<b>1. Money or Doctors? To settle or not to settle.</b></div>
<div>
<br /></div>
<div>
Settling your workers' compensation case in Florida is as easy as taking a check to the bank, if that process involved getting three people, two witnesses, and judicial approval. If you wanted to settle your work comp case from $500 to $2000, it could be finished tomorrow. If you want more, you will have to let your attorney build his case and try to see what he can get for you. If the insurance company has made an offer, you can accept it and place it in the bank. </div>
<div>
<br /></div>
<div>
<b>You don't have to settle your case. </b>But, with the substandard doctors, poor care, and bureaucratic red tape, most everybody in workers' compensation will tell you that you will get better care using your own money and selecting your own doctors. (Yes, in Florida, the insurance company picks your doctors.) </div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<b>1a. Will I have to lose my job if I settle?</b></div>
<div>
<br /></div>
<div>
99% of the time, if you settle your case in Florida you must also resign from your employer. The largest exception to this is Walmart, who notoriously does not require a resignation to settle a work comp case. The other exception, is if your employer has hired a new or different Work Comp Insurance carrier between your accident and the current date. Technically, if you employer wanted to still employ you after settlement, it would be advisable for your employer to find a new insurance company and to enter into a new written agreement for employment.</div>
<div>
<br /></div>
<div>
<b>1b. How much is my case worth?</b></div>
<div>
<b><br /></b></div>
<div>
Probably less than you think. When looking at a workers' compensation case, the insurance company does an analysis based on your expected treatment, whether or not you need surgery, how long you would be out of work. In essence, they are asking "How much is this person going to cost me if we treat them fully for their injuries?" With differing injuries, you would get different results. Someone who needs an outpatient knee surgery is going to have less of a case value than someone who needs a inpatient back fusion. </div>
<div>
<br /></div>
<div>
There are multiple reasons for this price difference. First is that an inpatient procedure costs much more than an outpatient procedure. Also, the recovery time for an inpatient procedure is bound to be longer than the recovery time for an outpatient procedure. They look at all the potential costs that they must bear if they were to see you all the way to your maximum medical improvement. This is called MMI, and it generally signals the end of your treatment with physicians.</div>
<div>
<br /></div>
<div>
It is possible that someone who needs a back fusion has not suffered as much as someone who needs a knee arthroscopy. This does not matter to the insurance company. <u>They do not pay for pain and suffering. Again, they do not pay for pain and suffering.</u> Generally, you will find that the insurance company will inflict pain and suffering, sometimes purposefully, by denials of operations, prescriptions, etc. The work comp insurance company issue denials to help out their profit margin and to put Porsche's in their driveways. Before you raise your voice at me, and try to tell me that your employer created such an unsafe condition, I can only explain that worker's compensation does not care. </div>
<div>
<br /></div>
<div>
There are exceptions to this rule. Florida Statutes 440.011(1)(b) lists the requirements for a direct suit over and above worker's compensation. These are generally impossible to prove except in the worst of circumstances, and 999/1000 times, your case does not fall into this category. One court has allowed an injured worker to sue his employer when the employer did not report an accident and caused the employee to fail to timely file a claim. <u>Ocean Reef Club, Inc. v. Wilczewski</u>, 99 So.3d 1 (Fla. 3d DCA 2012). Again, you likely do not fall under these exceptions.</div>
<div>
<br /></div>
<div>
<b>1c. But my surgery would cost $60,000 - I looked it up. You're telling me that they wont pay me $60,000?</b></div>
<div>
<br /></div>
<div>
If you walked in off the street, without insurance, your surgery might cost $60,000. However, the insurance company negotiates lower rates and some procedures are set out by statute are fixed by a reimbursement schedule set forth by our legislature. https://secure.fldfs.com/wcapps/cpt/ProviderManMenu16.asp So, even though your surgery might run in the range of $60,000, it is possible and even likely that if worker's compensation would only need to pay $20,000 for the surgery. </div>
<div>
<br /></div>
<div>
Why would it ever make sense to settle your case then, if you needed surgery? Currently, under the Affordable Care Act, you can apply for health insurance that will cover preexisting conditions. If they were facing costs of $20,000 for your surgery, and would offer you $20,000 to settle your case, you could use that money, obtain insurance, and treat your conditions with the doctor of your choosing.</div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<b>2. I have been offered light duty from my employer / my employer has no light duty. What should I do?</b><br />
<b><br /></b>
If your employer has offered you light duty, you should accept it. Why? Because work comp does not have any duty to pay you indemnity checks if you reject an offer of light duty. <u>Indemnity checks are only two thirds of your expected paycheck.</u> Most people find it difficult to live when their income is cut by a third. <u>Remember</u>, they do not pay for pain and suffering.<br />
<br />
<u>But my employer has no light duty!</u> When a client says this to me, the first thing I generally ask is, "How do you know?" Generally my client will launch into a giant discussion about how "The only thing that they do at my company is ______________, and because of my injury, there is no way that they would let me do ____________."<br />
<br />
Call your employer- ask about light duty availability. If they tell you that none is available, you should be receiving checks from work comp. If they tell you that some is available, then you should report to work or else you forfeit your indemnity checks.<br />
<br />
<b>2a. But I only work in the area of __________, but they are having me do desk work. This is not what I signed up for! I'm supposed to be doing __________.</b><br />
<b><br /></b>
Tough. If they want to make you the designated toenail clipper, and it is within your light duty restrictions, you must comply with their light duty requests or else you forfeit your right to indemnity checks. </div>
<div>
<b><br /></b>
<b> 2b. I don't want to work there anymore, I just want to quit. Will this hurt my case?</b><br />
<b><br /></b>
In general, I always advise my clients to do whatever it is that they need to live. No one should ever think that their work comp case is going to set them up for the rest of their lives. If you have another job lined up, and you want that job and it will make your life better- then go ahead and quit. None of the benefits that you would gain by staying employed with your employer after your work injury can equal the benefit of being in a good job that you love.<br />
<b><br /></b>
<b>3. I don't want surgery, I don't want money, I just want to be better!</b><br />
<b><br /></b>
Personally, I find that many of my clients are offended when I ask if they want money rather than doctors. The discussion generally starts like this, "So you want to try and get money out of the case rather than doctors?" <br />
<b><br /></b>
The client generally chimes back saying "I'm not in this for the money, I just want to get better." Often times there is a slight undertone of offense that I would only think that they are looking for a payday. <br />
<br />
This offends me on two levels. First, is the incorrect assumption that I would think less of a client who wanted to get cash and get out of worker's compensation. Second, is the incorrect assumption that if they get money, they would not be able to get better. <br />
<blockquote class="tr_bq">
It is a fundamental truth, that you will have better doctors, a wider range of care options, and a generally higher level of care with doctors outside of work comp. </blockquote>
<b> 3a. I don't want surgery, I just want money!</b><br />
<br />
By telling them you don't want surgery, you have just lowered the amount that the insurance company expects to pay on your case. You want surgery, or money. You want surgery, or money. You want surgery, or money.<br />
<br />
<br />
<b>4. My bi-weekly indemnity checks stopped- my surgery was not authorized- my prescription was not authorized, what can I do?</b><br />
<b><br /></b>
Generally, these are the issues that cause more people to hire an attorney more than any thing else. Before you hire an attorney, try calling your adjuster. They are the folks that need to approve all benefits that are paid. If they refuse, then it would be up to you to hire an attorney or to file your own petition for benefits yourself. If you don't hire an attorney to file your petition for benefits, make sure you have all medical records from your case.<br />
<b><br /></b></div>
Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com0tag:blogger.com,1999:blog-2553061942279365161.post-46380335325476883872015-07-30T17:53:00.001-04:002015-07-30T17:53:12.239-04:00Florida Revenge Porn Lawsuits - Sue the bastards<span style="font-size: large;">NO LONGER FEEL LIKE A VICTIM</span><br />
<br />
<br />
Frankly, there are not many situations where I would use the phrase "Sue the bastards," however when it comes to pornography of your sons or daughters posted online.... <span style="font-size: large;">Sue the bastards.</span><br />
<br />
<br />
<span style="font-size: large;">Criminal Prosecution</span><br />
<br />
Criminal prosecution is generally what people think of when they want to right a wrong, or imagine a trial on the matter. Criminal prosecution involves the police, and the State Attorney's office, and generally punish offenses against the state and the individuals which prescribe the state.<br />
<br />
Beginning October 1st, Florida will be under the <a href="https://www.flsenate.gov/Session/Bill/2015/0538/BillText/er/PDF" target="_blank">control of 784.049, Florida Statutes</a> which makes it a misdemeanor to commit sexual cyberharassment, and a felony for repeat offenders. The proper avenue for getting criminal actions begun is to contact your local police department. Generally, they will work with local prosecutors to get these cases to the point where the offender will be brought before a judge and punished. Misdemeanors are punishable by up to a year in jail.<br />
<br />
<br />
<span style="font-size: large;">Civil Prosecution</span><br />
<br />
Civil prosecution of this kind of case is also governed by 784.049. <br />
<blockquote class="tr_bq">
(5) An aggrieved person may initiate a civil action against a person who violates this section to obtain all appropriate relief in order to prevent or remedy a violation of this section, including the following:<br />(a) Injunctive relief.<br />(b) Monetary damages to include $5,000.00 or actual damages incurred as a result of a violation of this section, whichever is greater.<br />(c) Reasonable attorney fees and costs.</blockquote>
Section (a) regarding injunctive relief is seeking a court order forcing the person to remove the image from the website, to delete the images wherever they may exist, and to prevent any future posting or use of the image.<br />
<br />
Section (b) is the civil penalty associated with the act of harassment. The $5,000 number represents a minimum penalty in the absence of genuine damages. Damages to reputation, business, or other such damages are difficult to calculate and therefore difficult to ascertain. However, if the nude picture somehow damaged someone financially in excess of $5,000.00, those damages could also be recoverable. <br />
<br />
Section (c) provides that you should be entitled under the law to recover fees and costs associated with the lawsuit that you file to take down the offending material. This means that if you file a lawsuit, and are successful in the prosecution of the suit, you will be entitled to get every penny back that you reasonably paid to an attorney to get your results achieved.<br />
<br />
<span style="font-size: large;">Graham is Ready to Take Your Case</span><br />
<br />
Finding an attorney to take on a new type of case under a new law is sometimes difficult. You have to call up offices, wait for a call back, then get a quote, etc. etc. etc. Graham loves new cases, and is specially positioned to take these cases immediately.<br />
<br />
The law office of Graham W. Syfert at 904-383-7448, will be taking on civil cases regarding online pornography, and will pursue them passionately. Graham has a background in technology, IP networking, and was previously a system administrator for a research firm. Our goal is to find the bastard, terrorize the bastard, and sue the bastard.<br />
<br />
The flat fee associated with removing of pornographic images from website will be $1500.00 with about $500.00 of that used for the costs of suit. Graham W. Syfert, P.A. will make every effort to recover every penny you pay in fees or costs, and return your life to where it was before this ever happened.<br />
<br />
<br />
<br />
<br />
<br />
<br />Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com1Jacksonville, FL 32204, USA30.3152434 -81.685680830.2604134 -81.7663618 30.3700734 -81.6049998tag:blogger.com,1999:blog-2553061942279365161.post-9243394935223136792015-06-20T16:54:00.000-04:002015-06-20T16:54:00.052-04:00PDF Metadata in the Practice of Law<br />
<br />
<br />
<i>Clerk Seeks Indemnification for Metadata Disclosures</i><br />
<br />
The Florida Bar has released <a href="http://www.floridabar.org/DIVCOM/JN/jnnews01.nsf/8c9f13012b96736985256aa900624829/2d9455e3535e6f9285257e5e00429f8b!OpenDocument" target="_blank">an article</a> which states:<br />
<br />
<blockquote class="tr_bq">
"<span style="background-color: #fefefe; color: #3b3b3b; font-family: Verdana; font-size: x-small; line-height: 21px;">Florida Court E-Filing Authority, which manages the statewide e-filing portal, that it include a warning on the page where filers designate the type of document they are filing. That notice will read: “Warning: Removal of document metadata is the responsibility of the filer. Any document metadata remaining may become part of the public record.”</span></blockquote>
The idea is that an identity thief, fraudster, <i>et cetra</i> may obtain metadata from a filer failing to scrub PDF documents after redactions, and obtain SSN's, credit card numbers.<br />
Is the Florida Court E-Filing Authority a clerk of court? They seem to fill the role. Or are they as "Pacer" is to the Federal Clerk?<br />
<br />
The article goes on to note that only 37% of online filers create searchable PDF's. <b>Wow.</b> <br />
I'm curious as to how many untold gigs of storage is wasted by clerks of court.<br />
<br />
Metadata's potential usefulness, apparently, caught the clerk, and by inferrence some judges by surprise:<br />
<br />
<blockquote class="tr_bq">
<span style="background-color: #fefefe; color: #3b3b3b; font-family: Verdana; font-size: x-small; line-height: 21px;">Mary Cay Blanks, clerk for the Third District Court of Appeal stated:</span> </blockquote>
<blockquote class="tr_bq">
<span style="background-color: #fefefe; color: #3b3b3b; font-family: Verdana; font-size: x-small; line-height: 21px;"></span><span style="background-color: #fefefe; color: #3b3b3b; font-family: Verdana; font-size: x-small; line-height: 21px;">“All kinds of information was in that document, who the judge was, who the secretary was; everything is in there,” she said. “We realized we had to strip all of that information, which, now we do.”</span></blockquote>
While it may be a prudent practice to strip such metadata and information from an opinion or an order, shouldn't we be allowed to know these things anyway? If I were a Plaintiff or a Defendant receiving an order, I might like to know what judge worked on it, or what secretary worked on it. But<br />
<br />
I bet you dollars to donuts that the Clerk of the many DCA's can tell you the exact date and time when a Appellant's lawyer got notice of Oral Argument through the logs of their webserver and unique URL's. It's a metadata of sorts, as it is not exactly plain on the surface that this information is recorded. I digress- if you are in a law firm, it is obvious that you should not allow metadata to be shared with opposing counsel, or the public at large.<br />
<br />
Redaction of PDF metadata in regards to editing out personal information is a no brainer. If you draw a box over some text in a PDF, the text remains. If you redact, do so properly. <br />
https://blogs.adobe.com/acrolaw/2010/06/ricks-guide-to-using-redaction-in-acrobat-x-pro/<br />
<br />
Apparently in Linux, if you are not running <a href="https://appdb.winehq.org/appview.php?appId=847" target="_blank">Acrobat in Wine</a>., there is not much of a good way to redact, except Inkscape Vector Editor:<br />
https://askubuntu.com/questions/72920/is-there-a-better-way-to-redact-a-pdf<br />
<br />
If I told you how often I looked at PDF metadata to get ideas about a case, confirm a fact, confirm a filing time, you'd probably get the wrong idea about me. I have had two cases where I used PDF metadata to figure out what attorney or firm was responsible for the filing or the drafting of the documents. One of the cases was widely publicized. The other case was an attorney who continued to file documents on behalf of his client when they substituted in new counsel after a motion to disqualify.<br />
<br />
In addition, there have been at least three other cases where I have used PDF metadata to identify a John Doe defendant, or a metadata remnant of a non-attorney created PDF was key in opening up a new strategy. <br />
<br />
The truth is, that advising attorneys to scrub all metadata from a PDF before filing is a little overbroad. Is it a good practice? Sure. But essentially, scrubbing PDF data is kind of destroying the evidence.<br />
<br />
As a part of my practice includes criminal defense, I suppose I could advise everyone out there to scrub their metadata. <br />
<br />
<br />
<br />
<br />Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com14Jacksonville, FL 32204, USA30.3152434 -81.685680830.2604134 -81.7663618 30.3700734 -81.6049998tag:blogger.com,1999:blog-2553061942279365161.post-38609750256610692792014-01-18T11:49:00.000-05:002014-01-18T11:52:42.565-05:00Ethics of Facebook, Twitter, and Blogs. Oh, and LinkedIn - For attorneys.<br />
<br />
In Florida, among attorneys, there is a crisis of ethics. No, no, not like that. Not at all like that. Well, that's another discussion but I can not necessarily have it on this blog. Instead, it is the ethics of being able to use websites that normal ordinary people use everyday. <br />
<br />
Newly filed is a case that is pending against the Florida Bar of Searcy v. Florida Bar (<a href="http://guptabeck.com/wp-content/uploads/2013/12/Sercy-v-Fla-Bar-Cmplt.pdf" target="_blank">complaint</a>). The law firm of Searcy Denny Scarola Barnhardt & Shipley published on their blog comments regarding opinions that were not "objectively verifiable." Such comments were that the days "when we could trust big corporations . . . are over," and that "[g]overnment regulation of Corporate America's disregard of consumer safety has been lackadaisical at best," and that "when it comes to 'tort reform' there is a single winner: the insurance industry."<br />
<br />
The ABA asks, "is Florida too tough on lawyers using linkedin and twitter?" http://www.abajournal.com/news/article/is_florida_too_tough_on_lawyers_using_linkedin_and_twitter_endorsements_and/<br />
<br />
So, what we have is a new form of media, the internet, that we are trying to form into old restrictions on the ability to publish and advertise and communicate that are now being eradicated by the ease of use and openness of the internet. See <a href="http://it-lex.org/follow-up-florida-bar-revokes-advisory-ethics-opinion-about-linkedin/" target="_blank">Florida Bar Revokes advisory opinion</a>. It is obvious that the attorneys of Florida are at a crossroads in how exactly to handle the freedom that is provided through ease of rapid communication which is unparalleled in our history and will grow exponentially.<br />
<br />
The simple fact is that the internet can be abused by attorneys. The internet can be abused by anyone. <br />
<br />
<span style="font-size: x-large;">Twitter</span><br />
<br />
Now I don't handle many personal injury cases, but ambulance chasing is an old lawyer joke. The image of a lawyer chasing an ambulance is practically unheard of, at least I never hear it. Instead, they must interrupt Jeopardy and late night Perry Mason episodes to inform us to the sound of boring background music that they are compassionate people who will work hard on your case. But if one of them decided to ambulance chase on the internet, they could follow individuals in their target area, say, the entire State of Florida, and look for people announcing major life events on twitter. <br />
<br />
A search of #CarWreck on twitter, just one of many possible searches, at 10:16 AM on 1/18/2014, yielded evidence of at least four people who had been in car accidents in the last week An auto responder under could be setup to tweet back at that person, "Hey, I know a great attorney! Call 904-383-7448."<br />
<br />
And to blatantly advertise, yes I do handle a small number of select personal injury cases in Florida and Georgia. <br />
<br />
Surprisingly, or maybe not surprisingly, two law firms also appear in the search for #carwreck<br />
<blockquote class="twitter-tweet" lang="en">
In the aftermath of an <a href="https://twitter.com/search?q=%23AutoAccident&src=hash">#AutoAccident</a>, witnesses can be a key factor in determining who was at fault. <a href="https://twitter.com/search?q=%23CarWreck&src=hash">#CarWreck</a> <a href="http://t.co/mbAGHqzEML">http://t.co/mbAGHqzEML</a><br />
— Simon Law Group (@SimonLawGroup1) <a href="https://twitter.com/SimonLawGroup1/statuses/423517526988185600">January 15, 2014</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script><br />
<blockquote class="twitter-tweet" lang="en">
Get the recovery that you need and deserve. <a href="http://t.co/MzrDI9spVi">http://t.co/MzrDI9spVi</a> <a href="https://twitter.com/search?q=%23Atlanta&src=hash">#Atlanta</a> <a href="https://twitter.com/search?q=%23Accident&src=hash">#Accident</a> <a href="https://twitter.com/search?q=%23Georgia&src=hash">#Georgia</a> <a href="https://twitter.com/search?q=%23PainLaw&src=hash">#PainLaw</a> <a href="https://twitter.com/search?q=%23Carwreck&src=hash">#Carwreck</a> <a href="http://t.co/PbYDrSDdsS">pic.twitter.com/PbYDrSDdsS</a><br />
— The Griffin Law Firm (@Griffin_LawFirm) <a href="https://twitter.com/Griffin_LawFirm/statuses/423163836204478464">January 14, 2014</a></blockquote><br />
<br />
Now, a lawyer or a law firm simply using a hashtag "#carwreck" is not ambulance chasing, but it is blatant free advertising. One statement is a boring "objectively verifiable" statement, which if said in the midst of a normal "conversation" would be quite a non-sequitur. However, searching for a hashtag is a request for information, the same as a website.<br />
<br />
If the law firm had tweeted at a Georgia car wreck victim say, "@carwreckvictim Hey, I heard you were in a wreck. Visit www.syfert.com!" It would be a different story.<br />
<br />
Twitter is a place for open conversation. An attorney should regulate himself on twitter the same as they would over a message board, irc chat room, in a restaurant, on a beach, or walking to the courthouse. Twitter can exist in two basic ethical states. Twitter can be information on demand, such as the use of the "#" hashtag. Or Twitter can be a shouting match, a place to watch the random thoughts of the world fly by, and give you an opportunity to engage in conversation. <br />
<br />
This duality is the core of the problem in determining the ethics of twitter. Another duality that was created, mostly because of Facebook, was a suggestion and/or requirement that there be a clear divide between, well, what is best described as lawyer Graham and citizen Graham. Despite the fact that I am a solo practitioner and it's very difficult for me to confuse anyone, I still have a second Facebook page for my law firm, separate from my personal Facebook. Now, what's really bizzare about the split in the firm page and the Facebook page, is that essentially it doesn't matter. My personal account is linked as the owner of the firm, just as any other member could be linked to the firm. Essentially, the formation of my corporate structure, and the creation of a separate Facebook page, has done nothing to truly separate myself from this corporate Facebook account.<br />
<br />
In this attorney's personal opinion, it is more genuine and ethical for an attorney using social media to be themselves. Now I don't often hang out in bars unless I'm watching a concert, but if any attorney came forward into a barroom conversation and started saying "Get the recovery that you need and deserve. Hashtag Website. Hashtag Georgia. Hashtag Painlaw," it is obvious that the person would get up and walk away. To forward the cause of what it is to be an attorney, it is again my opinion that the use of firm twitter accounts should be discouraged. However, it is practically necessary for the purposes of advertisement.<br />
<br />
If I were to make a bright line rule, for Facebook, Twitter, and Linkedin, or the internet as a whole, it is simply the same as rules governing an attorney, in public. A virtual public, to be sure, but public nonetheless.<br />
<br />
<span style="font-size: x-large;">Facebook, Twitter, Advertising</span><br />
<br />
Social media allows you to be anti-social. Likewise, social media allows you to be overly-social. <br />
<br />
Hiring twelve men with megaphones to shout your name and number from the street corner near the courthouse, would be advertising. <br />
<br />
<span style="font-size: large;">Guerrilla Marketing</span><br />
<br />
Guerrilla marketing can take place either live or automated. This is essentially ambulance chasing. Various methods of exploitation of this form of marketing can exist.<br />
<br />
Automated marketing could require the hiring of a company, however an attorney with the proper technical knowledge could easily build a server that would script automated responses. From this one computer, and some clever word manipulation, it could appear that hundreds of people are discussing your law firm or the prowess of your attorneys. Now, why hundreds of people are discussing your law firm, may become an issue if the story is not believable. It's obvious that this form of marketing, or direct contact looking for people who were involved in an accident, is an issue. "Sorry to hear about your accident, #GrahamisTheBestAttorneyEver #GiveHimACall?"<br />
<br />
And what if such searching and responding were not robots, but instead people, would they not also be subject to attorney regulation?<br />
<br />
There is a problem at this juncture, with search optimization companies, or SEO. SEO companies have already engaged in both automated and non-automated entries on websites, to boost page rankings of attorneys. Big money is paid for these links. I think this is all unethical.<br />
<br />
<span style="font-size: large;">Paid Advertising</span><br />
<br />
Twitter has a character limitation. However, what is generally desired from a lawyers tweet is a call to action. "Click this link!" "Look at me!" "Pay attention!" "Over here!" Its 140 character limitation means that if I include my address and my phone number, like a skeleton ad, I only have 82 more characters left.<br />
<br />
The differentiating point of the speech on the internet that should be approved is when the advertising is paid. If the advertising is paid advertising on another website, whose content is beyond the control of the firm, then such advertising should be scrutinized. The bar should scrutnize both the "tweet" which would be paid to be a sponsored advertisement, and the webpage that is in the call to action in the tweet. <br />
<br />
<span style="font-size: large;">LinkedIn categories, Customer Reviews</span><br />
<br />
As soon as I saw the LinkedIn categories where people put down that they have specialties, I knew that this was a problem. When they allowed people to endorse other people for specific categories, I cringed. However, there is nothing I can do about this. Like the majority of people, I have a LinkedIn profile, but I do not use it. Unlike most people, I don't generally use Facebook either. <br />
<br />
I've said it before, it is my opinion that the use of these specialties are unethical. The endorsements, well, I have little control over that.<br />
<br />
Customer reviews are a completely different matter entirely. I love getting positive feedback from a client. For all the positive feedback I get from my clients, I sincerely expect more feedback on the Internet. But that's probably just my ego. Still, it surprises me quite often to see some, often solo attorneys, with so many positive client reviews. It doesn't surprise me that the linkedin profiles and the avvo profiles of some of the best attorneys contain no client reviews, no picture, and sometimes incorrect information.<br />
<br />
Customer reviews are the first amendment right of a customer. Endorsements on linkedin are the first amendment right of the customer. Unless they were solicited or requested, or paid for, they are not content that is subject to attorney regulation. <br />
<br />
I think that assigning an attorney a number on a scale of 1-10 is ridiculous. But I'm also a little nutty on this, because I don't believe the Martindale Hubble system of ranking should be used. I don't believe it should be allowed to be used in attorney advertising, and I don't believe it should be allowed in general.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com141529 Margaret Street, Jacksonville, FL 32204, USA30.313105999999991 -81.68092629.436003499999991 -82.9718195 31.19020849999999 -80.3900325tag:blogger.com,1999:blog-2553061942279365161.post-20376070623648149982013-06-04T13:28:00.001-04:002013-06-04T13:28:39.850-04:00Sharkmp4 PirateBay logs<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7529073 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-08-13 17:28:41 | 50.77.50.222 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7529137 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-08-13 17:40:33 | 50.77.50.222 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7529155 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-08-13 17:47:34 | 50.77.50.222 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7552199 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-08-21 00:54:51 | 46.21.99.22 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7819909 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-11-13 01:35:40 | 75.72.88.156 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7825185 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-11-14 17:14:58 | 75.72.88.156 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7825203 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-11-14 17:20:48 | 75.72.88.156 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7825260 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-11-14 17:30:30 | 75.72.88.156 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7832814 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-11-17 00:31:14 | 46.21.99.29 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7844770 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-11-20 19:51:42 | 46.21.99.29 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7848258 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-11-21 19:46:21 | 46.21.99.29 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7892402 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-12-06 00:56:18 | 46.21.99.29 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7912530 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-12-11 19:30:54 | 75.72.88.156 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7936734 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-12-19 00:31:27 | 85.17.31.120 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7940008 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-12-19 23:03:32 | 46.21.99.29 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 7968216 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2012-12-29 01:00:50 | 46.21.99.29 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 8119701 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2013-02-09 00:11:31 | 46.21.99.29 |</span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;">| 8144465 | </span><br />
<span style="background-color: white; color: #222222; font-family: 'times new roman', 'new york', times, serif; font-size: 16px;"> | 2013-02-14 21:44:33 | 75.72.88.156 |</span>Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com9tag:blogger.com,1999:blog-2553061942279365161.post-24810842183994068782013-04-04T17:43:00.000-04:002013-04-04T17:43:12.936-04:00 CFAA: Fundamental Flaws in Application<span style="font-size: large;">The CFAA: Where to draw the line?</span><br />
<br />
The imprisonment of <a href="http://en.wikipedia.org/wiki/Weev" target="_blank">Andrew Auernheimer</a> (A.K.A. weev) and the death of <a href="https://www.eff.org/deeplinks/2013/03/aaron-swartzs-lawyers-accuse-prosecutors-misconduct-help-next-aaron-reforming-cfaa">Aaron Swartz</a> have lead to many public discussions, as were both being prosecuted under the Computer Fraud and Abuse Act. The CFAA is also being used civilly by nefarious groups like <a href="http://www.popehat.com/tag/prenda-law/" target="_blank">Prenda Law</a> to attempt to find methods of attaching liability to IP addresses, essentially for "accessing computers without authorization." While the EFF has focused their attention on the cases of Auernheimer and Swartz, a large protest has begun against the CFAA, or how it is now being used.<br />
<br />
There is a clear divide in these suits and actions taken by prosecutors. I believe that the CFAA as it is applied now, is unconstitutional as it leads to a position where there is no definite or certain "line" that needs to be crossed on a computer in order to have it be a criminal act. Because there is no definite line, the CFAA is unconstitutionally vague and leads to a position of selective enforcement.<br />
<br />
<span style="font-size: large;">The CFAA and Weev's Case</span><br />
<br />
Before I get into Weev's AT&T "hack" I must confess that I have known of Mr. Auernheimer for nearly 12 years, but I am not biased for or against him based on that relationship. That part out of the way, his case is the perfect case to show where the line should be not drawn in the sand. Weev's "hack" of AT&T came from requests to a public webserver, which allows public access. They allowed this access to personal information to anyone who knew the address to type into a web browser. This information was made PUBLIC by AT&T by their failure to secure their systems.<br />
<br />
This is not to say that any entity in particular has a duty to prevent intrusion, but there is a difference between intrusion and opening a public web address. If no password is required, the request should not be considered an intrusion. If no security is in place, the request should not be considered an intrusion. If a person is not seeking to gain different or higher ranking credentials on a computer within a web request, this should not be considered an intrusion. <br />
<br />
How is this activity different than what SHOULD be a violation under the CFAA? Let us hack my office and see.<br />
<br />
<span style="font-size: large;">CFAA and my Office</span><br />
<span style="font-size: large;"><br /></span>
At my office, I have a webcam setup for security on a tiny linux box at the front of my office. The page for the webcam gives me the status of certain servers and devices that I run using ping or curl. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTJNrxrmpGsnsXqus-fmPziJR5LyDsj2mLVs5LWPPwHkvyySKzTFOhgm5T3UZF7qQC4O6HG_jYM3GI232Pht-Y7ZNWQJXXPOIHBJkLLfY3FombOoZe7eutM1pH9TnFqVfb6oF-D72GGFU/s1600/Capture.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="368" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTJNrxrmpGsnsXqus-fmPziJR5LyDsj2mLVs5LWPPwHkvyySKzTFOhgm5T3UZF7qQC4O6HG_jYM3GI232Pht-Y7ZNWQJXXPOIHBJkLLfY3FombOoZe7eutM1pH9TnFqVfb6oF-D72GGFU/s640/Capture.PNG" width="640" /></a></div>
<br />
<br />
The page for this webcam setup is a public webpage, and there is no password to access this particular page. It is a secret known only to me, not available in any google search, but if you knew to type in the URL the public at large would be able to access it. If someone was lucky enough to find the publicly accessible portion of this page, which is everything to the right of webcam picture, then they could have certain control over my office. However, there is a password on the webcam stream, and so the image would not be accessible.<br />
<br />
Over to the right hand side, there are also controls for the lobby music. Again, these are publicly available controls. You can turn the lobby volume up, turn it down, change the channel. stop it, start it, etc. If you found this particular page, without a password, you would be able to create some havok in my lobby. You would probably not be able to use this information in anyway, but it is a control of a device through the internet.<br />
<br />
If someone found this webpage, and spent all day turning the music in my lobby up and down, and switching stations, I would be very annoyed and angry, but this would be my fault.<br />
<br />
<span style="font-size: large;">CFAA is not a license to be insecure</span><br />
<br />
Now, imagine that weev found my webcam control page, and started spending a lot of time changing my lobby music at random (which is not all too far fetched). I would and should have no recourse against his actions. While it was not expressly permitted by me, by putting this control on the World Wide Web, unpassworded, I have opened it up for the world. I do not need to list it with google, I do not need to share the URL. If it happens that the URL is hit, then the URL is hit. Again, I should have no recourse.<br />
<br />
Now imagine that weev started saying things to me like, "Hey man, nice suit. Jerk face." and started saying that he could see me walking into my office. Well, to access that particular part of the webcam, the video stream, he would need to get around the password screen that pops up when the page is opened. This is a line that shouldn't be crossed. For the bar exam, one of the things we always had to remember for Burglary was that at common law, it was "Entering the dwelling house of another" and "at night" and "with the intent to commit a felony" but we have no such straight principles within the CFAA.<br />
<br />
This lack of bright-line rules within the CFAA and a lack of understanding of technology (or a lack desire to understand) on behalf of some members of the judiciary, leads to a position where the knowledgeable prosecutor can pull the wool over the courts eyes. <br />
<br />
Part of the lack of bright-line rules comes from the inherent problem of accurate language required by statutory construction paired with a lack of understanding and fear of technology. And, lets face facts, the common law does not exactly seem to apply nor basically even shed light on the issues presented by technology. The law of trespass has been used to describe entry upon land for centuries. States have instituted laws regarding the posting of signs regarding trespass. There is no "Signpost" on a webserver where such trespass warnings can be instituted. There are only password prompts or denials of access. It is not the "World Wide Web" of secrets, it is a world wide web of publicly accessible information with nests of secrets all around. If you want your information to be secure, and for a potential intruder to be criminally or civilly culpable, then it is your duty to put up sign posts or passwords, no matter how simple. Access to this information should be restricted, and secured, so that actual intrusion becomes necessary to get at the information.<br />
<br />
If I place upon my server a public directory, lets say <a href="http://www.syfert.com/AB34392DQERE3">http://www.syfert.com/AB34392DQERE3</a>, it is a good chance that this would never be guessed. But if I start throwing information into that folder without placing passwords on the information and someone accesses it, it is my fault. I put the information on the web. But, if I went to a judge or a prosecutor and claimed that you accessed that directory without permission and gained valuable information, I might be able to get them to run with it. If the Prosecutor or Law Enforcement had some particular reason to hate you (i.e. you are very vocal in a political party or movement or just being a general jerk like Weev) then they would spin the story into a security breach and seek punishment. The lack of direction within the CFAA and the lack of understanding of technology have lead to the perfect storm of selective enforcement of the law.<br />
<br />
<br />
TAKE ACTION TODAY <a href="https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005">https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005</a><br />
<br />
<br />
<br />
<span style="font-size: large;"><br /></span>
<span style="font-size: large;"><br /></span>Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com0Jacksonville, FL 32204, USA30.3152434 -81.685680830.2604134 -81.7663618 30.3700734 -81.6049998tag:blogger.com,1999:blog-2553061942279365161.post-60339817236946628972013-03-26T21:42:00.005-04:002013-03-26T21:42:50.814-04:00Bait Productions Pty. Ltd. v Does 1-XXX - IP Enforcement Law Group<br />
Attorney <a href="#ipenforce">Richard Fee of the IP Enforcement Law Group PA</a> has initiated many multiple individual suits in the Middle District of Florida. <br />
<br />
<br />
Bait Productions Pty Ltd. v. Doe 3 - Filed 2/11/2013<br />
Bait Productions Pty Ltd. v. Doe 24 - Filed 2/8/2013<br />
Bait Productions Pty Ltd. v. Doe 24<br />
Bait Productions Pty Ltd. v. Doe 12<br />
Bait Productions Pty Ltd. v. Doe 12<br />
Bait Productions Pty Ltd. v. Doe 33<br />
Bait Productions Pty Ltd. v. Doe 37<br />
Bait Productions Pty Ltd. v. Doe 52<br />
<br />
<br />
No client I have ever talked to about this movie ever remembers anything about it. <a href="http://en.wikipedia.org/wiki/Bait_(2012_film)">http://en.wikipedia.org/wiki/Bait_(2012_film)</a><br />
<br />
<div id="ipenforce">
The IP Enforcement Law Group is tightly integrated and an alter ego of <a href="http://www.feejeffries.com/" target="_blank">Fee & Jeffries, P.A.</a><br />
<br />
IP Enforcement Law Group -<br />
<br />
IP Enforcement Law Group, P.A.<br />
1227 N. Franklin Street Tampa, FL 33602<br />
Phone: 813-490-6050<br />
Fax: 813-490-6051<br />
<br />
<br />
Fee & Jeffries, P.A.<br />
1227 N. Franklin Street Tampa, FL 33602<br />
813.229.8008<br />
<br />
<br />
David Jeffries is a partner in both firms. <br />
<br /></div>
<br />
<br />
<br />Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com56tag:blogger.com,1999:blog-2553061942279365161.post-22082527098380105322013-01-28T11:33:00.000-05:002013-01-28T11:33:00.791-05:00Malibu Media - Exculpatory Evidence Request<br />
Malibu Media is contacting John Doe defendants in cases and requesting that they fill out a document, under oath, called an Exculpatory Evidence Request. <br /><br />
<br />
This document is a strange request for discovery without proper form before the courts.<br />
<br />
<br />
If you are in Florida or Georgia and have received one of these Exculpatory Evidence Requests, please do not hesitate to call.Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com8Riverside, Jacksonville, FL, USA30.313131689383255 -81.68096011213378930.309704689383256 -81.686002612133791 30.316558689383253 -81.675917612133787tag:blogger.com,1999:blog-2553061942279365161.post-48855765813050525912013-01-19T04:22:00.002-05:002013-01-19T04:43:59.045-05:00Georgia Super Speeder - Class ActionGraham Syfert is currently taking contact information from potential clients interested in Georgia Super Speeder representation. <br />
<br />
If you are a resident of Florida, or any state other than Georgia, and have received a notice which states that your license may be suspended for a failure to pay an extra $200.00 on top of your traffic ticket, Mr. Syfert is currently putting together a list of clients for a possible class action suit against various entities within the State of Georgia.<br />
<br />
The first thing you will need to do is visit <a href="https://www.foreclosurelawyerjacksonville.com/contact.php">https://www.foreclosurelawyerjacksonville.com/contact.php</a><br />
and enter your information.<br />
<br />
Second, please gather the materials that you have collected (Your ticket, any letter or demand for payment provided by DDS) and provide it to Mr. Syfert at graham@syfert.com or fax it to 904-638-4726. By submitting your information, no attorney client relationship exists, but attorney client confidentiality does. This is not a guarantee that any case will even occur, but collection of this information is the first place to start. Mr. Syfert intends to consult with other attorneys on this matter, and may enter into an agreement for joint representation with other counsel in these matters.<br />
<br />
Of particular interest is anyone who actually had a license suspended due to a failure to pay the super speeder fine. I would like to talk to a few people who had this happen. Mr. Syfert is licensed only in Florida and Georgia, and cannot give you advice on how to challenge Georgia's suspension of the superspeeder law if you are the resident of another state.<br />
<br />
I wrote an earlier blog post regarding the double jeopardy aspect of the Georgia Super Speeder law. I hope to challenge this soon in a criminal matter. While researching the matter of the constitutionality of the Super Speeder law, I came across something interesting. The legal theory is still being developed, but I don't see any reason why it is not a good argument.<br />
<br />
My Grandfather died on I-95 in South Georgia. He is someone that could have benefited from the extra revenue the Georgia Super Speeder law (<span style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 19px; text-align: justify;">O.C.G.A. section 40-6-189) . </span> He would be rolling over in his grave if he knew that there was another fine on top of a fine that was already paid. <br />
<br />
<br />
<br />
<br />
<br />
<br />Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com15tag:blogger.com,1999:blog-2553061942279365161.post-24755237842791776682012-11-27T18:24:00.000-05:002013-01-19T03:51:29.734-05:00West Coast Productions, Inc. v. Does 1-448<span style="background-color: white; color: #222222; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 14px; line-height: 18px;">Robby T. Cook - Attorney at Law</span><br />
<span style="background-color: white; color: #222222; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 14px; line-height: 18px;">3:12-cv-01277-HLA-JRK</span><br />
<span style="background-color: white; color: #222222; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 14px; line-height: 18px;">West Coast Productions, Inc.</span><br />
<span style="background-color: white; color: #222222; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 14px; line-height: 18px;"><br /></span>
<span style="background-color: white; color: #222222; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 14px; line-height: 18px;"><br /></span>
<span style="background-color: white; color: #222222; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 14px; line-height: 18px;">Another Porn bittorrent case. This time targeting 448 People. </span><br />
<br />
<span style="color: #222222; font-family: Arial, Verdana, Helvetica, sans-serif;"><span style="font-size: 14px; line-height: 18px;">At the risk of sounding like an advertisement, contact me today for representation. As always, the consultations are free.</span></span>Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com0tag:blogger.com,1999:blog-2553061942279365161.post-23617430016416377652012-11-15T10:23:00.000-05:002012-11-27T18:19:03.179-05:00Bait Productions Pty. Ltd. v. John DoesAn attorney by the name of Richard E. Fee of Fee & Jeffries PA has filed more than a handful of lawsuits in the United States District Court for the Middle District of Florida. <br />
<br />
The Plaintiff in this case is Bait Productions Pty. Ltd. and these (now fourteen) cases target on average about 50 people at a time. As of today's date, Bait Productions Pty. Ltd. appears to have filed 14 cases, and are therefore targeting close to 500 or 600 people. This means that roughly 100 or 150 innocent internet subscribers will be targeted in these cases.<br />
<br />
Some of the the case numbers are listed here:<br />
<br />
8:12-cv-02464-VMC-MAP<br />
8:12-cv-02470-JDW-EAJ<br />
8:12-cv-02468-JSM-MAP<br />
8:12-cv-02466-MSS-MAP<br />
3:12-cv-01205-MMH-JBT<br />
6:12-cv-01637-GAP-DAB<br />
8:12-cv-02556-MSS-TGW<br />
8:12-cv-02555-JDW-TBM<br />
8:12-cv-02554-MSS-TGW<br />
<div>
<br /></div>
<div>
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/hoNdAXMgDdY?feature=player_embedded' frameborder='0'></iframe>My sense of humor means I can't help but point out the two parts of these cases which are naturally funny. First of all, in the movie <a href="http://www.imdb.com/title/tt0092925/">Dragnet (1987)</a> starring Tom Hanks and Dan Aykroyd there was a pornography company named Bait. Dabney Coleman played the part of a Satan worshipping pornographer named Jerry Caesar who ran the company that produced Bait magazines. The portrayal of a rich pornographer in his mansion by this star of <a href="http://www.imdb.com/title/tt0100604/">Short Time</a> is how I like to think they all live. Notice how Dabney Coleman is the victim of a crime, just like pornographers who have their content stolen online.</div>
<div>
<br /></div>
<div>
The second part of the cases which is naturally ironic is the term "Bait" which of course is what is happening in these cases. People are being baited, and whether they are guilty of copyright infringement or not, people will be extorted for larger amounts than are fair and equitable, or in the case of the innocent internet subscriber, simply extorted. </div>
<div>
<br /></div>
<div>
Bait Productions appears to be an Australian company and to have made a movie called "Bait". They have had a registration in Australia since 2010. I have not seen much movement on these cases at this point, but it is certain that the demands and notices from the ISP's will be coming soon. Just in time for Christmas. Ho ho ho. http://www.imdb.com/title/tt1438173/<br />
<br />
From IMDB :<span style="background-color: white; color: #333333; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;">A freak tsunami traps shoppers at a coastal Australian supermarket inside the building - along with a 12-foot Great White Shark. 4</span></div>
<div>
<br />
5 Stars.<br />
<br /></div>
<div>
As always, my website <a href="http://www.syfert.com/">www.syfert.com</a> contains the FAQ which is still relevant to all John Doe cases. </div>
<div>
</div>
<div>
<br /></div>
<div>
<br />
<br />
<br /></div>
Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com01529 Margaret St, Jacksonville, FL 32204, USA30.3131938 -81.68100630.3114803 -81.683473499999991 30.3149073 -81.6785385tag:blogger.com,1999:blog-2553061942279365161.post-76170633015745339372012-09-13T21:44:00.001-04:002012-09-13T21:47:29.898-04:00Lightspeed Media CFAA Lawsuits and Guava v. SkylarLet's call things like they are in the Lightspeed Media lawsuits. People are using web browsers to access pornography through a website.<br />
<br />
They generally get to these websites by using "porn password" webpages when looking for free pornography online. Sometimes these passwords are included in a URL, for example http://user:password@URL.com/ <br />
<br />
Generally, the people who run these websites make their money off of advertising, and obtain their passwords from a wide variety of common hacking methods.<br />
<br />
<br />
<br />Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com0tag:blogger.com,1999:blog-2553061942279365161.post-4530809199808893952012-08-07T18:36:00.003-04:002012-08-07T18:37:56.399-04:00Comcast Granted Interlocutory Appeal in Nationwide Jurisdiction ISP Subscriber Information Case<br />
<div>
It is a rarity among the federal courts for an interlocutory appeal to be granted in an issue regarding early discovery, however, it appears that Comcast has been granted an appeal as to the constitutional issues regarding jurisdiction and joinder. </div>
<div>
<br /></div>
<div>
It should be noted that Comcast must have put up a substantial fight to get Judge Howell to grant an interlocutory appeal on these two issues, and attorneys from Comcast believe they will have some measure of success at the appellate level that they have been unable to achieve in the District court. </div>
<div>
<br /></div>
<div>
<a href="http://ia600806.us.archive.org/25/items/gov.uscourts.dcd.152214/gov.uscourts.dcd.152214.46.0.pdf">http://ia600806.us.archive.org/25/items/gov.uscourts.dcd.152214/gov.uscourts.dcd.152214.46.0.pdf</a></div>
<div>
<br /></div>
<div>
The order by Judge Beryl Howell is located in the link above.</div>
<div>
<br /></div>
<div>
Comcast lawyers will be arguing the points originally raised in my Motion to Quash and Motion to Dismiss forms that I posted nearly two years ago, but with decidedly more elaboration, I hope.</div>
<div>
<br /></div>
<div>
We may soon have a ruling from an appellate court regarding jurisdiction and joinder at the "John Doe" level of the bittorrent lawsuits.</div>Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com0tag:blogger.com,1999:blog-2553061942279365161.post-62428676657121747232012-08-01T18:39:00.000-04:002012-08-07T18:40:43.056-04:00Cloud Computing and Attorney Ethics: Virtual Files in the Ether and Sharing with Laypersons and Laycomputers<span style="font-size: large;">Can attorneys work in "The cloud"?</span><br />
<br />
A recent article in the Florida Bar News, August 1, 2012, written by Gary Blankenship brings up an interesting problem being discussed by the Bar's Professional ethics committee regarding the confidentiality of client information and the use of cloud computing. <br />
<br />
<blockquote class="tr_bq">
"On the cloud computing issue, committee members said there are concerns because attorneys are placing confidential client information in the custody of third parties. . . . "This is an emerging area that lawyers are reading into without any idea of what they are getting into," said Steven Teppler. "There are no guidelines, because there are no standards out there for security, and there's no real way you can do your homework to be sure you are comporting with the ethical rules."</blockquote>
<br />
The article also stated that it was unlikely the committee would rule that cloud technology is improper to use, but that regulations needed to be put in place.<br />
<br />
Judge Jim McCune in Marion county summed up the issues best when he stated: "There's a lot more to [the ethical issues] than meets the eye. Cloud computing gets outsourced to India and other places, and there's issues about whether you can repatriate your data that has been sent to those foreign places. Really, we all need some guidance on this."<br />
<br />
When the HIPPA act was produced, technology was at its infancy. HIPPA has been a blessing or a curse to many within the health care industry. It created numerous regulations which has lead to numerous impractical and unforeseen results due to overbearing policies that do not change along with technology. Other than just another pointless rumination within a blog post, the purpose of this article is at least voice a protest in the event that knee jerk reactions to ridiculous results in the future, and to avoid the costs of regulation and increased technology costs for law firms.<br />
<br />
<span style="font-size: large;">What is the Cloud, really? </span><br />
<span style="font-size: large;"><br /></span>
The "Cloud" is a buzzword designed to create excitement around ye olde internet. Even though it is a buzz word designed for the sale of products, it is no different than the internet of old. Every Florida bar member who conducts business through e-mail by logging into a Yahoo account or Gmail account is already conducting business in the cloud. If you use that e-mail account to communicate with clients, then you are using cloud based storage of confidential client communication.<br />
<br />
In fact, if you have an internet line running into your office, and it is connected to computers that use the internet for research you are using "the Cloud." If you use the internet for research through sites like Westlaw or Lexis-Nexis, you are leaving tracks behind (your browsing history) and these tracks are in possession of Westlaw or Lexis-Nexis's "cloud." These searches could reveal confidential concepts and ideas pertaining to defenses of cases, and if these are labeled by case or client, as is such a feature on both websites, Lexis-Nexis and Westlaw could be storing more information about intended litigation arguments and issues than would be noted in a typical client file.<br />
<br />
Cloud computing, in general, is based in the idea that as internet speeds increase, entire programs can be run from a web browser. The content created with those programs, can be stored remotely, and generally gives options to create a local copy. Soon, with the increase in speed, we will see a world where the installed software on a PC will be limited to providing access to the internet so that cloud based applications can be accessed. Although they will be much more powerful devices than the <a href="http://en.wikipedia.org/wiki/Computer_terminal#Dumb_terminal">dumb terminal</a>, of old times, the essential concept of the computer being simply a conduit to display information from other more powerful computers is the same as a "dumb terminal." The benefit of the cloud is an expected savings to the consumer by replacing the need to host a server, purchase software. It provides for easy collaboration, and easy access, generally, from multiple kinds of devices.<br />
<br />
Even though the concept behind the cloud is new, the technology that drives the ideas behind "the cloud" is nearly fifteen years old. However, due to slow internet speeds, these products and programs were not feasible for use by the general public. Because the technology and idea behind cloud computing is "old" (in technology terms) it has solidified for me that "Cloud" is a buzzword. The popular adoption of the term "Cloud" is simply a word for "Data stored on the internet, not stored on local drives." <br />
<br />
<span style="font-size: large;">Common Cloud Services</span><br />
<br />
Cloud services are in their infancy. Currently, most Cloud services are used for backup of local data. As time progresses, more and more edits will be done remotely on that data by web applications. These would include Dropbox, Google Drive, iCloud, and other related services which allow for the storage of documents. iCloud use to operate differently than it does now, as the "iDisk" portion of that service has now been removed and they have switched to more of a "Google Docs" approach. Google Docs on the other hand has changed their service to be more like the now defunct iDisk. <br />
<br />
<u>Backing Up Data</u><br />
<br />
Guidelines regarding the backing up of data on a webserver do not exist currently for attorneys. Many attorneys are looking more to the cloud to share information. The key issue of the security of data lies in the ability to encrypt transmission and communications.<br />
<br />
<b>One brief real world illustration of potential pitfalls of cloud computing: </b> I created legal forms which I sold for $19.95 to anyone interested in purchasing the forms. Because I first designed them to be shared with attorneys, I placed my documents onto Google Docs so that other attorneys could have free reign to edit and copy the material as needed for their particular case. The documents that I uploaded to Google Docs were shared among a large group of attorneys, for anyone to edit, share, or collaborate on. <br />
<br />
An attorney in another state then used Google Docs to make changes to my motions, adding his client name, the case number. Because Google Docs automatically saves the changes, his online edits were published to any and every other attorney that had access to the forms. Ultimately the changes made by the attorney to my documents were to become public record in litigation, and I am a disinterested party but the real world example illustrates a need for file permissions. <br />
<br />
Two common sense rules that emerge from both of my comments:<br />
1) All data that is concerning client information transmitted over the internet shall be transferred, in secure fashion, using 128 bit or 256 bit encryption for transmission.<br />
2) All data concerning client confidential information should be set with permissions so that it is only accessible by employees of the firm.<br />
<br />
HIPPA pointed out that e-mails or web traffic sent which contain patient information should be encrypted. See <a href="http://www.ama-assn.org/resources/doc/psa/hipaa-phi-encryption.pdf">http://www.ama-assn.org/resources/doc/psa/hipaa-phi-encryption.pdf</a> Along those lines, they have also suggested that the method of storing data should be such that it is in an encrypted form. They make suggestions as to the encryption of local folders. The publication I linked, also contains information concerning the fact that if transmissions are encrypted, and if local documents are encrypted, then a security breach does not need to be disclosed to patients.<br />
<br />
In fear of HIPPA compliance, and increasing reliance on the internet, most small health practices have adopted a policy of not allowing ANY communication from their servers that is not encrypted. Encryption, however, is good policy for data security, but if a hacker wants the data, they will obtain the data despite the encryption by obtaining the encryption key or the password which is associated with the data. HIPPA's requirement or suggestion of local encryption of data is overkill, as local file permissions should be sufficient to prevent "casual intruders." Most hacks concerning locally stored data will not be overly concerned with encryption (especially like Microsoft EFS) because once access is gained to the account that encrypted the information in the first place, all of that data will be decrypted. To put it in the simplest of terms, your Yahoo or Gmail account is "Encrypted" so that others can not view it. However, once a hacker has your email password or otherwise has access to your account, he can view all your e-mails in an unencrypted form.<br />
<br />
Gdrive, dropbox, and other "cloud based" backup tools generally provide for encryption of uploaded and downloaded material. They do not provide encryption of data, but they do not allow for the free dissemination of information, unless such permissions is checked.<br />
<br />
In short, unencrypted storage of data should be permissible, even in the cloud, as long as such information is stored in a manner where it is not freely available to the outside world and steps are taken for prevention.<br />
<br />
In the middle of writing this blog post, a fellow by the name of Bradley Wallace, in Raleigh, NC, whose number is 919-809-7121, called me. It was such a coincidence, that thought I had to mention him. He was calling and trying to sell me on the fact that his cloud based system, <a href="http://www.sharefile.com/industries/Healthcare/?src=direct&v=e&cat=1">sharefile</a>, would assist in the new e-service rules that take effect September 1st. He began discussing about how the incoming e-mails can be automatically indexed and stored. <br />
<br />
I began quizzing him relentlessly about the methods of encryption, and as to whether the storage was encrypted as well as the traffic. He sweated through my interrogation with a positive attitude and confidence of a man who had been on the phone all day being rejected by Florida attorneys who were uninterested in taking on a new expense. I include his phone number here not to punish him, but instead to say: Hey, this guy has a product that might be ethical per se. It is HIPPA compliant. They are filling a niche by providing encryption of both data and traffic, and have a customized agreement suited for that purpose, unlike Google Drive. I do not believe attorneys need a full HIPPA compliance, but I do think that if it is HIPPA compliant it would be per se ethical. So, you Florida attorneys out there can call Bradley and see if he can show you what the system can do as far as automatic sorting of e-served documents into file folders. I have my own ideas on the matter.<br />
<br />
It is August 1st, 2012, and while my e-mail address is on all my pleadings, I have approximately 50 cases where I do not have an e-mail address for service on opposing counsel. I have no belief that I will receive an e-mail address from these attorneys before September 1st. Especially the Plaintiff's foreclosure lawyers, where in pleadings the names of many attorneys appear, but not one real point of contact.<br />
<br />
<br />
<u>Websites</u><br />
<br />
Clients initial interaction, at least for me, generally start at my website. I currently have about four active domain names that I am running, and only one of them has 256 bit SSL encryption. I use this domain name that currently has an SSL certificate installed for all client communications through the web. Needless to say, any client communication which takes place through a website should be encrypted. It is incredibly rare for me to find any attorney website which has an SSL certificate installed. It can cost a lot of money. <br />
<br />
It should be equally as rare for me to find an attorney site which has a "Contact us" or "Chat now" button, but it is not. Any site with this sort of function should For an illustration, if I look at the websites of the two top personal injury attorneys (or at least the top advertisers for personal injury cases) in Jacksonville, all of them have a "Contact us" page where client information is to be filled out. Neither of them have their contact form encrypted, and neither of them have the suggested disclosure to potential clients, that information submitted through the website is submitted in an unencrypted form which may be viewed by third parties.<br />
<br />
As of the time of this writing, I clicked on the "Chat now" button on one of the websites, and looked at the protocol and confirmed that the chat session that was initiated was insecure, and had no SSL encryption or other security protocols. These "chat now" functions are web based applications which use old protocols that used to be driven by software which would be located on your computer. Now that web based applications have been invented, they are being placed on attorney websites as a way to create more customer interaction. Implementation, even among the most apparently wealthy and well to do attorneys, has been done in a manner of shoot first and ask questions later. Feeling like they need to adapt or die, attorneys are paying for web development and customer interaction integration, without asking the typical questions that would normally be required.<br />
<br />
The fantastic entity under the Florida Bar named <a href="http://www.floridabar.org/tfb/TFBMember.nsf/840090c16eedaf0085256b61000928dc/2ce4258d54fcadcb85256fd5005c36d9?OpenDocument">LOMAS</a> has issued statements regarding unencrypted communication and have been advising attorneys to disclose a lack of encryption, for almost as long as "Contact Us" forms existed on websites. This leads to some more guidelines which are repeats of the first one, but with a slight additions and clarifications.<br />
<br />
3) Client communications initiated through an attorney website should be encrypted or contain information regarding the lack of encryption.<br />
4) This rule should not be made to require that the domain level encryption certificates are purchased, but rather that if any content or application is embedded or included in an attorney website without a security certificate, it should be sure to run over a secure socket layer. (A chat application can be on a website that does not have a pretty green padlock next to the URL, and still be secure if it is embedded within an insecure webpage, or somehow included in an insecure webpage.)<br />
<br />
<span style="font-size: large;">The McCune Conundrum</span><br />
<br />
I do not personally know Judge McCune, but I hope that he has a sense of humor regarding the title of this section. He has presented, with his statement concerning cloud based computing hosted in India, an interesting problem which to my knowledge has never been faced. However, it is indeed a possible issue, given that "storage locker" type websites are often shut down for fear that they will be used for the purposes of piracy. By his concern over repatriation of the data, his fear seems to be that a cloud service may host data, and then decide, for any number of reasons, not to release that data back to its original source and owner.<br />
<br />
I didn't ask Bradley regarding the question of, "Is my data safe, even if I stop paying you?" McCune is well positioned in his fear. As a hypothetical, take the case of a disbarred attorney who used cloud based storage. If the attorney simply stopped paying, and digital copies of important documents were all that existed, and the client needed a copy of that document, obtaining the data could be difficult. I could tell you one thing, however. If the data was encrypted, and the person who had the password died, it would cease to be just difficult to recover the data- it would instead be next to impossible. A "permission" based password system of security should be sufficient for cloud storage. A permission based system of security should not be sufficient for cloud storage, if it is not over an encrypted connection.<br />
<br />
For this situation to occur, it would require an over reliance on cloud based architecture, without the existence of local backups. This is the sort of concept and idea that makes all old attorneys cringe and hesitate to embrace the future. Communication and access to client information is key to the operation of a law firm. Anyone who has ever handled technology for a law firm will tell you that when the internet goes down, they are hindered temporarily. However, when the phones go down, the law firm is outraged. One Paralegal said to me, "When the internet goes down, at least our phones still work. Our local server still stays up so that we can do work." With the internet goes down, or access to the internet is not available, client information may also be unavailable. Using a cloud based "backup" system should not change the local servers information, but as we progress more and more away from local services, the McCune conundrum becomes more clear. What this shows is that web services should not be used as a sole method of data storage. Unpaid bills to hosting services might mean that you can not retrieve your data or that it is deleted. Each hosting service has its own policies regarding these matters. If I took the time to review them it would be more like the earlier commercial when I mentioned sharedrive. <br />
<br />
Local backups solve the McCune conundrum,<br />
<br />
<span style="font-size: large;">Help! My confidential client data is in the hands of a fellow in India.</span><br />
<span style="font-size: large;"><br /></span>
I poke a little bit of fun regarding the Judge's statement that the data might be located on a server in India. However, he is only slightly wrong, and the truth might have scared him even more. Most "cloud" data storage isn't located on one server in India. In fact, the confidential client data is probably located on multiple servers throughout India, and being shifted around to different geographic locations all over the world at the whim of the cloud system administrator. I understand that that this can make things a little more scary, but it is the truth. <a href="http://www.openstack.org/">See how the software, "openstack" works by visiting their website.</a><br />
<br />
All of these online providers generally have agreements Google Drive states: <span style="background-color: #f9f9f9; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-style: italic; line-height: 18px;">The rights you grant in this license are for the limited purpose of operating, promoting, and improving our Services, and to develop new ones. </span><a href="http://www.trainsignal.com/blog/public-cloud-storage-privacy">http://www.trainsignal.com/blog/public-cloud-storage-privacy</a><br />
In the face of the license, Google Drive has reassured all business customers that their "Private" data will remain private. Other than the license agreement which plainly appears to state otherwise, I would imagine this would be akin to a computer technician who needs to have access to all the files, and makes you sign a waiver to that effect, but does not disclose that information.<br />
<br />
A bizzare hypothetical: Someone decides to sue Google and stores client confidential information on their Google Drive. Google decides to open it under the terms of their license. I would hate to be a judge in this situation.<br />
<br />
The uploading of encrypted files would easily satisfy any requirements for client confidentiality. Even to Google, this files would appear to be gibberish. File names, however, would be able to be indexed and scanned. How much information can be gleaned from a list of file names? You would be surprised. As an added complication, the great reasons to use these tools (easy search of documents, quick and effective client research and drafting, etc.) would also be negated by the encryption.<br />
<br />
Gmail and Yahoo web based accounts are commonly used among attorneys. That information is all scanned and used to advertise to you. Is it necessarily a leak of confidential information? Doubtful.<br />
<br />
<span style="font-size: large;">Help! My confidential client data is in the hands of a data center in Jacksonville. </span>Or, why we attorneys might overreact about confidential data in the cloud.<br />
<span style="font-size: large;"><br /></span>
Before cloud based services became publicly available, it was (and still is) common for Data Centers to "co-locate" a machine running Microsoft Exchange. Those who firms armed you with blackberry's at one point or another, and had frequent connection problems to their server, probably had a co-located machine. I could, for example, take my own web server and host it at <a href="http://www.peak10.com/">Peak 10, my favorite jacksonville data center</a>. (I do not co-locate my machine though, just a shameless plug for some good folks.) <br />
<br />
They would have access to the hard drive, and all client data if they decided to crack open the machine and take out the hard drive. Of course, Peak 10 and other reputable establishments would never do this. It is more likely that they would offer services software which would inspect all client data to for evidence of a lack of integrity of the data. An absolute loss of data scares me more than my data being located in India. <br />
<br />
Currently, cloud services are outperforming my hard drives in reliability, but I would never be without a local backup. I don't think any attorney at this point completely trusts cloud architecture to the point where he would migrate an entire business. <br />
<br />
In essence, cloud services, and others like it, should be allowed to be your IT guy in the sky. You should be allowed to trust your IT guy not go snooping around where he doesn't belong, or to use or abuse private information. Same could be said of the mailman taking important documents. "Do they open the envelope and peek inside?"<br />
<br />
You should, however, be able to negotiate with your cloud provider, just as you could with Peak 10 or other independent establishments who do not require click to accept, one size fits all user agreements. The necessity for manpower to accomplish these tasks means that the large cheap providers do not have the time to custom negotiate a contract with you to protect your data.<br />
<br />
Using a data center, or a high speed internet connection, can allow you to create your own "cloud" based services, without the need for relying on "click to accept" functions.<br />
<br />
<br />
<span style="font-size: large;">Help! My confidential client data is in the hands of my employees and accessible through a local server! And, I e-mail back and forth with my clients and employees concerning secure matters.</span> Or, why we as attorneys are generally underreacting to confidential electronically stored data in general.<br />
<br />
This HELP! section is probably how your firm is already set up. You are communicating with your clients via e-mail. While you might use an encrypted connection, you have no idea if <i>they</i> are using an encrypted connection unless you pre-shared a key and pre-arranged the message sending. <br />
<br />
Original messages and data stores are kept in plain text for numerous reasons. Some of these data stores are kept on your webserver in an SQL database. Your "Contact Us" button, might actually contact you, but it might also be storing those incoming messages in an SQL database for later retrieval, on your website, vulnerable to hackers, through your website. If your company intranet website uses a web based data system, accessible through a browser, your client information is being stored there in an SQL database, you might be vulnerable. As far as data interception methods are concerned, database leaks are one of the biggest security flaws and vulnerabilities that can be experienced by a law firm. If your law firm website is on Google, it is being scanned at least three times a week for security holes by people all over the world, no matter how small and insignificant you may think your practice would be.<br />
<br />
An attorney in Mississippi once told me a story about someone who would steal clients from him by hacking his voicemail. He swore up and down that a competing attorney was calling after hours, and using his default password, deleting his voicemails and taking the business. Today's equivalent might be SQL database dump like the ones so popular in the news, or even a program that would just harvest "Contact Us" requests through a website and redirect them. An insecurely programmed site is likely to be more common, among those who paid more for features within their website.<br />
<br />
I already mentioned the website issues regarding client communication and a lack of SSL certificate, in both the contact forms and the web chat functions. Even for small businesses, HIPPA prevents this. We have no such official regulation as attorneys. Just the tiny voice of LOMAS making a suggestion. Honestly, such regulation would probably send attorneys scrambling to find ways to comply with HIPPA, and finding that their old reliable system of case management is no longer working how they would like it. I do not believe we should take HIPPA type measures, but I do believe that web access should be secure from intruders based on permissions.<br />
<br />
5) Any attorney should take reasonable steps to ensure that client information passed over the internet is passed in an encrypted format whenever possible.<br />
<br />
<br class="Apple-interchange-newline" />
Once again, we can't be sure that the client is using an encrypted connection. The system of e-mail is to beneficial and crucial to the process of law and open communication with clients. However, it would be a shame to abandon it just because there is no way to ensure that your client is using unencrypted web based mail, or is using an insecure port to download e-mail to his "Microsoft Outlook" at a public wi-fi hotspot.<br />
<br />
Although it sickens me to say it, Facebook is actually a more secure method of communication with a client than if they decided to e-mail using an unencrypted connection on unencrypted wi-fi. If clients were so inclined to be able to receive PGP messages, this would be a decent solution. However, this is not a solution in most cases, because most people don't know how to send "encrypted" e-mails. Implementation of such systems, right now, would be expensive and nearly impossible.<br />
<br class="Apple-interchange-newline" />
<br />
Requiring encryption of communication traffic through a website is an additional cost that attorneys do not want to incur, but such cost would be a reasonable expenditure, in light of the importance of web traffic in a law office. The truth is that attorneys will be wary to adopt these standards unless they are forced into adopting these standards. I don't blame them. The costs can be outrageous from some companies who do hosting, but a reasonable amount is more like a maximum of $100.00 per year. Depending on hosting plans, certificates can run into the thousands. And if you have multiple websites, it is time to shell out money for those as well.<br />
<br />
<u>More Realistic Threats</u><br />
<br />
A law firm's confidential data, stored with a nice secure long password, is more likely to be breached by an employee or someone with physical access rather than a hacker. Ultimately if a hacker wanted to get into your systems, and monitor all your internal and network traffic, he would gain physical access to your office and install a device which would plug into your network and begin analyzing the network traffic and allow undetectable access from the outside. <br />
<br />
My data is as safe as I can make it, but I admit, there may be something I am overlooking. I am not as sharp as I once was regarding the details of computer security. I have learned one thing that will not change. If it is digitized, then it is available for someone to take, if they want it bad enough. The same could be said of a paper file.<br />
<br />
<u>In conclusion</u><br />
<br />
Ultimately, a safe full of paper is much safer than using computer networks to store information. But, we, as attorneys, are going a way that congress has decided that health care can not. Sometimes for the better, sometimes for the worst. The rapid communication of e-mail has changed the legal practice so much that we are adopting it for service as a preference over fax and US Mail. It has made it easier to communicate with clients, and sometimes more difficult to communicate with opposing counsel. <br />
<br />
-------<br />
<br />
Now, I am preparing to design a linux based automatic filing system for saving e-served documents locally, without paying anyone. Well, maybe sometime soon. <br />
<br />
Oh, and I would also again like to make a public apology to Bradley Wallace, in Raleigh, NC, whose number is 919-809-7121, and tried to sell me sharedrive. Mr. Wallace who did sweat through through my interrogation about their security and emerged on the other side looking like an overall decent guy. He just happened to have been unfortunate enough to catch me in the middle of this post. I swear I am not getting a kick back from sharedrive or Mr. Wallace. The timing was just perfect, and maybe this will drive him some business and payback the bad karma I gave him early on in our call.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com41529 Margaret St, Unit 2, Jacksonville, FL30.332183 -81.6556509999999923.0751860000000022 -122.08533849999999 57.58918 -41.225963499999992tag:blogger.com,1999:blog-2553061942279365161.post-24039559884158799682012-07-21T17:05:00.000-04:002012-07-21T17:10:12.543-04:00Is the World Wide Web unethical for Florida attorneys? Or, why the popular websites break the rules.I grumble like an old man so often to other people about the state of websites for lawyers and how they are used. A colleague of mine, a worthy adversary in court, got to talking one day regarding the low public opinion of attorneys and he blamed it on one thing, and said it was "Advertising" <br />
<br />
A third person was talking about her ex-husband saying "He's in a profession that is held in lower regard than an attorney." Both of us chimed in at the same time, and said, "What is he, a used car salesman?"<br />
<br />
Then my worthy adversary began complaining like an old man: "Back in the 1970's there was a ruling and suddenly attorneys could advertise all over the place. When this competition started happening, it was no longer based on the past experiences of clients and word of mouth, but instead, it was about who could give the best impression that an attorney can give them an edge. Something about this soured the whole profession."<br />
<br />
The decision was Bates v. State Bar of Arizona, 433 U.S. 350 (1977). It highlights the flipside of the argument my adversary presented. Word of mouth makes things just too difficult to find an attorney. An absolute ban on attorney advertising is probably too much. Along with this decision, the many states have come down with rules regarding attorney advertising.<br />
<br />
Attorney commercials on television are a running joke. In states like Florida, where the ethics are strictly regulated, attorney commercials are often considered a joke. <br />
<br />
"The music is always so boring," one friend said. <br />
"So, if it suddenly turned up with some heavy metal in the background, would you hire them as an attorney?<br />
"Well, no."<br />
"What's a better idea then?"<br />
"To make it less sucky, I don't know," was her reply.<br />
I then went on to bore her with conversations about attorney advertising regulation, and the fact that in Florida, attorneys were not supposed to use exciting music, and how in Mississippi, I saw an attorney using the phrase "turn your wreck into a check" and another who used the phrase "We get the money you deserve," as their tagline until they realized what they were saying and changed it to "We get <i>you</i> the money you deserve."<br />
<br />
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/FtW67TCAn0E?feature=player_embedded' frameborder='0'></iframe><a href="http://www.floridabar.org/divexe/rrtfb.nsf/FV/223CB3289B1CC14F85257249006599BE">Rule 4-7.5</a> limits any background sound other than instrumental music. Instrumental music isn't by definition boring. See, i.e. <a href="http://www.explosionsinthesky.com/">Explosions in the Sky</a> (Texas 2003). However, one wonders how the commercial reviewers at the Florida bar would react to some of the raucous feedback of the howling Marshal stacks if someone where to somehow obtain a license to use a song by Jimi Hendrix, or Sonic Youth.<br />
<span style="font-size: large;"><br /></span><br />
<span style="font-size: large;">Florida Ethics Rules regarding Social Networking Sites</span><br />
<br />
The Florida Bar Standing Advertising Committee has come down with ethics decisions regarding the use of Facebook, Twitter, Linkedin and other websites. These rules are available in full text here: <a href="http://www.floridabar.org/tfb/tfblawreg.nsf/9dad7bbda218afe885257002004833c5/a502e8b302def7a5852576e3004fc685!opendocument">Florida Rules Regarding Facebook, Twitter, and Linked In</a> I will attempt to itemize them, in some sort of statutory form, but also in the style of the twelve commandments, even though there are only three.<br />
<span style="background-color: white;"><br /></span><br />
<span style="background-color: white;">1. </span><span style="background-color: white;">I am the Bar, by God, which has understanding that you might use social media for personal reasons, but if you shall ever use it to promote your law firm, in Egypt:</span><br />
a) Thou shall not invite, add, or friend request persons not in your current contact list, unless they are an attorney.<br />
b) Thou shall not send out "public messages" from social media sites, which contains links designed to generate business or solicit legal services.<br />
c) Thou shall not violate <a href="http://www.floridabar.org/divexe/rrtfb.nsf/FV/805933D56732F188852573C6006D4167">rule 4-7.2</a><br />
<br />
Section b) of my pretend statute above, will ultimately require an expansion. I fully intend to tweet a link to this article, when I am done writing. Now, most of this will only be of interest to attorneys, so I am sure I am OK when it comes to this particular article. It will be a public tweet, but only my followers will get my requests. It seems as if using the "@" symbol behind someone else's twitter name without their permission could get you in trouble, if you are promoting a link or a website. What about hash tagging a very popular trend? What about hash tagging something relevant so that people can find information? It seems as if this "public post" rule will need further clarification as technology progresses. <br />
<br />
However, it also seems to exclude public posts, which would be searchable in twitter, which are not specifically pointed towards anyone<br />
<br />
<span style="font-size: large;">Inherent Pitfalls in Social Networking Sites</span><br />
<br />
<u>Linkedin</u><br />
<br />
Attorneys are not allowed to declare themselves experts in a field. They can, however, be board certified.<br />
<br />
<br />
When I signed into my linkedin account today (which is incredibly rare) I noticed that it was telling me that my profile was at 87% completeness. It gave me a progress bar as an indicator, which had a yellow sickly look, and desperately itched to turn green and show a stick and two goose eggs next to the percent sign.<br />
<br />
I looked for the portion that was incomplete:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbVLwBh5sB5XqDCGQsUDvEHwDC3d6h5r_GtJ0AKyvaKzMhoC5NvzwBFZZ_mX7AqWGwiVom5MkRdQc_o-1BtTmoMOOGN72xH-NPODq9tb57tBJlzOxIAPsHaoZgAQnEIzGdhTu_rc2mIRo/s1600/linkedin.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="395" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbVLwBh5sB5XqDCGQsUDvEHwDC3d6h5r_GtJ0AKyvaKzMhoC5NvzwBFZZ_mX7AqWGwiVom5MkRdQc_o-1BtTmoMOOGN72xH-NPODq9tb57tBJlzOxIAPsHaoZgAQnEIzGdhTu_rc2mIRo/s640/linkedin.JPG" width="640" /></a></div>
Now I remember why I left this part blank. It says "Skills & Expertise." The reason I include the screen capture of this is solely because it can be funny to lawyers who understand the logical use of the word AND and OR, not to mention the ampersand symbol. The grayed out words in the middle say, "Enter your skill OR expertise." Florida bar prohibits the use of the word expert, or expertise, to describe services but would most likely accept "skills." Logically, if it is an "or" Statement, then it is either a skill or an expertise, or both. The ampersand, standing for "and", means it is BOTH a skill and an expertise. This is how it would be seen by the general public. Therefore, I believe, that putting criminal law or any other words in this section is inherently unethical, unless an attorney wanted to add truly unrelated skills such as kung fu or linux administration. <br />
<br />
<u>Facebook</u><br />
<br />
First, let me confess that I don't really "get" facebook. I honestly don't know where features are within the interface, but this isn't from a lack of computer knowledge, it is instead from a lack of Facebook use. The most intriguing part about Facebook to me is that it is cataloging a massive database of the human experience, ranging from the exciting exchange of new ideas and information, to what someone had for breakfast that morning. This exchange of personal information and ideas will ultimately lead to great change.<br />
<span style="background-color: white;"><br /></span><br />
<span style="background-color: white;">My friends on Facebook rarely see any activity from me. My personal Facebook is a mixture of random people that friend me, real friends, and people I friend-ed. Sometimes, if I read an article about someone that is interesting and they have a Facebook, I will send them a friend request.</span><br />
<span style="background-color: white;"><br /></span><br />
<span style="background-color: white;">While I do make good attempts to keep a clean line between my personal time and my business time, I have never made such attempts when it comes to my personal facebook and my business facebook. I have created a business page, but that is about as far as I got. </span><br />
<span style="background-color: white;"><br /></span><br />
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/MuboHfvmdwU?feature=player_embedded' frameborder='0'></iframe></div>
<span style="background-color: white;">Needless to say, writing a script that targets people who use the term DUI in a public post, or car accident, and then reaches out to message them on facebook regarding legal services, would be improper. The technology of </span><a href="http://weknowwhatyouredoing.com/">http://weknowwhatyouredoing.com/</a> could readily be applied to this unethical enterprise, to seek out people complaining about their daily lives. Ambulance Chasing/Facebook chasing. Potential search terms "Hospital" "wreck". See Danny DeVito in "The Rainmaker"<br />
<br />
<br />
<br />
<u>Legalzoom</u><br />
<br />
The legality of Legalzoom and Quicken Family Lawyer has been decided by a number of courts to not be an unlicensed practice of law. Legalzoom and other form sites like it, following their success, they were emboldened to go even further, and offer attorney services directly from their website. They have set up a buffer, in the form of an attorney referral company. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwynK3UatKZKAfpDWzcVR_cFtVTTrWHSkKjlm37cwDz9D-NmOOegJGFLcw-qM_VphMXDwMd6tGPWMY7YVo2tiflzQE2hk0EpCc4xIeKIZ29krc3XGrgXwkuzZ0hVLqyvpHlbauaUaCqnQ/s1600/legalzoom.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="245" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwynK3UatKZKAfpDWzcVR_cFtVTTrWHSkKjlm37cwDz9D-NmOOegJGFLcw-qM_VphMXDwMd6tGPWMY7YVo2tiflzQE2hk0EpCc4xIeKIZ29krc3XGrgXwkuzZ0hVLqyvpHlbauaUaCqnQ/s320/legalzoom.jpg" width="320" /></a></div>
The form market is a big business. The attorney market is a big business. Companies like legalzoom have attorney Robert Shapiro pitching for them on TV, as a spokesperson. Their website tries to make very clear that they are not attorneys. They are more worried about sales of a form, than whether a form will fit a particular purpose. There is no customization of a legalzoom form other than what they permit. Rocketlawyer, falls to this same pitfall, as do most others. <br />
<br />
<br />
<br />
<br />
<u>SEO Ethical Issues</u><br />
<br />
I readily admit to doing stupid word link based SEO on my own sites, where I am permitted to control the content. On other blogs, if I posted a comment, I wouldn't even think of creating a link, except to my page, but not by including a search term.<br />
<br />
On this blog, I have noticed many attorneys who hire SEO companies to make comments like (Thank you, this will really help with my legal research) and then sign it "houston criminal attorney". I have traced the IP's back to China. So, there are some attorneys out there who are hiring SEO Companies who are in turn hiring chinese citizens to write blog posts using fake names and creating links to help search engine optimization. Based on some of the comments, and their lack of relevance to blog posts, these Chinese SEO subcontractors likely don't have even a rudimentary grasp of English.<br />
<br />
<u>Customer Reviews</u><br />
<br />
I see some law firms with 30+ reviews on sites like google places and yelp. I do not care what kind of success rate a person has, most people do not take the time out of their day to comment about the services their attorney is providing. How many of these reviews were solicited? <br />
<br />
Any attorney has always known that word of mouth is the most powerful tool for bringing in business. As things progress, "Word of Mouth" will have less to do with what is spoken, and have more to do with what is typed or otherwise recorded online. <br />
<br />
<u>Avvo</u><br />
<br />
Don't even get me started on avvo. I don't think that they are doing anything directly unethical, but the "Rating" system is off kilter. Then again, I think that the <a href="http://www.martindale.com/Products_and_Services/Peer_Review_Ratings.aspx">Martindale-Hubbell rating system</a> is off kilter as well. Some attorneys have no clout in a community, and are unknown by judges and other attorneys. These people still have and serve clients. The best thing that Avvo has done, it has all but destroyed what used to be an over simplistic monopoly. It adds in, for at least some portion, client satisfaction.<br />
<br />
<blockquote class="tr_bq">
"Martindale-Hubbell Peer Review Ratings were created in 1887 as an objective tool that would attest to a lawyer's ability and professional ethics, based on the confidential opinions of other lawyers and judges who have worked with the lawyers they are evaluating," said Mike Walsh, President and CEO, U.S. Legal Markets at LexisNexis. - Quote lifted from <a href="http://www.donleylawpc.com/about.html">http://www.donleylawpc.com/about.html</a> </blockquote>
<blockquote class="tr_bq">
<span style="font-size: x-small;">And since I used his research, I will willingly plug him with one of those nasty links. <a href="http://www.donleylawpc.com/bio.html">colorado springs probate attorney</a> I don't know him, but he seems like a good enough guy. He's AV rated, so he must be right?</span><span style="background-color: white;"></span></blockquote>
<div>
<span style="background-color: white;">The way that the quote is worded, it makes it seem like it was designed to help judges discuss whether a lawyer was able or ethical. But let there be no mistake about it, Martindale-Hubbell Peer Review ratings were designed for the public, for the purposes of advertisement, and seem to me like they should be included in </span><a href="http://www.floridabar.org/divexe/rrtfb.nsf/FV/805933D56732F188852573C6006D4167">rule 4-7.2</a> 's restriction on the characterization of services.<br />
<br />
It also seemingly promotes the "good old boy" system where the losers and winners are picked from within the community, and not by the consumer.</div>
<div>
<br /></div>
<div>
A new commandment should be issued:</div>
<div>
<span style="background-color: white;">d) Thou shall not use a scale from one interval to another interval, to define the characteristics of an attorney.</span></div>
<div>
<br />
Avvo is based on a game theory, to achieve the goal of a 10.0, or a level 15 contributor, and has many attorneys running around like hamsters in wheels. The whole thing smacks of role playing. "My attorney is a level 15 contributor to avvo with 40 hit points, 10exp and 1 magic." I know you're thinking I'm a role playing geek right now, but I am proud to say I was thrown out of every role playing game I was ever asked to participate in.</div>
<div>
<br /></div>
<u>The Solution</u><br />
<br />
I see so many emerging websites and dangerous trends for attorneys on the web. Some of these amount to very complicated profit splitting. None of them are truly adequate.<br />
<br />
What is needed is a website where an attorney will be able to control his content, sell his own forms, and offer his own services for review, cutting out the middleman. Advertising alone could be worth hundreds of thousands. It could combine the best of all services, but provide for content from attorneys, allowing them to interface with the public and sell their own materials rather than reviewing a legalzoom contract or a rocketlawyer contract.<br />
<br />
Preferrably one with a consumer only based rating system or none at all. Rating the FORMS of an attorney should be much better than rating the CHARACTER of an attorney. <br />
<br />
And now that I look back on the post, I am already a little wary of my Avvo rating slipping from negative commments, and Martindale-Hubbell not letting me be peer reviewed. <br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com0tag:blogger.com,1999:blog-2553061942279365161.post-10794829695884927382012-07-20T14:32:00.000-04:002012-07-20T14:32:15.875-04:00Building a Solo Office with a Megafirm Infrastructure and Low Overhead<br />
<b id="internal-source-marker_0.6078055377583951" style="font-weight: normal;"><span style="background-color: transparent; font-size: 29px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;">Building a Solo Office with a Megafirm Infrastructure</span><br /><span style="background-color: transparent; font-size: 29px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">The purpose of this article is to inform and inspire ideas in developing tools and techniques to reduce the overhead and maximize the infrastructure of solo legal and small firm practitioners. </span></b><br />
<b style="font-weight: normal;"><span style="white-space: pre-wrap;"><br /></span></b><br />
<span style="white-space: pre-wrap;"><b>It was written two years ago, and I have adapted new technology, and massively improved this setup.</b> I also didn't really take the time to edit this article for grammar or continuity.</span><br />
<span style="white-space: pre-wrap;"><br /></span><br />
<span style="white-space: pre-wrap;">But, this is what got me going in the beginning. I decided to stick some more information in places, like my change of Voip provider.<span style="font-weight: normal;"><br /></span></span><span style="background-color: transparent; background-color: transparent; font-size: 16px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">Many of the software tools discussed in this article are free and easy to use, and the rest are free or cheap and require a tech savvy background to properly deploy and administer.</span><span style="background-color: transparent; font-weight: normal; vertical-align: baseline;"> </span><span style="background-color: transparent; font-size: 16px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">All of the hardware discussed is intended to offer suggestions and to provide a real operating environment example. </span><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"><br /></span></b><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">This is not a suggestion of hardware or services, but instead outlines solutions for creating low overhead within the law office. Much of the hardware was selected by the author solely because it was available or otherwise inexpensive. </span></b><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"><br /></span></b><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Total investment is around 4,000.00-5000.00 for two computers, a scanner, and a network printer. </span></b><br />
<span style="white-space: pre-wrap;">Total conservative monthly overhead is around $250.00 or $300.00 for a firm with 3-5 people. ($200 for good internet and $50.00 for phones). </span><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"><br /></span></b><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">A web or cloud based accounting system, with low overhead, that follows all rules of trust accounting in all states, and allows for the printing of checks, does not exist at the time of this writing. No one has created a cloud based accounting system which would have lower overhead than a standard edition of quickbooks, and no one provides cloud invoicing which would allow you to specify whether a clients credit card payment was to be deposited into a trust account. </span></b><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"><br /></span></b><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Another thing I would like to see is automatic scanning recognition and filing. With the widespread adoption of e-filing and service of legal documents by e-mail, a potential piece of software could be made to automatically file documents into a directory structure.</span></b><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"><br /></span></b><br />
<b style="background-color: white; font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Case styles (a.k.a. the thing at the top that makes a paper look like a legal pleading) are somewhat standardized. These could be indexed and automatically matched with incoming documents for party names and case numbers and counties and automatically arranged. </span></b><br />
<br />
<b style="background-color: white; font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">All PC’s operating in this environment are running a Microsoft OS, but the underlying infrastructure is heavily based on Linux based hardware.</span></b><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">I also assume that you are starting from scratch. Customized law firm software often provides a resistance to change. Database importation can be a pure headache. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 24px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;">Before You Even Have An Office</span><br /><span style="background-color: transparent; font-size: 24px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;">Practice Management Software</span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Do I use Pro-Law, Amicus Attorney, or Time Matters? What about Google?</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">All practice management software should perform certain tasks including: Conflict Checking, Calendaring, Contact Database, and keeping track of Client Matters and Files. Any Gmail account from Google includes a calendaring system, and a Contact Database that can be used for conflict checking. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">The contact database is even more amazing, when you know you will also be placing most of your phone calls for free, all over the country, for very little overhead, and plenty of room for expansion, and potentially from anywhere in the world with an internet or WiFi connection. Also, notes regarding phone calls, if answered and entered into the system, can be instantly shared between staff.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">For most solo and small practitioners, a spreadsheet, placed into Google Docs, can be a File Management System. Be sure to create a Client-File (1000-001) numbering system that makes sense, include the current status of the cases, and county case numbers.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;">Collaborative Gmail Account</span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Most solo and small firm practitioners have the same problem- the ability to share information quickly and freely with the one or two people they have backing them. This model is essentially a secretary-boss type model, but here we can consider it to be a paralegal-attorney type model. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">This model is scalable, and can be used not only by solo practitioners, but also small practices who use a standard paralegal-attorney type model. Not only team accounts can be used, but one master account could be used to link all the teams together. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">The idea is to create a “team” or a collaborative Gmail account at http://mail.google.com. For example, </span><a href="mailto:team1@gmail.com"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">team1@gmail.com</span></a><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"> where team1 is an identifier. This could theoretically be </span><a href="mailto:graham-lucy@gmail.com"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">graham-lucy@gmail.com</span></a><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">, or </span><a href="mailto:graham-secretary-lucy@gmail.com"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">graham-secretary-lucy@gmail.com</span></a><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"> or whatever the team name would be.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">After creating the new Gmail account, you can instantly enter in your contacts that you will share among the team. Gmail can import from a wide variety of databases and allow you to share among them.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">This collaborative Gmail account also gives you access to Google Voice, which you can use as a Phone Number for the Team. Sign in and create a google voice account at http://voice.google.com/ </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">A dedicated web browser is not needed, because you can just use the browser you are most comfortable with, however, I suggest using Google Chrome as a stand alone practice management tool. You can set the default windows to open in Google Chrome to the following pages automatically:</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Google Calendar, Google Docs, Google Voice </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">You now have: </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">1) A calendar that can be shared, updated, and seen by anyone you wish that has a Gmail account. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">2) Calendars and Contacts that can automatically sync with an iPhone or other Exchange enabled device (Windows, Android, various Smartphones, iPad, iPod Touch, etc.) (You should Use the Exchange Method to sync calendars and contacts, not Imap or the built in Gmail account Settings, See <a href="http://www.google.com/support/mobile/bin/answer.py?hl=en&answer=138740">http://www.google.com/support/mobile/bin/answer.py?hl=en&answer=138740</a>)</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"> </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">3) A phone number that can be used solely as a contact for the team, or a main office number (for security and porting, your main office number should be a non-google voice number, forwarded to a google voice number). </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">4) A log of all incoming calls on the Google Voice number with the ability to enter notes.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">5) Transcription service of incoming voice mail messages.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">6) The ability of the “team” to accept text messages to their Google Voice Number.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">7) The ability to initiate calls directly from the web browser.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">8) The ability to share a Google Doc spreadsheet which contains all your case numbers, client information, case status, etc.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">After creating a team collaborative Gmail account, each user can create an individual Gmail account (i.e. </span><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">syfert@gmail.com</span><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"> and lucy@gmail.com). The collaborative Gmail account should be set up to forward all e-mail to the individual team members, so that Google Voice notifications, if desired, forward to all team members. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Through using Google Voice features (Such as * to forward an incoming calls to Google Voice enabled phones, useful for forwarding after someone answers the call, 4 to record an incoming call, and the ability to transcribe and text voicemails to cell phones) you can effectively have an operational office, with a Paralegal-Attorney type scheme, all operating remotely from different locations. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Depending on your cell phone provider, your cell phone plan, and your Google voice setup, if you have unlimited calling to and from certain numbers, you can use Google voice to receive and to place all of your office calls for free, from your cell phone, without exposing your true cell phone number.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;">Fax Machine</span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">I have struggled with many different fax services, and ideas for receiving faxes. The best solutions are efax services. They provide you a dial-in number which you can put down as your office fax number, and then they can e-mail to selected accounts. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><a href="http://www.myfax.com/"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">http://www.myfax.com/</span></a><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"> is one such service that provides economical faxing for personal and small business, usually around $10-12 per month for 500 pages of faxing. That’s one ream of faxing for $10.00 per month. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">You can set up your e-fax service to point to your collaborative Gmail account, and the fax will show up in </span><a href="mailto:lucy@gmail.com"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">lucy@gmail.com</span></a><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">, </span><a href="mailto:grahamsyfert@gmail.com"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">grahamsyfert@gmail.com</span></a><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">, as well as </span><a href="mailto:team1@gmail.com"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">team1@gmail.com</span></a><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"> or </span><a href="mailto:graham-lucy@gmail.com"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">graham-lucy@gmail.com</span></a><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">, or whatever the collaborative gmail account is. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;">Use of Google Talk Between Computer Workstations</span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Since both Attorney and Paralegal have Gmail accounts, it is only natural that they can communicate between computer workstations by using a text chat program. If they are both working remotely, text communication between two computer workstations, can be used to inquire about availability to take an incoming call. If the Attorney chooses to accept the call, the remote answering paralegal could hit * and then do an assisted transfer to the Attorney on the other end.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Google Talk is found embedded within the Gmail window and allows a user to send text messages to cell phones, and text messages to other Gmail users. It also allows for video and voice conferencing between Attorney and Paralegal, if their workstations are so equipped. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;">iPhones, iPads and iPods</span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">After setting up and worrying with the attorney trust account, you of course wish to be able to accept credit cards. There are many various methods of accepting credit cards, and a million people trying to sign you up for their merchant services. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Deals are one thing, but convenience can be another. Also, can I do credit card deposits to both my trust account and to my law firm operations account?</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Using an iPhone or iPad, or iPod touch credit card solution is one way to accept credit cards, and all you need is access to WiFi. Solutions for credit cards are available from Intuit to interface directly with your Quickbooks, and allow you to accept credit cards from your iPhone, iPad, or iPod Touch. One potential solution to the credit card trust accounting dilemma was to sign up for two different merchant service accounts available through the iPhone.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">In addition to being able to accept credit cards, iPhones, iPads and iPod Touches are useful for calendar and contact syncing with your collaborative Gmail account. http://www.google.com/support/mobile/bin/answer.py?hl=en&answer=138740</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">If setup correctly, when the paralegal makes a schedule change, or adds a phone number to a contact on her iPhone, the attorney’s iPhone contact is automatically updated with the changes the paralegal made. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Of course, you can use your iPhone with your Google Voice account by adding your mobile number to your Google Voice account. It is also possible to use an iPad or an iPod Touch 4</span><span style="background-color: transparent; font-size: 10px; vertical-align: super; white-space: pre-wrap;">th</span><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"> Generation or later with your Google Voice account, with the iPad being akin to a high quality speaker phone. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Thanks to the iPhone and Google, your basic office infrastructure is in place, and you do not even have an office. This gives you time in setting up your office that you might not otherwise have available, and saves you from being at the mercy of the phone and internet installer. It also creates a nearly fool proof method of not missing incoming communication, if you have the right support base.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 24px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;">Building the Office</span><br /><span style="background-color: transparent; font-size: 24px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Most offices come equipped with cat5 ethernet cable, which allow for computers to be plugged in to each other using routers, hubs, and switches. I cannot express enough the need and desirability of this method of network creation over Wifi. Wifi is fast, and is reliable, and will likely improve by leaps and bounds over the upcoming years.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Regardless of that, nothing compares with </span><span style="background-color: transparent; font-size: 16px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;">not</span><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"> relying on WiFi, and so far, nothing is faster than actual wires. Almost all headaches with internet, server disconnections, slow internet speed, etc., in an office environment, stems from use of WiFi. That being said, for the devices such as the iPhone, iPad, and iPod touch, any office should have WiFi.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">You have called your internet service provider, and they have provided you with a place to plug in a computer, or they have provided you with a place to plug in many computers, and sometimes a WiFi access point built in. If you have been provided with a place to plug many computers, you might have an internet device which has a </span><span style="background-color: transparent; font-size: 16px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;">STATIC IP.</span><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"> These devices are not preferred. Tell your internet company that you prefer a DSL Modem or a Cable Modem, and not a DSL Router or Cable Router. These devices usually have a </span><span style="background-color: transparent; font-size: 16px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;">DYNAMIC IP. </span><br /><span style="background-color: transparent; font-size: 16px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">For the purposes of ease of setup, a dynamic IP, with no ISP router, is preferred.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;">Selecting Your Network Router, Backbone, The Core, Etc.</span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">The main device fueling your network and sending signals to all your computers and devices is the network router. Rather than use the one provided by the ISP, you want to have one that passes the internet IP directly to the router and does not use a NAT (see above regarding ISP provided routers for multiple computers). </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Companies and firms can spend hundreds of thousands on these devices, and tens of thousands of dollars for certain features such as VPN or Virtual Private Network connections.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">In consumer models, these features are not present, however, they usually do provide built-in Wifi support.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Luckily, there is no need for spending that much money to get a feature rich router. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">DD-WRT is a linux based firmware which is free and installs on many models of routers, and is also available pre-installed on a number of routers from Buffalo.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Information and devices supported regarding DD-WRT is available at: </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">http://www.dd-wrt.com/</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">I purchased a Buffalo WZR-HP-G300NH, with DD-WRT pre-installed for around $70 near the time of this writing. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Whether you are completely tech savvy, or not very tech savvy, purchasing a router that is running dd-wrt will save many headaches regarding connectivity issues. Even if you have to pay a neighborhood kid to set it up, it is worth running to eliminate connectivity issues.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">With DD-WRT you will be able to remotely connect to your service via VPN, if you configure it properly.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><a href="http://www.dd-wrt.com/wiki/index.php/VPN_%28the_easy_way%29_v24%2B"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">http://www.dd-wrt.com/wiki/index.php/VPN_%28the_easy_way%29_v24%2B</span></a><br /><a href="http://www.dd-wrt.com/wiki/index.php/VPN_%28the_easy_way%29_v24%2B"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span></a><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">And, to make it easier to remember the IP address of your office system, and for the PBX you might want to install, you should configure a Dynamic DNS system in the DD-WRT router.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;">A Nearly Free Phone System</span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">For someone looking at starting up a small firm or solo practice with multiple employees, the phone system is one of the most costly and biggest worries. It is also the vein of your business and essential to client communication. Adding a line for a new employee could be a rather large expense on a traditional telephony system. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Voice over IP telephony is the perfect solution to the telephone scalability issues. And, incorporating your Google Voice account, you can purchase an IP telephone and for around $20 per month, have unlimited long distance and incoming calls and two lines.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">A simple two line phone system can be created using IP telephones (i.e. Polycom 550, Polycom 300, Cisco SPA942) and signing up for an account with </span><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"><a href="http://www.callcentric.com/">http://www.callcentric.com/</a> I </span><br /><a href="http://www.callcentric.com/"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span></a></b><br />
<b style="font-weight: normal;">I now use <a href="http://sipstation.com/">SipStation</a> for 24.99 a month, because you can add multiple numbers inexpensively and it helps with call routing.<br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"><br /></span></b><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">You can program the Polycom 550, or any other IP phone, to interface with Callcentric, providing you with a local phone number that allows for unlimited dial-in for around $8.95 per month and dial out at 1 cent per minute. However, if you use Google Voice to initiate your outgoing calls, Callcentric will see all those outgoing calls as incoming and will therefore be free.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">With Free PBX, your Google voice account may be sufficient to allow each person to have their own account. However, you would need to ensure that the Google Voice account routed to their workstation is not the google voice account that they would use on a daily basis to check their e-mail.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">iPhones, iPads, Computers, and iPod Touch 4</span><span style="background-color: transparent; font-size: 10px; vertical-align: super; white-space: pre-wrap;">th</span><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"> Generation devices can be used as telephone extensions using a variety of Voice over IP telephony programs. iPads and iPod touches can be used directly with the Callcentric accounts using programs like Acrobits, http://www.acrobits.cz/, and Google Voice accounts using programs like Talkatone, </span><a href="http://www.talkatone.com/"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">http://www.talkatone.com/</span></a><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;">A Nearly Free PBX Office Telephone System</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">(Advanced Computer Users Only)</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Once you get comfortable configuring IP telephones for use with Callcentric, you may be willing to tackle the core of every large office communications hub. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">PBX in a Flash is available for free download at </span><a href="http://pbxinaflash.com/"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">http://pbxinaflash.com/</span></a><br /><a href="http://pbxinaflash.com/"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span></a><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Installation of PBX in a flash is simple and straight forward, however, for documentation on configuration and installation, as well as scripts to allow for easy configuration, it would be suggested to head over to </span><a href="http://nerdvittles.com/"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">http://nerdvittles.com/</span></a><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"> and look at their information on Incredible PBX. </span><a href="http://nerdvittles.com/?p=712"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">http://nerdvittles.com/?p=712</span></a><br /><a href="http://nerdvittles.com/?p=712"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span></a><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Incredible PBX is an add-on to PBX in a Flash which contains scripts that allows for free outbound Google Voice dialing (you can use the Google Voice account you set up in the collaborative Gmail account).</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">For my small office, I purchased an Aspire Revo for $189.00, in accordance with the Nerd Vittles instructions, and installed Incredible PBX. These machines now sell for $400.00 or more, but a wide variety of computers can handle FreePBX with ease. While PBX in a Flash and Asterisk server administration are not for the faint of heart, once it is configured, it is hands off. It will handle the Callcentric accounts that you setup for the Voice over IP office phones. (see freepbx, trixbox instructions at callcentric) </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">The Callcentric accounts you created (or, “voice over ip phone lines”) or any other Voice over IP providers you wish to use can be added as trunks of the PBX system, and can allow for dial out, as well as dial-in ringing multiple phones at once, allowing for transfers, for individual voicemail, and just about any other feature you might want in a phone system, including things that you would never use in a solo/small firm situation.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;">Copy Machine</span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Having litigated a number of them, the last thing I wanted to do was sign a contract on a copy machine. I did inherit one of those all in one flatbed copy machines with a sheet-fed scanner, but it was slow and bulky, so I needed a new solution.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">My first purchase was a high speed sheet fed scanner. And while I did not do all the shopping I could have, I purchased a Cannon ScanFront220 (roughly $1200.00) which I used to scan to my Gmail account and then I could print duplicates of the PDF on the all in one machine.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">The next purchase was an HP LaserJet P3015. The benefit of this particular model of printer, like many others, is that it accepts PDFs to be directly copied to the printer and then printed out. The Cannon ScanFront220 was then setup to directly send PDFs to the printer, and so with the press of a button, one copy would pop out of my printer, and it was much faster than my all in one machine. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Also, with the ScanFront220, I was able to simultaneously send a PDF copy to the server. So, not only did I have an electronic record of every document I copied, if I needed multiple copies, I could simply open up the PDF and hit print and select the number of copies I wanted to print. One scan, a key stroke and three clicks is as much work as a large copy job on a large professional machine.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;">File Server</span><br /><span style="background-color: transparent; font-size: 16px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Typically, all that is needed for a file server system is a shared folder that is accessible by many users. If you have two or fewer users, a professional version of a Windows OS will allow multiple users to connect to a shared folder.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">However, if you also want the ability to possibly be able to host your own website someday, you can go the next step and purchase a computer and install Ubuntu Linux or many other varieties. </span><a href="http://www.ubuntu.com/"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">http://www.ubuntu.com/</span></a><br /><a href="http://www.ubuntu.com/"><span style="background-color: transparent; color: blue; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span></a><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Like asterisk phone system administration, linux administration is also not done by the faint of heart. However, the Ubuntu default interface is so user friendly, with the common tasks available (such as sharing a folder) through the GUI interface. </span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">Ubuntu was selected only because of the wealth of online documentation and howto’s that are available.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">After the installation of Ubuntu, the program called Samba is what allows the server’s share to be seen by windows computers.</span><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"></span><br />I have used multiple cloud backups with Ubuntu, to ensure that no data will be lost. My current project is to incorporate those files into Google Drive and have a truly web based backend to all document editing. It is ongoing, and I am awaiting google engineers to finish the google drive client for linux.<br /><br /><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">The biggest benefit behind a linux machine, is that any task you can dream for a server to do, can be accomplished with enough know how and effort. However, the average user, just wants to make sure that the server is stable and can be used to share files. Once the Linux machine is installed and available on the internet, freelance linux experts can be hired to do higher configuration, of webservers, domain name servers, and a variety of other services for which you would normally pay. I suggest </span></b><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"><br /></span></b><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"><i>Web Server</i></span></b><br />
<b style="font-weight: normal;"><span style="background-color: transparent; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"><i><br /></i></span></b><br />
<span style="white-space: pre-wrap;">Every office has an internet connection. Why pay hosting fees when you can host it yourself? Consider setting up an apache webserver on your linux machine.</span><br />
Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com1tag:blogger.com,1999:blog-2553061942279365161.post-64482946665796077002012-07-18T01:48:00.003-04:002012-07-18T01:48:35.606-04:00Florida Family Law Attorney - New law firm opening<a href="http://www.jacksonvilledivorcelawattorney.com/">Christopher Taylor in Jacksonville FL</a> has started a practice in Five Points, and it is located at 1529 Margaret St. Chris has been practicing law for 12 years, and has now decided to open up a solo practice devoting himself to the area of family law. <br />
<br />
In all candor, I must admit that this is a bit of an advertisement for his services by any person who finds my blog. What is different, however, than most blogs by attorneys, is that I am not selling my own services. <br />
<br />
I do family law, but only on a very limited basis. I choose not engage in many family law situations for many reasons. For all of those that trust me with their issues, this is an endorsement of Chris and a public well wishing to his firm to handle any Family Law issue from <a href="http://www.jacksonvilledivorcelawattorney.com/divorce.html">uncontested divorce</a> to <a href="http://www.jacksonvilledivorcelawattorney.com/child-support.html">child support</a>. It also will probably help with his search engine optimization, hopefully.<br />
<br />
<br />
<br />
<br />
<br />Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com82tag:blogger.com,1999:blog-2553061942279365161.post-19157986524712121352012-07-14T20:52:00.000-04:002012-07-14T21:19:32.393-04:00Odd Florida HolidaysOdd Florida Holidays:<br />
<br />
<br />
Chapter 683, Florida Statutes, deals with <span style="background-color: white;"><a href="http://www.criminallawyerjacksonville.co/0683.html">Official Florida Holidays</a>. </span><br />
<span style="background-color: white;">Chapter 117, Florida Statutes, </span><span style="background-color: white;">deals with </span><a href="http://www.criminallawyerjacksonville.co/0110.117.html" style="background-color: white;">Florida government employee paid holidays</a><span style="background-color: white;">. </span><br />
<div>
<br /></div>
<div>
Chapter 683 contains some surprising information pertaining to contract law when contracts happen to use the term "Legal Holidays." There are a bunch which would qualify, which are not often celebrated.</div>
<br class="Apple-interchange-newline" /><span class="SectionBody" style="font-family: Verdana; font-size: 13px; line-height: 18px; text-align: left;"></span><br />
<div class="Subsection" style="margin-left: 2em; margin-top: 0.7em;">
<div style="font-size: 1em;">
<br /></div>
</div>
<span class="SectionBody" style="font-family: Verdana; font-size: 13px; line-height: 18px; text-align: left;">
</span><br />
<div class="Subsection" style="font-size: 1em; margin-left: 2em; margin-top: 0.7em;">
<span class="SectionBody" style="font-family: Verdana; font-size: 13px; line-height: 18px; text-align: left;"><br /></span></div>
<span class="SectionBody" style="font-family: Verdana; font-size: 13px; line-height: 18px; text-align: left;">
</span>Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com2tag:blogger.com,1999:blog-2553061942279365161.post-71123429300074979752012-07-10T19:54:00.001-04:002012-07-10T20:06:46.529-04:00Nu Image - Dunlap, Grubb and WeaverNu Image is now seeking settlements in a case in the Middle District of Florida.<br />
<br />
As always, I can be contacted for representation. Read my <a href="http://www.syfert.com/">subpoena defense FAQ</a> and our conversation will be much more efficient.<br />
<br />
The lawsuit involves the download of the movie "Conan".Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com2tag:blogger.com,1999:blog-2553061942279365161.post-78996589009961819312012-01-12T22:31:00.000-05:002012-01-12T22:31:28.223-05:00New FAQ on ISP Subpoena Defense and Copyright infringement up at www.syfert.comI have posted a new FAQ on ISP Subpoena Defense and copyright infringement. <br />
<br />
It is mandatory reading for all those who contact me from out of state regarding a Florida case. It will save me a lot of time on the phone.<br />
<br />
A link is up at <a href="http://www.syfert.com/">www.syfert.com</a>, but the direct link is <a href="http://www.syfert.com/copyright-infringement-defense-attorney/copyright-defense-faq1.html">here</a>.Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com0tag:blogger.com,1999:blog-2553061942279365161.post-86524662842696290752011-12-21T13:43:00.000-05:002011-12-21T13:43:56.513-05:00<a href="http://www.madisonrecord.com/news/240499-lightspeed-media-claims-hacker-accessed-porn-without-paying">http://www.madisonrecord.com/news/240499-lightspeed-media-claims-hacker-accessed-porn-without-paying</a> <br />
<br />
<br />
This case is similar to <b>Lightspeed Media Corp. v. John Does 1-160, State Case No. 2011-034345-0000-01 / Local Case No. 2011-34345-CA-01</b> except it is in Wisconsin. I would hesitate to guess that it is an individual suit against one John Doe. The article is unclear.<br />
<br />
Previous copyright trolls are now becoming "Computer Fraud and Abuse Act" trolls by filing pure bills of discovery and alleging that hacked passwords are being used. They have not addressed their biggest problem under the Computer Fraud and Abuse act... Intent.Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com0tag:blogger.com,1999:blog-2553061942279365161.post-76666926197933347042011-08-14T01:34:00.002-04:002011-08-14T01:37:33.013-04:00See www.grahamsyfert.com for Why I released The Motion to Quash for FreeI just posted up at <a href="http://www.grahamsyfert.com/">www.grahamsyfert.com</a>, and it is not a blog, and I don't expect it to be widely read in the future. It details my reasons for releasing the forms, without payment, from here on out. <b>Basically, everyone should contact an attorney and the innocent should have that attorney fight</b>. The forms are available for free at <a href="http://www.syfert.com/">http://www.syfert.com/</a>Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com1tag:blogger.com,1999:blog-2553061942279365161.post-7443514776397707962011-03-09T20:35:00.000-05:002011-03-09T20:35:55.989-05:00Criminal Lawyer JacksonvilleThe purpose of this blog post is simply to introduce my new domain name, <a href="http://www.criminallawyerjacksonville.co/">Criminal Lawyer Jacksonville.</a>Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com5tag:blogger.com,1999:blog-2553061942279365161.post-72288118574603867222011-02-18T18:27:00.000-05:002011-02-18T18:27:58.349-05:00BitTorrent receives attention at Senate Judiciary Committee hearing | Indie Pro Pub<a href="http://indiepropub.com/bittorrent-receives-attention-at-senate-judiciary-committee-hearing/313925/">BitTorrent receives attention at Senate Judiciary Committee hearing | Indie Pro Pub</a><div><br /></div><div><br /></div><div>This is an interesting tidbit regarding Bittorrent users and use of DNS blocking, or rather, deleting the DNS records of offending websites.</div><div><br /></div><div>Would they also be able to block IP addresses? No. This would not work like they want. The senators would be good to pass a different legislation.</div><div><br /></div>Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com0tag:blogger.com,1999:blog-2553061942279365161.post-87454612869133843012011-02-09T20:15:00.001-05:002012-07-14T15:28:41.165-04:00Sued for illegal downloads? Mass Bittorrent Litigation: An overview of the procedures and issues<span class="Apple-style-span" style="border-collapse: collapse; font-family: sans-serif; font-size: 12px; line-height: 18px;"></span><br />
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
Graham Syfert is the author of Self-Help forms for mass bittorrent litigation suits such as Maverick Entertainment, Voltage Pictures, Lightspeed, all versusa number of John Does. The forms are available through <a href="http://www.jacksonvilleforeclosuredefense.org/" rel="nofollow" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #007a94; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">his website</a>.<br />
<br />
<h3>
ANOTHER FAQ IS NOW AVAILABLE AT <a href="http://www.syfert.com/">http://www.syfert.com</a></h3>
</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
This guide is designed to be a primer on the procedure and an overview of the issues in current bittorrent litigation cases. It is designed to inform the average defendant of the available options for their defense, or settlement, of bittorrent litigation. <strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">This is not legal advice.</strong> It is merely a discussion of the pros and cons of settling or defending a lawsuit brought by an illegal download of a movie on bittorrent. Everyone's case is different. <strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Hire an attorney.</strong></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
This article is current as of the date that it was written and will not be updated.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<br /></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">I received a letter from my ISP stating that I can file a motion to quash a subpoena, what can I do?</strong> </div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
This means, that somewhere, wherever the lawsuit happens to be filed, the people who are suing you for allegedly downloading a movie are trying to reveal your identity. Your Internet Service Provider (ISP) does not have records of your internet traffic, but can, given certain information (your IP address), figure out what internet subscriber created the traffic. Where did they get your IP address? It is likely that a security company with a cyber security division was monitoring bittorrent traffic associated with the download of that particular movie.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
A motion to quash is a legal court pleading which asks the court not to reveal your identity to the Plaintiff. As of the date of this writing, the author can think of only two scenerios where a motion to quash might be successful: Witness protection program, or potential violent harm that might come as a result of the ISP revealing that information. Neither of these two are very likely scenerios to come about. Motions to quash do however, create more work for the people suing you, and therefore it will take more effort to reveal your identity. The issue that this presets in <em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">both</em> hiring an attorney <em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">and</em> trying to defend yourself is that you might make yourself a bigger target. If you have questions as to what makes you a bigger target, consult an attorney in your area as laws differ from state to state.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<br /></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">The lawsuit was filed in Washington D.C., Illinois, Texas, West Virginia, or some other state that I don't live in. Why?</strong></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
It is more than likely that the lawsuit was filed before your identity was revealed. Most courts have not yet decided on one sticky issue. Essentially, rules are in place in the Federal Court system as well as most state court systems which have to do with where a person can be sued. In general, it is almost always appropriate to sue a person WHERE THEY ARE LOCATED. This does not mean that an opposing person needs to sue you in the closest courthouse, but they do need to be in the right judicial district. </div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
So, how are they suing you so far away? First, it is likely that the case was a John Doe case. Once your identity has been revealed, you <strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">SHOULD</strong> be dismissed from the case. <strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">This will not stop the Planitiffs attorney from telling you that <em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">YOU</em> have been sued in court</strong>, but if they are in the wrong state, chances are JOHN DOE was sued as a place holder for your name, and when your name is identified, in one way or another, that case should be dismissed for lack of <a href="http://en.wikipedia.org/wiki/Jurisdiction" rel="nofollow" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #007a94; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">jurisdiction</a>. If the case is not dismissed automatically, an attorney in that area can file a motion to dismiss on your behalf unless you are defending yourself. </div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
If you wish to fight, and have made up your mind that you will not settle under any circumstances, you should hire an attorney in the <em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">LOCATION WHERE THE SUBPOENA WAS FILED</em>, and have him petition for dismissal in that location. Then, wait for the Plaintiff's attorney (see common law firm names below) to sue you in <em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">YOUR LOCATION </em>and hire an attorney in your state.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<br /></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">I received a demand letter for $_______ from __________(insert law firm name here), what can I do? </strong></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
Law firms included in this list are John Steele of Steele Hansmeier PLLC, Nicholas Kurtz of Dunlap Grubb and Weaver, the USCG or US Copyright Group, and many others. If the letter claims that you downloaded a movie, and is looking for money from you for doing so, then your identity has already been revealed and so a motion to quash will not protect your identity. It seems simple enough. They already have your information. <strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">They wanted your address to send you this letter</strong>, and they got it one way or another.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<br /></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">To Settle or to Fight</strong> </div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
For the question "Am I innocent?" you should consult with an attorney before jumping to conclusions. Some states may may hold you accountable for the actions of a minor child under your supervision, but this is rare theory of liability.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
If you are innocent, and did not download a movie or have any knowledge of the act, the good news is, you are probably not liable. The bad news is that it will cost you time and money to prove otherwise. One potential joy after hiring an attorney and taking the matter to trial is that you may recover what you paid in attorneys fees. </div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
If you decide to settle, make sure you keep accurate records. If your IP address changed in the middle of a bittorrent download, it is possible that you might be sued twice or receive multiple demand letters. Of course, with deciding to settle a case, you should again, always contact an attorney. </div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Deciding to settle or deciding to fight is why people hire an attorney. </em>However, for those of you who answered yes to "Am I innocent?" after consulting with an attorney, you should contact that attorney immediately and tell him you want to fight. You may be entitled to attorneys fees if you win at trial.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">To Settle or to Fight</strong> (Issues besides innocence)</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
Lawsuits such as those began by LFP, Larry Flynt Publishing ( Hustler ) and other lawsuits involving Pornography present a bigger issue. How many people who like to end up being known as the guy sued for downloading pornographic material? This, of course, is a great benefit to the Plaintiff's attorneys trying to get money from the cable subscriber. Not only is there the threat of a lawsuit hanging over their head, but potential embarassment as well. </div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
Plaintiff's attorneys will give you bare facts in their letters to scare you into settling out the case. Information is great, but understanding is better. You can arm yourself with stacks of case law, and even get good at writing legal documents. No matter how much you know, a lawyer will always be more comfortable than you in the court room.</div>
<div class="additional_resources" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 12px; padding-left: 0px; padding-right: 0px; padding-top: 24px; vertical-align: baseline;">
<h2 class="additional_resources_header" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 17px; font-style: inherit; font-weight: bold; line-height: 1.35em; margin-bottom: 4px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
Additional Resources</h2>
<div class="additional_resources_text" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<a href="http://www.eff.org/issues/file-sharing/subpoena-defense/" rel="nofollow" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #007a94; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">http://www.eff.org/issues/file-sharing/subpoena-defense/</a><br />
<a href="http://blog.grahamsyfert.com/" rel="nofollow" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #007a94; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">http://blog.grahamsyfert.com/</a><br />
<a href="http://www.syfert.com/" rel="nofollow" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #007a94; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">http://www.syfert.com/</a></div>
<div class="web_link" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<a href="http://www.syfert.com/">Motion to Quash - Bottom of Page</a></div>
<div class="web_link" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<a href="http://www.foreclosurelawyerjacksonville.com/">Jacksonville Foreclosure Defense</a></div>
</div>Ghttp://www.blogger.com/profile/04294661626744750761noreply@blogger.com2