Timothy B. McCormack, attorney, shares some of the “trade secrets” of technology law and disputes: Another area of development that I have seen in the area of cloud computing is on-line storage. Backup of computer systems across a firm, even if the firm is a solo practitioner with one attorney and staff, has always been a problem. Computers fail. Data gets corrupted. While there are many safeguards that can be taken to help protect business data, the most obvious is an off-site backup of the data.
Timothy B. McCormack lawyer in technology and Seattle native with noteworthy international experience: The personal computer has made it easier for lawyers to type letters themselves, format pleadings, and even communicate via email. In other ways the personal computer has increased the modern lawyer’s efficiency. Our staff is more efficient, our research is faster and, literally, we need to get up from our desk less often. And this measure of productivity is inversely proportional: the more we integrate technology into our practices, the less often we are required to get up from our desks. Beware: surfing the web does not count!
Timothy B. McCormack, attorney, shares some of the “trade secrets” technology for lawyers
Timothy B. McCormack, attorney for software in Seattle, discusses software issues: Consequently, to the extent the competing programmer can demonstrate that aspects of the original interface are functionally optimal, and that there are few ways to devise alternative interface elements that will perform the function equally well, reproduction of those original interface elements by a competing program will not infringe. (It must be borne in mind that the copyright in the interface is distinct from the copyright in the program. A competitor who invokes this exception pertaining to the interface must still develop the program generating the interface in a legal manner.)
Timothy B. McCormack, attorney at law, discusses what you should note copy: Both a computer program’s source code and object code are protected under copyright law. Thus, one should not copy code from one disk to another (i.e., make unauthorized copies unless such copying is for authorized back-up use), or view a program’s code and retype it into one’s own program without authorization. Computer applications such as a word processing program are subject to copyright law. Likewise, computer operating systems such as WINDOWS® are also subject to copyright laws.