Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

How to Securely Exchange Large Files

By Daniel G. Rhodes
October 31, 2006

Foley & Lardner LLP is a full service national law firm that provides legal services to clients from growing companies to large multinational concerns. Much of this work involves the time-critical exchange of large documents and data with attorneys and clients both inside and outside the firm. Given the sensitive nature of these files, the challenge is how to give attorneys the ability to exchange the information in a secure way. Strategically, security is the easier part of the problem; the bigger issue is how to facilitate the exchange so that users are in control of the process instead of having to call for IT support every time the need arises.

As technology continues to evolve, most of the legal information in an attorney's typical day has become digitized. The problem, however, is that sending a couple of large file scans attached to an e-mail by one person can have a system-wide performance impact on every user since e-mail servers are not designed to handle heavy payloads.

On the other hand, since e-mail is the preferred communication and collaboration tool for users, our technology team has intentionally set no e-mail size limit within the firm's infrastructure to ensure maximum user productivity for clients. While this has necessitated constant vigilance to maintain the overall system, it also fulfills an important part of our mission in supporting Foley users.

Read These Next
Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

Legal Possession: What Does It Mean? Image

Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.

The Anti-Assignment Override Provisions Image

UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?