Litigation Support, Realtime Reporting, Software, Technology, Uncategorized

Kick your case into high gear! Hire a Certified Realtime Reporter!!

When the stakes are high and quick turnaround is critical, insist on a Certified Realtime Reporter (CCR) to report the testimony. CRRs can provide interactive realtime by sending the testimony to your electronic device or over the cloud for others on your team to view remotely, and they can produce an uncertified rough draft at the conclusion of the deposition.

Not all court reporters are capable of providing these services, so be sure to request a CRR when you make your scheduling arrangements.  Less than 8% of court reporters hold the CRR designation. Doris O. Wong Associates, Inc., has several CRRs on its staff.

Recommended Software: CaseView is the industry standard for interactive realtime software, and it’s FREE.  There is a CaseViewNet download for Windows and an iCVNet app for your digital devices.  The realtime feed is sent over Wi-Fi or the Internet for remote locations.  No more cables or driver issues.


What you should understand about realtime using any smart device:

  1. You should expect a “useable” realtime transcript with limited untranslates. A Certified Realtime Reporter has been tested to write a minimum of 96% accuracy on first pass.
  2. Easily mark text, make annotations, and read along with the testimony.
  3. Don’t be alarmed if you see some stenographic outlines or misspellings. The reporter will make corrections when proofreading.
  4. At the conclusion of the deposition, the reporter will do a quick scan to remove the steno and provide an uncertified rough draft.
  5. Upon completion of the final edit, a certified transcript will be delivered to replace the rough draft.

Helpful hint:  In most instances, this is the first time the reporter will hear the subject matter.  Provide keywords, a caption, and as much information as possible for the reporter to review.  The more information provided ahead of time, the cleaner your realtime feed will be.

Realtime is a powerful tool for litigators.  Put it to work for you!

bots, cybersecurity, Malware, Phishing, ransomware, Technology

Don’t Click The Link!

by Linda Fifield

STARtech21 opened with “The Basics of Cybercrime and Cybersecurity” by Shoba Pillay, Partner, Jenner & Block. I was riveted the moment Attorney Pillay started speaking. The bad guys are out there. We need to know what to look out for and what tools we need to protect ourselves from becoming a victim.

We’ve all read about the security breaches with Equifax, Yahoo, Marriott, healthcare systems, schools, federal agencies, and the like. What are these cybercriminals looking for? How does this impact the individual, companies, or government agencies? By what means are these companies getting hacked?

The Equifax breach occurred between May through July 2017.  They discovered the breach and reported it in September 2017. Roughly 143 million people were affected.  The hackers grabbed credit information that consisted of names, addresses, DOB, social security numbers, driver’s license numbers, and credit card information. How could this possibly happen? The hackers knew of a vulnerability in the software that Equifax and other companies were using.  Equifax’s delay in updating the software allowed the hackers in.

We, ourselves, are open to phishing, malware, and bots every day we open our email or surf the net.  Phishing emails are sent from “trusted” companies hoping we’ll react to a link. A common hack is an email from a trusted vendor like Amazon thanking you for purchasing an item for $50 or UPS asking you to track a package. When you didn’t order anything or if you did, their hope is that you’ll click on a link to investigate the purchase.  Best case scenario, DON’T click on the provided link. Go straight to the vendor website and check your information from there.

Malware is a file that is downloaded onto your computer or smart device via a link or opening of an attachment. It can take over and infect your computer and network. A type of malware we’re all too familiar with is Ransomware.  Hackers are relying on one employee within a business to click on a bad link that puts a company network up for ransom.  You pay them back in untraceable Bitcoin, and they release your data.  Hospitals, schools, and government agencies are often victims of this type of malware. What precautions should you take? Have offsite redundant backups of your server. If you get hacked, chances are that you can restore an old backup. You might have lost some current data, but you aren’t victim to being locked out of your computer and/or paying the ransom.

Bots a/k/a web robots are considered the most dangerous threat on the Internet. Bots take over multiple computers and smart devices, often without your knowledge, to create a large network of computers to deliver spam, steal passwords, bring down networks, etc. Oftentimes you don’t even know that you’re infected. They use the network of computers to carry out distributed denial of service (DDoS) attacks. The worst can actually take down websites. One of the most notable cases involved Elon Musk’s Tesla. Make sure you only go to trusted sites and always keep your antivirus software updated.

The deep web is an “invisible” web that people who don’t want their activities tracked by traditional search engines visit.  One small part of deep web is the dark web. The dark web is primarily used for illegal activities:  illegal drug sales, murder and maiming for hire, hacking software for sale, sale of stolen credit cards and passports, child pornography, and peddlers. These sites are often monitored by federal agencies, but it’s still scary knowing that something so sinister is out there. Pretty disturbing.

Technology and the WWW is a wonderful thing.  Without it, we wouldn’t be able to provide the services as a court reporter to the legal community. It allows us to provide realtime, conduct depositions over Zoom, and create backups in the Cloud.  Unfortunately, there are those individuals who abuse the technology for financial gains, the stealing of intellectual property, and black market sales.

Best advice of the day:  Keep your software updated, keep regular backups, install good antivirus/malware software, don’t share personal information, don’t search nefarious sites, and Don’t Click the Link!!

Published in the STARdotSTAR Summer edition.

Technology, Uncategorized, Video Conferencing, Zoom

TECH TIP 11 – Breakout Rooms in Zoom

Off the Record discussions can be handled with Breakout Rooms in Zoom.

When counsel and the witness need to confer during a deposition, the Host can create a breakout room(s).  Breakout rooms can be assigned giving individuals the privacy needed.  It is similar to parties leaving the room. In this case, you are “leaving” the main session.

To initiate a Breakout Room, the Host must click the bottom of the Zoom Screen and select Breakout Rooms.  Once the room is set up simply Join the breakout room you are assigned to.  Once in the breakout room, you are free to have a private discussion.

Breakout rooms work the same as if you were in the main room. You have access to Chat and Share Screen with participants within your secure breakout room.

When you are done with your conversation, click Leave Room, Leave Breakout Room to return to the main session.

The Host is also able to send a message via Chat to participants in the Breakout Room requesting them to return to the session.

Hyperlinked Exhibits, Litigation Support, Technology, Uncategorized, Video Conferencing, Zoom

TECH TIP 10 – Share Screen Navigation Options

Share Screen allows all participants to View a document at the same time. This feature is best used for viewing jpg files and for annotations. You can also share video and audio files in Share Screen.

If you are viewing a multi-page document, depending on your version of Adobe, you can jump to a desired page. Type in a # where you see 1 / 11 and hit enter. It will jump to that page.

If your document is OCR-ready, CTRL+F to search for a word or phrase to get to the desired location within the document.

Protocol for sharing files in Share Screen:

To use Share Screen, click the SHARE SCREEN button located in your meeting controls. You will see a White Board, and file(s) you would like to view. Click on the desired file.

If you would like to give others the option to share files, the Host must click on the Arrow beside Share Screen at the bottom of the screen to let others share files. Choose Multiple Participants.

Share screen allows all participants to View one document at the same time. Only the person sharing the document can move the document on the screen. 

For a participant to take control of Share Screen, click the View Options drop down menu at the top of your in-meeting window and select Request Remote Control. Then click Request to confirm.

Aside from viewing the file, this is how others can annotate the document being viewed to then be saved as an exhibit, if needed.

ALT+S to Stop the share.

NOTE: Doris O. Wong Associates is happy to extract pages in a multi-page document that can be shared as one shorter file and/or hyperlinked to be shared in Chat.

Litigation Support, Technology, Uncategorized, Video Conferencing, Zoom

TECH TIP 7 – Sharing an Audio file in Zoom

While in Zoom, click on the green Share Screen at the bottom of your screen.

It will ask you to “Select a window or application you want to share”

Locate the MP3 file that you want to share and click on it.  Participants will be able to hear the audio file.

NOTE:  It’s most helpful to have the location of the MP3 file open for easy access.

To get out of Share Screen, hit the red Stop Share button.  You will be brought back to the participants.

MP3 files can also be hyperlinked and shared in Chat.

Litigation Support, Software, Technology, Video Conferencing, Zoom

TECH TIP 3 – Audio Feedback in Zoom

Multiple computers in one room creating feedback?

Click on the Up Arrow to the right of the Mute button.

ALL participants in the room need to “Leave Computer Audio”

Next, have someone call the phone number on the Zoom invite so everyone can hear the proceedings via a speakerphone in lieu of the computer.