Many devices execute wireless commands. The military knows the most about them. They employ a variety of robotic agents on land, underwater and over Federally Administered Tribal Areas of Pakistan.  Doctors utilize drug delivery systems that are like miniature submarines in our blood and digestive tract. 

            Consumers are trickle-down beneficiaries of expert systems. They have cloud computing, key fobs for starters and alarms, and Internet-programmed locks, ovens, HVAC, and home security. But what about attorneys? They control data-access from a distance.

            Hypersend® permits people to look at electronic evidence but not necessarily touch. It is a form of secure data transmission; a recipient’s password opens a viewer on the Hypersend Website. Close the computer screen and the message is gone. There is no recording on your hard drive and the text never left the server on which it was viewed. However, you need to make sure someone did not install a key logger on your computer, permitting them to record everything you looked at!

            Adobe Document Center® is not particularly user-friendly; but its features impress when you consider that there is no cost in 2008. Here is how it works: The sender of an electronic file controls who may look at it, the date and time and period of access, and whether they can do anything else but read (such as annotate, modify, sign, etc.). 

            Even if you allow a correspondent to store the document on their hard drive or send it to a thousand people, you can change your mind.  By “revoking” access, you vaporize all electronic iterations of the file, wherever they are in the World and on whatever type of media they are stored. (Well, you’re not really erasing it; because they never had it. You are denying permission to recall the document to view via the Adobe server, which acts as gate-keeper to the actual file that never left your hard drive.)

            Hypersend and Adobe Document Center might be circumvented by invoking the screen-capture function on your computer, but why bother?  The tools are designed to create privacy, not remove it.

            LoJack® for Laptops offers in addition to its discrete "call-home" feature a sort of doomsday data-destruction for stolen laptops. This can really be convenient if you work for the Department of Veterans Affairs or some other place where laptops seem to fly out of employees’ hands. Lojack is like giving the negligent employee a second chance to protect sensitive data (think SSN’s and credit card numbers).  But if a lawyer is so careless as to lose their computer in the first place, they also may not be backing it up. That could lead to a moral dilemma; protect client privacy or recover the files. 

            Technology on European express trains requires engineers to “check in” every few seconds to demonstrate they are still alive. In California, a Metrolink engineer was alive but inattentive apparently; the ability to brake remotely from a control room might have avoided his disaster. The best data file protection for attorneys would be remote encryption, allowing us to still recover work after we miss the proverbial red signal and the police have returned our computer. Better yet, we should password-protect drives or folders on a regular basis.