When
the recipient accesses the document, the user is notified.
Not exact matches
The WFLC is still arguing in court for
access to some 300 U.S.
documents that would show the process for choosing
recipients of the money.
For example, we can reference
documents by hyperlinks in emails and know that
access by the
recipient is reliable and secure.
Briefly, the controversy erupted when it was revealed that, in the process of investigating a potential leak from one of its employees, Microsoft
accessed the Hotmail inbox of a blogger that it suspected was the
recipient of the leaked, internal Microsoft
documents.
Instead, if you want to send a PDF or other file to
recipients of your email alert or newsletter (e.g., a copy of a court decision), upload the PDF or other file to your website or a «
document library» provided by your email services provider, and then insert a URL linking to the file inside the email that
recipients can click to
access the file.
When your
recipient clicks on the link, they can
access the
document without setting up a Box account.
Once you revoke
access, the
recipient can no longer open it — even if the
document has already been downloaded to the
recipient's own computer.
You can also set permissions for the
recipients, defining whether they have read - only
access or can also edit and print the
document.
Access stats for the link demonstrate whether the
documents have been previewed or downloaded by the
recipient.
109 See Hazelwood, supra note 19, at 286 — 89 (listing a number of ethical issues surrounding email that legal writing courses could raise, including third - party
access / interception, metadata, data retention, and inadvertent disclosure); Dragnich, supra note 36 at 15 (discussing how an email assignment could include lessons about confidentiality, attorney - client privilege, and «contemporary issues such as information security and removal of metadata prior to transmitting
documents»); Tracy Turner, E-mail Etiquette in the Business World, 18 No. 1 Persps.: Teaching Legal Research & Writing 18, 19 — 20 (2009)(discussing ethical and professional email issues, including when to use email versus other forms of communication, forwards and replies, and CC and BCC use); see also Shapo, supra note 3, at 345 («If you are forwarding a message to another attorney, for example, check that there is nothing in the thread that is not for the eyes of that
recipient.
PDF enables your
recipient to
access your
document, without troublesome metadata, and without worrying about what word processor they have on their PC.