Author image

Tech Lingo For Lawyers

You know how someone throws in some Tech word in a conversation and in that one short moment you decide that they are just showing off? Actually, they are not. But it is not in the legal DNA to admit that we don’t know, no way. I mean we could choke on our own ego, now why would we wanna do that? Ha..ha…I’ve gotchu. Yes, Counsel, I’m here with some spicy tech words which you can sprinkle on a conversation and sound like you just walked off the gates of Harvard Tech.

Let’s go.

1.    API- Application Programming Interface. The API allows software components to interact with each other. Think Mpesa when you are trying to install automated Mpesa payments on your website. The API gives you codes and authorizations which will enable your website be responsive to Mpesa payments.

2.    Big Data- Like the name suggests, there is largesse to Big Data. It refers to large sets of data that can be analyzed to display patterns, trends, and associations especially as it pertains to human behavior and interactions. An algorithm is used to determine the patterns and trends. Think internet searches. Depending on what you search for on the internet, through big data, it will be easy to deduce your lifestyle, where you live, where you shop, your level of education, whether you are married or not and interestingly, whether you are in love or not. That’s where the Big Data algorithm is at currently, and you have no secrets.

3.    Cloud- It would be great if cloud storage were actually up in the clouds where nobody could reach it, but it does come close. Cloud computing refers to shared computing resources to store information. The system utilizes networks of servers to deliver storage and applications over the internet rather than having local servers handle them and this allows for advanced security and larger storage space managed offsite.

4.    Dashboard- A dashboard is a user interface that organizes and presents information in a way that is easy to read. This is typically a configurable home page for a software system that gives you visibility into the areas that you access the most.

5.    Encryption- Encryption is the mathematical scrambling of data so that it is protected from hackers. This translation of data is the most effective way to hide private information from anyone who does not hold the key/password that enables the reader to view the decrypted information. Think of the green app.

6.    Firewall- Firewalls are all about your safety. They provide a barrier of security against hackers and viruses that could take over your computer system or access private data. This can be installed as hardware or software, and are most often used to prevent any unauthorized users from accessing private networks.

7.    Web Hosting- A service that enable you have a place where your website sits. In 2023 we are keeping things simple. For web hosting, a provider may offer shared hosting or dedicated hosting of a service to customers depending on their individual requirements.

8.    IoT (Internet of Things)- This is the ability to transfer data independently over a network connecting people, objects, wearable devices, animals, and machines.  Wouldn’t it be nice for your door to open itself for you and notify the coffee maker to brew you some piping hot drink? And then as you sit your coffee, the cup senses your mood and sends a signal to the radio to play exactly the kind of songs that suit that mood? Wouldn’t that be nice? Yea?

9.    Malware- Malicious software. This is any program or file that is specifically designed by hackers to damage or disrupt a system such as a virus, Trojan Horse, spyware, or programming that gathers information about a computer user without permission. Malware, malpractice, same wozzap.

10.    SaaS- Software as a Service. SaaS is a cloud computing model that allows users to access all features and functionality without the need to invest in the hardware installation, set-up, daily upkeep, and maintenance issues that arise with complete ownership. You only pay for what you use. You can choose modules within the software that you want to use and pay for. Think of it as renting software services and paying for them as a subscribed service or a month to month, quarter to quarter basis.

11.    UI- User Interface. This is the interaction between a user and technology. It refers to how easy it is to use the outlook of a technology service. Some UI elements would be fonts, colors, icons, menu options, the layout of the screen, and buttons as a way for the user to communicate what they want their system to do for them. The best platforms on the internet are ‘fool proof’, where the user does not have to think while using the service. Because you see, thinking is a distraction you don’t want your users to engage in when they are on your website, especially not if you are trying to get money off their pockets. The UI ensures that your user never has to ask: “Why I’m I here, again?” or “Don’t I have a job and three kids? Or “Why on earth I’m I struggling with a non-responsive button? Heh? Julia, why?”

12.    UX- User Experience. We are not as logical as we think we are. In the advent of ecommerce, every software developer aims for a UX that makes the user feel good. We are all about feelings. We love who we love because of how we feel. We buy this car and not that other one because (other than the moolah?), it is about how it enhances our UX. User experience is king. And cash of course, he..he.

13.    Cyber security- This refers to security measures on the internet, online and offline. Cyber security refers to the processes and protocols that ought to be in place to protect you against Internet-based security threats. For instance, your ATM has several security features embedded, which are cyber security measures. Again, when you are logging in to your Google account, several verification methods are applied. And the way it is going, Gmail are going to ask for tongue and corneal identification, you wait.

14.    Digital signature – Also known as a dry signature, which means a secure, unique, and verifiable mark that can authenticate documents, usually contracts, and is unique to the person signing. Digital signatures are legally recognized in Kenya under the Business Laws Amendment Act which came to force in the year 2020. The Act recognizes dry signatures (electronic) as valid signatures as equally as wet (ink) signatures. The only exception to this rule is the execution of Wills and Negotiable Instruments like bills of exchange, promissory notes and cheques. This provision leaves a wide playing filed for lawyers to digitize and innovate, seeing that most legal documents do require execution at one point or the other.

So, there you have it, ladies and gentlemen. Go impress those techies now, will yah?!

Written by Elixa on Tuesday May 14, 2024

Permalink -

« The Subtle Balance And Trade-Offs In Cyber Security (Part 2) - What In The World Is ChatGPT? »

Ready to delve into Elixa's features on a one-to-one?

Request Demo