Computer Policy (Email, File Storage, and Security)

When it is convenient for Trenner Law, written communications between you and Trenner Law will be via email. You should set your spam filter, firewall, and any other security devices so that you receive all communications from trennerlaw.com. You should also check in with Trenner Law if you believe you have missed a communication from Trenner Law that you were expecting.

You understand that Trenner Law cannot guarantee that communications and documents will always be virus free. In addition, you understand that the nature of the Internet is inherently unsecured and subject to attack by viruses and hackers, and therefore may result in a breach of confidentiality. If you do not want Trenner Law to communicate via email, you must so notify Trenner Law in writing.

Trenner Law may use cloud-based or other virtual computing technology to store and/or transmit your files and/or information about you. Trenner Law undertakes to maintain the integrity of all electronic files, including the use of backups, virus protection software, firewalls, and other computer security measures. However, you should also understand that there are no fail-proof measures, and that computers are subject to malfunction and attack by viruses and hackers.

You hereby expressly authorize Trenner Law to use the computing services described above, and others, as deemed appropriate by Trenner Law.