Posted On: February 29, 2008

News From ALA: American Libraries Direct

February 27, 2008.

Supreme Court rejects wiretapping suit

"The U.S. Supreme Court declined February 18 to consider whether plaintiffs who believed they had been spied on without a court order could challenge the legality of such surveillance without tangible proof—even if the proof is classified as a state secret. The rejection of the ACLU v. NSA appeal came two days after the expiration of the Protect America Act, which from August 2007 until February 16 legalized warrantless eavesdropping on phone and internet communications to U.S. homes, workplaces, libraries, and elsewhere...."

It’s official: SMU chosen for Bush library site

"The board of trustees of Southern Methodist University unanimously approved an agreement with the George W. Bush Library Foundation February 22 to locate the presidential library and policy institute on its Dallas campus. The agreement, which followed more than a year of negotiations, states that SMU was chosen over seven other competitors...."

Another power play in Boston

"Boston Mayor Thomas M. Menino has informed Boston Public Library President Bernard Margolis that the city will take control of the library’s nearly 200 trust funds—private contributions and bequests totaling about $54 million—to better monitor how the money is spent. The plan has incensed Margolis and some of his allies, who say it could have a chilling effect on donors and even lead to the money being spent outside the library system....
New York Times, Feb. 26"

Black history treasure trove at Temple University

"The Charles L. Blockson Afro-American Collection at Temple University in Philadelphia contains more than 30,000 historical items, some dating to the 16th century. It includes Paul Robeson’s sheet music, African Bibles, rare letters and manuscripts, slave narratives, correspondence of Haitian revolutionaries, and a first-edition book by W. E. B. DuBois. The collection has grown so much since Temple acquired it 25 years ago that it moved into a larger space on campus this month...."

FCC grills Comcast in net neutrality hearing

"FCC chief Kevin Martin February 25 targeted Comcast’s contention that delaying peer-to-peer file-sharing traffic serves user interests, appearing to sympathize with the cable company’s critics. Through pointed questioning at a public hearing (although Comcast tried to stack the audience) at Harvard Law School in Cambridge, Massachuetts, Martin seemed to be pushing a two-pronged agenda: Internet service providers should be as transparent as possible about manipulating network traffic, and consumers should have the freedom to get what they pay for....
C|Net news blog, Feb. 25; Computerworld, Feb. 27"
Associated Press, Feb. 23

Information isn’t reserved for books

"Research librarians say their powers have been unfairly dismissed in the online age. Not only can they outsmart Google’s dead ends and weaknesses, librarians say, but they can help people surf faster and smarter by showing them hidden databases and tricks. “It’s one of the most misrepresented professions,” said Saima Kadir, a reference librarian with the Houston Public Library...."

10 emerging technologies 2008

"Technology Review presents its list of the 10 technologies that are most likely to change the way we live. Find out more about modeling surprise, probabilistic chips, nanoradio, wireless electricity (shades of Nikola Tesla!), offline web applications, graphene transistors for speedier computer processors, and reality mining (learning human behavior through cell-phone user data)...."
Technology Review, Mar./Apr.
Houston Chronicle, Feb. 22

The life cycle of a blog

"Frank Rose writes: “You have a blog. You compose a new post. You click Publish and lean back to admire your work. Imperceptibly and all but instantaneously, your post slips into a vast and recursive network of software agents, where it is crawled, indexed, mined, scraped, republished, and propagated throughout the Web. Within minutes, if you’ve written about a timely and noteworthy topic, a small army of bots will get the word out to anyone remotely interested. Here’s how the whole process goes down.”..."
Wired 16, no. 2 (Feb.)

To see complete issue of American Libraries Direct with links to articles included, click here.


Posted On: February 29, 2008

Status of New Library of Congress Class Schedule for Indians (Indigenous Peoples in the Americas)

QUESTION:

Does anyone know when this new schedule is coming out?

Library of Congress classification schedule KIA - KIX for Law of the Indigenous Peoples in the Americas.

ANSWER:

The Library of Congress classification schedule KIA - KIX for Law of the Indigenous Peoples in the Americas is currrently under development and it is not anticipated to be available before March 2009. Questions or comments may be sent to cpso@loc.gov

| Share
Posted On: February 29, 2008

Ten Top Stories from the ABA Journal Weekly Newsletter

February 29, 2008:

Our Top Ten Stories of the Week
Law Firms
Large Law Firms Prepare for a Slower Year
Feb 25, 2008, 05:51 am CST

"Large law firm leaders and consultants say legal work is slowing in several segments, leading them to expect a less than stellar year in 2008. Last year was a boom time for many firms, which saw revenue growth of more than 10 percent on average...."

--------------------------------------------------------------------------------

Law Firms
Loss of Bankruptcy Rainmaker Shows Weil Gotshal 'Time Warp'
Feb 25, 2008, 06:38 am CST

Lawyer Pay
Top In-House Lawyers Make $645K, Survey Says
Feb 26, 2008, 05:54 am CST

U.S. Supreme Court
Supreme Court Finds No Per Se Rule Against 'Me, Too' Evidence
Feb 26, 2008, 09:34 am CST

U.S. Supreme Court
Linda Greenhouse To Take N.Y. Times Buyout
Feb 27, 2008, 05:13 pm CST

Work/Life Balance
How Alston & Bird Improved Retention by 6 Percent
Feb 25, 2008, 01:06 pm CST

Lawyer Pay
Salary Wars Pit Associate Pay Against Partner Profits
Feb 27, 2008, 05:31 am CST

Patent Law
Troll Tracker Outs Himself, $15K Reward Remains Unclaimed
Feb 26, 2008, 06:23 am CST

Legal Ethics
New York AG Asks 124 School Districts for Law Firm Payment Info
Feb 25, 2008, 05:23 pm CST

Alternative Dispute Resolution
Fla. School Bd. Tells Warring Supt. & Bd. Attorney: Get Help
Feb 27, 2008, 04:09 pm CST


Posted On: February 29, 2008

How to Build Your Own Wikipedia

"Wikis are useful business tools. With planning and some staff time, you can make your own online collection of useful articles, tailored to your organization's needs, to communicate about business processes, manage collective know-how and more" Since many libraries, including law libraries, have expressed an interest in incorporating wikis into their progrrams and services , we have included a link to the article: "How to Build Your own Wikipedia," by Margaret Locher, CIO, February 27,2008. This is a "hands on" article which addresses issues many of us are beginning to encounter. Comments are welcome.

Posted On: February 29, 2008

Implementing Virtualization: Techniques and Tools for Microsoft Windows

From Symantec

Summary:

Most IT professionals know or suspect that virtualization of computer systems may have an important role in their organization’s evolving infrastructure – though where and how are likely under investigation. Some organizations will decide that virtualization isn’t necessary. Others will find that they want to implement it in places, but not across the board. Sill others will move to implement it on a large scale. For those who decide to implement virtualization, the question is how to do it. Many people are not aware that a number of conversion tools and techniques are available now in the Microsoft Windows environment.

This paper focuses on these tools and techniques and presents a variety of scenarios for using them. First, several misconceptions about virtualization and hardware, management, resources and utilization are pointed out, then considerations are presented on when and how to implement virtualization.


See Virtulization Techniques White Paper by clicking here

Posted On: February 28, 2008

International Organization for Standardization (ISO): Standards Under Consideration

ISO (International Organization for Standardization) is the world'd largest developer and publisher of international standards. Many of these standards relate to matters of interest and concern to law libraries and law librarians. Part of their process for standards development is to prepare drafts to various interested groups for comment and review. The following are among the standards currently under review by various groups, including the American Association of Law Libraries.:*

ISO TC 46 Open Ballots
These ballots are in progress. Please send your vote and comments to: nisohq@niso.org

ISO/DIS 23081-2, Information and documentation -- Records management processes for Metadata -- Part 2: Conceptual and implementation issues
Ballot closes: 2008-06-18
Comments due to NISO: 2008-06-04
See proposed standard

ISO/DTR 28118, Information and documentation -- Performance indicators for national libraries
Ballot closes: 2008-05-04
Comments due to NISO: 2008-04-18
See proposed standard

ISO/CD 27729, Information and documentation -- International Standard Name Identifier (ISNI)
Ballot closes: 2008-04-26
Comments due to NISO: 2008-04-11
See proposed standard

ISO/CD 26324, Information and documentation -- Digital Object Identifier (DOI)
Ballot closes: 2008-04-24
Comments due to NISO: 2008-04-10
See proposed standard

ISO/CD 690, Information and documentation -- Guidelines for bibliographic references and citations to information resources
Note: Note: This revision combines the two parts of the previous standard.
Ballot closes: 2008-04-23
Comments due to NISO: 2008-04-09
See proposed standard

ISO/DIS 8459, Information and documentation -- Bibliographic data element directory
Ballot closes: 2008-04-02
Comments due to NISO: 2008-03-19
See proposed standard

For more information regarding ISO (International Organization for Standardization) click here.
____________________________________

* Many thanks to Andrea Rabbia, AALL OBS-SIS Chair for bringing this information to our attention via e-mail.

Posted On: February 27, 2008

NYCRR Sections Affected March 2008

List of Sections Affected of the Official Compilation Codes Rules and Regulations of the State of New York (NYCRR). James R Sahlem, Principal Law Librarian, New York Supreme Court Library at Buffalo, is the Compiler of this ongoing work. The following is from his introduction:


PURPOSE

The following citator is intended to “fill the gap” in NYCRR, both print and electronic format. It covers the most recent ten-month period. It is designed to be printed and stapled and left at the end of your NYCRR or retained in e-format as a back-up to electronic research. Hopefully, this will demonstrate that the long-standing NYCRR gap problem can be cured. I will be providing twice-monthly cumulative updates. Those familiar with the CFR- LSA will have a good analogy.


PROCEDURE

Simply locate the pertinent title and section and consult this citator under that same title and section. If there is no entry, the reg has not been changed during the “gap” period. If an entry is found, it will be either a proposal “P”, or an action. Actions may include additions “Ad”, amendments “Am”, repeals “Rep”, re-numberings “Ren”, or combinations. “E” designations are emergency actions. Actions will have an effective date provided in the second-last column, while proposals will not. Those actions having effective dates earlier than their register publication are in bold . The last column will give the register reference by date and (in parentheses) the page on which it appears. Register pages are available at www.dos.state.ny.us/info/register.htm
.
This attachment may be forwarded freely to anyone who might benefit from it. Questions may generally be resolved by examining the New York Register entry referred to in the last column. Failing that, questions, comments or suggestions may be forwarded to jsahlem@courts.state.ny.us. Sections are arranged to the level of section and subsection only; lower level references are given in the adjoining column, in chronological order. Only register references which impact a specific NYCRR title and section are included; table references, rate schedules, waiver requests, etc. are not included.

SUPPLEMENTATION

Each monthly update adds the most recent register references and deletes the oldest month, thereby providing a “rolling” ten month coverage period. Proposals not acted upon will be retained for a full year, at which time they are deemed expired in any case. Mid-month updates add either two or three weeks of coverage with no deletions. Each update is cumulative for its coverage period. Any and all earlier updates should be discarded or deleted. Archival copies will be saved and are available on request.

See entire text of March 2008 Cumulative Supplement by clicking on link below:

NYCRR Sections Affected March 2008

Posted On: February 27, 2008

ABA Publications Information

Information regarding selected publications of the American Bar Association received in February 2008:

Essential Rules for the Deponent
You need to prepare your client for a deposition. Preparation is the key to successfully reconstructing what did or did not happen in the case. How many rules are there for a witness in a deposition? What are the essential dos and don'ts for the deponent? Don't head into your next deposition without reviewing the essential rules.


Individual Responsibilities
To be effective in decision-making and oversight activities, a director must understand the corporation's operations, including its areas of business and the competitive environment in which it operates. This knowledge enables the director to evaluate independently corporate and senior management performance, to provide strategic guidance, to work with management and other directors in developing and evaluating corporate objectives and strategic plans, and to challenge, support, and compensate management as warranted.


Keys to Tax Planning
Tax planning is a major part of most estate planning, and one of the first steps in tax planning is to identify those tax decisions or options that may be useful to the client. In compiling a list of possible recommendations, consider the following suggestions.


Can One Partner Be the Dependent of the Other?
Even without a formal written agreement, lesbian and gay couples must be cautious when setting up their household. With life insurance, each will initially own his policy and then assign it to the other and have that person become responsible for all premiums. This is necessary if the parties cannot establish an insurable interest in their partner's life. Doing so removes the proceeds from the insured's estate. For one partner to claim the other as dependent, there are five claims to be met.


The Insured Stock Purchase Agreement, Second Edition
By Lawrence Brody and Stephen A. Daiker

Complete with the necessary sample forms, this guide explains the types of stock purchase agreements, including stock redemption, cross purchase, combination of redemption and cross-purchase, and wait-and-see buy-sell, along with the advantages and disadvantages of each from a tax planning perspective. It also includes numerous examples and charts plus a chapter on state law considerations, including general information on community property states and a summary of various state laws of an owner.

How to Build and Manage an Estates Practice, Second Edition
By Daniel B. Evans

Specifically tailored to the unique needs of the estates and trusts lawyers, this updated second edition of "How to Build and Manage an Estates Practice" focuses on making your practice better. Written as a "book of ideas," you'll find guidance on marketing, effective client communications, fee agreements, and ethics, including the updates to the American Bar Association's Model Rules of Professional Conduct. Whether you're a solo practitioner or a lawyer at a large firm, you'll find the tools you need to make a difference. Includes sample forms, checklists, and questionnaires on an accompanying CD.

The Family Limited Partnership Deskbook, Second Edition
By David T. Lewis and Andrea C. Chomakos

This bestselling deskbook provides expert guidance and essential forms for using FLPs and LLCs to address clients' tax and non-tax objectives. Comprehensive in scope and detail, it explains the key principles involved in planning with FLPs and provides numerous examples of typical situations along with illustrations of the practical application of each technique. It offers in-depth guidance and suggests solutions to potential problems in their use. Twenty-four sample agreements, exhibits, and other documents are discussed within the text and contained on the accompanying CD-ROM.


Computer Forensics Practice
In our electronically driven society, there are many reasons for undertaking computer forensic work. From matters involving criminal complaints, through misappropriation issues, to family court matters, computer forensics is a forensic science that can make a difference in a growing range of cases. Regardless of the specific nature of your case, it is important for counsel to understand the nature of the computer forensic process. Failure to follow a documented process can call the work into question. And by understanding the process, counsel can determine how to use it more effectively and efficiently in support of their cases.

For additional information click here.



Posted On: February 26, 2008

Electronic Hein Cites - Issue 708

Publications from William S. Hein & Co. Inc. February 26, 2008


Secret Treaties of History

Second Edition


This new edition from Hein contains nearly 1,000 "secret" treaties spanning more than 1,500 years and 150 countries. Professor Edward Grosek organizes this book into a chronological listing of 973 documents, including an informative annotated bibliography of the sources for texts of and information on these secret treaties, an essay on where to begin one's research on pre-1648 treaties to educate the in-depth treaty researcher, and an index by country for those researching secret treaties of specific countries.

Civil Liberties in Wartime

Legislative Histories of the Espionage Act of 1917 and the Sedition Act of 1918


Hein is pleased to bring researchers, for the first time in one comprehensive collection, a compilation of the legislative histories of the Espionage Act of 1917 and the Sedition Act of 1918. Editor William H. Manz includes many hard-to-obtain documents related to the laws' legislative histories, including the major bill versions, the complete congressional debate, reports and hearings.


American Interpretations of Natural Law

Published under the direction of the Department of Government at Harvard, this new reprint from Hein considers the evolution of natural law throughout the ages, from the time of James I in England, to modern-day municipal government in 1930s America. This exceptional work was "B" rated by AALS in the area of "Legal History."


Permanent Establishment in the United States

A View Through Article V of the U.S.-Canada Tax Treaty

This new title from Vandeplas Publishing provides a fresh look at Permanent Establishment in the United States using the U.S.-Canada Treaty as a case study. It illustrates a methodology that can be applied to the study of other treaty concepts.


Harvard Negotiation Law Review

Hein is pleased to announce that we have recently obtained the multi-media rights to this law review. The Harvard Negotiation Law Review provides a forum in which scholars from many disciplines can discuss negotiation as it relates to law and legal institutions. This review is aimed specifically at lawyers and legal scholars.

Posted On: February 26, 2008

Stop Criminals from Using Your Website As a Gateway to Fraud

"The Web has exploded as medium for commerce and communication, but it's also become a favorite attack vector for criminals. And while the bad guys are motivated by money, the damage they wreak transcends the balance sheet: loss of reputation, lawsuits, loss of investor confidence and sometimes crippling liability."

"Click below to get a new whitepaper from FinJan that highlights the new techniques hackers use to infiltrate your networks, with critical steps you can take to prevent them by using real-time content inspection technologies."

From: CIO Security Alert, February 23, 2008

Stop Criminals from Using Your Website As A Gateway to Fraud

Posted On: February 26, 2008

User Created Lists on WorldCat.org Made Available as RSS Feeds

From: OCLC Updates. February 26, 2008.

WorldCat.org users who want to keep tabs on lists of items created by fellow users can now do so without having to return to the site: Public WorldCat lists are available as RSS feeds that can be monitored using any RSS-capable service or software.

RSS (Really Simple Syndication) is an information format used by news-media sites, blogs and other Web services that are frequently updated. RSS feeds typically carry brief summaries of the information currently available at a specific Web location, so you can see what's new without having to view the site in a browser.

To subscribe to a list's feed, users can view the list and click the RSS Feed button at top right. The displayed "Subscribe to Feed" page provided by AddThis.com links to a variety of free Web services that can monitor RSS feeds, including personalized home pages at Google and Yahoo!. A user simply selects one of the services, then either signs in to the service or creates a new user account.

Posted On: February 26, 2008

Superior Direct and Cross Examination: Demonstrations from Trial Masters

The American Bar Association Criminal Justice Section and The South Carolina Bar Present:
Superior Direct and Cross-Examination: Demonstrations from Trial Masters of the ABA Criminal Justice Section and the S.C. Bar*

8:45 a.m. - 5:00 p.m. Friday, April 4, 2008

Reception to Follow

The Francis Marion Hotel Charleston, S.C.

We have assembled the highest caliber lawyers from the ABA Criminal Justice Section and South Carolina to plan a spectacular set of demonstrations, analysis and commentary on direct and cross-examination. Few moments provide the kinds of opportunities for major impact on the outcome of the trial that direct and cross examination of witnesses give. Leading national and South Carolina prosecutors and defense attorneys will demonstrate how to use witnesses to lay the foundation for your case and how to dismantle the foundation attempted to be laid by opposing counsel. The Criminal Justice Section and the South Carolina Bar invite you to share this announcement with your colleagues and look forward to your attendance and participation. Join us for a day of programs and panel discussions presented by experts from South Carolina and across the country who will demonstrate stellar witness examination and discuss new developments in direct and cross examination.


Things to do around Charleston:
www.charleston.com/index.cfm?newUserLocation=2&subcategoryID=293

www.charleston.com/keyAttractions.cfm?subcategoryId=431&newUserLocation=1
_____________________________________________

*Click for full brochure and registration materials:www.abanet.org/crimjust/calendar/2008springcle.pdf

Posted On: February 25, 2008

American Libraries Direct February 20, 2008

News from the American Library Association:

House allows warrantless wiretaps law to expire

A dramatic showdown between House Republicans and Democrats February 14 has led to Congress beginning a one-week break without sending any surveillance legislation to the White House. The result is the February 16 expiration of the Protect America Act, which since its enactment in August 2007 has permitted the National Security Agency to eavesdrop without a court order on foreign communications, including phone calls and email exchanges, between someone “reasonably believed to be outside the United States” and a person on U.S. soil, as well as communications traveling to or from U.S. libraries...

.Greenwich library faces Mideast lecture controversy

Greenwich (Conn.) Library officials decided February 14 to allow a speaker to proceed with two scheduled lectures on Israeli-Palestinian relations at the library’s Cole Auditorium. The permission was a reversal of a previous action to cancel the lectures after the library received a number of complaints from community members....


ALA’s social responsibility mission

ALA was one of several associations spotlighted as global change agents in a new initiative by the American Society of Association Executives that focuses on social responsibility. In its case study, ASAE says that social responsibility “is imbedded in ALA’s stated mission, core values, and policy statements as critical to promoting high-quality library and information services and public access to information. The appendix to ALA’s Ahead to 2010 document, Envisioned Future and Organizational Values, also recommits to ‘social responsibility and the public good.’”...
American Society of Association Executives


Jane Greenberg to receive Kilgour Research Award

Jane Greenberg, a metadata expert and faculty member at the University of North Carolina–Chapel Hill School of Information and Library Science, is the winner of the 2008 Frederick G. Kilgour Award for Research in Library and Information Technology. The Kilgour Award, sponsored by OCLC and LITA, recognizes outstanding research that advances information science and information retrieval....

As economy struggles, more people rely on libraries

Librarians have long thought that the demand for library services leaps when the economy limps. It’s not just books that the belt-tightening public wants more of in tough times, but museum passes, children’s programs, and internet access. That’s been the case at the Kelley Library in Salem, Massachusetts, over the past year, coinciding with the economic slowdown, according to Director Eleanor Strang....
North Andover (Mass.) Eagle-Tribune, Feb. 19

Library acquires Mary Queen of Scots death warrant

The only contemporary copy of the piece of paper that sent Mary Queen of Scots to her death in 1587 has been purchased by the library of Lambeth Palace, the official London residence of the Archbishop of Canterbury, bringing a huge sigh of relief that it will not be sold outside of the UK. An export ban was placed on the document in November 2007, giving UK institutions a chance to raise the £72,485.50 ($141,265 U.S.) asking price for it, bearing in mind its
importance to British history....

Digital downloads will not kill Blu-ray

Duncan Riley writes: “With Toshiba’s announcement that it is to cease manufacture of HD DVD players, the high-definition format wars are now over. With Blu-ray left standing, some, such as Rob Beschizza at Wired are now saying that digital downloads will now kill Blu-ray. It’s an argument many of you reading this will feel is a sound one, but it’s not going to happen anytime shortly. Here are a few reasons why.”...
Techcrunch, Feb. 17

To see entire February 20, 2008 issue of American Libraries Direct, click here.


Posted On: February 25, 2008

ABA Journal Weekly Newsletter February 22, 2008

Ten Top Stories:

Legal Ethics
New Issues for Lawyer Who 'Worked' 1,286 Days in One Year
Feb 19, 2008, 01:07 pm CST
A New York lawyer who reportedly was simultaneously listed as a full-time employee of five Long Island school districts for which he worked as legal counsel is seeing some fallout over a newspaper article about the situation.

--------------------------------------------------------------------------------

Associates
WSJ: Top First-Year Pay Has Hit Ceiling
Feb 15, 2008, 02:44 pm CST

Judiciary
Judges Flunk Story Problem Test, Showing Intuitive Decision-Making
Feb 19, 2008, 09:20 am CST

Law Schools
Harvard Snags Sunstein; Nussbaum Stays at Chicago
Feb 20, 2008, 12:27 pm CST

Legal Ethics
Vote to End Jury Deadlock May Cost Attorney His Law License
Feb 19, 2008, 10:02 am CST

Constitutional Law
Judge Shutters Whistle-Blower Site; Major 1st Amend. Issue
Feb 19, 2008, 03:22 pm CST

Law Students
New NALP Deadline for Accepting Summer Offers: 45 Days
Feb 19, 2008, 02:10 pm CST

Law Practice Management
Law Firm's New Structure Creates Parallel Management Tracks
Feb 20, 2008, 04:53 pm CST

Partners
High-Profile Skadden Litigator Goofs, Sends Private E-mail to Reporters
Feb 21, 2008, 07:03 am CST

Law Professors
Lessig Considers Congressional Bid
Feb 21, 2008, 06:31 am CST

Posted On: February 21, 2008

News From the American Association of Law Libraries

From the AALL E-Newsletter, February 2008.*

David Pogue to be Keynote Speaker at AALL Annual Meeting

I am very pleased to announce that David Pogue, the personal-technology columnist for The New York Times, will come to Portland this July as the keynote speaker for the Opening General Session at the AALL Annual Meeting. Each week Pogue contributes a print column, online column, and an online video for the Times. His daily blog, Pogue’s Posts, is the Times’ most popular blog. He is also an Emmy award-winning technology correspondent for CBS News, a frequent guest on NPR’s "Morning Edition," and a regular on CNBC.

Pogue studied music, English, and computer science, and after college, he spent 10 years conducting and arranging Broadway musicals in New York. When his computer teaching skills turned out to be in more demand than his musical ones, he started teaching the Broadway community how to use their Macs. Since then he has written or co-written seven books in the For Dummies series, as well as the Missing Manual series, a line of printed manuals for computer products that don’t come with any.

Registration for the Annual Meeting opens February 25. Keep an eye out for the e-mail blast that will announce the official opening and allow you to register for the meeting and then go directly to the housing site to book your hotel reservation. The Preliminary Program for the Annual Meeting will mail out to AALL members on February 22 with the March issue of AALL Spectrum.

Check out AALL’s New Blog

The AALL Washington Affairs Office is pleased to announce its new blog! The blog, named AALL’s Washington Blawg, will highlight bills we’re tracking in Congress, Action Alerts, interesting articles and Web sites, exciting events we’re participating in, and more. You can keep up with our regular updates by subscribing to the RSS feed or by visiting the blog for the latest news. We hope the blog serves as another way to keep you informed about the Washington Office. Please let us know what you think. Send an e-mail to ejf33@law.georgetown.edu.

Law Library Journal Turns 100

The Winter 2008 issue of Law Library Journal was recently published and mailed to all AALL members and LLJ subscribers; it is also available on AALLNET. This issue marks a major milestone, as it is volume 100, number 1. Throughout 2008, LLJ will celebrate its 100th birthday with special features about its history. This issue is the first for LLJ Editor Janet Sinder and includes a guide to "The Essential Law Library Journal" by former Editor Frank Houdek.

This issue also features two winning articles from the 2007 AALL Lexis Nexis Call for Papers competition by Margaret A. Leary and by Connie Lenz and Helen Wohl. Other article topics include how to protect the law library’s core missions through updated quality assessment standards, best practices in academic law library hiring, and whether office e-mail is a burden or blessing.
_________________________
* Having attended conferences where David Pogue was the keynote speaker I congratulate AALL on his selection. David is both knowledgable and enertaining. His wide range of interests helps him to relate well to both general and specialized audiences.

Another item of special interest to many is the new AALL Blog. I have checked it out and urge both librarians and non librarians to take a look and let AALL know what you think.

DGB

| Share
Posted On: February 21, 2008

Information Security Update: February 21, 2008

The following is some updated information that we thought might be of interest. This is not a separate issue of the Newsletter:

NEW YORK STATE OFFICE OF CYBER SECURITY AND CRITICAL INFRASTRUCTURE COORDINATION CYBER INFORMATION BULLETIN


DATE ISSUED:

February 21, 2008


SUBJECT:

Malicious Email Messages Referencing the Lunar Eclipse

One state reported that they received a large number of malicious email messages which reference the “lunar eclipse” and include a link purporting to show video of a lunar eclipse. Clicking on the link connects users to a site that will deliver malware to client machines. Presently, some commercial antivirus products are not detecting this malware. The addresses hosting the malware are reported to be constantly changing, thus minimizing the impact of blocking the offending sites.

We recommend that organizations warn users of the risks associated with visiting unknown or un-trusted Web sites and clicking on links provided in email messages.

As this example demonstrates, be advised that attackers may use current events (such as the recent lunar eclipse, various holiday greetings, and the 2008 Presidential Election) to entice users to visit Web sites, click on links, open attachments, or perform other actions that could lead to system compromise.


Posted On: February 21, 2008

U.S. Supreme Court: Riegel v. Medtronic 06-179

Argued December 4, 2007 - Decided February 20, 2008

..."Of Wednesday's pre-emption cases, Riegel v. Medtronic may have the broadest impact. The Court ruled against the estate of Charles Riegel, who died after a catheter made by Medtronic malfunctioned during heart surgery."

"Riegel sued in federal court, invoking New York state common law to argue for liability and damages. Like lower courts, the Supreme Court ruled that the federal Medical Device Amendments of 1976 specifically preclude states from imposing their own requirements on the makers of federally regulated medical devices."

"Justice Ruth Bader Ginsburg dissented from the opinion authored by Scalia. Ginsburg called the ruling a "radical curtailment" of state law remedies that Congress did not intend when it passed the law.,,"

From: Munro, Tony. "Supreme Court Creates Pro-Business Stance...", Legal Times, February 21, 2008.

To see decision click on the link below:

Riegel, Individually, and as Administrator of Estate of Riegel v. Medtronic, Inc. 06-179

Posted On: February 21, 2008

U.S. Supreme Court: Danforth v. Minnesota

Decision Date: February 20, 2008:

DANFORTH v. MINNESOTA
CERTIORARI TO THE SUPREME COURT OF MINNESOTA

No. 06-8273. Argued October 31, 2007-Decided February 20, 2008

After this Court announced a “new rule” for evaluating the reliability of testimonial statements in criminal cases, see Crawford v. Washington, 541 U. S. 36, 68-69, petitioner sought state postconviction relief, arguing that he was entitled to a new trial because admitting the victim’s
taped interview at his trial violated Crawford’s rule.

The Minnesota trial and appeals courts concluded that Crawford did not apply retroactively nder Teague v. Lane, 489 U. S. 288. The State Supreme Court agreed, and also concluded that state courts are not free to give a decision of this Court announcing a new constitutional
rule of criminal procedure broader retroactive application than that given by this Court.

Held: Teague does not constrain the authority of state courts to give
broader effect to new rules of criminal procedure than is required by
that opinion.

(a) Crawford announced a “new rule”-as defined by Teague-because its result “was not dictated by precedent existing at the time the defendant’s conviction became final,” Teague, 489 U. S., at 301 (plurality opinion). It was not, however, a rule “of [this Court’s] own devising” or the roduct of its own views about sound policy, Crawford, 541 U. S., at 67.

(b) The Court first adopted a “retroactivity” standard in Linkletter v. Walker, 381 U. S. 618, 629, but later rejected that standard for cases pending on direct review, Griffith v. Kentucky, 479 U. S. 314, and on federal habeas review, Teague v. Lane, 489 U. S. 288. Under Teague, new onstitutional rules of criminal procedure may not be applied retroactively to cases on federal habeas review unless they place certain primary individual conduct beyond the States’ power to
proscribe or are “watershed” rules of criminal procedure. Id., at 310 (plurality opinion). .

To see the decision click on the link below

Danforth v. Minnesota 06-8273

Posted On: February 20, 2008

ABA Judicial Division Presents Programs at the 2008 ABA Midyear Meeting

From the ABA Judicial Division:

The ABA Judicial Division presented and received favorable press coverage of the many wonderful programs during the 2008 Midyear Meeting in Los Angeles, CA, February 6-10. You can read, listen, and/or view these programs by clicking on the links below. This information is also posted to: http://www.abanet.org/jd/

Stranger in a Strange Land: Cross-Cultural Issues in the Courts -- Video | Audio

If there's one issue facing our nation where the ABA should take a leadership role, what would that be? -- Video

How is the ABA making the legal profession better? -- Video

Minority Judicial Clerkship Program (ABA in the News)

Daughter of Civil Rights icon offers intimate view of historic time (ABA in the News)

More 2008 ABA Midyear Meeting Highlights

Posted On: February 19, 2008

U.S. v Allen: Dropping Books During Clumsy Robbery Doesn't Reduce Sentence

"(U.S. 6th Cir., Feb. 5, 2008) - Defendants' sentences resulting from their clumsy robbery of rare books from a university and attempts to sell them at auction are vacated and remanded for re-sentencing, where the district court erred by excluding books dropped and abandoned in the library stairwell from the valuation of loss and computation of the sentencing range. The court held that the defendant-robbers "took" the books, under USSG, 2B3.1, when they exercised dominion and control over them, such that they completed the acts necessary to seize the books."

U.S. Charles Thomas Allen II et. al.

Posted On: February 19, 2008

U.S. Khalid Sheikh Mohammed et.al.

"Guantanamo Bay, Cuba, Feb. 11, 2008) - The U.S. Department of Defense announced that six high-value detainees held in Guantanamo Bay were charged, under the Military Commissions Act, with planning and executing the Sept. 11, 2001 terrorist attacks. Specific charges include violations of the laws of war, attacking civilians, attacking civilian objects, intentionally causing serious bodily injury, destroying of property in violation of the laws of war, terrorism, and material support to terrorism"

U.S. Khalid Sheikh Mohammed et.al.: Specifications and Charges

Source: Findlaw Featured Documents, February 11, 2008.


Posted On: February 11, 2008

Report to Congress on Implementation of Section 1001 of the USA Patriot Act

Report prepared by U.S. Department of Justice, Office of the Inspector General

February 2008.

Section 1001 of the USA PATRIOT Act (Patriot Act), Public Law 107-56, directs the Office of the Inspector General (OIG) of the U.S. Department of Justice (DOJ or Department) to undertake a series of actions related to claims of civil rights or civil liberties violations allegedly committed by DOJ employees. It also requires the OIG to provide semiannual reports to Congress on the implementation of the OIG’s responsibilities under Section 1001. This report – the twelfth since enactment of the legislation in October 2001 – summarizes the OIG’s Section 1001-related activities from July 1, 2007, through December 31, 2007.

I. INTRODUCTION
According to the Inspector General Act, the OIG is an independent entity within the DOJ that reports to both the Attorney General and Congress. The OIG’s mission is to investigate allegations of waste, fraud, and abuse in DOJ programs and personnel and to promote economy and efficiency in DOJ operations.

The OIG has jurisdiction to review programs and personnel in all DOJ components, including the Federal Bureau of Investigation (FBI), the Drug Enforcement Administration (DEA), the Federal Bureau of Prisons (BOP), the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), the U.S. Attorneys’ Offices, and other DOJ components.

The OIG consists of the Immediate Office of the Inspector General and the following divisions and offices:

• Audit Division is responsible for independent audits of Department programs, computer systems, and financial statements.

• Evaluation and Inspections Division conducts program and management reviews that involve on-site inspection, statistical analysis, and other techniques to review Department programs and activities and make recommendations for improvement.

• Investigations Division is responsible for investigating allegations of bribery, fraud, abuse, civil rights violations, and violations of other criminal laws and administrative procedures that govern Department employees, contractors, and grantees.

The OIG can investigate allegations of misconduct by any Department employee, except for allegations of misconduct by attorneys (or investigators working under the direction of Department attorneys) acting in their capacity to litigate, investigate, or provide legal advice. See Pub. L. 107-273 § 308, 116 Stat. 1784 (Nov. 2, 2002).

• Oversight and Review Division blends the skills of attorneys, investigators, and program analysts to investigate or review high profile or sensitive matters involving Department programs or employees.

• Management and Planning Division provides planning, budget, finance, personnel, training, procurement, automated data processing, computer network communications, and general support services for the OIG.

• Office of General Counsel provides legal advice to OIG management and staff. In addition, the office drafts memoranda on issues of law; prepares administrative subpoenas; represents the OIG in personnel, contractual, and legal matters; and responds to Freedom of Information Act requests.

The OIG has a staff of approximately 400 employees, about half of whom are based in Washington, D.C., while the rest work from 16 Investigations Division field and area offices and 7 Audit Division regional offices located throughout the country.

See full Report by clicking on the link below:

Report to Congress on Implementation of Section 1001 of the USA Patriot Act, February 2008

Posted On: February 11, 2008

Is There a Wiki Where you Work?

The following is a question and and responses to that question. We have made every effort to remove all identifying information Regarding both the person who submitted the question and those who responded.

QUESTION:

How many of you have a wiki at your firm? What is it used for? Who is allowed to contribute?

Purpose of my inquiry: We are building a wiki for our advanced legal research class and I was hoping to be able to share with them instances where they might see a wiki in law practice.

RESPONSES:

1. As far as content, we are at the beginning stages of creating Legal Subjects Resource Guides that will bring together all the materials we have on a given topic. It will include a list of key print sources with the call numbers, a list of relevant web sites, and blogs and other news sources for keeping current on the topic. We will also list the electronic sources for the resource to include Lexis, Westlaw, HeinOnline and others. Actual database identifiers will be listed. Finally, we will also have a short tutorial on the topic. We want to assign our librarians several of these topics to create and maintain. So we have begun working to get all of our all the librarians to buy into the idea of learning the basic wiki code required to create a basic web page. The idea is for the Librarians to create and maintain pages themselves rather than have everything go through the one person who updates and maintains the intranet now. We have also tried to use the wiki to collaborate on a project where committee members are scattered over three states. We now have one place to go for all of the meeting agenda's, minutes, and all other extraneous information regarding the committee's charge in one place.

2. We have something like a wiki here. It's an online database that the reference librarians in all our offices contribute to, and only they can access it. I'm told that it doesn't actually use wiki software, but I think it's the same idea.

3. The collective libraries of my firm share a wiki to post information relating to our monthly reference meetings. Everybody dials a certain extension to get connected to the call, and often there is a netmeeting too. The wiki provides information to the attendees, such as the date of the next meeting, the connection information for that meeting, the agenda, guest speaker bios, attached "hand-outs", etc. The offices take turns hosting the meetings and each office is responsible for posting their information when it's their turn.

4. The purpose of our wiki is to capture and share knowledge internally about emerging retail investment products. This is part of a program to identify new investment products, monitor and assess their development, and provide a strong informational basis for us to take action if appropriate with regard to our investor protection mission. In its first year, contributors were primarily made up of a cross-divisional team of staff tasked with working on the emerging retail investment products initiative, along with a few other dedicated staff. Our web publishing team and Knowledge Centre staff administer the wiki and provide training on how to add content. All staff are welcome to contribute to the wiki. We found it effective to assign topic leaders for each product in the wiki; the leader tends to seek expertise inside and outside the organization, collecting knowledge in advance of product discussion meetings. After meeting with staff to evaluate the effectiveness of the wiki in its first year, we are now making some design changes to make it easier to browse and contribute knowledge.

5. We use a wiki as sort of a shared document for saving and sharing tips such as who to call for hard-to-track down government documents, procedures for certain interlibrary loans or document requests, where copies of elusive documents are stored - that kind of thing. Any information or document that would be handy to have in the future. One or the other of us usually puts something in a few times a month, and it is always a lifesaver! A basic Word doc would have worked fine, too, but we chose the wiki format because it allowed us both to access it from work or home, and it will notify the other when something is added.

6. Right now we have wikis for several administrative functions. The library staff uses one for a shared calendar, agendas/minutes for meetings, reference answers, etc. We are redoing our intranet and have a wiki for that. There has been talk in several of the practice groups about using one to share information on that particular area of law.

7. We use wikis here, but not for the attorneys as far as I know. The library has a wiki that we consider our institutional memory. We include procedures, notes about decisions we have made, project lists, vendor notes - anything that needs to be available to all library staff. I think it would be useful for all the managers to have a wiki and be able to see what is happening in other departments. This form of communication/social networking, however, has not been adopted firmwide, however.

Posted On: February 8, 2008

CLLB Information Security Newsletter February 2008

While reviewing responses to readers of this blawg, I noticed that many seem interested in postings related to information security. Therefore, as an experiment beginning with this posting I plan to include an occasional newsletter covering topics and issues related to information security.

As an added activity I serve on an Information Security Committee at my orgaization. This experience has certainly increased my awareness of the importance of information security issues to all of us, including law librarians. Let's see how this works. Comments are welcome.

David Badertscher

February 2008

Volume 1, Issue 1

Securing a Wireless Network

From the Desk of David Badertscher

Is a Wireless Network Secure?

Wireless networks are not as secure as the traditional “wired” networks, but you can minimize the risk on your wireless network (at home or at work) by following the tips below.

How Does it Work?

The standard set up for a wireless network requires two components: a Wireless Access Point (WAP) and a computer with a wireless network adaptor. Properly configuring a wireless device can be challenging and the steps will vary depending on the manufacturer. If you do not feel comfortable doing it yourself, be sure that whomever is configuring the wireless network follows these best practices.

Wireless Access Point (WAP)

The WAP connects to your high speed Internet connection or your internal network. This is the foundation for building a wireless network. It provides the ability to use a computer without being constrained by the distance of a wire. Keep in mind that metal filing cabinets as well as certain building materials, such as bricks and blocks, can interfere or limit the range. The distance between your wireless computer and the wireless access point. Generally, the indoor range for a WAP is approximately 125 feet.

Wireless Network Adaptor

A wireless network adaptor, used for transmitting and receiving information, is required for each computer you intend to connect to a WAP. When purchasing wireless networking hardware from separate vendors, be sure to obtain guarantees that the hardware will conform to defined standards and interoperate properly. The wireless network adaptor is usually built into laptop computers while it is an add-on component inserted into a USB port on desktop computers.

Enable Encryption

Every wireless network should enable encryption. Encryption scrambles the data in a way that if your signal is intercepted there is reduced risk of someone being able to eavesdrop or monitor your communications. There are several standards of encryption common to most WAPs. Wired Equivalency Privacy (WEP) is the older standard. WEP has a number of known security flaws and should only be used if no other method of encryption is available. Be sure to set the WEP authentication method to ”shared key” instead of “open system.” Under “open system” the initial sign-on is encrypted but the data is not. Newer wireless access points include Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2). WPA2 is the stronger and the preferred method of encryption.

Change the Default Password

Change the default password that comes with your WAP. The default passwords used by manufacturers are well known to the hacking community. Be sure to use a strong password, at least eight characters including numbers and special characters.

Change SSID Name

The Service Set Identifier (SSID) is the name of your wireless network. Default SSIDs are well known, often the name of the manufacturer and easy to guess. Change the SSID name to something unique and be careful not to use a name that freely discloses information. For example, avoid using your family name. Avoid descriptive or functional names as well, such as “Payroll” or “Accounting” since this would advertise an attractive target for an attacker.

Turn Off SSID Broadcasting

By turning off SSID Broadcasting, your wireless access point does not advertise its presence. It is similar to having an unlisted telephone number. This is a way to reduce the visibility of your network to others in your neighborhood. The only way to connect to a WAP with SSID Broadcasting turned off is to know the SSID name and password.

Use MAC Filtering on Your WAP

The MAC (Media Access Control) address is the unique ID assigned to your computer’s network interface card. It is referred to as the computer’s “physical address.” Enabling MAC filtering on your WAP allows you to designate and restrict which computers can connect to your WAP. If the computer’s address is not listed, a wireless connection cannot be made to the WAP. To look up a MAC address on a Windows computer, go to “Start” then “Run” and type “cmd”. A new window will open and you will need to type ipconfig /all and press the enter key. A number of attributes will be displayed. The MAC address is identified as the “Physical Address.”

RF Interference Assuming your WAP point functions in the 2.4 GHz range, you may experience Radio Frequency (RF) interference from other 2.4 GHz devices, such as cordless phones, microwaves and baby monitoring devices. These devices can limit wireless performance. To manage the problem, limit sources of RF interference in proximity to the WAP.

Additional resources for wireless networks can be found at:
Wireless Network Tutorial including manufacturer step by step procedures.
http://spotlight.getnetwise.org/wireless/wifitips/
Microsoft: www.microsoft.com/technet/network/wifi/wifisoho.mspx

For more monthly tips go to: www.msisac.org/awareness/news

FROM IT SECURITY NEWS:

Bush wants a security clearance reform plan by April 30
The memo's language reflects concerns that longstanding security
clearance practices are preventing employees and contractors from
beginning work. (fcw)
http://www.1105newsletters.com/t.do?id=866100:3309489

For more monthly tips go to: www.msisac.org/awareness/news/

Posted On: February 8, 2008

Recent ABA Publications

We have recently received information on the following recent American Bar Association Publications:

ABA Standards for Criminal Justice, Third Edition: DNA Evidence

"The 'black letter' Standards contained and discussed in this publication relate to collecting, preserving and use of DNA evidence, DNA testing, pretrial proceedings, trial, post-conviction, charging by DNA profile, and DNA databases. The 'black letter' Standards were approved by the American Bar Association's policymaking House of Delegates in August 2006. The commentary was approved by the Criminal Justice Standards Committee in July 2007. Although this publication is part of the Third Edition of the Criminal Justice Standards, this is the first volume relating to DNA Evidence."

Fifty Legal Careers for Non-Lawyers

By Ursula Furi-Perry

This thorough, easy-to-use handbook helps the reader select a law career best suited to one's interests, training, and aptitude. Each of the fifty careers profiled in the book includes interviews with people currently in that job; sample responsibilities; typical education and skills necessary; and further resources to help find out more, and how to enter the field. This new book from the American Bar Association is an up-to-date resource and a "must-have" for anyone planning their future in law.

2008 600 pages 6 x 9 Paper
Product Code: 1620305
ABA Member Price: $17.95
Regular Price: $19.95

Standards Development Patent Policy Manual

By Jorge L. Contreras
This comprehensive set of annotated, policy-neutral language can be instantly accessed and utilized by standards development organizations (SDOs) who are developing new patent policies or those looking to refine or interpret existing policies. Authored by standards experts from across industry, academia and private practice, this book serves as an invaluable resource for SDOs, the lawyers who advise them and other participants involved in the process.

Intellectual Property Deskbook for the Business Lawyer

By The ABA Section of Business Law Committee on Intellectual Property and Sharon K. Sandeen
This book provides you with a starting point for issue identification, perspective, and resources in dealing with intellectual property issues and assets, whether in the context of structuring and consummating transactions or in the day-to-day counseling of clients. The chapters provide an overview of the issues, identify traps for the unwary, suggest checklists and forms, and offer references to additional materials to guide deeper analysis and research.


Fundamentals of Intellectual Property Valuation: A Primer for Identifying and Determining Value

By Weston Anson and Donna Suchy
This primer, written by experts in the area, answers some of the most frequently asked questions about identifying the value of the primary types of intellectual property (IP) and other intangible assets. It also looks at the primary, traditional, and not-so-traditional methods of valuing these assets and includes case studies and situations where valuation is required.


Posted On: February 8, 2008

Gambino Family Indictment: U.S. v. Agate, ET. AL.

Source: Findlaw Documents:

Indictment Unsealed Against Accused Gambino Crime Family Defendants

U.S. V. JOSEPH AGATE, ET AL
.
(U.S. Dist. Ct., E.D.N.Y., Feb. 6, 2008) -" A federal indictment was unsealed in Brooklyn, New York naming sixty-two defendants on organized crime charges that include racketeering, conspiracy, extortion, gambling, and theft. Some of those accused include reputed members of the Gambino crime family, including boss John D’Amico, reputed underboss Domenico Cefalu, consigliere Joseph Corozzo, as well as three Gambino family captains, three acting captains, sixteen soldiers, and numerous associates."

To read the indictment click here.


| Share
Posted On: February 8, 2008

Residence Restrictions For Released Sex Offenders

A Report for Congress Prepared by Garrine P. Laney, Analyst in Social Policy, Domestic Policy Division of the Congressional Research Service, February 4, 2008.

The following is from the Summary:

"Monitoring the movement of sex offenders in communities continues to be of
interest to Congress, state legislatures, and local governments. In response to some
citizens’ concerns, Congress passed the Adam Walsh Child Protection and Safety Act
of 2006 (P.L. 109-248), which, among other provisions, provides for mandatory
registration of sex offenders who are released from prison, closer scrutiny of them,
and community notification of their whereabouts. Through the community
notification process, the public has more knowledge of where sex offenders reside.
At least 23 states and hundreds of local governments have passed laws to prohibit sex
offenders, who must register as such, from living within a specified distance of a
particular area. Often, restricted areas include parks, playgrounds, recreation centers,
swimming pools, schools, bus stops, libraries, convenience stores, and other facilities
that serve large numbers of persons under 18 years of age...."

Complete Report: Residence Restrictions for Released Sex Offenders

Posted On: February 5, 2008

Selected Documents and Web Sites: U.S. President's Budget for 2009

DAVID BADERTSCHER

The following posting consists of a series of documents selected to hopefully help provide those readers interested with an overview of the budget and the budget process. It also includes a list of the web sites rererenced in President Bush's Budget Message.To provide added context I have embedded some of the citation references within quotations from his message. Due to the size and complexity of this budget as submitted we can only include a few of the documents in this posting. The following includes links to the series of documents selected.

SELECTED DOCUMENTS:

The Nation's Fiscal Outlook (PDF 365 KB)
As Released by the Office of Management and Budget

The Budget System and Concepts (PDF 235 KB)
As Released by the Office of Management and Budget

Fiscal Overview of the President's Fiscal 2009 Budget Proposal (PDF 50.3 KB)
Summary Prepared by the Minority Staff of the House Budget Committee

The President's Fiscal 2009 Budget: Analytical Perspectives - Introduction (PDF 147 KB)
As Released by the Office of Management and Budget

The President's Fiscal 2009 Budget: Analytical Perspectives - Economic Assumptions and Analyses (PDF 677 KB)
As Released by the Office of Management and Budget

The President's Fiscal 2009 Budget: Analytical Perspectives - Budget Reform Proposals (PDF 191 KB)
As Released by the Office of Management and Budget

What's at Stake? State-by-State Analysis of the President's Fiscal 2009 Budget (PDF 188 KB)
Report Prepared by the Majority Staff of the House Budget Committee

WEB SITES LISTED IN PRESIDENT BUSH'S BUDGET MESSAGE:

www.budget.gov The budget of the Federal Government for Fiscal Year
2009.

"To help Americans see where their money is being spent, we have launched
website called www.USAspending.gov "

"...to help Americans see the kind of results they are getting
for their money, we launched www.ExpectMore.gov...."


Posted On: February 5, 2008

NYLINK Library Movie Festival

We just received the following announcement and thought some of you might be interested even if you are not able to participate.

Calling All Library Auteurs: Library Movie Festival!

Free Nylink Community Brown Bag Session

Date: Thursday, February 21, 2008

Time: 11:30am – 1pm

Location: Mid-Manhattan branch of NYPL

Have you created a promotional video for YouTube for your Library?

Maybe you’ve only made a request for the equipment.

Or

Maybe you’re just interested in speaking to others who have!

Please join us for our second Community Brown Bag Lunch session. This is not a formal training-just a one hour library video film festival, where you can share your movie and we can share infamous library films like, Michael Wesch’s Web 2.0 and the CLA Library Cheer.

This event is free and open to anyone interested in talking, listening and learning.

We’ll provide the beverages and tasty treats you provide your own brown bag lunch and ideas.

Submissions are welcome - submit your library movie URL to services@nylink.org, or include a link when you register!

Time is limited, so we may not get to see them all, but we will post the links and encourage further discussion!

Registration is suggested but not necessary. Please register by contacting Deidre Dowling at dowlingd@nylink.org simply include your name, title, institution and email address. Please put “Brown Bag Lunch Registration” in the subject line.

Posted On: February 1, 2008

New Maryland Rules No Free Online

New Maryland Rules Now Free Online http://marylandlaw.blogspot.com/2008/01/new-maryland-rules-now-free-online.html *
--------------------------------------------------
*Thanks to Trevor Rosen, Librarian at Shapiro Sher Guinot & Rosen in Baltimore, MD for sending this.

Posted On: February 1, 2008

Wireless Technology for Oregon Courts

Jackson, William. "Wireless Rules for Oregon Courts," Government Computer News, (February 1, 2008).

"Officials at the Oregon Judicial Department (OJD) ran into a problem several years ago when they began looking for a new home for the department’s information technology staff and equipment. "

"Managers had to figure out how to connect the network operations center (NOC) with the state’s data center and support more than 2,000 department employees at 70 locations statewide without requiring IT staff members to spend all their time on the road...."

To see complete article click here.

Posted On: February 1, 2008

Top Stories: ABA Journal Weekly Newsletter February 1, 2008

Law Firms
'Abysmal' Associate Attire Leads to Fashion Counseling
Jan 31, 2008, 07:05 am CST
"The generational divide is playing out in law firm fashion wars, with younger lawyers favoring business casual and even yoga pants and older lawyers tending to wear more traditional business attire"...Continue reading


--------------------------------------------------------------------------------

Pro Bono
Pro Bono for Defendant Who Earns $200K? Jones Day Says Yes
Jan 28, 2008, 03:18 pm CST

Legal Ethics
Lawyer Misses Client's Murder Trial, Says He's on Sabbatical
Jan 28, 2008, 07:56 am CST

Careers
Miserable Law Firm Employee Writes Advice Columnist
Jan 30, 2008, 10:04 am CST

Law Firms
Law Firms See Litigation Downturn, Likely to Weed Out Underperformers
Jan 28, 2008, 01:25 pm CST

Settlements
Hewitt Asked to Pay $9M for Error in Enron Settlement Payout
Jan 25, 2008, 07:12 am CST

Work/Life Balance
Lawyer Jokes No Laughing Matter for This Partner/Comedian
Jan 28, 2008, 12:32 pm CST

Legal Marketing & Consulting
Law Firm 'Fake News' Video Criticized
Jan 29, 2008, 06:14 am CST

Lawyer Pay
Associate Pay Hikes Create New Problem: Lower-Paid Partners
Jan 30, 2008, 06:43 am CST

Careers
'Woman Thing': Some Attire is Career-Limiting
Jan 24, 2008, 03:21 pm CST

Posted On: February 1, 2008

Recent Issues of the ABA Journal: July 2007 - January 2008

FEATURED STORIES:

January 2008
Newsmakers of the Year 2007 and 2008
Featured Stories:

Electing to Litigate
Full Court Coverage


December 2007
ABA Journal Blawg 100
Featured Stories:

A Conspiracy of One
ForeBlawggers
Motormouth


November 2007
Top 10 Ethics Traps
Featured Stories:

A Shot at the Second Amendment
Beast Practices
Paying Politics


October 2007
Pulse of the Legal Profession
Featured Stories:

Color Me Legal
Manhattan Work at Mumbai Prices
Settling It On the Web


September 2007
Law In the Age of Terror
Featured Stories:

Rising From The Rubble
Every Terrorism Case Since 9/11
Moussaoui v. The United States


August 2007
The Billable Hour Must Die
Featured Stories:

New Routes Into the Corporate Door
You’re NOT the Boss of Me
Rebuilding Project


July 2007
Law Hacks
Featured Stories:

Re-engineering the J.D.
Stories You Won’t Read in Books

For additional information including Tables of Contents for issues listed above, click here.

Posted On: February 1, 2008

"Total Research System" Tip from LexisNexis: Municipal Codes

From LexisNexis, In the Know:

In an exciting move, LexisNexis has been able to work with numerous cities, municipalities, and villages to obtain the right to publish their local codes, statutes or ordinances (depending on the term that the location uses). These sources are currently scheduled for updates twice a year, but some municipalities are working to enable us to update their ordinances with greater frequency.

We currently have ordinances from 35 states, including Illinois, Florida, Georgia, Texas, California, Ohio, and Washington. The number of cities included for each state varies, and we are looking forward to adding more cities in the future.

Each state has two sources which contain municipal codes (if that state currently has any municipal codes). The first is a group file in the following folder:

States Legal > Combined States > Statutes & Legislative Materials > Municipal Codes

The second source is located in each state's Statutes & Regulations folder. For example, the municipal codes for Alaska are in the following source:

Legal > States Legal - U.S. > Alaska > Statutes & Regulations > Alaska Municipal Codes

You can use any of the following methods to retrieve a municipal code section:

Use the Table of Contents. Click on the plus sign in front of Nome, then click in the plus sign in front of Title 12 Ports and Harbors, and finally click on the plus sign in front of Chapter 12.40; at this point you can click on the link for section 12.40.

Conduct a Search using the Heading Segment. Once you are in the Alaska Municipal Code source, run heading ( nome ) and section ( 12.40 ).

Use Get a Document. Click Get a Document, then click on Citation Formats, and type "Nome" into the box. This will bring up the template for using Get a Document to retrieve section 12.40, Nome Municipal Code § 12.40.

You cannot currently Shepardize Municipal Codes. As an alternative to Shepards, run a search in case law.

For additional information regarding research tips from LexisNexis click here.

Posted On: February 1, 2008

MARC21 Records for World Trial Library Available for Cassidy Cataloguing

From Cassidy Cataloguing Inc.

"We are pleased to announce that... Cassidy Cataloguing [is offering] MARC21 records for the World Trials Library. The MARC21 records for this collection will be developed and managed wholly by Cassidy Cataloguing, who is offering the records at a one-time subscription price. A subscription will include MARC21 records for up to 1,900 titles comprising Phase I of the World Trials Library. It will also include monthly updates that will coincide with new content released in Phase I of this library in HeinOnline. On average, we have been adding approximately 100 titles per month to the World Trials Collection and will continue to do so until the digitization of the Cornell Law collection is completed. After the digitization of Phase I is complete, we plan to further develop this library by adding additional historically significant trial collections, providing even greater access to trials that have been locked away for hundreds of years!"

If you have any questions about this service, please contact Cassidy Cataloguing at info@cassidycat.com or 973-586-3200

Posted On: February 1, 2008

Hien's Top 20 Publications for 2007

From William S. Hein and Company, Inc.:

1. Dahl's Law Dictionary - Spanish/English 4th Edition


Now in its fourth edition, Dahl's was the first bilingual dictionary containing encyclopedic definitions. This new edition includes more than 11,000 words and phrases to aid researchers in defining legal terms in both English and Spanish.
________________________________________________________________

2. Adoption Law: Theory, Practice and Policy

This publication is the first adoption law casebook with a state-to-state guide. It comprises statutes from every region of the United States. Practice pointers from various sources, a hearing transcript and forms that will provide researchers with a sense of the practice of adoption law are also included.
________________________________________________________________

3. Judicial Opinion Writing Handbook - 5th Edition

This publication reviews existing methods, styles, rules and techniques described in numerous books and articles. This new edition has been expanded to include a section on judges' views, containing comments and ideas from prominent judges.
________________________________________________________________

4. What Good Is Legislative History?

This is the first work to study the influence of Justice Antonin Scalia's criticism of legislative histories in more than 250 court decisions. Author Joseph L. Gerken explains throughout his work what it is that federal courts of appeals judges do when presented with legislative history in support of a statutory argument.

________________________________________________________________

5. Art Law: Cases and Materials

This one-of-a kind casebook is perfect for artists, researchers, students, attorneys and all who are interested in art and the law. More than 180 in-depth case analyses are included in this work. The book includes ten chapters focusing on developing and defining the legal contours for protection of art.
________________________________________________________________

6. Civil Liberties in Wartime

7. Screening Justice - The Cinema of Law

8. Relief From the Collateral Consequences of a Criminal Conviction

9. Survey on Law Library Liaison Services

10. Beyond the Books: People, Politics and Librarianship

11. Legal Research for the Texas Practitioner

12. Illegal Sex Discrimination or Permissible Customer Preference?

13. Family Manifesto

14. Fundamental Principles of Family Law - 2nd Ed.

15. Secret Treaties of History- 2nd Ed.


16. Family Law: Balancing Interests and Pursuing Priorities

17. Robert H. Jackson: Country Lawyer, Supreme Court Justice...

18. Scope and Myths of Roe v. Wade ...

19. Taxes in Paradise: Developing Basic Income Tax Concepts - 2nd ed.

20. ASIL Careers in International Law

_________________________________________________________________