Close

Articles Posted in Information Security Newsletter

Updated:

Is It Time for a New US Constitutional Convention?

Introduction. This posting provides information to help explore the key arguments surrounding this question from both positive and negative perspectives and to provide a useful framework to inform the debate.  Commentary is organized into the following categories: Survey Information, Historical Context, Current Challenges, Arguments for a New Constitutional Convention, Arguments…

Updated:

American Bar Association and AI

In a previous posting on this blog, Reflections of a Retired Law Librarian: From Mimeograph to Generative AI, I urged professional organizations, including the American Bar Association (ABA) and the American Association of Law Libraries (AALL), to appoint committees or commissions at the highest level to  facilitate the development and…

Updated:

The Potential for Using Generative AI to Help Regulate Criminal Behavior

Generative AI is a type of artificial intelligence technology that can produce various types of content, including text, imagery, audio and information that is artificially manufactured. The recent interest in generative AI has been driven by the simplicity of new user interfaces for creating high-quality content, including text, graphics and…

Updated:

Congressional Budget Office: H.R.4503, AI Training Expansion Act of 2023

August 4, 2023. As ordered Reported  by the House Committee on Oversight and Accountability on July 12, 2023. Summary: H.R. 4503 would require the Office of Management and Budget (OMB) to expand a training program to provide federal managers with an introductory understanding of the operational benefits and privacy risks…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 9 September 2010.

Volume 3 Number 9 September 2010. September 2010 Detecting and Avoiding Fake Anti-Virus Software From the Desk of David Badertscher Your Computer Is Infected with Malware! You may be familiar with this or similar messages appearing on a website, urging you to take action purportedly designed to clean your allegedly…

Updated:

CLLB Information Security Newsletter. Volume 3 number 8 August 2010.

Volume 3 number 8 August 2010. From the Desk of David Badertscher Protecting Children Online. What are the threats online? Children are spending more of their time online than ever before. According to one study, 8-18 year-olds spend an average of 1.5 hours a day using a computer outside of…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 7 July 2010.

Volume 3 Number 7 July 2010 July 2010 PROTECTING DATA CONTAINED IN COPIERS AND PRINTERS From the Desk of David Badertscher What kind of data can be stored in copiers and printers? You are probably familiar with many of the standard best practices for safeguarding your data, such as avoid…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 6 June 2010.

Volume 3 Number 6 June 2010 From the Desk of David Badertscher Home Personal Computer (PC) Maintenance for Windows Operating Systems Why do I need to maintain my home PC? As with most types of equipment, you must perform periodic maintenance on your home PC to keep it in good…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 5 May 2010.

Volume 3 Number 5 May 2010 Identity Theft From the Desk of David Badertscher What is Identity Theft? Identity theft is a crime in which your personal information such as your name, social security number, date of birth, and address is stolen and may be used by someone to assume…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 4 April 2010.

Volume 3 Number 4 April 2010. Cloud Computing From the Desk of David Badertscher What is Cloud Computing? Cloud computing is a growing trend in information technology as organizations look for ways to save money and add flexibility to their operations. Cloud computing, while still an evolving service, provides on-demand…

Contact Us