“Ten Tests for Microsoft’s Document Inspector: Does it Satisfy the Metadata Management Needs of Law Firms?” runs through a battery of tests to determine the answer to the question posed. Click here to register to download the Report
Articles Posted in Information Technology
Report: 2008 Internet Security Trends
“For a time, security controls designed to manage spam, viruses, and malware were working. Loud, high-impact attacks abated. But, as a result of this success, the threats they protected against were forced to change. In 2007, many of these threats underwent significant adaptation. Malware went stealth, and the sophistication increased.”…
State Security Breach Notification Legislation: State Laws Chart
The following link is to a Chart prepared by Perkins Cole to provide information regarding information security breach notification legislation which has been enacted in U.S. jurisdictions. It has been updated to May 14, 2008: Chart indicating state-by-state legislation relating to information securirty breach notification as of 5-14-08
AALL State-by-State Survey and Report on Authentication of Online Legal Resources
An Introduction* David Badertscher How trustworthy are state-level primary legal resources on the Web? The American Association of Law Libraries (AALL) published the State-by-State Report on Authentication of Online Legal Resources (Authentication Report) that answers this very important and timely question. The comprehensive report examines and draws conclusions from the…
Global Business Law Conference: Frankfurt Germany May 29-30, 2008
ABA Section on Business Law Specialized Cyberspace and Technology Programming Sponsored by: Committee on Cyberspace Law Web 2.0: Wikis, Blogs, Mash-Ups and Avatars; or, The Explosion of User Generated Content and the Legal Challenges That Arise – Data Security Breach Incidents: The Law in the E.U., U.S. and Globally and…
Paperless Progress
BY Keith Ecker FROM: InsiderCounsel Magazine April 2008 Issue Excerpt: “Many lawyers believe the nature of their profession necessitates the hoarding of paper-a lot of paper-a misconception that through time has made them the enemy of tree”… “Thanks to the advent of certain technologies, in-house counsel don’t have to be…
The Future of the Internet and How to Stop It
Jonathan L. Zittrain has written an interesting, informative and innovative book titles The Future of the Internet: And How to Stop It. . I use the word “innovative” because the web version, which is available in full text at http://yupnet.org/zittrain/ incorporates added features to engage the reader. To quote from…
10 Tips for Finding Great Web Design and Development Services
BY: Molly E. Holzschlag “Losing tens of thousands of dollars is something we all want to avoid. Yet in today’s confusing world of Web development, it’s a daily occurrence, says Web doyenne Molly Holzschlag”. “The problem, as many CIOs learn after being burned, can be solved by gaining a better…
Q&A: What is Virtual Law?
QUESTION: What is virtual law? RESPONSE: “Virtual law is like ‘Internet law,’ in that it refers to a wide body of generally preexisting law that is applied somewhat differently in a new context. In fact, much of what we think of as ‘Internet law’ applies to virtual worlds. In sum,…
CLLB Information Security Newsletter. April 2008 Volume 1, Issue 3.
April 2008 Volume 1, Issue 3 From the Desk of David Badertscher SOCIAL ENGINEERING: ARE YOU AT RISK? The term “social engineering” can be defined in various ways, relating to both physical and cyber aspects of that activity. For the purposes of the discussion in this newsletter, social engineering is…