Close

Articles Posted in Information Technology

Updated:

Leading Executives in the Legal Research Industry Join Bloomberg Law

Leading Executives in the Legal Research Industry Join Bloomberg Law Lou Andreozzi and Larry D. Thompson to Lead Expansion of Bloomberg’s Web-Based Legal Platform New York, October 18, 2010 – Bloomberg today announced that Lou Andreozzi has joined the Company as chairman of Bloomberg Law and Larry D. Thompson, PhD,…

Updated:

From the Offices of Lesley Ellen Harris

A New Bog: Those of you who follow this blog will know that I occasionaly post Lesley Harris’s excellent Newsletter The Copyright & News Media Law Newsletter, (latest issue posted below with permission) where she covers a wide range of topics from copyright and licensing to jobs for librarians. Although…

Updated:

Ethics and Social Media Use By Court Staff

Real world examples needed.I am posting the following request for real-world examples of issues and problems regarding ethics and social media that have occurred in our courts as a service to all of us who really need access to this information. Please contact Norman Meyer directly if you have any…

Updated:

State of Telecom Conference: Matching Supply and Demand for the Next Generation of Broadband

The Columbia Institute for Tele-Information (CITI) “State of Telecom” conference will be held on October 15 at the Columbia University Business School, Davis Auditorium in theShapiro Center (just behind Uris Hall). This year’s focus will be on “Matching Supply and Demand for the Next Generation of Broadband.” The conference will…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 9 September 2010.

Volume 3 Number 9 September 2010. September 2010 Detecting and Avoiding Fake Anti-Virus Software From the Desk of David Badertscher Your Computer Is Infected with Malware! You may be familiar with this or similar messages appearing on a website, urging you to take action purportedly designed to clean your allegedly…

Updated:

Ten Ways IT Departments May Enable Cybercrime

Kapersky laboratories has produced a special whitepaper focused on how IT unknowingly enables cybercrime by giving cybercriminals access to systems and data through a series of misconceptions and false assumptions. To view this paper click on the link below: Ten Ways IT Departments Enable Cybercrime

Updated:

CLLB Information Security Newsletter. Volume 3 number 8 August 2010.

Volume 3 number 8 August 2010. From the Desk of David Badertscher Protecting Children Online. What are the threats online? Children are spending more of their time online than ever before. According to one study, 8-18 year-olds spend an average of 1.5 hours a day using a computer outside of…

Updated:

No Crackdown but Questions in Europe About Data Protection and the Cloud

By Alex Williams / September 4, 2010 11:18 PM* German authorities have recently expressed skepticism about cloud computing and the potential it has for breaking data protection laws. According to the Information Law Group, there is no imminent danger of a European crackdown, but legal experts are advising international companies…

Contact Us