Ellen McGrath of the Charles P.Sears Law Library at the University of Buffalo has forwarded the following announcement from the National Information Standards Organization (NISO). We are posting it here in recognition and appreciation of the importance of NISO’s ongoing work to the library community: David Badertscher Date: Fri, 18…
Articles Posted in Information Technology
Murdoch On How to Get People to Pay for Content
In a video of an interview with his Fox Business Network, Rupert Murdoch, News Corp. Chairman discusses what he considers the future of media and the Company’s plan to charge for content. During the interview Mr. Murdoch said that in order to get people to pay for content online you…
The Third Way: A Narrowly Tailored Broadband Framework
David Badertscher This posting is essentially a followup of two of our earlier postings on this topic which you can find here and here. It begins with two statements released by the U.S. Federal Communications Commission (FCC) on May 6, 2010 in partial response to the recent decision in the…
CLLB Information Security Newsletter. Volume 3 Number 5 May 2010.
Volume 3 Number 5 May 2010 Identity Theft From the Desk of David Badertscher What is Identity Theft? Identity theft is a crime in which your personal information such as your name, social security number, date of birth, and address is stolen and may be used by someone to assume…
Department of Technology NYC: How Are We Doing?
An Internet Society NYC update with video: ISOC-NY on May 8 2010, hosted a seminar “dot nyc – How are we doing?” at NYU. NYC Council Member Gale Brewer delivered keynote remarks, then vendor Eric Brunner-Williams of CORE Internet Council of Registrars revealed details of their proposal to the City,…
Intro to Cloud Computing and Its Ethical Implications –Is There a Silver Lining – Part I of II
Much is being written about the application development and information security aspects of cloud computing but there has been comparatively little discussion about how cloud computing relates to ethical issues that may arise from a lawyer’s use of this technology. In their two part article I n t r o…
FBI Finding Criminal Data on Cell Phones and Game Consoles is Tough
Non-traditional communications devices such as smartphones and game consoles pose a particular problem to law enforcement agencies trying to milk them for forensic data that reveals criminal activity, attendees were told at the 2010 Computer Forensics Show in New York City. From: Greene, Tim. FBI: Finding Criminal Data on Cell…
CLLB Information Security Newsletter. Volume 3 Number 4 April 2010.
Volume 3 Number 4 April 2010. Cloud Computing From the Desk of David Badertscher What is Cloud Computing? Cloud computing is a growing trend in information technology as organizations look for ways to save money and add flexibility to their operations. Cloud computing, while still an evolving service, provides on-demand…
What Should Be The Appropriate Privacy Expectations Of A Public Employee When Text Messaging On the Job?
In City of Ontario California et. al. v. Jeff Quon et. al. the U.S. Supreme Court is wrestling with the issue of whether public employees are entitled to a reasonable expectation of privacy in text messages transmitted on their workplace pages or similar devices without such messages being subject to…
New Website: Alabama Supreme Court and State Law Library
The Alabama Supreme Court and State Law Library is pleased to announce the launch of its new website. Please check us out at http://judicial.alabama.gov/library.cfm. As part of our redesign, we are proud to present the full text of the Alabama Rules of Court-Civil, Criminal, Small Claims, Juvenile, Appellate, and Judicial…