Articles Posted in Information Technology

“For a time, security controls designed to manage spam, viruses, and malware were working. Loud, high-impact attacks abated. But, as a result of this success, the threats they protected against were forced to change. In 2007, many of these threats underwent significant adaptation. Malware went stealth, and the sophistication increased.”

Computerworld Resources, May 26, 2008

To highlight and address these threats and related issues in 2008 and to offer suggestions as to how to cope with them, Cisco and Ironport, two specialists in these areas, have recently published a comprehensive report: 2008 Security Trends: A Report on Emerging Platforms for Spam, Viruses, and Malware.. According to the Introduction to the Report: “This report is designed to help highlight the key security trials in 2008 and suggest ways to defend against the sophisicated generation of internet threats certain to arise in the future.”

The following link is to a Chart prepared by Perkins Cole to provide information regarding information security breach notification legislation which has been enacted in U.S. jurisdictions. It has been updated to May 14, 2008:

Chart indicating state-by-state legislation relating to information securirty breach notification as of 5-14-08

An Introduction*

David Badertscher

How trustworthy are state-level primary legal resources on the Web? The American Association of Law Libraries (AALL) published the State-by-State Report on Authentication of Online Legal Resources (Authentication Report) that answers this very important and timely question. The comprehensive report examines and draws conclusions from the results of a state survey that investigated whether government-hosted legal resources on the Web are official and capable of being considered authentic. The survey was conducted by the Access to Legal Information Committee of AALL. For a quick overview, the Authentication Report’s Executive Summary provides an excellent introduction to some of the underlying issues and facts surrounding the pressing and timely issue of the authenticity of state primary digital legal materials.

ABA Section on Business Law

Specialized Cyberspace and Technology Programming Sponsored by: Committee on Cyberspace Law

Web 2.0: Wikis, Blogs, Mash-Ups and Avatars; or, The Explosion of User Generated Content and the Legal Challenges That Arise –

Jonathan L. Zittrain has written an interesting, informative and innovative book titles The Future of the Internet: And How to Stop It. . I use the word “innovative” because the web version, which is available in full text at http://yupnet.org/zittrain/ incorporates added features to engage the reader.

To quote from his introduction:

“…The Internet’s current trajectory is one of lost opportunity. Its salvation lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true ‘netizens.’ “

BY: Molly E. Holzschlag

“Losing tens of thousands of dollars is something we all want to avoid. Yet in today’s confusing world of Web development, it’s a daily occurrence, says Web doyenne Molly Holzschlag”.

“The problem, as many CIOs learn after being burned, can be solved by gaining a better understanding of what to look for in a Web design and development company, how to ask for it and how to ensure that what you pay for is really what you need.”

Contact Information