“Ten Tests for Microsoft’s Document Inspector: Does it Satisfy the Metadata Management Needs of Law Firms?” runs through a battery of tests to determine the answer to the question posed.
Articles Posted in Information Technology
Report: 2008 Internet Security Trends
“For a time, security controls designed to manage spam, viruses, and malware were working. Loud, high-impact attacks abated. But, as a result of this success, the threats they protected against were forced to change. In 2007, many of these threats underwent significant adaptation. Malware went stealth, and the sophistication increased.”
Computerworld Resources, May 26, 2008
To highlight and address these threats and related issues in 2008 and to offer suggestions as to how to cope with them, Cisco and Ironport, two specialists in these areas, have recently published a comprehensive report: 2008 Security Trends: A Report on Emerging Platforms for Spam, Viruses, and Malware.. According to the Introduction to the Report: “This report is designed to help highlight the key security trials in 2008 and suggest ways to defend against the sophisicated generation of internet threats certain to arise in the future.”
State Security Breach Notification Legislation: State Laws Chart
The following link is to a Chart prepared by Perkins Cole to provide information regarding information security breach notification legislation which has been enacted in U.S. jurisdictions. It has been updated to May 14, 2008:
AALL State-by-State Survey and Report on Authentication of Online Legal Resources
An Introduction*
David Badertscher
How trustworthy are state-level primary legal resources on the Web? The American Association of Law Libraries (AALL) published the State-by-State Report on Authentication of Online Legal Resources (Authentication Report) that answers this very important and timely question. The comprehensive report examines and draws conclusions from the results of a state survey that investigated whether government-hosted legal resources on the Web are official and capable of being considered authentic. The survey was conducted by the Access to Legal Information Committee of AALL. For a quick overview, the Authentication Report’s Executive Summary provides an excellent introduction to some of the underlying issues and facts surrounding the pressing and timely issue of the authenticity of state primary digital legal materials.
Global Business Law Conference: Frankfurt Germany May 29-30, 2008
ABA Section on Business Law
Specialized Cyberspace and Technology Programming Sponsored by: Committee on Cyberspace Law
Web 2.0: Wikis, Blogs, Mash-Ups and Avatars; or, The Explosion of User Generated Content and the Legal Challenges That Arise –
The Future of the Internet and How to Stop It
Jonathan L. Zittrain has written an interesting, informative and innovative book titles The Future of the Internet: And How to Stop It. . I use the word “innovative” because the web version, which is available in full text at http://yupnet.org/zittrain/ incorporates added features to engage the reader.
To quote from his introduction:
“…The Internet’s current trajectory is one of lost opportunity. Its salvation lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true ‘netizens.’ “
10 Tips for Finding Great Web Design and Development Services
BY: Molly E. Holzschlag
“Losing tens of thousands of dollars is something we all want to avoid. Yet in today’s confusing world of Web development, it’s a daily occurrence, says Web doyenne Molly Holzschlag”.
“The problem, as many CIOs learn after being burned, can be solved by gaining a better understanding of what to look for in a Web design and development company, how to ask for it and how to ensure that what you pay for is really what you need.”
CLLB Information Security Newsletter. April 2008 Volume 1, Issue 3.
April 2008 Volume 1, Issue 3
From the Desk of David Badertscher
SOCIAL ENGINEERING: ARE YOU AT RISK?