Close

Articles Posted in Information Security Newsletter

Updated:

National Town Hall on Scams and Older Adults

Important announcement for seniors: Older adults, families, and professionals who work with older adults are invited to register for an action-oriented National Town Hall on scams and older adults on Wednesday, October 30, 1:00–2:00 p.m. ET. Presented jointly by the Consumer Financial Protection Bureau (CFPB), AARP, and Federal Deposit Insurance…

Updated:

Is It Time for a New US Constitutional Convention?

Introduction. This posting provides information to help explore the key arguments surrounding this question from both positive and negative perspectives and to provide a useful framework to inform the debate.  Commentary is organized into the following categories: Survey Information, Historical Context, Current Challenges, Arguments for a New Constitutional Convention, Arguments…

Updated:

American Bar Association and AI

In a previous posting on this blog, Reflections of a Retired Law Librarian: From Mimeograph to Generative AI, I urged professional organizations, including the American Bar Association (ABA) and the American Association of Law Libraries (AALL), to appoint committees or commissions at the highest level to  facilitate the development and…

Updated:

The Potential for Using Generative AI to Help Regulate Criminal Behavior

Generative AI is a type of artificial intelligence technology that can produce various types of content, including text, imagery, audio and information that is artificially manufactured. The recent interest in generative AI has been driven by the simplicity of new user interfaces for creating high-quality content, including text, graphics and…

Updated:

Congressional Budget Office: H.R.4503, AI Training Expansion Act of 2023

August 4, 2023. As ordered Reported  by the House Committee on Oversight and Accountability on July 12, 2023. Summary: H.R. 4503 would require the Office of Management and Budget (OMB) to expand a training program to provide federal managers with an introductory understanding of the operational benefits and privacy risks…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 9 September 2010.

Volume 3 Number 9 September 2010. September 2010 Detecting and Avoiding Fake Anti-Virus Software From the Desk of David Badertscher Your Computer Is Infected with Malware! You may be familiar with this or similar messages appearing on a website, urging you to take action purportedly designed to clean your allegedly…

Updated:

CLLB Information Security Newsletter. Volume 3 number 8 August 2010.

Volume 3 number 8 August 2010. From the Desk of David Badertscher Protecting Children Online. What are the threats online? Children are spending more of their time online than ever before. According to one study, 8-18 year-olds spend an average of 1.5 hours a day using a computer outside of…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 7 July 2010.

Volume 3 Number 7 July 2010 July 2010 PROTECTING DATA CONTAINED IN COPIERS AND PRINTERS From the Desk of David Badertscher What kind of data can be stored in copiers and printers? You are probably familiar with many of the standard best practices for safeguarding your data, such as avoid…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 6 June 2010.

Volume 3 Number 6 June 2010 From the Desk of David Badertscher Home Personal Computer (PC) Maintenance for Windows Operating Systems Why do I need to maintain my home PC? As with most types of equipment, you must perform periodic maintenance on your home PC to keep it in good…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 5 May 2010.

Volume 3 Number 5 May 2010 Identity Theft From the Desk of David Badertscher What is Identity Theft? Identity theft is a crime in which your personal information such as your name, social security number, date of birth, and address is stolen and may be used by someone to assume…

Contact Us