Close

Articles Posted in Information Technology

Updated:

Q&A: Electronic Signatures*

QUESTION: Does any one use electronic signatures for documents? We conduct video arraignments with detention facilities around our county and this would be most helpful and much more efficient. Any information you can provide will be appreciated. RESPONSE: There is a difference between electronic and digital. We use a live…

Updated:

Chain of Custody: Authenticating Digital Evidence

The transition of evidence from paper to digital imposes new challenges to ensuring a proper “chain of custody'” in the authentication of digital evidence. The legal group of Merrill Corporation has recently compiled a report which addresses this and related issues: Report: AUTHENTICATING DIGITAL EVIDENCE: IDENTIFY AND AVOID THE WEAK…

Updated:

New Online Journal: Legal Information and Technology eJournal

Georgia K. Briscoe* of the University of Colorado School of Law Library has sent the following announcement which we are please to post here for the benefit of all law librarians and perhaps some others as well. Here is her announcement: In case you haven’t heard, there is a new…

Updated:

Recent Comments on Google and the Future of the Book

Sometimes it seems as though Google has become ubiquitous in the world of searching and may want to repeat its act in the world of books. While thinking about this, two articles, one forthcoming and one published Febrary 1 have come to our attention> The forthoming article Google and the…

Updated:

CLLB Information Security Newsletter. January 2009 Volume 2 # 1.

January 2009 Volume 2 # 1 Challenge or Secret Questions From the Desk of David Badertscher What are Challenge or Secret Questions? Knowledge-based authentication or the use of “Challenge or Secret Questions” helps computer users access their accounts when they forget their password. The questions are often designed as simple,…

Updated:

Results from Marshall Breeding’s 2008 Library Automation Survey

In case you missed it, the results from the 2008 version of Marshall Breeding’s Library Automation Survey are available at http://www.librarytechnology.org/perceptions2008.pl. This Survey is international in scope. There were 1,450 responses.

Updated:

Upgraded Library Web Resource Announcement

State of New York Supreme Court Criminal Term Library (New York County) Inspired by the recent New York Unified Court System Report Green Justice: An environmental Action Plan for the New York State Court System*, the New York Supreme Court Law Library, Criminal Term (New York County) is pleased to…

Updated:

Technology: What’s Coming in 2009?

Michael Gartenberg’s predictions as reported in Computerworld – December 17. 2008. “Well, it’s that time of the year again. Time to enjoy the glow of a nice LED-backlit display and huddle with the warmth that only an overclocked PC can produce. Yep, it’s time to take a look at what’s…

Updated:

Technology Escrow Agreements: Safeguarding Technology Investments

“What happens to your mission-critical… application source code should the vendor go bankrupt? This is when you need a Technology Escrow service.Tech Escrow requires vendors to deposit source code into an account held by a third party agent to ensure ongoing accessibility of the software. Recent research by IDG research…

Contact Us