David Badertscher* How trustworthy are state-level primary legal resources on the Web? The American Association of Law Libraries (AALL) published the State-by-State Report on Authentication of Online Legal Resources (Authentication Report) that answers this very important and timely question. The comprehensive report examines and draws conclusions from the results of…
Articles Posted in Information Technology
Regisration for Web 2.0 Challenge
Bonnie Shucha has asked us to “spead the word” about the exciting Web 2.0 Challenge that is being sponsored by the Computer Services Special Interest Group of the American Association of Law Libraries. We are happy to do so. Here is part of Bonnie’s announcement: Are you interested in learning…
Microsoft’s Top Ten Innovationss by James Rapoza
” Let’s face it, during the reign of Bill Gates, Microsoft hasn’t exactly been Xerox Parc when it comes to inventing and creating new technologies. For the most part, Microsoft has been content to buy or copy new technologies and focus on incremental improvements to its products. But that doesn’t…
Ten Tests for Microsoft’s Document Inspector: Does it Satisfy the Metadata Management Needs of Law Firms
“Ten Tests for Microsoft’s Document Inspector: Does it Satisfy the Metadata Management Needs of Law Firms?” runs through a battery of tests to determine the answer to the question posed. Click here to register to download the Report
Report: 2008 Internet Security Trends
“For a time, security controls designed to manage spam, viruses, and malware were working. Loud, high-impact attacks abated. But, as a result of this success, the threats they protected against were forced to change. In 2007, many of these threats underwent significant adaptation. Malware went stealth, and the sophistication increased.”…
State Security Breach Notification Legislation: State Laws Chart
The following link is to a Chart prepared by Perkins Cole to provide information regarding information security breach notification legislation which has been enacted in U.S. jurisdictions. It has been updated to May 14, 2008: Chart indicating state-by-state legislation relating to information securirty breach notification as of 5-14-08
AALL State-by-State Survey and Report on Authentication of Online Legal Resources
An Introduction* David Badertscher How trustworthy are state-level primary legal resources on the Web? The American Association of Law Libraries (AALL) published the State-by-State Report on Authentication of Online Legal Resources (Authentication Report) that answers this very important and timely question. The comprehensive report examines and draws conclusions from the…
Global Business Law Conference: Frankfurt Germany May 29-30, 2008
ABA Section on Business Law Specialized Cyberspace and Technology Programming Sponsored by: Committee on Cyberspace Law Web 2.0: Wikis, Blogs, Mash-Ups and Avatars; or, The Explosion of User Generated Content and the Legal Challenges That Arise – Data Security Breach Incidents: The Law in the E.U., U.S. and Globally and…
Paperless Progress
BY Keith Ecker FROM: InsiderCounsel Magazine April 2008 Issue Excerpt: “Many lawyers believe the nature of their profession necessitates the hoarding of paper-a lot of paper-a misconception that through time has made them the enemy of tree”… “Thanks to the advent of certain technologies, in-house counsel don’t have to be…
The Future of the Internet and How to Stop It
Jonathan L. Zittrain has written an interesting, informative and innovative book titles The Future of the Internet: And How to Stop It. . I use the word “innovative” because the web version, which is available in full text at http://yupnet.org/zittrain/ incorporates added features to engage the reader. To quote from…