Close

Articles Posted in Information Technology

Updated:

Murdoch On How to Get People to Pay for Content

In a video of an interview with his Fox Business Network, Rupert Murdoch, News Corp. Chairman discusses what he considers the future of media and the Company’s plan to charge for content. During the interview Mr. Murdoch said that in order to get people to pay for content online you…

Updated:

The Third Way: A Narrowly Tailored Broadband Framework

David Badertscher This posting is essentially a followup of two of our earlier postings on this topic which you can find here and here. It begins with two statements released by the U.S. Federal Communications Commission (FCC) on May 6, 2010 in partial response to the recent decision in the…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 5 May 2010.

Volume 3 Number 5 May 2010 Identity Theft From the Desk of David Badertscher What is Identity Theft? Identity theft is a crime in which your personal information such as your name, social security number, date of birth, and address is stolen and may be used by someone to assume…

Updated:

Department of Technology NYC: How Are We Doing?

An Internet Society NYC update with video: ISOC-NY on May 8 2010, hosted a seminar “dot nyc – How are we doing?” at NYU. NYC Council Member Gale Brewer delivered keynote remarks, then vendor Eric Brunner-Williams of CORE Internet Council of Registrars revealed details of their proposal to the City,…

Updated:

Intro to Cloud Computing and Its Ethical Implications –Is There a Silver Lining – Part I of II

Much is being written about the application development and information security aspects of cloud computing but there has been comparatively little discussion about how cloud computing relates to ethical issues that may arise from a lawyer’s use of this technology. In their two part article I n t r o…

Updated:

FBI Finding Criminal Data on Cell Phones and Game Consoles is Tough

Non-traditional communications devices such as smartphones and game consoles pose a particular problem to law enforcement agencies trying to milk them for forensic data that reveals criminal activity, attendees were told at the 2010 Computer Forensics Show in New York City. From: Greene, Tim. FBI: Finding Criminal Data on Cell…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 4 April 2010.

Volume 3 Number 4 April 2010. Cloud Computing From the Desk of David Badertscher What is Cloud Computing? Cloud computing is a growing trend in information technology as organizations look for ways to save money and add flexibility to their operations. Cloud computing, while still an evolving service, provides on-demand…

Updated:

What Should Be The Appropriate Privacy Expectations Of A Public Employee When Text Messaging On the Job?

In City of Ontario California et. al. v. Jeff Quon et. al. the U.S. Supreme Court is wrestling with the issue of whether public employees are entitled to a reasonable expectation of privacy in text messages transmitted on their workplace pages or similar devices without such messages being subject to…

Updated:

New Website: Alabama Supreme Court and State Law Library

The Alabama Supreme Court and State Law Library is pleased to announce the launch of its new website. Please check us out at http://judicial.alabama.gov/library.cfm. As part of our redesign, we are proud to present the full text of the Alabama Rules of Court-Civil, Criminal, Small Claims, Juvenile, Appellate, and Judicial…

Updated:

CLLB Information Security Newsletter. Volume 3 March 2010.

Volume 3 March 2010 Security and Privacy on Social Networking Sites From the Desk of David Badertscher What are the security and privacy issues associated with social networking sites? Social networking sites have become very popular avenues for people to communicate with family, friends and colleagues from around the corner…

Contact Us