Volume 3 number 8 August 2010. From the Desk of David Badertscher Protecting Children Online. What are the threats online? Children are spending more of their time online than ever before. According to one study, 8-18 year-olds spend an average of 1.5 hours a day using a computer outside of…
Articles Posted in Technology News
No Crackdown but Questions in Europe About Data Protection and the Cloud
By Alex Williams / September 4, 2010 11:18 PM* German authorities have recently expressed skepticism about cloud computing and the potential it has for breaking data protection laws. According to the Information Law Group, there is no imminent danger of a European crackdown, but legal experts are advising international companies…
New York: How Fast (Or Slow) Is Your Broadband?
Take a speed test: According to a recent survey by the Federal Communications Commission (FCC), 4 out of 5 Americans have no idea what the speed of their Internet connection is. The Center for Technology in Government (CTG) at the University at Albany is partnering with the New York State…
Network Neutrality: Some Background and Perspectives (Updated August 26, 2010)
David Badertscher Introduction In an August 6, 2010 posting on the AALL Washington Blawg, “As Talks Break Down, What is Next for Neutrality”, Emily Feldman discussed the implication of talks on network neutrality between the Federal Communications Commission (FCC) and stakeholders of network neutrality falling apart, or at least being…
CLLB Information Security Newsletter. Volume 3 Number 7 July 2010.
Volume 3 Number 7 July 2010 July 2010 PROTECTING DATA CONTAINED IN COPIERS AND PRINTERS From the Desk of David Badertscher What kind of data can be stored in copiers and printers? You are probably familiar with many of the standard best practices for safeguarding your data, such as avoid…
CLLB Information Security Newsletter. Volume 3 Number 6 June 2010.
Volume 3 Number 6 June 2010 From the Desk of David Badertscher Home Personal Computer (PC) Maintenance for Windows Operating Systems Why do I need to maintain my home PC? As with most types of equipment, you must perform periodic maintenance on your home PC to keep it in good…
Developing an Addition to Your Blackberry in 13 Easy Steps
We recemty receoved the following e-mail from the ABA Judicial Division and are grateful for the opportunity to share this column by Judge Dixon with you our colleagues and friends.: Judge Herbert Dixon’s technology column, Developing an Addition to Your BlackBerry in 13 Easy Steps, is available free to the…
Murdoch On How to Get People to Pay for Content
In a video of an interview with his Fox Business Network, Rupert Murdoch, News Corp. Chairman discusses what he considers the future of media and the Company’s plan to charge for content. During the interview Mr. Murdoch said that in order to get people to pay for content online you…
CLLB Information Security Newsletter. Volume 3 Number 5 May 2010.
Volume 3 Number 5 May 2010 Identity Theft From the Desk of David Badertscher What is Identity Theft? Identity theft is a crime in which your personal information such as your name, social security number, date of birth, and address is stolen and may be used by someone to assume…
CLLB Information Security Newsletter. Volume 3 Number 1 January 2010.
Volume3 Number 1 January 2010 From the Desk of David Badertscher As we begin the new year, it’s an opportune time to assess the cyber security landscape and prepare for what new challenges may lie ahead, as well as what current threats may continue. What Are the Cyber Trends for…