Libraries are bridges to information and knowledge.

The background information regarding U.S. Supreme Court nominee Sonia Sotomayor at our earlier posting has been updated to include her completed questionnaire which was delivered to the Committee of the Judiciary of the U.S. Senate on Thursday June 4, 2009. For those who have not seen it, that posting which is at:

https://www.criminallawlibraryblog.com/2009/05/judge_sonia_sotomayor_backgrou.html

According to Ed O’Keefe in a June 5, 2009 Washington Post article, “Library Officials Accused of Interference”, Senator Charles E. Grassley has written a sharply worded letter to the Librarian of Congress , James H. Billington, stating “…Your office attempts to influence and/or control [the Office of Inspector General] appear to be in direct contravention of the principles underlying the creation of the Inspector General”. The article explains that the question is whether top officials at the Library of Congress interfered with investigations conducted by its “independent watchdogs” such as the Office of the Inspector General and whether they have admonished investigators for the tone and focus of their investigations.

For additional information on this topic see our April 30, 2009 posting on this blog which provides additional information and a link to the Marhc 2009 report of the Office of the Inspector General regarding information technology planning at the Library of Congress: Information Technology Strategic Planning: A Well Developed Framework is Essential to Support the Library’s Current and Future Infortation Technology (IT) Needs , Report Number 2008-PA-105 March 2008.

To view the full-text of cases you must sign in to FindLaw.com. All summaries are produced by Findlaw.

June 4, 2009.

BANKING LAW, SECURITIES LAW Koehler v. Bank of Bermuda Ltd., No. 82 The Court of Appeals answered a certified question from the U.S. Court of Appeals for the Second Circuit as follows: A court sitting in New York may order a bank over which it has personal jurisdiction to deliver stock certificates owned by a judgment debtor (or cash equal to their value) to a judgment creditor, pursuant to CPLR article 52, when those stock certificates are located outside New York.

To view the full-text of cases you must sign in to FindLaw.com. All summaries are produced by Findlaw.

June 3-4, 2009.

CIVIL PROCEDURE, EDUCATION LAW, INJURY AND TORT LAW O’Connor v. Pierson , No. 07-1758 In an action brought by a public school teacher against a school, alleging various state and federal tort claims, district court’s of defendant’s motion for summary judgment on grounds that plaintiff’s claim is barred by res judicata is affirmed where: 1) the state court decision against plaintiff on his intentional infliction claim was decided on the merits and bars his pursuit of the substantive due process claims in federal district court; 2) the parties in the state and federal actions are in privity for purposes of res judicata; and 3) plaintiff had a fair and adequate opportunity to litigate his claims, even if they may have eventually been separated from one another.

QUESTION:

Recently, Connecticut and New Jersey have sought to remove funding completely for their county and court law libraries through budget bills and separate legislative actions. Has anyone experienced this threat from their state legislature recently?

SOME RESPONSES:

To view the full-text of cases you must sign in to FindLaw.com. All summaries are produced by Findlaw.

June 1-2, 2009.

CRIMINAL LAW & PROCEDURE, SENTENCING US v. Timewell, No. 07-4587 Sentence for drug crimes and making false statements to federal agents is vacated and remanded where the district court erred in neglecting to answer the question posed by the Crosby remand of defendant’s original sentence of whether the court would have imposed a materially different sentence under the post-Booker sentencing regime based on the circumstances at the time of the original sentence, and this error was not harmless

To view the full-text of cases you must sign in to FindLaw.com. All summaries are produced by Findlaw.

June 1, 2009.

CIVIL PROCEDURE, INJURY AND TORT LAW, PER CURIAM, TRANSPORTATION CSX Transp., Inc. v. Hensley, No. 08-1034 In an action brought under the Federal Employers’ Liability Act, based on Plaintiff’s fear of developing cancer due to asbestos exposure, judgment for Plaintiff is reversed where the trial court denied an instruction that Plaintiff must have a “genuine and serious fear” to recover damages, because that instruction was required by the Court’s prior decision in Ayers v. Norfolk & Western R. Co., 538 U.S. 135 (2003). Read more…

Web based criminal justice issues cannot be addressed in a rational manner without also the establishment and ongoing maintenance of a trusted and resilient information and communications infrastructure. Realizing the paramount importance of these objectives the Obama administration has been engaging in a mumber related activities including President Obama’s recent call for the creation of a cybersecurity coordinator who will orchestrate and integrate federal cybersecurity policies and agendas, and the release by the White House of a Report: Cyberspace Policy Review: Assuring a Trusted and Resilient Information Infrasturcture

These measures could not be more timely. The increasing rate that information on the web is being compromised in many ways including identity theft, willful distortion of information,and illegal wiretapping to name a few. Other organizations such as the American Association of Law Libraries (AALL) have long been concerned with issues related to the continuing integrity or authenticity of information on the web and are actively engaged in developing recommendations and helping others understand the importance of achieving and maintaining information authenticity of the web but additional help and support is needed. It is therefore most encouraging to see indications that the Obama administration is interested in taking an active role in addressing these and related issues.

The following are links to documents and articles discussing recent cybersecurity initiatives of the Obama administration.

Contact Information