Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

FTC – Stopping Unsolicited Mail, Phone Calls, and Email

“Tired of having your mailbox crammed with unsolicited mail, including preapproved credit card applications? Fed up with getting telemarketing calls just as you’re sitting down to dinner? Fuming that your email inbox is chock-full of unsolicited advertising? The good news is that you can cut down on the number of unsolicited mailings, calls, and emails you receive by learning where to go to “just say no.”

Chief FOIA Officers Council Meeting July 27 2017

“OGIS and the Office of Information Policy (OIP) at the Department of Justice are happy to announce that the next meeting of the Chief FOIA Officers Council will be held on Thursday, July 27 from 10 am to noon. You can register to join the audience in the William G. McGowan Theater beginning on July… Continue Reading

Research – Correspondence Archives in the Age of Email

As a follow up to my previous postings – What is the fate of deleted Presidential tweets? and Obama White House E-mail Archiving Plan Revealed – See Also – Correspondence Archives in the Age of Email: Technology, Privacy, and Policy Challenges by Senior Program Associate Kristen C. Ratanatharathorn on the US-UK task force currently developing… Continue Reading

Citizens unredacted personal data concerning election fraud commission posted by White House

Follow up to resources with previous posting – States reject demand to provide all voter personal info to Trump election fraud commission – via Slate – White House Publishes Names, Emails, Phone Numbers, Home Addresses of Critics – “People who spoke up about their concerns over privacy suddenly found key private details, including their email… Continue Reading

NYT As Elites Switch to Texting Watchdogs Fear Loss of Transparency

As Elites Switch to Texting, Watchdogs Fear Loss of Transparency, Kevin Roose – “Lawmakers, executives and other leaders are turning to encrypted chat apps to keep their communications under wraps, causing problems in industries where careful record-keeping is standard procedure…Secure messaging apps like WhatsApp, Signal and Confide are making inroads among lawmakers, corporate executives and other… Continue Reading

Pew survey – Online Harassment 2017

“This study measures the prevalence and patterns of online harassment by examining six broad categories of abusive behavior (see “Defining online harassment” in the accompanying box). These categories are identical to those used in Pew Research Center’s 2014 examination of online harassment. They are designed to capture a broad range of experiences – not just… Continue Reading

New on LLRX – New ABA Email Guidelines: How Can Lawyers Comply?

Via LLRX.com – New ABA Email Guidelines: How Can Lawyers Comply? – Nicole Black advises lawyers on a range of applications and technology from which they can choose to establish standardized secure, encrypted email communications for all but the most extreme case-related interaction. Continue Reading

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

CRS – Cybersecurity: Legislation, Hearings, and Executive Branch Documents, Rita Tehan, Information Research Specialist. May 12, 2017. [FAS] “Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic… Continue Reading

24/7 Wall St – 15 Most Famous Cyberattacks of All Time

“The WannaCry ransomware attack has affected more than 200,000 computers in over 150 nations. The attack, which targets the Microsoft Windows operating system, has been described as one of the largest cyberattacks of all time. The malware encrypts files, demanding users of affected computers pay a ransom of $300 in bitcoin. The software behind WannaCry… Continue Reading

FTC updates consumers on ransomware

You’ve probably heard about the ransomware attack affecting organizations’ computer systems around the world. It seems to affect server software on organizations’ networked computers. But ransomware can attack anybody’s computer, so now is a good time to update your own operating system and other software. And then keep them up-to-date. The ransomware in the news… Continue Reading

State of the Phish 2017

This report is compiled data from tens of millions of simulated phishing attacks sent through Wombat’s Security Education platform over a 12 month period, as well as an extensive survey of our database of infosec professionals. The report also includes survey data from thousands of end users in the UK and US that measured their… Continue Reading

Vendors approve of NIST password draft security recommendations – emojis welcome

Via CSO – “Standards group recommends removing periodic password change requirements – A recently released draft of the National Institute of Standards and Technology’s (NIST’s) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies… Continue Reading