The Wise Use of ‘Intelligence’, Leigh Jones, The National Law Journal, 04-12-2005. Continue Reading
The Wise Use of ‘Intelligence’, Leigh Jones, The National Law Journal, 04-12-2005. Continue Reading
Jay Cline reviews a range of popular e-commerce websites that offer consumers a defined list of privacy protections and provides general scores for those that implement portions of the European privacy principles. Continue Reading
Supreme Court Standards for Peer-to-Peer and Beyond – “The upcoming ruling on copyright infringement in P-to-P networks will have important implications for future technology development.” Continue Reading
From the WSJ Free Content, Librarians Reference These Sites When Seeking Work, by Sarah E. Needleman Continue Reading
“CDT will testify (text of statement submitted by CDT Exec. Director, 17 pages, PDF) April 13 before the Senate Judiciary Committee on the privacy and security issues raised by recent losses of personal information by data brokers and others. CDT will call for a stronger policy framework, requiring notice of breach, security safeguards, limits on… Continue Reading
Press release: LexisNexis Concludes Review of Data Search Activity, Identifying Additional Instances of Illegal Data Access: “In addition to the 30,000 individuals already notified, LexisNexis will begin notifying approximately 280,000 additional individuals whose information may have been acquired during these recently identified incidents. LexisNexis will offer free support services to individuals who receive the notification,… Continue Reading
Klein and Mueller: What to Do About ICANN: A Proposal for Structural Reform, April 5, 2005. “…Three structural reforms are proposed: 1) Create an international oversight body to replace US oversight of ICANN and ICANN’s Governmental Advisory Committee; 2) restore ICANN’s global Board elections; 3) Give ccTLD managers and Internet Protocol address users a choice… Continue Reading
Press release: Spam and phishing – “More than a year after the CAN-SPAM Act became law, email users say they are receiving slightly more spam in their inboxes than before, but they are minding it less…And in a first-time measure of “phishing,” or unsolicited email requesting personal financial information, 35% of users say they have… Continue Reading
From Secrecy News, “During calendar year 2004, 1,758 applications were made to the Foreign Intelligence Surveillance Court for electronic surveillance and physical search, according to the latest Foreign Intelligence Surveillance Act (FISA) annual report to Congress. That established a new annual record for domestic counterintelligence and counterterrorism surveillance and search activity.” Continue Reading
From Accenture, the sixth annual global report on delivery of e-government services, “Leadership in Customer Service: New Expectations, New Experiences,” is available free but requires registration to download. Use this link to review excerpts that include Background, Key Findings, and The Citizens’ View. Press release – Governments Must Move Beyond eGovernment Initiatives to Enhance Customer… Continue Reading
Spyware Installation Methods, by Benjamin Edelman, updated April 11, 2005. “This page indexes installation methods used by spyware programs and other unwanted software.” Continue Reading
“This page features links to World Wide Web sites, PowerPoint slideshows, and other electronic resources used in support of presentations at Computers in Libraries 2005. Links are provided at the discretion of presenters. Additional links will be provided as they become available.” Continue Reading