Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Monthly Archives: June 2005

ICANN to Address Unrestricted Access to Whois Data

ICANN Watch reports: “At the Luxembourg ICANN meeting, the US Government is organizing a 4-hour session of the Governmental Advisory Committee (GAC) on how public display of Whois data supports “combating illegal activities on the Internet.” Perhaps sensing that time is running out on unrestricted access to Whois data, the US GAC representative and US-based… Continue Reading

NRC Incrementally Restoring Documents to Website

As a follow-up to my October 26, 2004 post, Nuclear Regulatory Commission Sidelines Web Document Library, from the NRC’s June 9, 2005 press release: “The Nuclear Regulatory Commission is restoring public access to more than 70,000 additional documents through its on-line public library, ADAMS, after reviewing them for security sensitivity. The restoration involves administrative, contractual,… Continue Reading

Report Documents Significant Challenges For Future of E-Government

Forrester study finds slowing e-gov adoption: “The Presidential e-Government Initiatives of 2000 have lost much of their steam because people still prefer to interact with federal agencies over the telephone, according to a report from Forrester Research Inc. of Cambridge, Mass.” May 12, 2005, The Future Of eGovernment, Introducing The eGovernment Maturity Continuum, by Alan… Continue Reading

Advocacy Group Publishes Legal Guide for Bloggers

Press release: EFF Announces its New Legal Guide for Bloggers – “The Electronic Frontier Foundation EFF) is pleased to release a document that informs bloggers of their legal rights. EFF’s Legal Guide for Bloggers is a collection of frequently asked questions (FAQs)designed to educate bloggers about their legal rights in a number of areas, including… Continue Reading

Federal Agencies Confront Growing Cybersecurity Issues

Information Security: Emerging Cybersecurity Issues Threaten Federal Information Systems GAO-05-231, May 13, 2005. Highlights. “Spam, phishing, and spyware pose security risks to federal information systems. Spam consumes significant resources and is used as a delivery mechanism for other types of cyberattacks; phishing can lead to identity theft, loss of sensitive information, and reduced trust and… Continue Reading

Bill Requiring Disclosure of FOIA Exemptions Passes Senate

On June 9, the Senate Judiciary Committee approved S.1181, “a bill to ensure an open and deliberate process in Congress by providing that any future legislation to establish a new exemption to section 552 of title 5, United States Code (commonly referred to as the Freedom of Information Act) be stated explicitly within the text… Continue Reading

The Pros and Cons of PowerPoint Presentations

Two postings, via Hot Links, that offer useful comments on best practices for PowerPoint presentations, as well as how and when to dispense with them in favor of simply talking directly to your audience: “It has become commonplace to rail against the evils of PowerPoint talks; you know, those dull, boring never-ending ordeals where the… Continue Reading