From the Canadian Globe and Mail, Could Googling become illegal? See C-60, An Act to amend the Copyright Act, specifically Sec. 40.3 (scroll down the page to locate) Continue Reading
From the Canadian Globe and Mail, Could Googling become illegal? See C-60, An Act to amend the Copyright Act, specifically Sec. 40.3 (scroll down the page to locate) Continue Reading
Keeper of Expired Web Pages Is Sued Because Archive Was Used in Another Suit Internet Archive the complaint, filed in District Court, Eastern District of Pennsylvania (48 pages, PDF) Continue Reading
H.R. 3199, To extend and modify authorities needed to combat terrorism, and for other purposes. Introduced July 11, 2005 U.S. Newswire – “The House Judiciary Committee today passed legislation (H.R. 3199) reauthorizing the USA-PATRIOT Act by a 23-to-14 vote with 2 Members voting present. The Committee adopted some of the dozens of amendments it considered… Continue Reading
At issue is the HHS sponsored website, 4parents.gov, launched March 25, 2005, which is promoted as “part of a new national public education campaign to provide parents with the information, tools and skills they need to help their teens make the healthiest choices.” Following are links to documents posted today on the Minority Office website… Continue Reading
The 3 page press release (PDF), CBS Unveils Changes, Web Strategy. “CBS News will move from a primarily television and radio news-based operation to a 24-hour, on-demand news service, available across many platforms, drawing on the experienced, worldwide, award-winning resources of the Division. The new CBSNews.com will include: an on-demand, 24-hour news network in the… Continue Reading
From the U.S. Public Policy Committee of the Association for Computing Machinery (ACM), Data security & privacy bill part of a crowded Senate agenda (Part 1). Part 2, published July 13, 2005 Continue Reading
A free feature from today’s WSJ: Should Newspapers Sponsor Blogs Written by Reporters? Continue Reading
From the New York Times today, Secrecy Is Lifted in Some Tax Court Trials Continue Reading
From the Christian Science Monitor, Can you be found anywhere, anytime? reviews how GPS, TV and wireless signals can be used to track your location. Continue Reading
Information Security: Department of Homeland Security Needs to Fully Implement Its Security Program GAO-05-700, June 17, 2005. Highlights. “DHS has not fully implemented a comprehensive, departmentwide information security program to protect the information and information systems that support its operations and assets. It has developed and documented departmental policies and procedures that could provide a… Continue Reading
A 16 page PDF Practice Area Research Guide to news, business, industry and market resources from Factiva which will be available on LexisNexis in 2005. Continue Reading
Alert Overview: “The United States Computer Emergency Readiness Team (US-CERT) has received reports of an email based technique for spreading trojan horse programs. A trojan horse is an attack method by which malicious or harmful code is contained inside apparently harmless files. Once opened, the malicious code can collect unauthorized information that can be exploited… Continue Reading