Emily Donnellan updates readers on the lawsuit in the US Court of Appeals for the Federal Circuit over what essentially boils down to the question: are PACER fees too high? Donnellan includes resources to track and monitor changes and issues related to Pacer in addition to user objections to fees.
If you work in any of the higher ed institutions that are preparing to move online – maybe your copyright world has exploded in a range of questions on fair use, e-reserves, online access, scanning, digitization, and more! Many in the library community are working towards the best solution for students, faculty, staff, and patrons in this time of crisis. To help you navigate this process, lawyer, librarian, copyright academic Kyle K. Courtney’s Two Part article offers a wealth of guidance on the legal tools libraries have for copyright as “stewards of access” in our communities. [See Part 1]
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Finland is winning the war on fake news. Other nations want the blueprint; Ari Mahairas and Peter Beshar on AI and 5G security risks; Age of fraud: Are seniors more vulnerable to financial scams?; Concern Growing Over ‘Nefarious’ Website Offering Individuals’ Personal Information, Reputation Rating.
Nicole L. Black discusses how e-filing mandates in many jurisdictions are causing lawyers to digitize their law firm’s documents, and as a result more firms are moving toward a paperless law office—or at the very least, an office with less paper. She suggest some effective avenues to achieve this goal.
At the beginning of this year, President Trump signed into law the Open, Public, Electronic and Necessary Government Data Act, requiring that nonsensitive government data be made available in machine-readable, open formats by default. As researchers who study data governance and cyber law [Anjanette Raymond, Beth Cate and Scott Shackelford] we are excited by the possibilities of the new act. But much effort is needed to fill in missing details – especially since these data can be used in unpredictable or unintended ways. The federal government would benefit from considering lessons learned from open government activities in other countries and at state and local levels.
Former CPA, writer and teacher Ken Boyd provides readers with an explanation of tax fraud that is clearly presented, instructive and relevant to the ongoing Mueller investigation. Boyd uses the extensive New York Times investigative report of November 2018 that documented a history of tax fraud allegedly committed by Donald Trump, his father and siblings, as the foundation for his lesson on various types of tax fraud. The allegations documented by the Times are under review by the New York State Department of Taxation and Finance.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness.Note – four significant highlights of this week’s column: The web really isn’t worldwide – every country has different access; Measuring the “Filter Bubble”: How Google is influencing what you click; Grandparents Increasingly Targeted By Impostors Who Know ‘Everything’ About Them; Who lives with you? Facebook seeks to patent software to figure out profiles of households.
Legal research companies are selling surveillance data and services to law enforcement agencies including ICE. Their participation in government surveillance raises ethical questions about privacy, confidentiality and financial support: How private is your search history when your legal research vendors also sell surveillance data? Are you funding products that sell your patrons’ and clients’ data to ICE and other law enforcement agencies? Law professor professor and faculty services librarian Sarah Lamdan’s article focuses on how librarians uphold their privacy and intellectual freedom standards when they rely on surveillance companies for their research resources.
This guide by Marcus Zillman focuses on selected free and fee based resources published by a range of reliable sources that researchers can use for tracking, monitoring and sector research discovery purposes, as well as on tools and techniques to leverage in their business intelligence work.
In anticipation of the incorporation of Ravel Law visualization technology into an upcoming iteration of LexisAdvance, Reference Librarian and Professor Sarah Gotcshall shows us examples of how Ravel Law and Shepard’s graphical view work now.