Why does the Senate confirm Trump’s picks for key posts — and how?
Legal scholar Jennifer L. Selin explains the confirmation process and the ‘constitutional loophole’ of recess appointments.
Legal scholar Jennifer L. Selin explains the confirmation process and the ‘constitutional loophole’ of recess appointments.
Veronica Garrick’s paper is an insightful, factual and timely discussion of how in today’s digital age, minors are exposed to technology at a young age, presenting both great opportunities and risks. Online risks include data privacy breaches, access to inappropriate, cyberbullying, and online child predators. These challenges can have negative long-lasting effects, including privacy, mental, emotional, and physical safety. Addressing these risks associated with increased technology among minors requires a collaborative effort across many sectors. If communities, government, law enforcement, online platforms, and tech companies work together, they can minimize these risks. Once they start prioritizing online safety and implementing new safeguards, children can explore the digital world securely and safely.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Inside the Underground Site Where ‘Neural Networks’ Churn Out Fake IDs; 5 Steps to Improve Your Security Posture in Microsoft Teams; Drone surveillance case in Michigan Supreme Court tests privacy rights; and ‘AI Washing’ Is a Risk Amid Wall Street’s Craze, SEC Chief Gesler Says.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Every car is a smart car, and it’s a privacy nightmare; Cybercriminals Are Using Siri and Google Voice Assistants To Scam People; NIST releases revised cyber requirements for controlled unclassified information; and DELETE Act closes ‘big loophole’ and tightens regulations on data brokers.
With rare bipartisan support, the American Data and Privacy Protection Act moved out of the U.S. House of Representatives Committee on Energy and Commerce by a vote of 53-2 on July 20, 2022. The bill still needs to pass the full House and the Senate, and negotiations are ongoing. Given the Biden administration’s responsible data practices strategy, White House support is likely if a version of the bill passes. Legal scholar and attorney Professor Anne Toomey McKenna, who studies and practices technology and data privacy law, has been closely following the act, known as ADPPA. McKenna contends that if passed this legislation will fundamentally alter U.S. data privacy law.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Report Finds Identity Fraud Up 167% In USPS Change Of Address Requests; Cell carriers can use your web history for ads; The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?; and Microsoft Teams Adds an Emergency Call Alert.
This new guide by Marcus P. Zillman is a comprehensive listing of directory, subject guide and index resources and sites on the Internet. The guide includes sites in the private, public, corporate, academic and non-profit sectors and spans the following subject matters: Academic/Education; Economics/Business; Government and Statistics; Humanities; Information and Information Science; Law; Medicine; News; Science and Engineering; and Social Sciences.
If you work in any of the higher ed institutions that are preparing to move online – maybe your copyright world has exploded in a range of questions on fair use, e-reserves, online access, scanning, digitization, and more! Many in the library community are working towards the best solution for students, faculty, staff, and patrons in this time of crisis. To help you navigate this process, lawyer, librarian, copyright academic Kyle K. Courtney’s Two Part article offers a wealth of guidance on the legal tools libraries have for copyright as “stewards of access” in our communities. [See Part 2]