FOIA Facts – My Proposal: FOIA Litigation Reporting Requirements
Scott A. Hodes makes the case that there should be a reporting requirement for all FOIA lawsuits requiring agencies to inform a central FOIA Office the outcome of FOIA lawsuits.
Scott A. Hodes makes the case that there should be a reporting requirement for all FOIA lawsuits requiring agencies to inform a central FOIA Office the outcome of FOIA lawsuits.
Heather A. Phillips reviews Stephen S. Wu’s book whose focus is coming into compliance with the recent and complex new HIPAA requirements.
Conrad J. Jacoby focuses on two recent cases that emphasize the credibility problems counsel can face in the context of e-discovery – and suggest that outside assistance may be the only way for some counsel to demonstrate that these materials are being managed in a competent and trustworthy way.
Connie Crosby’s column returns with an insightful clarion call about the work in which we must engage now, collectively, to clarify, market and invigorate our profession.
This month Jan Bissett and Margi Heinen review the expanding world of federal case law sources available free on the web. They also highlight the new feature of searching slip opinions that is now available on a number of sites.
Stuart Basefsky documents how the Personal Information Trainer can become a unique employee benefit written into the employment contract of key individuals deemed to be essential to the success of a firm or institution. This concept is useful to human resource managers, libraries, and the institutions they serve. This article provides the fundamental concepts and constructs necessary to implement such a program with an emphasis on why and how this should be done.
Ted Tjaden’s comprehensive guide provides information and links to print and online resources and is aimed primarily at researchers outside of Canada needing an overview of Canadian legal research.
From the perspective of several decades in the profession, Mary Whisner provides advice and specific data on what new law librarians should know about salaries, career opportunities, job responsibilities and challenges.
Ken Strutin’s article includes selected resources published on the web concerning the reliability and admissibility of fingerprint evidence. Links to guides, standards and related materials are listed to provide some background on the processes and application of this identification technique.
According to Conrad J. Jacoby e-mail conversion is done without a second thought in many e-discovery projects, and the results are often satisfactory to both producing and requesting parties. However, each major e-mail archive architecture uses a fundamentally different method for storing information about e-mail messages, and sometimes some collateral damage will occur.