308,656 research outputs found

    Calm before the storm: the challenges of cloud computing in digital forensics

    Get PDF
    Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic investigators, equipment vendors, law enforcement, as well as corporate compliance and audit departments (among others). Much of digital forensic practice assumes careful control and management of IT assets (particularly data storage) during the conduct of an investigation. This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment. Several new research challenges addressing this changing context are also identified and discussed

    Age Verification in the 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005)

    Get PDF
    Today a lot of private businesses have adopted the practice of driver\u27s license swiping where proof of age or security issues arise. This practice has beneficial uses for both private entities, in identifying underage persons and those with fake identification, and law enforcement. However, the problem arise when the private sector, businesses are not using the information to merely identify underage customers or those with fake identification but store the information encoded on the barcode in a computer database. No federal laws and very few state laws regulate the collection and use of this information while the private sector is not following the basic guidelines to make people aware that their information is being collected electronically and to alert them to how it is being used. This comment argues that United States citizens have a right to privacy with regard to the information contained on their identification cards. First, the background of how personal information is being stored on Driver’s license is presented and a more detailed description of how swiping technology works follows. Next the author examines the state and federal regulations currently existing to govern this practice of driver\u27s license swiping. The Fair Information Practice Principles are also being presented and a brief history of their application is given. Then, all the current applications of swiping, including law enforcement and private enterprise use is examined and a more detailed analysis of the potential costs and benefits of scanning and data retention is given to determine whether the practice should continue to be unregulated in private enterprises. It is argued that a person should have the right to purchase something that is legal without having to exchange his or her sensitive information for this item and that people should be aware that their information is being collected and receive notice as to how it could be used. In conclusion, it is suggested that legislation be put in place to regulate the practice of scanning and storing patron\u27s personal information since it is almost inevitable that once the practice of swiping becomes widespread among private enterprises that must check for proof of age, this information may fall into the wrong person\u27s hands

    Lawyer ≠ Luddite

    Full text link
    Being a competent attorney means being a competent technologist. ABA Model Rule 1.1 (Competence) requires all lawyers to stay abreast of technology even if they still use a Dictaphone and typewriter and think “the cloud” refers to the fluffy white stuff in the sky. It can be malpractice to misuse or misunderstand technology, and this misuse can take many forms. Lack of familiarity with technology can lead to improper production of confidential information, delays in litigation, wasting time and client funds, ending up on Above the Law (and not in a good way), and more.Legal technology courses are becoming increasingly common on law school campuses, but there is no model curriculum or consensus as to what topics should be covered. The technology available to lawyers is revolutionizing the practice of law and introducing new opportunities and efficiencies, but is changing on a constant basis. Exasperating both of these situations is the sometimes murky interpretation and enforcement of the ABA rules.At the Pence Law Library, we are currently surveying students’ technological competence through a Basic Technology Competence Checklist adapted from Sam Glover at lawyerist.com. The survey asks about basic computer, Internet, data security, and e-discovery competence. We intend to use the results of the survey to fill in the gaps in our students’ understanding of technology.The goal of the presentation is to a.) discuss ABA model rule 1.1 and its commentary, as well as other professional rules and responsibilities imposed by state bars, b.) evaluate technological competencies for lawyers and students, including methods for their instruction, and c.) discuss the emerging technologies that will impact that practice of law in the future. All of these topics will be covered with a mind towards developing ethical members of the bar

    DNA – Intimate Information or Trash for Public Consumption?

    Full text link
    “Surreptitious sampling” may be police officers’ trump card in cracking otherwise unsolvable crimes as serious as murder, arson and rape. Law enforcement officers engage in surreptitious sampling when they covertly collect DNAsamples from unsuspecting people, who inadvertently leave behind hair, skin cells, saliva or other biological materials.Surreptitious sampling is a terrific crime-resolution tool. It allows diligent law enforcement officers to collect proof-positive evidence of guilt or innocence without the hassle of obtaining a warrant and absent probable cause or reasonable suspicion to believe that the contributor of the biological evidence committed a crime. Provided an officer has the energy and savvy to gather a hair or other biological sample for testing, she can gather information with the potential to definitively link someone to a crime. Not even a hunch is necessary to justify the quest; yet, DNA processing technology “lets crime laboratories derive a full profile from a minute amount of biological material at relatively low cost.”Perhaps because of its effectiveness and the lack of legislative or judicial regulation of the practice, surreptitious sampling is growing in popularity. Recently, the New York Times highlighted this evidence-gathering method. According to the article, “Over the last few years, several hundred suspects have been implicated by the traces of DNA they unwittingly shed well after the crime was committed[.] Although great for solving crime, some contend that surreptitious sampling is a tragedy for personal privacy and freedom because it threatens to expose significant amounts of intensely private information about citizens’ health, gender, race and lineage to the government. One federal district court judge remarked, “[T]he relative ease with which a DNA sample may be obtained renders questionable the ability to realistically protect any genetic privacy interest . . . .” This essay argues a middle position—that the well-established Fourth Amendment rule of “abandonment” can strike an appropriate, “reasonable” balance to serve law enforcement needs for surreptitious sampling, while simultaneously protecting citizen privacy

    Engaging Government-Industry-University Partnerships to Further Gender Equity in STEM Workforce Education Through Technology and Information System Learning Tools

    Get PDF
    This paper has two goals: First, to detail processes through which a project funded under a National Science Foundation workforce development program (Innovative Technology Experiences for Students and Teachers, ITEST) leveraged active partnerships among government agencies, industry firms, and universities to develop and study an innovative, out-of-school information system and technology workforce education program. The aim of the program was to improve equity of opportunity for high school girls. The program engaged young women from underrepresented subgroups in data science, analytics, information communication technology, and programming learning activities in an experiential, law enforcement computer forensics context. This description of the research team’s process is intended as inspiration and guidance to others considering developing similar programs targeting workforce development in science and technical fields through an equity lens. Second, this paper shares reflections from senior project personnel on lessons learned while working with cross-sector collaborations, including challenges encountered while implementing components of the program facilitated by the partnership model. The authors adopt a reflective practice orientation, considering implications regarding the most useful—and evolving—roles that cross-sector partnerships might play in developing programs to help students traditionally underrepresented in technical fields be more aware of, interested in, and prepared for careers in science, technology, engineering, and mathematics (STEM) disciplines. In so doing, the authors offer insights about how university partners might address potential tensions involved in such collaborations

    Reducing exposure to lead and noise at indoor firing ranges

    Get PDF
    "Workers and users of indoor firing ranges may be exposed to hazardous levels of lead and noise. The National Institute for Occupational Safety and Health (NIOSH) recommends steps for workers and employers to reduce exposures. According to the Bureau of Justice Statistics, more than 1 million Federal, State, and local law enforcement officers work in the United States [DOJ 2004]. They are required to train regularly in the use of firearms. Indoor firing ranges are often used because of their controlled conditions (see Figure 1). In addition to workers, more than 20 million active target shooters practice at indoor firing ranges. Law enforcement officers may be exposed to high levels of lead and noise at indoor firing ranges. NIOSH estimates that 16,000 to 18,000 firing ranges operate in the United States. Several studies of firing ranges have shown that exposure to lead and noise can cause health problems associated with lead exposure and hearing loss, particularly among employees and instructors. Lead exposure occurs mainly through inhalation of lead fumes or ingestion (e.g., eating or drinking with contaminated hands)."- NIOSHTIC-2"This document was prepared by Chucri A. Kardous (Division of Applied Research and Technology) and Susan Afanuh (Education and Information Division), NIOSH." - acknowledgements"January 2010."Also available via the World Wide Web

    Perceived Influence of Copyright Act 2004 on the provision of Information Services in selected Law Libraries in Universities in North Central, Nigeria.

    Get PDF
    ABSTRACT This study investigated the influence of Copyright Act, 2004 on the provision of information resources in academic law libraries in North Central Nigeria. Three (3) objectives with corresponding resaerch questions guided the study while hypothesis was formulated. Descriptive survey research design was adopted for the study. The study surveyed 303 respondents (comprising 13 staff (Law library staff} and 290 law students{500 level undergraduate law students). The sample was drawn across five(5) law libraries in universities in North Centra, Nigeria. Questionnaire was used as instrument for data collection for the study. Descriptive statistical tools such as tables, frequencies and percentages were employed for data presentation and analysis, while chi-square statistic was used for the test of hypothesis at 0.05 level of significance. Findings of the study revealed that selected law libraries in universities in North Central Nigeria are aware of the provisions of the Copyright Act, 2004. Findings also revealed that the copyright Act 2004 has significant perceived influence on the provision of information services in selected academic law libraries in universities in North Central, Nigeria. However, findings indicated that, there is partial observance and enforcement of the provisions of the Act in the law libraries. This largely is as a result of some of the challenges identified during the cause of the study. These challenges as indicated by the study include: lack of proper organization of right owners in various aspects of intellectual property industry, lack of legal education on implication of intellectual property, lack of professional specialization in the practice of intellectual property, globalization and technology, dynamic nature of intellectual property, poor judicial sympathy and difficulty in negotiating licensing agreement for online databases. The study finally, made recommendations based on the findings
    • …
    corecore