Skip to main content

Home/ PA311-2011/ Group items tagged law

Rss Feed Group items tagged

Ron McKee

Tsk Tsk: John Boehner Editorializes A Re-Tweet About The Health Care Law - 1 views

  •  
    "The argument for the internet being a wild, wild West of geriatric porn and kitten antics and Twitter wars is a good one, but there is at least some sense of an overarching "etiquette" when it comes to navigating the web and social media. Speaker John Boehner broke one of the rules tenuously keeping the web from descending into anarchy and goatse .gifs by adding his own editorial stance to a re-tweet concerning health care law......."
Ron McKee

Feds settle case of woman fired over Facebook site | Litigation | eSchoolNews.com - 0 views

  •  
    article subtitle: Labor board says discussing work with others is a right.  Key issues highlighted with article quotes: "Schools and other employers should think twice before trying to restrict workers from talking about their jobs on Facebook or other social media." "The National Labor Relations Board sued the company last year, arguing the worker's negative comments were protected speech under federal labor laws."
Ron McKee

Modernizing the 990-PF to Advance the Accountability and Performance of Foundations: Pa... - 0 views

  •  
    Modernizing the 990-PF to Advance the Accountability and Performance of Foundations: Part 2 (posted 03/21/2011 to website) (John Craig is executive vice-president and COO of The Commonwealth Fund. Craig is chair of the Nonprofit Coordinating Committee of New York, and a former chair of The Investment Fund for Foundations (TIFF). He serves on the boards of the TIFF Education Fund, the Greenwall Foundation, the International Women's Health Coalition, and the National Center for Law and Philanthropy, and on the investment committee of the Social Science Research Council.)
Ron McKee

South Carolina: Internal Emails Reveal Speed Trap Profit Motive - 0 views

  •  
    Internal emails regarding Ridgeland, South Carolina speed camera system shows profit drives deployment decisions: An ongoing federal lawsuit against the speed trap town of Ridgeland, South Carolina uncovered internal emails last month that shed light on the motivation behind the state's only photo enforcement program. Since July 2010, Ridgeland has allowed the private firm iTraffic to operate a mobile speed camera van on Interstate 95, despite a state law outlawing the practice and a pair of attorney general opinions warning that the photo ticketing was not legal.
Ron McKee

FBI - The Cyber Threat: Who's Doing What to Whom? - 0 views

  •  
    Speech by Steven R. Chabinsky, Deputy Assistant Director, Cyber Division, Federal Bureau of Investigation  - delivered March 23, 2010 "...to talk with you about the cyber threat, why it's important, and how you can help your organizations-and in doing so, help our country-rise to this enormous challenge. Some of you no doubt are on the front lines of the cyber security problem and are quite familiar with it, while others of you may only have passing familiarity with this growing problem. First, let me share with you the importance of the cyber security problem from the lens of the FBI. As you know, the FBI is a law enforcement agency that investigates hundreds of federal crimes as well as a domestic national security agency that combats terrorism, espionage, treason, and sabotage.
Ron McKee

Protecting Cyberspace as a National Asset Act of 2010 (S.3480) - Senate version of the ... - 0 views

  •  
    A Senate bill sponsored by: Sen Lieberman, Joseph I. [CT] Establishes in the Executive Office of the President an Office of Cyberspace Policy, which shall: (1) develop a national strategy to increase the security and resiliency of cyberspace; (2) oversee, coordinate, and integrate federal policies and activities relating to cyberspace security and resiliency; (3) ensure that all federal agencies comply with appropriate guidelines, policies, and directives from the Department of Homeland Security (DHS), other federal agencies with responsibilities relating to cyberspace security or resiliency, and the National Center for Cybersecurity and Communications (established by this Act); and (4) ensure that federal agencies have access to, receive, and appropriately disseminate law enforcement, intelligence, terrorism, and any other information relevant to the security of specified federal, military, and intelligence information infrastructure.
Michael Bennett

A Girl's Nude Photo, and Altered Lives - 0 views

  •  
    At first I had no intentions of using this article as a bookmark, however, after I got to reading it I realized the implications it has in regards to public administration. As technology advances and becomes more prominent within society people are finding more uses for it for personal and emotional gains. As more technology is available, it is more likely that children will have access to these also. This article describes the schools and law enforcemenets efforts to combat the problems that technology can bring to our society. This article also suggests public policy involved in these types of cases and can also spark ideas into ways that policy can become better and more fine tuned to fit the needs of our society today.
Ron McKee

Cellebrite - Mobile Forensics and Data transfer solutions - UFED Physical Pro - 1 views

  •  
    The Cellebrite UFED Physical Pro is a high-end, all-in-one solution for logical and physical extraction. The UFED Physical Pro expands your current device capabilities to extract deleted mobile device data, user passwords, file system dumps, and physical extraction from GPS devices.
  •  
    From the company product brochure for "UFED Physical Pro": 'THE COMPLETE MOBILE FORENSICS SOLUTION Cellebrite's UFED addresses the growing need for fast, comprehensive mobile forensic capabilities. An add-on module for advanced extraction and analysis of evidence Physical Pro enables the basic UFED system with physical data extraction, file system dump and reconstruction, and password extraction. UFED Physical Pro enables recovery of invaluable evidential information that isn't accessible by logical extraction methods alone. In use by military, law enforcement, governments, and intelligence agencies across the world, UFED Physical Pro allows users to rapidly extract a wide variety of data types in a forensically sound process from both phone and SIM memory. Extracting data in a forensic manner and presenting it with the integrity of the data intact ensures that the evidence will be admissible in court.
  •  
    Online .pdf Brochure Description of 'extraction device' continued (notice the GPS and mapping capability also): AT A GLANCE * Complete extraction of existing, hidden, and deleted phone data, including call history, text messages, contacts, images, and geotags * Powerful search, reconstruction, and analysis of the phone hex dump that can be used for intelligence gathering, investigative research, and as legal evidence in court * Expanded coverage for GPS devices, with mapping of GPS locations on Google Maps and visualization of GPS locations on Google Earth * Unrivaled phone coverage and compatibility * Fast, intuitive extraction process source: http://www.cellebrite.com/images/stories/brochures/UFED%20Physical%20Pro%20Brochure%20%20ENGLISH.pdf
1 - 12 of 12
Showing 20 items per page