Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Records

Beyond Words: help discover pictures in LC historical newspaper collections

“The Library of Congress invites you to help us in the effort to take newspapers Beyond Words. Join us to identify and improve information about illustrated newspapers in the Chronicling America digital collection. This brand new pilot project offers you the opportunity to explore historical newspaper coverage of World War I and contribute to Library of Congress collections at the same time. This project from LC Labs is an experiment in crowdsourcing and community engagement. Our goals are to gather more structured and usable metadata about the illustrations, comics, cartoons, and photographs in these newspapers; and to learn how to better connect to people who are interested in our collections. To help us reach our goal — and to help ensure accuracy — we’ve broken the work into 3 free-standing tasks. These tasks follow a sequence, but they can be performed independently. Feel free to focus on the one you enjoy the most! The information that is created through this project is being made available for download as data sets and for exploration via keyword search in the Gallery…”

Library of Congress launches Digital Labs

“Welcome to Labs! A place to encourage innovation with Library of Congress digital collections. Labs will have a growing and changing selection of experiments, projects, events and resources to encourage creative use and connections with the Library of Congress. This is a space for us to try things in public, create community, and invite you… Continue Reading

Secure EDGAR data breach exploited for possible insider trading

Statement on Cybersecurity Chairman Jay Clayton, Sept. 20, 2017 “…Notwithstanding our efforts to protect our systems and manage cybersecurity risk, in certain cases cyber threat actors have managed to access or misuse our systems.  In August 2017, the Commission learned that an incident previously detected in 2016 may have provided the basis for illicit gain… Continue Reading

Constitutional Cost of Fees for Access to Electronic Public Court Records

Schultze, Stephen, The Price of Ignorance: The Constitutional Cost of Fees for Access to Electronic Public Court Records (August 25, 2017). Georgetown Law Journal, Vol. 106, No. 4, 2018. Available at SSRN: https://ssrn.com/abstract=3026779 “The United States federal judiciary maintains a system called PACER, “Public Access to Court Electronic Records.” PACER is the public gateway into… Continue Reading

Online translation applications may pose security risk

Quartz: “…On Sept. 3, the Norwegian news agency NRK reported that sensitive Statoil information—contracts, workforce reduction plans, dismissal letters, and more—were available online because employees had used the free translation service Translate.com, which stored the data in the cloud. The news traveled fast in Scandinavian countries. In response, the Oslo Stock Exchange even blocked employee… Continue Reading

Implementation of facial recognition technology widens across the world

The Economist: “…Technology is rapidly catching up with the human ability to read faces. In America facial recognition is used by churches to track worshippers’ attendance; in Britain, by retailers to spot past shoplifters. This year Welsh police used it to arrest a suspect outside a football game. In China it verifies the identities of… Continue Reading

Report to the President on Federal IT Modernization

“Executive Order (EO) 13,800 tasks the Director of the American Technology Council (ATC) to coordinate a report to the President from the Secretary of the Department of Homeland Security (DHS), the Director of the Office of Management and Budget (OMB), and the Administrator of the General Services Administration (GSA), in consultation with the Secretary of… Continue Reading

2017 U.S. State and Federal Government Cybersecurity Research Report

“In August 2017, SecurityScorecard analyzed and scored the current security posture of 552 small, medium and large U.S. government organizations with more than 100 public-facing IP addresses, to determine the state of government cybersecurity programs today. In this report, 2017 U.S. State and Federal Government Cybersecurity Research Report, you’ll learn:  Top performing U.S. State and… Continue Reading

NARA FY 2018-FY 2022 Draft Strategic Plan Highlights Paperless Future

DRAFT FY 2018 – FY 2022 Strategic Plan NARA Strategic Goals and Objectives “…NARA’s strategic goals identify the four key areas in which NARA must excel in order to efficiently and effectively deliver its mission in a modern environment. Make Access Happen Make Access Happen affirms that “public access” is NARA’s core mission and is… Continue Reading

Report to Congress: DATA Act Pilot Program

Report to Congress: DATA Act Pilot Program, Office of Management and Budget, August 10, 2017. “In May 2017, the Administration enabled a new view of Federal spending that for the first time, linked Federal account information to awards. This represents the successful implementation of the centerpiece of the Digital Accountability and Transparency Act of 2014… Continue Reading

Free Law Project – We Have Every Free PACER Opinion on CourtListener.com

“At Free Law Project, we have gathered millions of court documents over the years, but it’s with distinct pride that we announce that we have now completed our biggest crawl ever. After nearly a year of work, and with support from the U.S. Department of Labor and Georgia State University, we have collected every free… Continue Reading

NIST – Security and Privacy Controls for Information Systems and Organizations

Security and Privacy Controls for Information Systems and Organizations, August 2017. Draft NIST Special Publication 800-53 Revision 5. This publication provides a catalog of security and privacy controls for federal information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats including hostile attacks,… Continue Reading