Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Due Diligence Online by Cynthia HetheringtonCase IQ
Learn the tools and resources used by experienced online analysts for finding and vetting information about private companies within the United States. Hetherington will discuss the databases, websites and Internet resources that help locate difficult information on small private companies, their assets, and the people that run them.
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Due Diligence Online by Cynthia HetheringtonCase IQ
Learn the tools and resources used by experienced online analysts for finding and vetting information about private companies within the United States. Hetherington will discuss the databases, websites and Internet resources that help locate difficult information on small private companies, their assets, and the people that run them.
Oportunidade de representação comercial em todo o Brasil.
Conquiste sua franquia com até 40% de participação.
Produto inovador e de grande aceitação no mercado imobiliário.
100% focado no mercado imobiliário.
We discuss the role of Videos in eLearning & share tips on how you can use a DIY (Do It Yourself) approach to shoot & produce videos for your online courses.
My books- Learning to Go https://gumroad.com/l/learn2go & The 30 Goals Challenge for Teachers http://amazon.com/The-Goals-Challenge-Teachers-Transform/dp/0415735343
Resources at http://shellyterrell.com/ventesoltech
Find out how a business can improve its cyber posture by adopting recently released cybersecurity frameworks, and by implementing essential cyber safeguards.
Learn more: http://www.lynda.com/IT-Security-tutorials/Foundations-Cybersecurity/388081-2.html
While your friends are waiting tables, you could be working in Silicon Valley for one of the hottest start-ups, or networking with some of the top dogs on Wall Street. These schools give you access to awesome internships that will make your resume stand out.
There are always fears and apprehension when a new movement emerges – unknowns almost always create insecurity and myths abound.
To follow up the 5 Myths of Coding in the Classroom is a simple slideshare that simply paints the real benefits of kids learning to code.
This is why learning to code matters to kids, to their future, and to how people will learn into the future. Coding matters and this is why.
Presentation sheds light on designing meaningful interactions that improve eLearning outcomes. Explore different types of content as defined by Dr. David Merrill and determine which of these content types lend themselves to digital interaction. Also find the Dos & Don’ts of interaction design.
Here Comes The iPad Generation - Future of Higher Education 2015Martin Hamilton
What will the iPad generation expect from further and higher education and skills? In this talk for the 2015 Future of Higher Education conference I discuss drivers for change from the learner's perspective, and signpost some work that Jisc is doing around building digital capability and supporting student led innovation
The CRUX of the Matter: Amplifying Authentic Voices Across the InstitutionSarah Maxell Crosby
In 2015, Dartmouth will launch a shared content repository to serve as the bedrock of our 200+ institutional sites. With an emphasis on the content repository user experience (CRUX), we are separating content from form, building a digital commons that renders silos invisible on the surface, and empowering site editors to join the narrative wave. Follow along as we tangle with questions of territoriality, authorship, and credit while we bring the COPE model to a diverse, distributed network on sites.
This session will cover:
Transitioning from high geek to high speak as we follow the arc of the web from data to conversation.
Modernizing the digital press to execute the distributed message.
Managing the community: how we provide education to help people understand both the toolsets and the concepts of shared content (in plain language).
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...gallowayandcollens
Attorney Howard Collens presents on Fiduciary Access to Digital Assets, where he focuses on photo sharing and storage sites such as Picasa, Dropbox and Flickr. #FADA4MI. Howard is working on getting a new law enacted in Michigan.
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
Many of today's artists are streaming on popular music sites like Google Play. Attorney Howard Collens shares his knowledge of Fiduciary Access to Digital Assets and how it pertains different music streaming sites and social media.
Oportunidade de representação comercial em todo o Brasil.
Conquiste sua franquia com até 40% de participação.
Produto inovador e de grande aceitação no mercado imobiliário.
100% focado no mercado imobiliário.
We discuss the role of Videos in eLearning & share tips on how you can use a DIY (Do It Yourself) approach to shoot & produce videos for your online courses.
My books- Learning to Go https://gumroad.com/l/learn2go & The 30 Goals Challenge for Teachers http://amazon.com/The-Goals-Challenge-Teachers-Transform/dp/0415735343
Resources at http://shellyterrell.com/ventesoltech
Find out how a business can improve its cyber posture by adopting recently released cybersecurity frameworks, and by implementing essential cyber safeguards.
Learn more: http://www.lynda.com/IT-Security-tutorials/Foundations-Cybersecurity/388081-2.html
While your friends are waiting tables, you could be working in Silicon Valley for one of the hottest start-ups, or networking with some of the top dogs on Wall Street. These schools give you access to awesome internships that will make your resume stand out.
There are always fears and apprehension when a new movement emerges – unknowns almost always create insecurity and myths abound.
To follow up the 5 Myths of Coding in the Classroom is a simple slideshare that simply paints the real benefits of kids learning to code.
This is why learning to code matters to kids, to their future, and to how people will learn into the future. Coding matters and this is why.
Presentation sheds light on designing meaningful interactions that improve eLearning outcomes. Explore different types of content as defined by Dr. David Merrill and determine which of these content types lend themselves to digital interaction. Also find the Dos & Don’ts of interaction design.
Here Comes The iPad Generation - Future of Higher Education 2015Martin Hamilton
What will the iPad generation expect from further and higher education and skills? In this talk for the 2015 Future of Higher Education conference I discuss drivers for change from the learner's perspective, and signpost some work that Jisc is doing around building digital capability and supporting student led innovation
The CRUX of the Matter: Amplifying Authentic Voices Across the InstitutionSarah Maxell Crosby
In 2015, Dartmouth will launch a shared content repository to serve as the bedrock of our 200+ institutional sites. With an emphasis on the content repository user experience (CRUX), we are separating content from form, building a digital commons that renders silos invisible on the surface, and empowering site editors to join the narrative wave. Follow along as we tangle with questions of territoriality, authorship, and credit while we bring the COPE model to a diverse, distributed network on sites.
This session will cover:
Transitioning from high geek to high speak as we follow the arc of the web from data to conversation.
Modernizing the digital press to execute the distributed message.
Managing the community: how we provide education to help people understand both the toolsets and the concepts of shared content (in plain language).
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...gallowayandcollens
Attorney Howard Collens presents on Fiduciary Access to Digital Assets, where he focuses on photo sharing and storage sites such as Picasa, Dropbox and Flickr. #FADA4MI. Howard is working on getting a new law enacted in Michigan.
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
Many of today's artists are streaming on popular music sites like Google Play. Attorney Howard Collens shares his knowledge of Fiduciary Access to Digital Assets and how it pertains different music streaming sites and social media.
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
In an era where technology plays such an important part of everyday life, the attorney needs to understand how to properly plan for a client’s digital assets. This presentation will discuss Michigan’s new Fiduciary Access to Digital Assets Act and how to incorporate it into your existing practice.
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
Attorney Howard H. Collens presents the most recent updates on the new Fiduciary Access to Digital Assets Act. Learn the many states that have recently enacted the new Act and updates on what the future holds for estate planning and digital assets.
Strong Host Security Policies are Good BusinessHostingCon
Inevitably, the actions of some clients create legal issues that need to be addressed by hosts quickly and cost effectively. It is essential to have good hosting policies and procedures in place to deal with the legal and regulatory issues arising from operating a hosting business. Failure to implement good hosting practices can be disruptive and expensive for both hosts and their clients. Hosts must deal with a variety of law enforcement issues over time, ranging from cyber-crime to potential law suits.
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
Attorney Howard Collens presented the most recent updates on Michigan’s new Fiduciary Access to Digital Assets Act. Now is the perfect time to update your will, trust and power of attorney to incorporate the latest options for dealing with your digital assets.
As the number of information requests increase exponentially, organizations worldwide can no longer process all information requests in time. Large government organizations have huge departments handling these requests and in some cases these are up to 10 times larger than internal legal departments. This shows the urgency to involve more automation handling the public records requests.
When handling public records requests, many possible levels of automation exist to optimize the process, use resources more effectively, and to deal with increasing data volumes.
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
No matter what kind of law practice you have, you need to comply with privacy laws generally and lawyers' ethical duties with respect to privacy, specifically. In this presentation, legal ethics counsel Sarah Banola (Cooper, White and Cooper, LLP) and employment and privacy attorney Diana Maier (Law Offices of Diana Maier) deliver a primer on privacy law and teach you the key areas of privacy law and associated ethical obligations.
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...gallowayandcollens
National Academy of Elder Law Attorneys Webinar 2015 presented by Attorney Howard Collens on the recent updates regarding Fiduciary Access to Digital Assets.
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR "HxRefactored
Mark Scrimshire provides an overview of the work he is doing as HHS Entrepreneur-in-Residence to Improve Beneficiaries' access to their health information at CMS.
Slides from my presentation at HxRefactored 2015 in Boston. This is an overview of the work I am doing as HHS Entrepreneur-in-Residence to Improve Beneficiaries' access to their health information at CMS (MyMedicare.gov). How we plan to use the HL7 FHIR protocol to build a data service that enables beneficiaries to connect their CMS health information to the applications and services that they trust.
Seattle Public Library Foundation Trend SummitJim Loter
Presentation by Stephanie Chase and Jim Loter to the board of The Seattle Public Library Foundation at their 2013 library trends summit in Seattle, WA.
ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...Jim Loter
ReadersFirst (readersfirst.org) is a coalition of over 225 public libraries advocating for easier access to digital content in libraries. In January 2013, ReadersFirst convened a roundtable discussion with nearly 30 digital content, integrated library system, and discovery services providers to discuss ways in which digital content product architecture can be made more open and allow for libraries to deliver content to patrons in the same familiar and easy-to-use online library environments they are used to.
SPL Strategic Plan Preparing Team Final ReportJim Loter
The Seattle Public Library’s Leadership Team chartered a Strategic Plan Preparing Team (SPPrT) with the broad goal of setting the stage for strategic plan implementation by developing recommendations to support an organizational culture of innovation.
SPL Strategic Plan Preparing Team Report - PresentationJim Loter
Presentation summary of The Seattle Public Library's Strategic Plan Preparing Team's final report on fostering an organizational culture of innovation.
Connecting with Your Community via Social Media: The Seattle Public LibraryJim Loter
Based on the hard work of and the slides created by Jennifer Robinson, Toby Thomas, and Caroline Ullmann.Overview of the use of social media at The Seattle Public Library. Presented at the Gates Foundation Global Libraries Peer Learning Meeting 2011.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2. Why do libraries
so much about
“Choice requires both a
varied selection and the
assurance that one's
choice is not monitored.”
3. H A V E L A W S P R O T E C T I N G T H E
CONFIDENTIALITYOFLIBRARYRECORDS48 STATES Kentucky & Hawaii have attorney general's opinionsPlus the district of Columbia
4. Any library record, the primary
purpose of which is to maintain
control of library materials, or to gain
access to information, that discloses or
could be used to disclose the identity
of a library user is exempt from
disclosure under this chapter.
RCW 42.56.310
5. The Librarywillkeeppatron records confidentialand will
not disclosethis information except asnecessaryforthe
properoperationof theLibrary,upon consent of theuser,
pursuant to subpoena or court order, or as otherwise
required by law.
6. The Library retains the minimum
number of records necessary for
maintaining operations.
Public computer information is
automatically deleted at the end of
a session.
Information about check-outs and
returns is automatically deleted at
day-end (unless the patron has fines
or has been referred to a materials
recovery agency).
Mandatory library staff training in
library policy and intellectual
freedom principles
PROCEDURES
8. USA PATRIOT Act
Section215 permits gov’tto secretly
request and obtain library records
forlarge numbers of individuals
without any reason to believe they
are involvedin illegal activity
Section505permits the FBI to obtain
electronic records fromlibraries with
a National Security Letter without
priorjudicial oversight
Photo by Jessamyn West / CC BY 2.0
17. Seattle Public Library
expresses ‘concern and
alarm’ over Adobe’s
data tracking policies
Taylor Soper on GeekWire.com, October 8, 2014
1. Clarify what data is
being collected,
especially if that data
contains PII
2. Explain how long the
data is bring retained
3. Stop transmitting data
in plain text
19. “The Library has teamed up
with reputable third party
partners in order to provide
certain services to its users.
Information a patron submits
to the Library may be
provided to those third
parties so they can assist the
Library in providing certain
services. Users are
encouraged to read and
become familiar with the
privacy policies of these
third party partners.”
20. “Solving social
problems by restricting
technology and
preventing you from
access to those
restrictions reduces
privacy and security.”
Photo CCA3 Jonathan Worth, JonathanWorth.com
Cory Doctorow
Editor's Notes
My name is Jim Loter, I’m the Director of IT for The Seattle Public Library and one of my primary responsibilities is to manage data collected by the library related to circulation of library materials and use of library technology. It’s a responsibility that we take very seriously and operate under principles that strive to protect the intellectual freedom and freedom of inquiry of our patrons.
2
As you may know the individual right to privacy is not explicitly addressed in the US Constitution but it has been recognized in many court cases. The state laws related to library privacy vary widely in their approach and details. Some are independent statutes that expressly address library records; others are integrated statutes that address library records in open records laws.
In our state, the Revised Code of Washington addresses library records in the context of open records laws – specifically, it exempts library records from public disclosure. The law does not say anything about privacy but it does direct how records retention schedules are developed. This exemption has allowed us to manage patrons’ records in a way that helps us protect patron privacy.
The Seattle Public Library’s policies are consistent with the library bill of rights, the ALA’s professional guidelines, and applicable state laws. Note, however, that our guarantees are not absolute. For example, we need to keep records to manage and enforce lending books. During the time that we have those records, there are situations, largely related to law enforcement, in which records may be subject to disclosure.
In practice, we treat library data management as a special case of records management. Once you return a book, the data related to your possession of that item is deleted. Importantly all Library staff receive extensive training regarding what information they can disclose. So our practices are not just a function of IT systems but critically rely on effectively trained and committed staff as well.
I’m going to talk about 3 factors that are disrupting the traditional approaches to patron privacy in libraries. I call these “disruptions” rather than challenges because, to me, a challenge implies an obstacle or roadblock that needs to be overcome before you can continue on your path. A disruption changes the very landscape under your feet.
One of the biggest disruptions related to security and civil liberties is the PATRIOT Act. Two sections of the Act address overrides to library privacy protections and restrict libraries’ rights to notify patrons if information has been requested. The ALA urges librarians and advocates to educate the public on the impacts of PATRIOT Act. The Seattle Public Library has information on our web site about the Act.
But Libraries have always been required to comply to subpoenas and search warrants. What has changed are the conditions under which warrants could be obtained by law enforcement and the fact that libraries are effectively under a gag-order if such warrants are served and fulfilled. But borrower records are still exempt from records retention laws and the library still discards those records as soon as we can.
In many cases, libraries contract with third-parties who make digital content available to eligible users. This situation often involves a chain of parties and a process that takes control of patron data further away from patrons and libraries. Some content providers have complex arrangements with content owners that require that data be further shared for Digital Rights Management purposes.
In simple cases, libraries have contracts directly with content providers who agree to manage patron data according to the library’s local policies and practices. These agreements are largely in place with providers of services such as online databases, journals, and periodicals.
We also try to minimize the amount of data that is passed to third-parties. A middleware technology known as “EZProxy” is in widespread use throughout libraries and the content providers we routinely deal with. EZProxy can not only broker logins to digital services but it also proxies a patron’s traffic through the library’s network, thus providing an additional layer of privacy and anonymity.
But the library community lacks a true federated identity and authentication service that can enable practices of secure identity assertion and verification rather than the direct submission of credentials. Current practice opens up a risk that third-parties may intentionally or unintentionally mis-manage data or create records that can be vulnerable to disclosure.
For digital content such as eBooks, most content owners require the use of technology to restrict sharing and copying and to impose time limits on lending. The technology to manage so-called Digital Rights is beyond the scope of most libraries to implement and manage. Libraries generally rely on eContent providers such as OverDrive, to host content and manage the DRM required by publishers.
Even OverDrive relies on yet other parties – such as Adobe – for the DRM technology they use. This practice has required library patrons to establish accounts with Adobe to complete the DRM process. The interplay between the library, OverDrive, and Adobe is not well understood by patrons, or, indeed, by a lot of libraries. The risks inherent in this situation were made manifest last year.
In fall 2014, security researchers noted that the Adobe Digital Editions software transmitted detailed information about a reader’s eBook reading experience to Adobe. Adobe stated that this information is only used to enhance the reading experience but libraries are concerned about unintentional uses.
The library urged Adobe to be more transparent with our patrons about the data it collects. Adobe has since encrypted the data it transmits but otherwise does not seem to altered its other practices. OverDrive, however, has taken steps to minimize Adobe’s access to individual patron data and no longer requires an Adobe ID.
Another area of concern is OverDrive’s relationship with Amazon for fulfillment of eBooks in Amazon Kindle format. OverDrive cannot produce Kindle eBooks directly, so those requests are passed on to Amazon where patrons complete their borrowing transaction. What happens to data that is generated by that process and how long that data is retained is not disclosed, but a safe guess is “anything, and forever.”
The Seattle Public Library acknowledges our relationships with third-parties in our policy and encourage patrons to make educated choices about the services they engage with online.
DRM is the primary reason we need third-party services like OverDrive to exist, and why OverDrive needs to rely on Adobe and Amazon. Libraries have solved the problem of how to store, lend, and distribute millions of physical books; without DRM we can figure out how to do that for digital content and retain better control of your data. Until then, we will continue to protect the data we do have and to advocate for and educate you about how data may be used by others.