This document discusses the growing need for government agencies to archive their websites and social media pages. As agencies increase their online presence, they face challenges in complying with records retention laws. Web archiving provides a solution by creating snapshots of websites that can be accurately reproduced, searched and retrieved. The document examines legal implications like FOIA requests, litigation and using digital evidence in court. It recommends the PageFreezer solution, which employs powerful archiving tools, stores secure representations of content, and ensures digital records are defensible.
User Privacy or Cyber Sovereignty Freedom House Special Report 2020MYO AUNG Myanmar
https://freedomhouse.org/report/special-report/2020/user-privacy-or-cyber-sovereignty?utm_source=Newsletter&utm_medium=Email&utm_campaign=SPOTLIGHTFRDM_072720
Special Report 2020
User Privacy or Cyber Sovereignty?
Assessing the human rights implications of data localization
WRITTEN BY-Adrian Shahbaz-Allie Funk-Andrea Hackl
https://freedomhouse.org/sites/default/files/2020-07/FINAL_Data_Localization_human_rights_07232020.pdf
USER PRIVACY OR CYBER SOVEREIGNTY?
Assessing the human rights implications of data localization
Privacy and Access to Information Law - Lecture 1James Williams
The first lecture from Law 3040X.03, Privacy and Access to Information Law. This lecture was given in January 2013 at Osgoode Hall Law School, York University. The rest of our slides are for students only.
Protecting Patient Health Information in the HITECH EraRapid7
The American Healthcare system is getting a complete facelift thanks to incentives to adopt Health Information Technology introduced by the Health Information Technology for Economic and Clinical Health (HITECH) Act. The HITECH Act contains tools for the enforcement of HIPAA regulations, as well as incentives to accelerate the adoption of information systems that reduce costs, gain efficiencies, and ultimately improve patient care while keeping patient health information secure. This paper examines the HITECH Act, the enforcement mechanisms the HITECH Act provides for HIPAA, and the key security challenges healthcare services face in order to protect patient health information as part of becoming HIPAA compliant.
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
Nearly two dozen media outlets and nonprofits penned a letter to Hawaii Gov. David Ige about government transparency and accountability, delivered to his office Dec. 26, 2014.
User Privacy or Cyber Sovereignty Freedom House Special Report 2020MYO AUNG Myanmar
https://freedomhouse.org/report/special-report/2020/user-privacy-or-cyber-sovereignty?utm_source=Newsletter&utm_medium=Email&utm_campaign=SPOTLIGHTFRDM_072720
Special Report 2020
User Privacy or Cyber Sovereignty?
Assessing the human rights implications of data localization
WRITTEN BY-Adrian Shahbaz-Allie Funk-Andrea Hackl
https://freedomhouse.org/sites/default/files/2020-07/FINAL_Data_Localization_human_rights_07232020.pdf
USER PRIVACY OR CYBER SOVEREIGNTY?
Assessing the human rights implications of data localization
Privacy and Access to Information Law - Lecture 1James Williams
The first lecture from Law 3040X.03, Privacy and Access to Information Law. This lecture was given in January 2013 at Osgoode Hall Law School, York University. The rest of our slides are for students only.
Protecting Patient Health Information in the HITECH EraRapid7
The American Healthcare system is getting a complete facelift thanks to incentives to adopt Health Information Technology introduced by the Health Information Technology for Economic and Clinical Health (HITECH) Act. The HITECH Act contains tools for the enforcement of HIPAA regulations, as well as incentives to accelerate the adoption of information systems that reduce costs, gain efficiencies, and ultimately improve patient care while keeping patient health information secure. This paper examines the HITECH Act, the enforcement mechanisms the HITECH Act provides for HIPAA, and the key security challenges healthcare services face in order to protect patient health information as part of becoming HIPAA compliant.
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
Nearly two dozen media outlets and nonprofits penned a letter to Hawaii Gov. David Ige about government transparency and accountability, delivered to his office Dec. 26, 2014.
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...Kenneth Riley
Following the adoption of GDPR in the European Union, the United States has seen their own privacy regulatory landscape evolve and develop. Beginning in California and expanding to Nevada, Maine, and beyond, ensuing organizational and technical compliance with these stringent regulations has become a priority for many organizations. These regulations have come with additional reputational and regulatory risk (e.g. fines), increased consumer rights, and an enhanced focus on how companies use data as a commodity. This webinar will unpack the key complexities surrounding those regulations, speak to how technology advancements can assist in compliance and overall privacy program maturity, and discuss how Internal Audit can prepare for and drive a proactive approach to privacy.
Since the days of California's pioneering data breach notification law, virtually all states have implemented some form of consumer ID theft protection law. In 2008, the focus shifted to the east coast, when Massachusetts took it beyond notification, and issued their regulations for the protection of personal information, viewed by many as the most proscriptive in the US. This presentation will provide a general overview of state law, but focus on how the MA regulations evolved from the version issued in Sept 2008 to what became effective March 2010, how organizations are responding, and some potential implications for the future.
Allison Dolan, Program Director, Protecting Personally Identifiable Information, Massachusetts Institute of Technology
Allison F. Dolan is currently Program Director, Protecting Personally Identifiable Information at the Massachusetts Institute of Technology. This program is co-sponsored by the Institute Auditor and Vice President for Information Services and Technology (IS&T). Previously, Allison spent 10 years in IS&T, including roles as Director of Shared Services - Finance, Administration and HR, and as Director of Telephony Services. Allison’s MIT experience was preceded by 20 years of combined information systems, operational, and leadership experience at Eastman Kodak. Allison holds a BA degree from the University of Delaware, with a double major in Computer Science and Economics.
To understand the significance of the Computer Fraud and Abuse Act, we must consider its history, the use, scope, and function of the Internet at the time of the Act’s inception, and the recurring nature which Congress amended the Act in order to keep up with the advancements of computer and computer-based communications.
We must also consider the evolution of precedence over the course of its history with respect to charges under the Act.
Further, we must address the root cause of the contentious nature of this Act as written, and look to other industry models which can assist in amending the Act according to contemporary use of computers, and the modern Internet.
Data Privacy and Security in the Digital age Ukraine - Patrick BellUBA-komitet
Зустріч в рамках Комітету АПУ з питань телекомунікацій, інформаційних технологій та Інтернету з юристом з США Патріком М. Беллом щодо обговорення питань конфіденційності та безпеки даних, 26.07.2017, м.Київ
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
Given the exhaustive plethora of information regarding Wikileaks, Anonymous, and the U.S. Government, this is a comparatively superficial overview of the impact of Information Warfare on the Internet and our rights.
My apologies for the somewhat informal research aesthetic.
E Commerce Platform Data Ownership and Legal Protectionijtsrd
In order to better distinguish the issues of data ownership in e commerce platforms, this article starts with the basic theory of data rights on e commerce platforms, studies the current status of e commerce legal regulations, and explains relevant data rights regulations from the aspects of legislation, law enforcement, and justice Practice and analyze how to scientifically allocate rights, obligations and responsibilities in practice based on classic cases of data rights protection on e commerce platforms. Through the research on the existing data of e commerce platform data rights, the comparative analysis method is used to analyze the main problems in the development. The e commerce platform data rights protection legal system, law enforcement protection methods, and judicial relief systems still need to be improved. Finally, corresponding perfect countermeasures are proposed for the above problems. China should further improve the e commerce platform data rights legal system, law enforcement mechanism, and judicial relief channels, improve the self discipline mechanism of industry associations, improve the internal data governance capabilities and levels of e commerce platform enterprises, and provide a comprehensive and systematic legal protection for the protection of e commerce platform data rights. Changjun Wu | Xinhui Zhang "E-Commerce Platform Data Ownership and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32983.pdf Paper Url :https://www.ijtsrd.com/management/law-and-management/32983/ecommerce-platform-data-ownership-and-legal-protection/changjun-wu
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
Attorney Howard H. Collens presents the most recent updates on the new Fiduciary Access to Digital Assets Act. Learn the many states that have recently enacted the new Act and updates on what the future holds for estate planning and digital assets.
Tisski Ltd Freedom of Information White PaperKatie Weir
The public sector’s management of Freedom of Information (FOI) requests has come sharply into focus recently, with the new Information Commissioner threatening to vigorously pursue delays and poor treatment of FOI applications.
This white paper sets out to explore the challenges around maintaining compliance and what existing technology can deliver immediate improvements to FOI systems and processes.
It specifically looks at the power of Microsoft Dynamics 365 and will be useful to anyone operating in the public sector who wants to find a quick and effective means of ensuring compliance at a time of enhanced scrutiny.
115 By Robert Smallwood with Randy Kahn,Esq. , and .docxdrennanmicah
115
By Robert Smallwood with Randy Kahn,
Esq. , and Barry Murphy
Information
Governance and Legal
Functions
C H A P T E R 8
Perhaps the key functional area that information governance (IG) impacts most islegal functions, since legal requirements are paramount. Failure to meet them can literally put an organization out of business or land executives in prison. Privacy,
security, records management, information technology (IT), and business manage-
ment functions are important—very important—but the most signifi cant aspect of all
of these functions relates to legality and regulatory compliance.
Key legal processes include electronic discovery (e-discovery) readiness and as-
sociated business processes, information and record retention policies, the legal hold
notifi cation (LHN) process, and legally defensible disposition practices.
Some newer technologies have become viable to assist organizations in imple-
menting their IG efforts, namely, predictive coding and g technology-assisted review
(TAR; also known as computer-assisted review ). In this chapter we explore the need ww
for leveraging IT in IG efforts aimed at defensible disposition, the intersection be-
tween IG processes and legal functions, policy implications, and some key enabling
technologies.
Introduction to e-Discovery: The Revised 2006 Federal Rules of
Civil Procedure Changed Everything
Since 1938, the Federal Rules of Civil Procedure (FRCP) “have governed the
discovery of evidence in lawsuits and other civil cases.” 1 In law, discovery is an early y
phase of civil litigation where plaintiffs and defendants investigate and exchange
evidence and testimony to better understand the facts of a case and to make early
determinations of the strength of arguments on either side. Each side must produce
evidence requested by the opposition or show the court why it is unreasonable to pro-
duce the information.
The FRCP apply to U.S. district courts, which are the trial courts of the fed-
eral court system. The district courts have jurisdiction (within limits set by Congress
and the Constitution) to hear nearly all categories of federal cases, including civil and
criminal matters. 2
116 INFORMATION GOVERNANCE
The FRCP were amended in 2006, and some of the revisions apply specifi cally to
the preservation and discovery of electronic records in the litigation process. 3 These
changes were a long time coming, refl ecting the lag between the state of technology
and the courts’ ability to catch up to the realities of electronically generated and stored
information.
After years of applying traditional paper-based discovery rules to e-discovery,
amendments to the FRCP were made to accommodate the modern practice of discov-
ery of electronically stored information (ESI). ESI is any information that is created
or stored in electronic f.
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...Kenneth Riley
Following the adoption of GDPR in the European Union, the United States has seen their own privacy regulatory landscape evolve and develop. Beginning in California and expanding to Nevada, Maine, and beyond, ensuing organizational and technical compliance with these stringent regulations has become a priority for many organizations. These regulations have come with additional reputational and regulatory risk (e.g. fines), increased consumer rights, and an enhanced focus on how companies use data as a commodity. This webinar will unpack the key complexities surrounding those regulations, speak to how technology advancements can assist in compliance and overall privacy program maturity, and discuss how Internal Audit can prepare for and drive a proactive approach to privacy.
Since the days of California's pioneering data breach notification law, virtually all states have implemented some form of consumer ID theft protection law. In 2008, the focus shifted to the east coast, when Massachusetts took it beyond notification, and issued their regulations for the protection of personal information, viewed by many as the most proscriptive in the US. This presentation will provide a general overview of state law, but focus on how the MA regulations evolved from the version issued in Sept 2008 to what became effective March 2010, how organizations are responding, and some potential implications for the future.
Allison Dolan, Program Director, Protecting Personally Identifiable Information, Massachusetts Institute of Technology
Allison F. Dolan is currently Program Director, Protecting Personally Identifiable Information at the Massachusetts Institute of Technology. This program is co-sponsored by the Institute Auditor and Vice President for Information Services and Technology (IS&T). Previously, Allison spent 10 years in IS&T, including roles as Director of Shared Services - Finance, Administration and HR, and as Director of Telephony Services. Allison’s MIT experience was preceded by 20 years of combined information systems, operational, and leadership experience at Eastman Kodak. Allison holds a BA degree from the University of Delaware, with a double major in Computer Science and Economics.
To understand the significance of the Computer Fraud and Abuse Act, we must consider its history, the use, scope, and function of the Internet at the time of the Act’s inception, and the recurring nature which Congress amended the Act in order to keep up with the advancements of computer and computer-based communications.
We must also consider the evolution of precedence over the course of its history with respect to charges under the Act.
Further, we must address the root cause of the contentious nature of this Act as written, and look to other industry models which can assist in amending the Act according to contemporary use of computers, and the modern Internet.
Data Privacy and Security in the Digital age Ukraine - Patrick BellUBA-komitet
Зустріч в рамках Комітету АПУ з питань телекомунікацій, інформаційних технологій та Інтернету з юристом з США Патріком М. Беллом щодо обговорення питань конфіденційності та безпеки даних, 26.07.2017, м.Київ
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
Given the exhaustive plethora of information regarding Wikileaks, Anonymous, and the U.S. Government, this is a comparatively superficial overview of the impact of Information Warfare on the Internet and our rights.
My apologies for the somewhat informal research aesthetic.
E Commerce Platform Data Ownership and Legal Protectionijtsrd
In order to better distinguish the issues of data ownership in e commerce platforms, this article starts with the basic theory of data rights on e commerce platforms, studies the current status of e commerce legal regulations, and explains relevant data rights regulations from the aspects of legislation, law enforcement, and justice Practice and analyze how to scientifically allocate rights, obligations and responsibilities in practice based on classic cases of data rights protection on e commerce platforms. Through the research on the existing data of e commerce platform data rights, the comparative analysis method is used to analyze the main problems in the development. The e commerce platform data rights protection legal system, law enforcement protection methods, and judicial relief systems still need to be improved. Finally, corresponding perfect countermeasures are proposed for the above problems. China should further improve the e commerce platform data rights legal system, law enforcement mechanism, and judicial relief channels, improve the self discipline mechanism of industry associations, improve the internal data governance capabilities and levels of e commerce platform enterprises, and provide a comprehensive and systematic legal protection for the protection of e commerce platform data rights. Changjun Wu | Xinhui Zhang "E-Commerce Platform Data Ownership and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32983.pdf Paper Url :https://www.ijtsrd.com/management/law-and-management/32983/ecommerce-platform-data-ownership-and-legal-protection/changjun-wu
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
Attorney Howard H. Collens presents the most recent updates on the new Fiduciary Access to Digital Assets Act. Learn the many states that have recently enacted the new Act and updates on what the future holds for estate planning and digital assets.
Tisski Ltd Freedom of Information White PaperKatie Weir
The public sector’s management of Freedom of Information (FOI) requests has come sharply into focus recently, with the new Information Commissioner threatening to vigorously pursue delays and poor treatment of FOI applications.
This white paper sets out to explore the challenges around maintaining compliance and what existing technology can deliver immediate improvements to FOI systems and processes.
It specifically looks at the power of Microsoft Dynamics 365 and will be useful to anyone operating in the public sector who wants to find a quick and effective means of ensuring compliance at a time of enhanced scrutiny.
115 By Robert Smallwood with Randy Kahn,Esq. , and .docxdrennanmicah
115
By Robert Smallwood with Randy Kahn,
Esq. , and Barry Murphy
Information
Governance and Legal
Functions
C H A P T E R 8
Perhaps the key functional area that information governance (IG) impacts most islegal functions, since legal requirements are paramount. Failure to meet them can literally put an organization out of business or land executives in prison. Privacy,
security, records management, information technology (IT), and business manage-
ment functions are important—very important—but the most signifi cant aspect of all
of these functions relates to legality and regulatory compliance.
Key legal processes include electronic discovery (e-discovery) readiness and as-
sociated business processes, information and record retention policies, the legal hold
notifi cation (LHN) process, and legally defensible disposition practices.
Some newer technologies have become viable to assist organizations in imple-
menting their IG efforts, namely, predictive coding and g technology-assisted review
(TAR; also known as computer-assisted review ). In this chapter we explore the need ww
for leveraging IT in IG efforts aimed at defensible disposition, the intersection be-
tween IG processes and legal functions, policy implications, and some key enabling
technologies.
Introduction to e-Discovery: The Revised 2006 Federal Rules of
Civil Procedure Changed Everything
Since 1938, the Federal Rules of Civil Procedure (FRCP) “have governed the
discovery of evidence in lawsuits and other civil cases.” 1 In law, discovery is an early y
phase of civil litigation where plaintiffs and defendants investigate and exchange
evidence and testimony to better understand the facts of a case and to make early
determinations of the strength of arguments on either side. Each side must produce
evidence requested by the opposition or show the court why it is unreasonable to pro-
duce the information.
The FRCP apply to U.S. district courts, which are the trial courts of the fed-
eral court system. The district courts have jurisdiction (within limits set by Congress
and the Constitution) to hear nearly all categories of federal cases, including civil and
criminal matters. 2
116 INFORMATION GOVERNANCE
The FRCP were amended in 2006, and some of the revisions apply specifi cally to
the preservation and discovery of electronic records in the litigation process. 3 These
changes were a long time coming, refl ecting the lag between the state of technology
and the courts’ ability to catch up to the realities of electronically generated and stored
information.
After years of applying traditional paper-based discovery rules to e-discovery,
amendments to the FRCP were made to accommodate the modern practice of discov-
ery of electronically stored information (ESI). ESI is any information that is created
or stored in electronic f.
Web and Social Media Archiving: A Growing Necessity For the Financial IndustryPageFreezer
Financial firms, investment advisors, and others in the financial industry must employ good retention practices to remain compliant with rules from FINRA, SEC, and other regulators. The emerging solution to retaining perfect copies of online activity is web archiving. Social media should be archived too! This paper examines the necessity and benefits of archiving, and presents effective solutions.
This powerpoint covers the CLUE program (Client Legal Utility Engine) developed by Matthew Stubenberg, IT Director at Maryland Volunteer Lawyers Service. It also covers the TRACE program developed at Maryland Legal Aid. The programs discover unknown client issues by checking their information across a number of public databases. Currently it checks to see if you have an expungeable record, a water bill, and a current property tax.
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
Statement of Michelle Richardson, Director, Privacy & Data
Center for Democracy & Technology
before the
United States Senate Committee on the Judiciary
GDPR & CCPA: Opt-ins, Consumer Control, and the Impact on Competition and Innovation
March 12, 2019
On behalf of the Center for Democracy & Technology (CDT), thank you for the
opportunity to testify about the importance of crafting a federal consumer privacy law that
provides meaningful protections for Americans and clarity for entities of all sizes and sectors.
CDT is a nonpartisan, nonprofit 501(c)(3) charitable organization dedicated to advancing the
rights of the individual in the digital world. CDT is committed to protecting privacy as a
fundamental human and civil right and as a necessity for securing other rights such as access to
justice, equal protection, and freedom of expression. CDT has offices in Washington, D.C., and
Brussels, and has a diverse funding portfolio from foundation grants, corporate donations, and
individual donations.1
The United States should be leading the way in protecting digital civil rights. This hearing
is an opportunity to learn how Congress can improve upon the privacy frameworks offered in
the European Union via the General Data Protection Regulation (GDPR) and the California
Consumer Privacy Act (CCPA) to craft a comprehensive privacy law that works for the U.S. Our
digital future should be one in which technology supports human rights and human dignity. This
future cannot be realized if people are forced to choose between protecting their personal
information and using the technologies and services that enhance our lives. This future depends
on clear and meaningful rules governing data processing; rules that do not simply provide
1 All donations over $1,000 are disclosed in our annual report and are available online at:
https://cdt.org/financials/.
2
people with notices and check boxes but actually protect them from privacy and security
abuses and data-driven discrimination; protections that cannot be signed away.
Congress should resist the narratives that innovative technologies and strong privacy
protections are fundamentally at odds, and that a privacy law would necessarily cement the
market dominance of a few large companies. Clear and focused privacy rules can help
companies of all sizes gain certainty with respect to appropriate and inappropriate uses of data.
Clear rules will also empower engineers and product managers to design for privacy on the
front end, rather than having to wait for a public privacy scandal to force the rollback of a
product or data practice.
We understand that drafting comprehensive privacy legislation is a complex endeavor.
Over the past year we have worked with partners in civil societ.
Rapid7 Report: Data Breaches in the Government SectorRapid7
Rapid7, the leading provider of security risk intelligence solutions, analyzed data collected and categorized by the Privacy Rights Clearinghouse Chronology of Data Breaches. Using this data, the company outlined patterns for government data breaches, including year, month, location and breach type patterns. This information and tips for protecting infrastructure can ensure that government IT environments stay protected against malicious attacks and unintended disclosure.
Move to e-commerce long overdue by US Secretary of State offices. The era of electronic filing has been with us now for twenty years. The world’s first fully electronic online business register emerged in New Zealand back in 1996. Since then, many uniform laws have been drafted in the U.S. to encourage the use of online record submissions and searching.
This white paper sets out the reasons for government to adopt contemporary technology solutions to deliver electronic registries.
The State of E-Discovery as Social Media Goes Mobile Cori Faklaris
Presentation by Cori Faklaris and Sara Anne Hook on Sept. 18, 2015. An overview of case law, articles and key findings as to how electronic discovery in U.S. legal system is affected by the rise of Snapchat, WhatsApp and other mobile messaging apps in the face of the pending update to the Federal Rules of Civil Procedure. This presentation was originally prepared for the ATINER 2015 International Conference on Law in Athens, Greece. These revised slides were used during a Brown Bag talk to the Department of Human-Centered Computing, School of Informatics and Computing, Indiana University-Purdue University Indianapolis.
What is cyber law?
What is cyber crime?
Cybercrimes areas
what law relating to
Data protection and privacy
Software Licensing Issues
IT acts
Policy Versus Law
Codes of Ethics and Professional Organizations
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Website and Social Media Archiving: A Growing Necessity for Government Agencies
1. Website and Social Media Archiving:
A Growing Necessity for Government Agencies
Introduction
Shortly after taking office, President Obama issued an Open Government Directive and instructed
executive departments and agencies to “use innovative tools, methods, and systems to cooperate among
themselves, across all levels of Government.”1 This mandate, along with the growing interest in “Gov 2.0”
and “open government” among state and municipal agencies, has led to an unprecedented amount of
online data and an explosion of social media use by governments at all levels. Now, agencies are finding
it difficult to effectively manage and store their digital content in the face of existing records retention laws,
and new challenges relating to electronic information.
The legal implications of digital record-keeping extend across many government situations: e-discovery
proceedings, lawsuits, FOIA requests, audits, and investigations. Agencies at local, state, and federal
levels are accountable to various laws regarding the proper preservation of online communications. In
most cases, electronic records are subject to the same retention regulations as traditional ones. These
records are no longer limited to agency e-mails or websites, but cascade across blogs, wikis, RSS feeds,
and social networking sites. It is critical for governments to implement responsible policies for properly
preserving the ever-increasing amounts of online data.
This whitepaper examines the unique challenges associated with online communications and social
media for government agencies, and explains the role of web archiving in addressing those challenges.
This will assist you in understanding current web communications regulations, their implications for
governments, and the best practices for implementing solutions. We hope this document serves to inform
and empower your agency toward future success.
1
http://www.whitehouse.gov/the_press_office/Transparency_and_Open_Government/
2. Compliance Concerns
The issue of records retention for government agencies is an evolving one. At the federal level,
organizations like the National Archives and Records Administration (NARA) and the Office of
Management and Budget (OMB) have provided some guidance documents and regulation regarding the
preservation of web records2, but the technologies are developing faster than the rules. Agencies at state
and municipal levels have developed their own versions of records retention requirements.3 At the heart
of all regulations is a common-sense directive: governments should take steps to make sure their
information is accessible and that important data can be located quickly when necessary.
“Effective records management . . . constitutes the backbone of the Administration's
Open Government Initiative. The Government cannot be open and accountable if it
does not preserve - and cannot find - its records.”
David S. Ferriero, Archivist of the United States
There are several federal statutes that relate, at least in part, to the preservation of government records.
The retention requirements relevant to these laws should now be interpreted as applicable to digital
content:
● Federal Records Act of 1950
● Freedom of Information Act (FOIA) of 1966
● E-Government Act of 2002
More recently, the House of Representatives passed HR 1387 (Electronic Records Preservation Act) to
encourage the implementation of strict records management policies. The legislation called for agencies
at the federal level to adopt systems to ensure the capture and preservation of digital records. The
resolution was not passed in the Senate, but the Act served as a step in the process of developing
regulations for the retention of electronic government records.
Regardless of specific retention laws, agencies often find themselves facing situations that necessitate
the preservation of web records. Some of these situations are outlined below. Governments would do
well to consider the direction digital information is headed: it will continue increase, and regulators will
begin to define additional requirements that will certainly involve the retention of government records on
all levels, including electronic information.
Consider how your agency would respond when faced with these common occurrences. As your online
content increases, will your IT team be empowered to provide specific records from particular dates in a
timely and complete manner?
FOIA Requests
Freedom of Information Act (FOIA) and open records laws vary in scope and detail, but most municipal,
state, and federal agencies are required to produce government records to anyone that requests them,
2
http://www.usa.gov/webcontent/reqs_bestpractices/laws_regs/web_records.shtml
3
http://www.rcfp.org/ogg/index.php?function=browse
3. unless the document falls within an enumerated exception. Generally, FOIA regulations state that
governments may not withhold an entire document if it contains information that is not subject to
disclosure -- it must redact that information only, and produce a copy of the document.4
With the burgeoning amount of online communication and publication by governments, FOIA and open
records regulations have become complicated. The amount of electronic information has multiplied
exponentially, and agencies must implement new policies for dealing efficiently with requests for digital
records. Amendments to existing open records laws, like the Electronic Freedom of Information Act
Amendments of 1996,5 specifically declare governments to be responsible for making digital content
accessible to citizens.
Systematic preservation of government records, documents, and datasets -- with the ability to search and
retrieve if necessary -- is the key to compliance. Agencies that do not ensure the sustainability of their
web presence will find themselves reactively scrambling to comply with FOIA requests, while agencies
that preserve their digital records can respond in a timely and efficient manner. In cases where only part
of a document or dataset may be released, agencies that implement robust retention tools can more
easily modify their web records for public viewing. They can maintain an authentic archive of the original
while releasing the modified version to the requester, thereby complying with open records and retention
regulations.
Litigation
A few years ago, government agencies were only beginning to understand the importance of online
records retention. In June 2007 the U.S. Court of Federal Claims chastised the Justice Department and
the Army for failing to properly preserve electronic records, in the case of United Medical Supply
Company v. United States.6 United Medical claimed the Army had not adhered to the terms of a
procurement contract by ordering supplies from other vendors. When the Army Defense Supply Center’s
legal team sought e-mail messages relevant to the case, it was discovered they had been destroyed
according to routine. These electronic records were the government’s only line of defense. Their
destruction resulted in additional e-discovery costs and a censuring remark from the judge:
“Aside perhaps from perjury, no act serves to threaten the judicial process more than
the spoliation of evidence.”
Judge Francis Allegra, United Medical Supply v. United States
Government agencies at all levels must recognize the importance of records retention in case of litigation.
Now that electronic records have expanded to include complex web pages, social media communications,
and extensive online datasets, the ability to preserve and retrieve is more urgent than ever.
Digital Evidence in Court: Burden of Proof
If your agency already employs a retention strategy, it’s important to recognize that not all electronic
records are created equal. Suppose your agency did find itself facing legal action or e-discovery
proceedings. How would your web records hold up in court? It is critical for organizations to understand
how digital evidence is treated by law. Your website - and indeed, all online content - is transient by
nature. The Federal Rules of Evidence require proof that the data presented is authentic, and has not
4
http://findarticles.com/p/articles/mi_qa3720/is_200109/ai_n8957360/
5
http://www.justice.gov/oip/foia_updates/Vol_XVII_4/page2.htm
6
http://gcn.com/articles/2008/10/26/the-case-for-ediscovery.aspx
4. been manipulated, altered, or misrepresented.7 Without a defensible archive of a webpage, those
requirements are very difficult to meet.
For digital records to be accepted in court, you must be able to prove their authenticity and integrity. Data
authenticity verifies that the presented web content was indeed from your website and was online at a
specified date. Data integrity verifies that the presented web content is an exact representation of the
original and has not been changed over time. If you can’t prove the verifiability of your digital evidence, it
will likely be thrown out as in the pivotal case of Vinhee vs. American Express:
In 2003, Vee Vinhee owed American Express more than $40,000 on his two credit cards. He filed for
bankruptcy while American Express pressed charges, seeking settlements of the balance he owed.
During the course of the case proceedings, the credit card firm presented electronic records of Vinhee’s
monthly statements as evidence to the court. However, the court refused to accept these online records
as evidence because the firm could not prove authenticity of the records. AMEX appealed but lost the
case in the end.8
This was a trend-setting verdict for the emerging issue of electronic evidence in court. Subsequent cases
have upheld the same standards and continue to place the burden of proof on the submitter of the digital
files. These standards can be met by utilizing three key components: a certified atomic clock to establish
a legally-accepted time, a digital signature to establish data integrity, and a digital timestamp to establish
data authenticity. How can government agencies ensure that these components are present for all their
online activity? Through comprehensive, systematic archiving of their websites and social media pages.
7
http://www.law.cornell.edu/rules/fre/rules.htm#Rule901
8
http://www.financialadvisormagazine.com/component/content/article/1740.html?
magazineID=1&issue=84&Itemid=73
5. Social Media: Benefits and Risks
The explosion of social networking platforms like Twitter, Facebook, LinkedIn, and YouTube has not been
limited to the public sector. As governments have realized the value of real-time communication with
citizens, many have become active on some type of social network, often without establishing policies for
managing the information that is published by the agency. A recent report released by IBM’s Center for
the Business of Government concludes that, in general, governments have shown a “lack of standards for
records management” within social media.9
According to the report, 22 out of 24 major agencies are utilizing social media tools. The most popular
are RSS feeds, microblogs, social networking sites (like Twitter and Facebook), blogs, and video sharing.
These platforms hold vast potential for connecting citizens with their governments, but agencies must
recognize the regulatory risk involved with social media in the absence of proper records management
policies. The author of the report, Patricia C. Franks, notes that current regulations pose a problem for
managing records created using social media tools.
"New media brings with it new challenges -- especially for records managers
struggling to apply existing records management laws and regulations . . . in a social
media world."
Patricia C. Franks, Associate Professor,
School of Library and Information Science,
San Jose State University, CA
To remain compliant with existing regulations and to prepare for those that will inevitably be developed as
governments focus on creating new standards, agencies must act to ensure their social media activity is
preserved in a way that enables them to recover it if necessary. This is complicated because social
media tools involve complex web content, links, videos, third party posts, and more.
Would your agency be prepared with searchable records of past social media activity if it was required by
a regulator or for e-discovery situations? If not, your agency might face increased costs in both time and
money, or enforcement actions. The time to prepare is now.
9
https://docs.google.com/viewer?
a=v&pid=explorer&chrome=true&srcid=1gzmMWLydBCtu5YkAgVlpskw0WnKnP_kFuN6r3aaTT
ExdgTLV1ONS7EnYNv2d&hl=en
6. Web Archiving is the Solution
Obviously, a responsible plan for admissible records retention is critical for federal, state, and local
governments. Should it become necessary to access the history of your web presence, would you
confidently be able to produce non-refutable records from a specified date? How difficult would it be to
find the data in question? And most importantly, would you be able to view the content (including links,
rich media, feeds, etc) just as it appeared when it was created?
Server Back-Up
Some agencies believe their server backup policy is providing them with sufficient protection. However,
the web is built on rapidly evolving technologies, making it increasingly difficult to maintain a
comprehensive record of web history using back-up alone. In fact, for historical web pages to be valid,
organizations must continually back-up any databases (in addition to the other website components)
because the databases influence the site’s content, and are constantly changing. In addition, backups
are cumbersome (a continual manual process), expensive (because of excessive storage demands), and
inefficient (since they cannot be indexed or searched). Above all, most server back-ups simply do not
meet the standards for data integrity and authenticity that are required by the Federal Rules of Evidence
for use in court.
CMS Revision Control
What about Content Management Systems (CMS)? Many of these systems have “revision control” of
webpage content built into the application, enabling users to view versions of webpages from the past.
But this technology isn’t powerful enough to restore the pages in a comprehensive, defensible form.
Modern online content is dynamic and complex, often pulling data (such as Flash or AJAX content) from
outside the CMS’s database. A webpage reproduced through CMS revision history will not be truly
admissible unless the reproduced page bears a digital timestamp and signature. Needless to say, this is
not a viable option for agencies interested in a strong records retention policy.
Web Archiving
Archiving is the emerging solution to the problem of maintaining perfect historical web records. An
enduring web archive is created by capturing a digital snapshot of the web content, independent of
specific databases or technologies. That means the webpage can always be viewed in its original form
and deliver the same user experience, meeting regulation requirements for authentic copies. Archiving
guarantees your agency’s ability to exactly reproduce past online content, and to locate specific pages
using search technologies for web-analytics or e-discovery purposes.
7. The PageFreezer Solution
PageFreezer is pleased to offer a complete, SaaS-based archiving solution which provides for the specific
needs of government agencies -- daily automatic archiving of your website and social media pages,
perfect reproduction and replay of those archives, excellent search and retrieval functionality, and
compliance with regulations concerning records retention.
Implementing a web archiving policy requires considerable investigation and forethought, given the
various options now available in archiving technology. How will you know which archiving service is
covering all the bases? There are several key components to consider. The ideal archiving solution:
… employs a powerful content capture method.
In order to provide comprehensive archiving of even complex or hard-to-reach content, PageFreezer
utilizes archival crawlers (derived from search engine crawling technologies) and harvesters (for real-time
archiving) to capture pages. PageFreezer’s web crawl and harvest technologies are industry-strength
and work well in a wide range of circumstances and site / page designs.
… provides perfect representations of digital content.
Today’s websites employ all manner of technologies -- Javascript, Flash, Web 2.0, AJAX, and much more
-- making it difficult to secure archives that can be viewed as exact representations of the originals. Only
PageFreezer supports the capture of ALL complex web content (including Flash). The perfect copies are
stored unchanged, which is particularly important within a legal context.
… eliminates dependency on publishing software and databases.
The preservation and storage of digital content is best approached using the SaaS (software as a service)
model -- everything happens online, with nothing to install or configure. PageFreezer takes responsibility
for your archives and stores them for you, independent of specific technologies or databases.
… allows for powerful search functionality across all archived material.
Discovering and analyzing specific archives is simple within PageFreezer’s browser-based console, which
allows for detailed keyword searches and filtering commands across your entire archive or within specific
site / date combinations. Unique calendar and timeline features help agencies perceive how their
webpages have changed over time.
… guarantees secure archive storage.
Responsible handling of your agency’s sensitive data is of vital importance. PageFreezer stores your
archives on a fault-tolerant data cloud at our SAS70 Type II compliant data center, then mirrors the
information to a geographically remote second location as an added precaution. Archives will not be
changed or destroyed during the duration of your agency’s subscription.
… offers a variety of options for acquiring web content.
With archival crawlers browsing your website capturing everything within a defined scope, it’s essential to
set parameters that will keep the resulting archives relevant to your agency’s needs. With PageFreezer,
you can choose to archive entire websites, individual pages, specific URL paths, or even exclude key
words from the crawlers’ search. You also determine how often you want your site archived, preventing
redundancy and keeping your records pertinent.
8. … ensures defensible digital records.
In addition to providing a user-centric view of content in the original rendered form (as required for legal
use), PageFreezer places a 512-bit strong digital signature on each archived page, proving the content
has not been altered (data integrity). PageFreezer also provides each page with a digital timestamp,
synchronized with certified atomic clocks, to prove the content was online at a specified date (data
authenticity). These precautions guarantee the admissibility of your archived records.
… supports the Litigation Hold process.
In the case of legal action or e-discovery proceedings, PageFreezer provides prompt exports of archived
content. Within a few business days of your request, your legal counsel will receive a well-prepared
package including searchable PDF files and the native files with our digital timestamp and signature,
providing the defensible evidence required in court. Regular data export is also available, should you
need a local copy of your records for any reason.
9. Why PageFreezer?
Once your company has decided to implement a web archiving policy, it’s important to understand the
functional differences between various archiving services. PageFreezer is industry-leading in a number
of aspects and offers several unique functionalities. The following feature checklist is included for your
convenience in comparing archiving options.
Legal Support:
● 512-bit strong digital signature
● RFC 3136 -compliant timestamp
● Synched with certified atomic clocks
● Supports Legal Hold process
● Optional affidavit
Search Features:
● Full text search
● Search all content in snapshots
● Metadata search
● Boolean search
● Proximity search
Export Options:
● PDF with support for Search, Copy, and Paste
● Native Format
10. Conclusion
Web archiving is rapidly becoming the preferred method of records retention as governments seek
responsible, effective, compliant solutions for managing their increasing amounts of online content. You
can protect and empower your agency by bringing PageFreezer’s powerful technologies to work for you.
As the archiving industry grows and evolves, we are committed to continued innovation, ensuring that our
customers always have access to the most comprehensive, robust archiving technologies available.
To learn more about web archiving or find out how you can get started today, please contact us:
PageFreezer Customer Service
1.888.916.399
info@pagefreezer.com
11. About PageFreezer
PageFreezer.com provides government agencies and companies with a solution for website archiving,
regulatory compliance, e-discovery, and litigation support.
The service is available in two editions: On Demand or On Premises. For online service, with no software
installation or configuration, choose PageFreezer On Demand. Set up your account and begin archiving
within an hour.
If you prefer to keep your data private “in house,” choose PageFreezer On Premises. With this edition,
you can also archive your intranet and other internal websites.
PageFreezer is brought you by PageFreezer Software, Inc., a Vancouver-based company with 4 offices
worldwide in the USA, Canada and Europe.