Posts in Technology.

The old adage, "sticks and stones may break my bones, but words will never hurt me" may not be so reassuring in a day and age when anyone can post an insult about someone on a public blog or social media site for a virtual universe of internet users to see. This is especially so if a student or students have posted insults about an administrator or a teacher on a public website that are viewed by other members of school staff, students, parents, and the community.

There has been a lot of buzz recently about whether employers can demand employees or prospective employees to provide passwords to their private social media accounts. The buzz was undoubtedly associated, in part, with a proposed amendment to the Federal Communications Commission Process Reform Act of 2012, which was approved by the House of Representatives on March 27, 2012. The amendment would have ...

During the every day course of business, actual or potential disputes may arise that could lead to later legal action. In these situations, the preservation of electronically stored information can be overlooked.

In addition, litigation discovery rules provide that parties in litigation must take necessary measures to preserve electronic evidence. If appropriate measures are not taken in that regard, a ...

Categories: Technology

The trend toward “cloud computing” is increasingly visible as technology firms and service providers vie with each other to provide users with web-based data and software application services. From Apple’s iCloud to Amazon’s cloud-based user libraries to your local cable provider’s data storage plans, everyone wants to provide users with fee-based cloud services.

Cloud computing offers a ...

Categories: Technology

The adoption of acceptable use policies to establish the nature and limits of employee and student access to and use of computer systems is by now a common practice. Once such policies are established, however, districts and county offices of education sometimes fail to review them to ensure they are current. In today’s rapidly changing technology environment, these policies can quickly become outdated in the face of new technologies and means of communication, the most recent examples including social networking, micro-blogging, and cloud computing.  It is important that acceptable use policies be kept current to address the impacts of new technologies.

Other AALRR Blogs

Recent Posts

Popular Categories

Contributors

Archives

Back to Page

Necessary Cookies

Necessary cookies enable core functionality such as security, network management, and accessibility. You may disable these by changing your browser settings, but this may affect how the website functions.

Analytical Cookies

Analytical cookies help us improve our website by collecting and reporting information on its usage. We access and process information from these cookies at an aggregate level.