Wednesday, August 31, 2011

How Law Enforcement Agencies Are Using Social Media to Better Serve the Public




http://ow.ly/6icUS

Article by Aliza Sherman, appearing on Mashable website.

This article discusses ways in which law enforcement agencies in various countries use social media to help increase the effectiveness of their efforts.  As the author points out, "As demonstrated in countries like Egypt and Syria, governments worldwide are monitoring — and in some cases, shutting down — social media channels in attempts to control gain control of unfolding events. More recently, the unrest in the U.K. highlights the complexity of monitoring social media conversations and putting the information gathered in real-time to use."


In addition, the author states, "According to Washington D.C. social media lawyer Bradley Shear, any user of social media should realize that everything he posts publicly online has the potential to be reviewed by others who may not be the intended readers — that includes governments and police departments.

“If you post something on a public Facebook Page, public Twitter account, public Google+ profile, you generally give up your right to privacy regarding the content that you have posted,” says Shear. “When I tweet or blog, I do so with the knowledge that my content may be viewed by anyone at any time who has access to the Internet.”"



The article also references the Fourth Amendment, and how it limits what information can be obtained by law enforcement in the U.S. without a warrant.

The article also discusses how police can tactically use social media, "Operationally or tactically, police units can aggregate, filter and analyze a social media stream in a given policing area and look for conversations ahead of planned events such as demonstrations. Analyzing what people are talking about can guide the effective deployment of services.

For intel, a police unit could identify key influencers to both glean and disseminate credible information. They could monitor the streams during the day of an event to make on-the-spot decisions and better manage resources on the ground. Then after an event, they could learn from the operation and assess the public’s feelings about what took place."

Read more »

Judge Blocks Teacher-Facebook Law



http://ow.ly/6hDrg

Article and video by Danielle Smith, appearing on stollerderby blog.

This article, and accompanying video clip discuss a law proposed in Missouri, aimed a restricting teachers from becoming Facebook friends with their students.  The law was blocked by a Judge, stating that is violates the First Amendment, and restricts free speech rights excessively.  There are still hearings underway regarding this matter.

This is an interesting case of first impression regarding attempts to restrict Facebook based on the relationship between teachers and students.  Watch the video at the link above for more insight into this matter.




Read more »

NY man suing Facebook has to allow email access



http://ow.ly/6hCpf

AP article appearing on the Wall Street Journal website.


The article discusses the latest development in Paul Ceglia's case against Facebook.  "Judge Richard Arcara denied Paul Ceglia's request to delay Facebook's access to his emails so he could object on privacy grounds. It was the latest in a series of court rulings that have gone Facebook's way as the Palo-Alto, Calif.-based company and its founder, Mark Zuckerberg, aggressively defend against Ceglia's claims that Zuckerberg signed away half of Facebook before it got off the ground."

The article goes on to discuss a statement made by Ceglia's attorney, "When a judge on Friday refused to stay the entire order, Ceglia sought Monday to protect just his email accounts.

"In today's world, people commonly discuss their most private and important matters by email," his attorney, Jeffrey Lake, wrote. "As such, allowing defendants' experts to search though and read all of Ceglia's emails since 2003 undoubtedly will give them a view of matters far outside the scope of this litigation and far inside Ceglia's private life, a view to which no one is entitled and that is protected from government prying by the most sacred components of the Constitution."

As the article further states, "Facebook and Zuckerberg will soon move to dismiss the lawsuit based on "the now-overwhelming evidence that Ceglia appears to have destroyed critical electronic documents and is perpetrating a large-scale fraud," Snyder, of Gibson, Dunn & Crutcher LLP in New York, wrote in last week's filing."

Read more »

Counsel’s Accidental Information Back-Up Breaks the Budget




http://ow.ly/6hvAc

Article by Christopher D. Dize, appearing on E-Lessons Learned website.

This article discusses the New York State case of Oxxford Info. Tech., Ltd. v. Novantas, LLC, 910 N.Y.S.2d 77 (N.Y. App. Div. 2010).

In this case, counsel for the plaintiff entered into a stipulated confidentiality agreement regarding the preservation of data provided by the defendant.  The stipulation called for the erasure of all the defendant's data after the termination of the case. Plaintiff's counsel accidentally stored data belonging to the defendant on various back-up tape systems, and upon realizing this error, they sought relief from the court to modify the confidentiality agreement, rather than incur the costs of data removal.  The court denied the attorney's request, and so did the appellate court.

The article states the following in regard to this situation:

"In what was no doubt a humbling moment for plaintiff’s counsel, New York’s Appellate Division basically said, “You should have known better.”

“Plaintiff voluntarily consented to the Confidentiality Order . . . and its counsel, who have demonstrated experience in and sophisticated knowledge of electronic discovery matters, should have foreseen the problem and addressed it when the Confidentiality Order was being negotiated.”

The appellate division reasoned that the cost to Oxxford’s counsel did “not outweigh defendants’ bargained-for interest in the post-litigation destruction of its business information in outsiders’ hands . . . .” The court emphasized that the plaintiff’s proposed safeguards for keeping Novantas’ business secrets safe amounted to “something considerably less than a guarantee.”

It is possible that the court would have reversed if counsel had not “demonstrated experience in and sophisticated knowledge of electronic discovery matters.” But we know for sure that if you do demonstrate such experience and knowledge of e-discovery, cleanup is on you if you mess something up.

And if you agree to return or destroy the other party’s confidential information at the close of litigation, the ol’ too-costly excuse ain’t gonna cut it if you don’t. This is especially true when the other party relies on a confidentiality stipulation, into which you entered while flexing your e-discovery muscles."

This is a perfect example of how costly an eDiscovery error can be.


Read more »

Reasonable Particularity in Requesting ESI




http://ow.ly/6huox

Article on bowtie law blog, by Joshua Gilliland, Esq.

This article discusses the case of Doubt v. NCR Corp., 2011 U.S. Dist. LEXIS 95518, 11-12 (N.D. Cal. Aug. 22, 2011). In this case both the Magistrate Judge, and later the District Court, held that a plaintiff's discovery request was overly broad, and denied the request.

The requests asked for "each and every document" in several instances, the case was based on age discrimination. As the the Mr. Gilliland, the author of the article stated "A discovery request must both be relevant to a party’s claims or defenses and “reasonably calculated to lead to admissible evidence.” Doubt, at *11, citing Federal Rule of Civil Procedure Rule 26(b).

Federal Rule of Civil Procedure Rule 34 states that a discovery “must describe with reasonable particularity each item or category of items.”Doubt, at *11, citing Federal Rule of Civil Procedure Rule 34."

The author describes that the court felt that the plaintiff's request was too burdensome, and would require the defendant to search through too many documents that were unrelated to the facts of the case.  The article suggests the following, as a means of improving discovery requests:

 "For both a requesting or producing party, technology such as “early case [data] assessment” can be extremely helpful in identifying relevant discovery. However, ECDA cannot limit ESI for identification without first determining what is being searched with “reasonable particularity.”

In identifying ESI with “reasonable particularity” at a minimum includes the type of ESI (email, Excel, text message), the author of the ESI (Email Sender or who drafted a file), Recipients of messages, date ranges and keywords designed to identify ESI relevant to a party’s claims or defenses."

This case serves as a good example for the need to draft properly tailored discovery requests, and provides some insight into how to improve skills in this area.


Read more »

Tuesday, August 30, 2011

The End of Social Media 1.0




http://ow.ly/6hb8Z

An article by Brian Solis posted on the briansolis.com website.

This article touches on the fact that social media networks are competing, and evolving.  This change in the social media landscape has caused services like Facebook to lose momentum in some aspects of its use. The author also warns against too many advertisements from corporations, and states that this may have a chilling effect on the conversations taking place on social media.

 The author points out that the following lessons should be learned regarding the role that social media will play:

"What can we learn of this?
1) Businesses must first realize that there’s more to social media than just managing an active presence, driven by an active editorial calendar. Listening is key and within each conversation lies a clue to earn relevance and ultimately establish leadership.
2) Consumers want to be heard. Social media will have to break free form the grips of marketing in order to truly socialize the enterprise to listen, engage, learn, and adapt. You can’t create a social business if the business is not designed to be customer-centric from the outside-in and the inside-out.
3) Social media becomes an extension of active listening and engagement. Strategies, programs, and content are derivative of insights, catalysts for innovation, and messengers of value. More importantly, social media becomes a platform for the brand and the functions that consumers deem mandatory. From marketing to HR to service to R&D, brands will expand the role they play in social networking to make the acts of following and sharing an investment in a more meaningful relationship."


Read more »

Manjeri college


Q.3.Who described NAVROJI as a” divine person” ?.
  
A-Tilak
b-gandhi
c-gokhale
d-Tagore.

Answer:C

Read more »

Duty to Protect Confidentiality of E-Mail Communication with One's Client




http://ow.ly/6h1Bf

This is a formal opinion from the ABA (Formal Opinion 11-459) dated August 4, 2011


The introductory comment of this formal American Bar Association opinion states as follows: 

"A lawyer sending or receiving substantive communications with a client via e-mail or other electronic
means ordinarily must warn the client about the risk of sending or receiving electronic communications
using a computer or other device, or e-mail account, where there is a significant risk that a third party may gain access. In the context of representing an employee, this obligation arises, at the very least, when the lawyer knows or reasonably should know that the client is likely to send or receive substantive client-lawyer communications via e-mail or other electronic means, using a business device or system under circumstances where there is a significant risk that the communications will be read by the employer or
another third party."




The opinion goes on to provide other insight regarding ethical obligations associated with an attorney's duty to warn their client, and cites specific cases that pertain to this issue, as well as the ABA Model rules of professional conduct.


Read more »

There's an App - and a Risk for That



http://ow.ly/6gQg6

Article by John Martin, Esq. partner at Nelson Mullins Riley & Scarborough, appearing on law.com on the Corporate Counsel website.

The article touches on the use of iPads in the corporate environment, and the fact that much of the ESI stored in iPads could be subject to a production request in litigation.  To minimize this potential risk, the author suggests a number of steps:

"Because of all the above concerns, legal departments should consider adopting the following procedures to protect the confidentiality of their companies' data. You can institute these measures as company policies, and circulate them among all employees issued company iPads:

  • The company bears no responsibility for an employee's personal use of the iPad.

  • Employees should have no expectation of privacy in using the company's electronic resources, including all personally owned hardware to the extent it stores ESI associated with company business.

  • Before using them for company business, employees should make the iPad available to IT personnel for implementation of security settings.

  • Employees are expected to immediately report any loss or theft of an iPad, or possible unauthorized access to an iPad.

  • Remote wipe will be initiated immediately when any iPad is lost or stolen.

  • Pursuant to records management policy, employees must consent to dispose of data from any iPad used for company business when retention of such ESI on the iPad is no longer necessary for legal hold or company retention purposes.

  • Limits on downloading apps shall be enforced, and specific apps for corporate business shall be required.

  • Limited use or designation of specific acceptable social networking sites shall be enforced.

  • For legal hold purposes, existing policies and notifications also extend to business content stored on iPads.

  • Employees must affirmatively accept the duty to personally enforce records management and litigation hold directives across their iPad content."

Read more »

5 Enterprise Social Trends for Next 5 Years




http://ow.ly/6gHW2

Article by Debra Donston-Miller appearing on infoweek.com

This article touches on 5 anticipated trends that the use of social media networks will cause over the next 5 years.

The author projects that the 5 following areas will be impacted through the increasing use of social media:
1. Organizations will "flatten";
2. Customers will be a bigger part of the corporate community;
3. Customer service models will change dramatically;
4. Internal social networks will be the new intranets;
5. The marketing function will continue to expand.

The author makes some interesting points about all the topics referenced above.  There certainly are some unique new trends that will continue to develop as result of the increased presence of social media networks.


Read more »

eDiscovery Rules: What's Really Required for a Meet and Confer?




http://ow.ly/6gxKI

Article by Doug Austin, on the eDiscovery Daily Blog.

This article outlines items that are required for discussion at a proper Meet and Confer conference, under FRCP Rule 26(f).

As the author points out, "Rule 26(f) states that attorneys must meet and discuss "any issues about preserving discoverable information" as well as developing a "discovery plan." It also specifies that:
Attorneys must already be aware of the location and nature of their own clients' computer systems and discoverable documents, and must be prepared to ask questions about their opponents' ESI, electronic systems, and data preservation actions.
In order to be fully prepared for this conference, an attorney needs to know as much as possible about the location, volume, and logistical challenges that surround the collection of ESI, as well as the client's preferences regarding privilege, protective orders, and document review.
The more informed the attorneys are on each of these counts, the more capable they will be to address relevant issues, streamline the discovery process, and minimize eDiscovery costs.
Attorneys may exchange either in-depth or limited information about the legal holds process.
The result of the "meet and confer" conference is to establish a comprehensive discovery plan and lay the groundwork for the discovery aspects of the rest of the proceeding."




Read more »

unity womens college



Q.2-..............is regarded as the magnacarta of indian independence.
a-Queen Victori’s Proclamation.
b-British Parliament
c-Doctrine of Lapse
d-Petition and mendicacy.
Answer:A

Read more »

Monday, August 29, 2011

Photo- From Unity women's college

students of Unity Women's College, Manjeri, win the first prize in group dance 
  december 22,2010
C-zone intercollegiate youth festival of the University of Calicut   


students of Unity Women's College, Manjeri, won the first prize in Hindi drama  

our Botany lab 

GOPURAM 


Read more »

Unity Womens College, Manjeri


Unity Womens College, Manjeri


P.O Narukara,Manjeri,Malappuram DT. Kerala 676122, Tel : 91 04832767142.


Unity Women's College was established in 1991 and is run by Muslim Educational & Cultural Association MECA - a registred society. Strarted as a first Grade Aided College and affiliated to the University of Clicut, it is the only multi-faculty (Arts, Science & Commerce)Womens College in Malappuram District.It has al so the unique distiction of bieng the only institution of this kind run by muslim community in Kerala. The institution aims mainly at the upliftment of women in genaral and the educationally backward muslim women in particular, through modern good quality education.
Location

Situated 1.6 kms of Manjeri - Calicut road, at 'Koodakkara', the College function in two magnificent buildings, surrounded by the panoramic and enchanting scenery of hillocks and greenary. The College provide its own transportation facility to the staff and students. The College has creditable academic as well as co-curricular accomplishments in the past. The College has been accredited by the National Addessment and Accreditation Council (NAAC) at B+ level in 2005.

Courses

A.UNDERGRADUATE COURSES: 

1. B.A.English(Main) 
History and World History(Subs) 
2. B.A.History(Main)
Political Science and West Asian Studies(Subs)
3. B.Sc. Chemistry(Main) 
Mathematics and Physics(Subs) 
4 . B.Sc. Computer Science(Main)
Mathematics and Physics(Subs) 
5. B.Sc.Botany(Main)
Chemistry and Zoology(Subs) 
6. B.Sc.Family and Community Science(Main) 
Chemistry and Zoology(Subs) 
7. B.Com(Co-operation) 
8. B.Com(Computer Application) 

B. POST GRADUATE COURSE: 

9. MA English (4 semesters) 

C. CERTIFICATE/DIPLOMA/ADVANCED DIPLOMA COURSES: 

10. Database Management and Programming. 
(Offered by the Dept. of Computer Science) 
11. Nutrition and Dietetics
(Offered by the Dept. of Family and Community Science) 
12. Micropropagation and Horticultural Practices 
(Offered by the Dept. of Botany)

WELFARE SHEMES

STUDENTS WELFARE SCHEME &CO-CURRICULAR ACTIVITIES

1.Tutorial system. 
At the beginning of the academic year, students are grouped in to different batches and placed under the personal charge of a teacher designated as ‘Tutor’. He/she will be regularly monitor the attendance, progress and conduct of students under him/her and will give necessary guidance. Students shall forward all applications including leave to the principal through the concerned class tutor. University application forms shall be attested by the class tutor. the progress report of the students will also be intimated to parents by the class tutor.

2.Students Aid Fund(SAF)
For helping very needy& financially backward students a general funds is raised from staff &students in the form of donations. Selected students will get financial assistance from the SAF. A fund also raised to meet the monthly bus fare of deserving students by contribution from PTA.

3. Parent teacher association.
A parent teacher association is actively functioning for promoting general welfare of the students and keeping good relation ship between parents and teacher. The graduation of every students shall join the association and all teachers are members of the association. The annual membership fee is 25/-, The college buses are sponsored by PTA. Proficiency prizes are also awarded by PTA. The Vice-President of the Association is elected from among the parents.

4. Career and Courses Guidance Centre(CGC)
A career and course guidance centre is functioning in the college for helping the students to know and select their career and courses. Awareness programmers are conducted by expert to selected group of students. reference books are made available in the library for equipping the students to undergo competitive examinations
.

5.IQAC
An internal quality assurance cell has been set up in the college as a post accreditation quality sustenance measure. since quality Enhancement is a continuous process, the IQAC will work forwards realizing the goals of quality enhancement and sustenance. further, it will channels the effort and measures of the institution towards academic excellence.

6.National Service Scheme
The main objective of NSS is to create spirit of service among students to the fellow being and to the society.It also aimsat the personality development of students by interaction and participation in various social and cultural activities.Every students completing 240 hours of social work and attending one special camp will be eligible for a certificate issued by University,which fetches 5 marks weightage for hiegher study.
There are two units of N.S.S in the college each having an enrolment strength of 100.

7.Compulsory Social Service(CSS)
From 1998-99 academic year onwards,Calicut University has implimented Compulsory Social Service to the degree student.Accordingly all students shall undergo a minimum 42 days of social service work during the course for awarding thier degree.The aim is to arouse the social concience of student community and to inculate service mentality among students and to prepare them to be useful to the society.There is an implimentation committee in the college with a co-ordinator and group tutor will be in charge of executing and monitoring the programme.

RESIDENTIAL FACILITY

The college hostel, functions in the college campus. The hostel has been named ”Nightingale House”, symbolizing dedicated service, Hostel accommodation is available for a limited number of students Those who wish to join the hostel shall submit separate application after obtaining admission in the college and shall pay the establishment charges and caution deposit at the time of admission The boarding charges are calculated on a monthly dividing basis, Rent Rs………Establishment charges………,Water………(The rates are subject to change)

HOSTEL RULES


  • Application for hostel admission shall be in the prescribed form available at the college office.prescribed form available at the college office. Admission will be offered to the available seats considering the accademic merit and need of the applicant.


  • Inmates shall adhere to the routinr schedule&rules in thehostel issued by Dy.Warden/Hostel Matron.


  • Students themselves shall be responsible for all thier valuables and other personal belongings and avoid wearing costly gold ornaments.


  • Inmates should get permission from the Matron before leaving the hostel premises. They shall reach the hostel before 6.00pm.after the classes in the normal working days.


  • Inmates shall not allow or entertain outsiders to enter the hostel without prior permission.


  • Students will be allowed to go home during holidays &vacations with their parents/Guardian/Authorised person, who shoud produce identity card in turn while taking the ward from the hostel, issued by the principal. However in special cases/occasions a written request to the principal from Parent/Guardian will be honored and an inmate may be permitted to go home alone or with other neighboring students.


  • Inmates shall submit their leave at the college during illness through the Dy. Warden/Matron


  • No fund shall be collected or meeting organized in the hostel without previous consent of the warden.


  • Mess dues will be published on the first week of every month and inmates shall remit the dues before 15th of every month without fine.


  • Principal as the chief warden reserves the right to dismiss a student from the hostel on specific reasons noted or reported.


THE LIBRARY

The college library has a collection of 12300 volumes and will subscribe 73 periodicals during the report year. All the collections in the library are classified and catalogued according to DDC(Dewey Decimal Classification)scheme. The library is completely computerized with a standard library software. PAC(on the public access catalogue)is provided to locate the documents available in the library quickly. Internet access facilities are also available in the library.

REFERENCE READING ROOM

There is a good collection of standard text books in all subjects and reference materials such as dictionaries, Encyclopedias Directories etc .in reference reading room .Books from the section shall not be allowed to be taken out.
TEXT BOOK SECTION

Text book section contains standard text books in all subjects. They are loaned to deserving students for a period of one year, a normal fees has to be paid for each book.

Discipline&Rules

COLLEGE RULES
  • Students shall behave with dignity and courtesy inside and outside the college.

  • Students shall observe strict modesty in dress.

  • Students shall always carry identity cards with them.

  • No meeting of any kind shall be organized or any sort of fund collected without the permission of the Principal.

  • Students shall not indulge in any kind of misdemeanor bringing opprobrium to the institution.

  • Students shall not entertain visitors without prior per mission.

FEE AND ATTENDANCE RULES
  • Students who do not enjoy fee concession shall remit the fees,which will be collected in the office in 3 terms on the days noted in the calendar and also as notified from time to time.

  • Fee will be received in the college office only on the specified collection days from 9.30am to 3.00 pm.

  • If the fees and fine,if any,are not paid within 15 days of due date,the name of the students will be removed from the college rolls and the students will not get the benefit of attendance.

  • No student shall be absent from class without leave.

  • Students absenting themselves without leave for ten consecutive working days will be struck off the rolls.

  • Application for leave in the specified format(available in college co-operative store)shall be forwarded to the pricipal through the class tutor.

  • The annual certificate of the attendance required for operating in University Examinations will not be granted unless the principal is satisfied with the attendance,progress and conduct of the student.

LIBRARY RULES
  • Working Hours:The library is keeps open on all working days from 8.30 a.m. to 4.30 p.m

  • Strict discipline and silence shall be observed in the library.

  • Membership of the library id extended to all students of the college.Five library tickets are issued to each P.G students and three tickets to each UG students

  • For availing this facility the students will have to submit an application in the prescribed form.

  • They are entitled to borrow books on the production of readers ticket.

  • Loss of ticket should be intimated to the librarian immediately in writing.A fine of Rs.25/- will be levied for each card lost.

  • If a book is lost it can be replaced by a copy of same edition. if it is not done within the due date,4times the cost of the book and overdue charge have to be paid.

  • Those who borrow books from the library are requested to examine them carefully and report damages if any to the library assistant. the borrower will be held responsible for any damage found at the time of returning the books other than damages already reported.

  • The librarian reserves the right to recall at any time any book issued from the library

Read more »

8,000 Menacing Posts




http://ow.ly/6g2Tm

An article by Somini Sengupta regarding appearing on the EDD Update blog, regarding a test of the limits for free speech of Twitter.

This article illustrates a real life situation which as an example of Cyberstalking.  This blog post references a New York Times article and states, "...The New York Times article, "Case of 8,000 Menacing Posts Tests Limits of Twitter Speech," involves efforts by William Lawrence Cassidty to harass a woman, Alyce Zeoli, by posting thousands of threatening and defamatory Twitter posts. He was charged with online stalking, on the theory that his posts caused emotional distress to the victim.

Cyberstalking laws are, accordingly to the article rarely enforced. The prosecution in this case raises a question about the precise nature of information posted on social networks -- are they better viewed as private communications between parties, or public statements like newspaper articles."



The author of the blog post also discusses an eDiscovery aspect related to this situation, "For an EDD standpoint, note that Twitter, in response to a subpoena, revealed the IP address of the computer used to post the messages – information that allowed law enforcement to locate the accused. This raises an additional First Amendment issue, as the disclosure of the author of seemingly anonymous posts to law enforcement is likely to have a chilling effect on future anonymous posters about controversial subjects."





Read more »

3 Ways to Cut eDiscovery Costs




http://ow.ly/6g1LR

An article by Deborah Galea on the Email and Security Compliance website.

This article provides insight into possible ways to reduce eDiscovery costs.  The author points out three key areas to focus on for how to reduce costs:  1) Have a Data Map; 2) Store and Manage Data Centrally; and 3) Use Non-Attorneys when possible.

With respect to the third point, the author points out the following, "Some companies have turned to college-level interns or entry-level employees to search data stores for eDiscovery. However, when doing as such, it’s important the company has adopted an email archiving solution that is role- based (with for instance an auditor role or eDiscovery role) and can be configured to only grant access to areas of data storage that will include information pertinent to a particular case. That will help avoid a data breach that could present costs that trump even those associated with eDiscovery."



Read more »

Narukara unity


Read more »

manjeri


Read more »

Social Media Policies Database - Policies of 236 Different Corporations




http://ow.ly/6ft2t

This is a resource provided on the compliance building website.

This link contains at present 236 different social media compliance policies from some Fortune 1000 corporations, and other entities that have published their compliance policies.  The policies posted here range from regulation of blogging, social media networks, and general internet usage by employees.

We trust that you will find this to be a valuable resource of information.


Read more »