This Week in the Law Library …

This week in the Law Library visit our tables in the Atrium to learn about the Law Library Research & Technology Competency programs! This week we are also teaching problem solving, online search techniques, technology in law practice, social justice resources, and statutes. We also continue to raise awareness for domestic violence and cybersecurity.

Welcome Back from Fall Break!

We hope your fall break was restful and relaxing.

This Week’s Research Sessions

Monday, October 17, 2022

Legal Research & Writing for LLM Students

Shannon Kemen, Legal Technology & Research Instructional Services Librarian
Room 230
8:00am – 9:20am
Problem Solving from Start to Finish

Learn about Law School Competencies

Laura Dixon-Caldwell, Instructional & Reference Services Librarian & Shannon Kemen, Legal Technology & Research Instructional Services Librarian
Atrium Table
Noon – 1:00pm

Learn about how you can participate in the law school research and technology competencies! University of Cincinnati Law students who complete the requirements of the Competency programs before graduation will receive a notation on their transcript stating that they are competent with respect to legal research and/or technology, a credential they can list proudly on their resumes as proof of the research skills they offer prospective employers.

Tuesday, October 18, 2022

Lawyering I, sec. 2

Susan Boland, Interim Director & Laura Dixon-Caldwell, Instructional & Reference Services Librarian
Room 135
9:00am – 10:25pm
Online Searching

Lawyering I, sec. 4

Michael Whiteman, Associate Dean of Library Services
Room 170A
10:40am – 12:05pm
Online Searching

Lawyering I, sec. 3

Ron Jones, Electronic Resources Instructional Services Librarian
Room 145
10:40am – 12:05pm
Researching Statutes

Technology in Law Practice

Shannon Kemen, Legal Technology & Research Instructional Services Librarian
Room 107
11:10am – 12:05pm

Learn about Law School Competencies

Laura Dixon-Caldwell, Instructional & Reference Services Librarian & Shannon Kemen, Legal Technology & Research Instructional Services Librarian
Atrium Table
Noon – 1:00pm

Learn about how you can participate in the law school research and technology competencies! University of Cincinnati Law students who complete the requirements of the Competency programs before graduation will receive a notation on their transcript stating that they are competent with respect to legal research and/or technology, a credential they can list proudly on their resumes as proof of the research skills they offer prospective employers.

Lawyering I, secs. 5 & 6

Susan Boland, Interim Director, Instructional & Reference Services Librarian
Room 230
1:30pm – 2:55pm
Online Searching

Lawyering I, sec. 1

Laura Dixon-Caldwell, Instructional & Reference Services Librarian
Room 145
1:30pm – 2:55pm
Researching Statutes

Wednesday, October 19, 2022

Legal Research Competency Program

Laura Dixon-Caldwell, Instructional & Reference Services Librarian
l2:00pm – 1:00pm
Room 107
Legal Research Using Terms and Connectors

Students who complete the requirements of the Legal Research Competency Program before graduation will receive a notation on their transcript stating that they are competent with respect to legal research, a credential they can list proudly on their resumes as proof of the research skills they offer prospective employers. This is the first live session of the program. For questions, or to RSVP, contact Laura Dixon-Caldwell at dixoncla@ucmail.uc.edu.

Thursday, October 20, 2022

Lawyering I, sec. 2

Susan Boland, Interim Director & Laura Dixon-Caldwell, Instructional & Reference Services Librarian
Room 135
9:00am – 10:25pm
Researching Statutes

Lawyering I, sec. 4

Michael Whiteman, Associate Dean of Library Services
Room 170A
10:40am – 12:05pm
Researching Statutes

Technology in Law Practice

Shannon Kemen, Legal Technology & Research Instructional Services Librarian
Room 107
11:10am – 12:05pm

Law Library Resources for Law & Social Justice Brown Bag for the Jones Center

Susan Boland, Interim Director
Room 320
12:15pm – 1:20pm

Lawyering I, secs. 5 & 6

Susan Boland, Interim Director, Instructional & Reference Services Librarian & Laura Dixon-Caldwell, Instructional & Reference Services Librarian
Room 230
1:30pm – 2:55pm
Researching Statutes

Featured Study Aids

Cybersecurity Law

Available via the West Academic study aid subscription, this book provides a relatively comprehensive examination of cybersecurity related laws. The book outlines and details the U.S. federal sectoral approach to cybersecurity, such as covering the Gramm-Leach-Bliley Act and regulations, and the Health Insurance Portability and Accountability Act Security Rule, as well as an examination of state laws impacting cybersecurity, such as data breach notification, privacy and state education laws. International issues as well as specific topics such as ransomware and the Internet of things are addressed. Notably, the book provides a review of the role of the cybersecurity professional, risk assessment as well as the National Institute of Standards and Technology (NIST) risk assessment framework, and laws related to hacking.

Principles of Cybersecurity Law (Concise Hornbook)

Available via the West Academic study aid subscription, this book covers the cybersecurity laws that apply to an entity based on the entity’s business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine years of technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO’s technical cybersecurity issues and how they fit into today’s cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. The first chapter provides a review of cybersecurity. For example, key to any discussion on cybersecurity is the Confidentiality, Integrity, and Availability (CIA) of data. Learn how to implement policy-based “reasonable security measures” frameworks for your organization that form a legal defense to cybersecurity-based actions brought by U.S. agencies such as the Federal Trade Commission (FTC) and state Attorney Generals. A high-level discussion of the National Institute of Science and Technology (NIST) cybersecurity frameworks is included as well as data breach laws, anti-hacking related laws and some international issues.

Cybersecurity and Privacy Law in a Nutshell

Available via the West Academic study aid subscription, this book provides a comprehensive and up-to-date overview of cybersecurity law and policy. Cybersecurity is a serious concern in our lives. It affects individuals, governments, the military, big businesses, small businesses, and law firms themselves. Cybersecurity policy issues implicate both private and public international law, in addition to domestic law. In this Nutshell, we present case law, federal, state and international legislation, administrative actions and regulations, and relevant policy considerations that attorneys and their clients should keep in mind, whether they are working on a case about cybersecurity or just wanting to know more about cybersecurity and privacy in the Internet age.

Featured Guide

College of Law IT Support: Information Security

The Information Security page on the College of Law IT Support Guide provides information on UC Information Security policies, how to report information security incidents, cyber security tips, and more.

Featured Database

Bloomberg Law Privacy & Data Security Practice Center

From EU GDPR to CCPA and beyond, the Bloomberg Law Privacy & Data Security Law is a platform for practitioners to track the latest developments– with actionable guidance. It features primary and secondary sources, practice tools, and analysis across data privacy law and other key topics. It contains data privacy news. It provides checklists and sample forms, as well as In Focus resource pages providing analysis of critical issues.

Featured Treatise

Law of the Internet

Available on Lexis. Internet law is changing almost as fast as technology itself. Law of the Internet is an easy-to-use resource written for busy practitioners with summaries of major cases and statutes, and forms. This annually-updated, treatise provides analysis of legal issues raised by the Internet and insightful commentary on future directions the law may take.

Featured Video

Cybersecurity Awareness Month 2022 Briefing

Even in the wake of the major attacks across regularly targeted business sectors – such as financial services, healthcare, critical infrastructure, government, energy – most people and businesses still don’t know how to better safeguard their data. Cybersecurity Awareness Month. every October, is dedicated to ensuring everyone has the resources they need to stay safe and secure online. In this special briefing, leadership from today’s leading tech companies share how their organizations are addressing cyber threats and educating others to create a more secure, interconnected world.

National Domestic Violence Awareness Month

October National Domestic Violence Awareness Month
October is National Domestic Violence Awareness Month. Begun in 1981 by the National Coalition Against Domestic Violence, it is a Day of Unity to connect battered women’s advocates across the country.

More Resources for Domestic Violence Awareness

ABA, The Commission on Domestic & Sexual Violence

The ABA Commission on Domestic & Sexual Violence’s mission is to increase access to justice for victims of domestic violence, sexual assault, and stalking by mobilizing the legal profession.

Cyber Civil Rights Initiative (CCRI)

CCRI’s Mission is to combat online abuses that threaten civil rights and civil liberties. It also advocates for technological, social, and legal innovation to fight online abuse.

Indian Law Resource Center, Safe Women, Strong Nations Project

The Center’s Safe Women, Strong Nations project partners with Native women’s organizations and Indian and Alaska Native nations to end violence against Native women and children. The project raises awareness to gain strong federal action to end violence against Native women; provides legal advice to national Native women’s organizations and Indian nations on ways to restore tribal criminal authority and to preserve tribal civil authority; and helps Indian nations increase their capacity to prevent violence and punish offenders on their lands.

National Coalition Against Domestic Violence, Statistics

Ujima, Inc.: The National Center on Violence Against Women in the Black Community

Ujima, Inc.: The National Center on Violence Against Women in the Black Community serves as a national, culturally-specific services issue resource center to provide support to and be a voice for the Black Community in response to domestic, sexual and community violence.

National Cybersecurity Awareness Month

October (2)
October is also National Cybersecurity Awareness Month. Cybersecurity Awareness Month was launched by the National Cyber Security Alliance & the U.S. Department of Homeland Security in October 2004.

This year’s campaign theme — “See Yourself in Cyber” — demonstrates that while cybersecurity may seem like a complex subject, ultimately, it’s really all about people. For individuals and families, you are encouraged to See Yourself taking action to stay safe online. That means enabling basic cyber hygiene practices: update your software, think before you click, have good strong passwords or a password keeper, and enable multi-factor authentication (meaning you need “More Than A Password!”) on all your sensitive accounts.

More Resources on Cybersecurity

National Cybersecurity Alliance, Hacked Accounts (May 26, 2022)

This article offers quick tips to see if someone else has gained access to your account and ways you can regain control if your account has been compromised or hacked.

National Cybersecurity Alliance, Online Safety Basics (May 26, 2022)

With a little knowledge, a dash of effort, and a few minutes of time, you can keep your sensitive data and computer systems locked down tight. Cybersecurity does not have to be intimidating! It does not require a large investment of time or money! In fact, you can secure your digital life with trusted free tools, and now many cybersecurity best practices can be automated.

SANS #SecureTheFamily | Practical Ways to Stay Safe Online – From Our Experts to Your Home

Heather Mahalik, Digital Forensics Expert, SANS Faculty Fellow, Cellebrite Senior Director of Digital Intelligence, developed the SANS Security Awareness #SecureTheFamily global initiative to help keep your kids, family, and home safe from cyber harm. Leverage these tools to learn practical advice on how to keep your family safe online with a focus on proper device usage and limits for all ages.

Krebs On Security

Krebs on Security is a daily blog on cybersecurity and cybercrime. It’s written by Brian Krebs, an American journalist and investigative reporter.

Cyber Games

The Cybersecurity & Infrastructure Security Agency (CISA) partnered with Pacific Northwest National Laboratory (PNNL) to create a series of cyber games for K-12 students and early career, non-technical cybersecurity professionals that were released via the Apple AppStore and Google Play in 2021.

Defend the Crown –protect castles from potential invasion by deploying various cyber defenses.
Network Collapse – route network packets to the correct destination and apply cyber defense strategies to secure the network while managing growing connections.
Hotel Hijinks – learn about real cybersecurity challenges posed by the Internet of Things (IoT), collect clues, and catalog smart devices to end cyber-attacks and catch hackers.

Comments are closed.