Despite its downside, UCITA is gaining acceptance throughout the U.S. How does this act impact on the governance of software and networking services?
Ed. Note: This will be Jim Warren's last Access column for a while. He is taking a breather from his columns to, as he said, "discover if there really is life beyond the computer terminal." We appreciate his contributions to Government Technology for the past three years and hope he'll return soon. We'll leave the light on... Next month we welcome Harry Hammitt, publisher of Access Reports who will continue the Access column.
Privacy Bill's Unintended Consequences
Online Political Debates: Make Substance and Clarity Count
Is the Internet Just for the Elite?
Ballot Access & Digital Signatures
Holding Back the Sunrise
Pricing Policies for Public Records
Balancing Voters' Privacy and Access Rights
Voter Access to Empower Grassroots Participation
Low-Cost Computerized Political Disclosures
How to Solve Cybersex Hysteria
Online Text is Not Like Printed Text
Bandits on the Information Superhighway
Telecom Power Grab Under Wraps
Wish-List for NewtNet
Help Fix the Digital Telephony Mistake