Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...cceptable security practices for such systems. It requires the creation of computer security plans, and the appropriate training of system users or owners wher * Requires establishment of security policies for Federal computer systems that contain sensitive information. ...
    1 KB (168 words) - 11:37, 23 May 2010
  • ...de to the Emerging Legal Issues 14 ( Joseph F. Ruh, Jr., ed., The Computer Law Association 1996). ...
    1 KB (144 words) - 12:26, 16 October 2014
  • ...ines "message" means the digital representation of information (generally, computer-based information), "document" means information inscribed on a tangible me ...
    1 KB (161 words) - 12:29, 16 October 2014
  • ...ting UCC2B consisted of both members from NCCUSL and members of [[American Law Institute]] (ALI). At certain stage of the process, ALI has withdrawn from ...final "as read" UCITA document is what is actually passed and signed into law by each state governor. The passage record typically indicates each versio ...
    2 KB (317 words) - 11:12, 30 October 2011
  • ...s version published in September 2002. During this seven-year period, case law related to electronic evidence has developed significantly. Of particular n ...tory effect, confers no rights or remedies, and does not have the force of law or a U.S. Department of Justice directive. See United States v. Caceres, 44 ...
    3 KB (438 words) - 12:32, 5 August 2011
  • ...is a term used in Title 18, Section 1030 of the United States Code, (the [[Computer Fraud and Abuse Act]]) which prohibits a number of different kinds of condu <blockquote>a computer—<br/> ...
    5 KB (773 words) - 11:40, 27 August 2011
  • Alabama Computer Crime Act — Ala. Code §§ 13A-8-100 to 13A-8-103 Colo. Rev. Stat. tit. 18, art. 5.5 — Computer crime<br> ...
    9 KB (1,358 words) - 22:11, 5 September 2011
  • ...n enjoining enforcement of a state statute, criminalizing dissemination by computer of material “harmful to a minor.” ...e, prohibiting dissemination of “sexually explicit” materials to minors by computer. ...
    4 KB (639 words) - 19:02, 10 April 2011
  • ...' is a California law regulating the privacy of personal information. The law was introduced by California State Senator Peace on February 12, 2002, and [[Category:Computer law]] ...
    3 KB (522 words) - 13:52, 26 October 2011
  • ...er might keep a list of who owes him money in a file stored in his desktop computer at home, or a money laundering operation might retain false financial recor ...e in criminal cases. The purpose of this publication is to provide Federal law enforcement agents and prosecutors with systematic guidance that can help t ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • ==Common Law Rule== At common law, one who “repeats” the statements of another is just as responsible for the ...
    6 KB (919 words) - 14:33, 10 April 2011
  • # [[Copyright Non-Preemptable Common Law Claims]] # [[Uniform Computer Information Transactions Act]] ...
    2 KB (209 words) - 09:53, 13 April 2011
  • ...ted by copyright law and (ii) where the particular work to which the state law claim is being applied falls within the type of works protected by the Copy ...he copyright rule of preemption that allows an individual to bring a state law misappropriation claim for “hot news.” National Basketball Ass’n v. Motorol ...
    10 KB (1,594 words) - 10:19, 12 April 2011
  • ==Break down of the law== ...law requires a record to be in writing, an electronic record satisfies the law.'' ...
    9 KB (1,499 words) - 11:31, 30 October 2011
  • ...M.J. 57 (CAAF 2006) (finding REOP in emails defendant sent from her office computer and in emails stored on government server); Quon v. Arch Wireless, 445 F. S ...ndercover federal agents looked over his shoulder, when he did not own the computer he used, and when he knew that the system administrator could monitor his a ...
    5 KB (848 words) - 13:21, 26 April 2011
  • ...substance from public international law, conflict of laws, constitutional law and the powers of the Executive (government) and Legislature branches of go ...sdictional basis to avoid constitutional challenge. The subsections of the Computer Fraud and Abuse Act reflect different jurisdictional bases.[[FN20]] ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • ...f patent or copyright law may be protectable as a trade secret under state law. ...iring employees to sign confidentiality agreements, MAI Sys. Corp. v. Peak Computer, 991 F.2d 511, 521 (9th Cir. 1993), and keeping secret documents under lock ...
    7 KB (1,065 words) - 16:48, 13 April 2011
  • ==Computer Fraud and Abuse Act== ...hes anyone who not just commits or attempts to commit an offense under the Computer Fraud and Abuse Act but also those who conspire to do so.<br> ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...or intermeddling with a chattel in the possession of another.” The common law form of trespass requires actual harm with intent to harm and physical cont ...thout authorization interfered with plaintiff's possessory interest in the computer system; and (2) defendant's unauthorized use proximately resulted in damage ...
    13 KB (1,987 words) - 10:22, 12 April 2011
  • :'''(1)''' having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such :'''(2)''' intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains--<b ...
    15 KB (2,463 words) - 11:31, 1 May 2010
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)