Search results

Jump to navigation Jump to search
  • United States courts use the Miller test for determining whether speech or expression is "obscene," and therefore not pr ...als or pubic area." This definition is used for both child pornography and for federal reporting and record-keeping requirements under 18 U.S.C. § 2257. ...
    6 KB (925 words) - 18:53, 10 April 2011
  • ...omputers merely serve as convenient storage devices for evidence of crime. For example, a drug dealer might keep a list of who owes him money in a file st ...e government with important (and sometimes essential) evidence in criminal cases. The purpose of this publication is to provide Federal law enforcement agen ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • ...explains the constitutional limits of warrantless searches and seizures in cases involving computers. ...investigator or attorney should bear in mind before applying to the court for a warrant. Section C discusses the issues that arise in drafting a computer ...
    10 KB (1,477 words) - 13:29, 5 August 2011
  • .... California, 314 U.S. 252, 270 (1941). This opportunity is to be afforded for "vigorous advocacy" no less than "abstract discussion." N.A.A.C.P. v. Butto As the ACLU v. Reno, 521 U.S. 844 (1997), cases demonstrate, regulation of content over the Internet is challenging in ligh ...
    32 KB (4,920 words) - 19:22, 10 April 2011
  • ...d the needs of their users carefully before selecting particular language. For example, a sensitive government computer network may require a broadly word ...a transiting or stored on this information system may be disclosed or used for any lawful government purpose. ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...re admissible under Federal Rule of Evidence 803(6), the hearsay exception for "records of regularly conducted activity"--or more commonly, the "business ...assertions (e.g., dialing a phone number or punching in a PIN at an ATM). For example, pressing "send" on an email is a command to a system (send this me ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...investigator or attorney should bear in mind before applying to the court for a warrant. Section C discusses the issues that arise in drafting a computer ...use the computer is a repository of data that is contraband (such as child pornography) or because the computer is stolen property; ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...explains the constitutional limits of warrantless searches and seizures in cases involving computers. B. The Fourth Amendment's "Reasonable Expectation of Privacy" in Cases Involving Computers ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ...l immunity to any cause of action that would make service providers liable for information originating with a third-party user of the service”. Zeran v. A EFF maintains an archive of CDA cases: http://www.eff.org/legal/ISP_liability/CDA230/ ...
    38 KB (5,571 words) - 14:45, 10 April 2011
  • ...computers and also discusses how to obtain cell-site location information for cellular phones. ...e regulates the collection of addressing and other non-content information for wire and electronic communications. Title III regulates the collection of a ...
    97 KB (14,928 words) - 13:21, 5 August 2011