Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...C provides a summary of Law Enforcement Efforts to Combat Internet Auction Fraud. # Lim v. The.TV Corp. Int’l, 99 Cal.App.4th 684 (2002). The court held that the winning bid in an online auction for registration of a domain name could re ...
    3 KB (428 words) - 17:03, 13 April 2011
  • ==Computer Fraud and Abuse Act== ...e who not just commits or attempts to commit an offense under the Computer Fraud and Abuse Act but also those who conspire to do so.<br> ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...ud, but there have also been fraudulent "discoveries", e.g., in scientific fraud, to gain prestige rather than immediate monetary gain. ...s deception, but without the intention of gain or of damaging or depriving the victim. ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...e within a defined area of responsibility. The term is also used to denote the geographical area or subject-matter to which such authority applies. ...and Legislature branches of government to allocate resources to best serve the needs of its native society. ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • ...le I of the ECPA, it covered only wire and oral communications. Title I of the ECPA extended that coverage to electronic communications. ...C. § 2511(1). In general, these prohibitions bars third parties (including the government) from wiretapping telephones and installing electronic "sniffers ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • ...he use of their names to gain access. Thus, the pilots were not “users” of the Web site when they gave authorization. ...nications because its acquisition was contemporaneous with transmission by the users. ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • This Act may be cited as the `Electronic Freedom of Information Act Amendments of 1996'. ...lish and enable enforcement of the right of any person to obtain access to the records of such agencies, subject to statutory exemptions, for any public o ...
    18 KB (2,889 words) - 10:47, 22 May 2010
  • ...te with ID theft, decreased as a percentage of all ID theft complaints for the sixth year in a row. ...of transactions this translates to billions of dollars. In 2006, fraud in the United Kingdom alone was estimated at £535 million or US $750–830 million a ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...-time and stored communications. Despite these amendments, detailed below, the legal regime for obtaining wiretaps and stored communications remains ambig ...monly known as the “[[Stored Communications Act]]” or “SCA.” Title III of the ECPA covers pen registers and trap/trace devices. ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...-time and stored communications. Despite these amendments, detailed below, the legal regime for obtaining wiretaps and stored communications remains ambig ...invaded. Few threats to liberty exist which are greater than that posed by the use of eavesdropping devices.”). ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...er-networked information technology. It is less a distinct field of law in the way that property or contracts are, as it is a domain covering many areas o ...oretically be subject to the laws of all three countries as they relate to the transaction at hand. ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...play on the usual term for unsolicited email of this type, [[Spam|spam]]. The bill was sponsored in Congress by Senators Conrad Burns and Ron Wyden. ...04, the month the law went into effect, less than 1% of spam complied with the CAN-SPAM Act of 2003. ...
    26 KB (4,026 words) - 12:15, 5 May 2011
  • ...tor's actions. Organizations and individuals who are duped or defrauded by the identity thief can also suffer adverse consequences and losses, and to that ...(philosophy)|identity]] as such - more accurate terms would be ''identity fraud'' or impersonation or ''identity cloning'', but ''identity theft'' has beco ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ==Computer Fraud and Abuse Act== ...puter offenses, an amendment in 1994 allows civil actions to brought under the statute, as well. ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...te) and 'Corporate and Auditing Accountability and Responsibility Act' (in the United States House of Representatives) and commonly called '''Sarbanes–Oxl ...e share prices of affected companies collapsed, shook public confidence in the nation's capital market or securities markets. ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...(economics and accounting)s or Service (economics) to consumers with which the trademark appears originate from a unique source, and to distinguish its pr A trademark may be designated by the following symbols: ...
    39 KB (6,281 words) - 14:29, 26 April 2011
  • ...CA. Fourth, in the case of a non-government network, banners may establish the network owner's common authority to consent to a law enforcement search. ...sent and waiver triggered by a particular banner will in general depend on the scope of its language. Here is a checklist of issues to consider when evalu ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...telephone or learn whom the suspect has called. This chapter explains how the electronic surveillance statutes apply to criminal investigations involving ...ply with these statutes may result in civil and criminal liability, and in the case of Title III, may also result in suppression of evidence. ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...eorge W. Bush|President George W. Bush]] on October 26, 2001. The title of the act is a ten letter acronym (USA PATRIOT) that stands for: ...e [[domestic terrorism]], thus enlarging the number of activities to which the USA PATRIOT Act’s expanded law enforcement powers can be applied. ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...cusses the limited circumstances in which statutes or other rules prohibit the government from using search warrants to obtain computers or electronic med ...uld be chosen after considering the many possible roles of the computer in the offense: ...
    138 KB (21,660 words) - 13:18, 5 August 2011
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)