Search results

Jump to navigation Jump to search
  • ..., Inc., 489 U.S. 141 (1989). Therefore, anything that does not fall within the domain of patent or copyright law may be protectable as a trade secret unde ...used improper means, in breach of a confidential relationship, to acquire the trade secret. See, e.g., Data Gen. Corp. v. Grumman Sys. Support Corp., 36 ...
    7 KB (1,065 words) - 16:48, 13 April 2011
  • ...989) ("Sexual expression which is indecent but not obscene is protected by the First Amendment"). ...whether speech or expression is "obscene," and therefore not protected by the First Amendment. That means it can legally be banned. ...
    6 KB (925 words) - 18:53, 10 April 2011
  • ...unishes anyone who not just commits or attempts to commit an offense under the Computer Fraud and Abuse Act but also those who conspire to do so.<br> The CFAA has specifically defined “protected computers” under [[USC 18 1030 | U ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...actured or sold by others and to indicate the source of the goods, even if the source is unknown. 15 U.S.C. § 1127. Service marks identify services as opp ...feit, copy, or colorable imitation of a registered mark in connection with the sale, offering for sale, distribution, or advertising of any goods or servi ...
    17 KB (2,794 words) - 10:00, 13 April 2011
  • ...te with ID theft, decreased as a percentage of all ID theft complaints for the sixth year in a row. ...of transactions this translates to billions of dollars. In 2006, fraud in the United Kingdom alone was estimated at £535 million or US $750–830 million a ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...l publications," even those not generally distributed to the public, while the discovery rule does not apply even when a publication is given only limited ...first posted on the newspaper’s website, not October 10, 1997, the date of the print edition. ...
    17 KB (2,553 words) - 14:51, 10 April 2011
  • ...-time and stored communications. Despite these amendments, detailed below, the legal regime for obtaining wiretaps and stored communications remains ambig ...monly known as the “[[Stored Communications Act]]” or “SCA.” Title III of the ECPA covers pen registers and trap/trace devices. ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...s Code]] to extend the reach of copyright, while limiting the liability of the Online service provider for [[copyright infringement]] by their users. ...nion directives usually requires separate legislation by or within each of the Union's member states.) ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...(economics and accounting)s or Service (economics) to consumers with which the trademark appears originate from a unique source, and to distinguish its pr A trademark may be designated by the following symbols: ...
    39 KB (6,281 words) - 14:29, 26 April 2011
  • The growth of the Web and other Internet technologies has and will continue to raise a number of copyright issues co ...ged material and (2) violation by the alleged infringer of at least one of the exclusive rights granted to copyright holders.”). ...
    27 KB (4,215 words) - 07:04, 11 April 2011
  • ...-time and stored communications. Despite these amendments, detailed below, the legal regime for obtaining wiretaps and stored communications remains ambig ...invaded. Few threats to liberty exist which are greater than that posed by the use of eavesdropping devices.”). ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...CA. Fourth, in the case of a non-government network, banners may establish the network owner's common authority to consent to a law enforcement search. ...sent and waiver triggered by a particular banner will in general depend on the scope of its language. Here is a checklist of issues to consider when evalu ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...mputer records in court, including hearsay and the foundation to establish the authenticity of computer records. ...do not define an "assertion." However, courts have held that "the term has the connotation of a positive declaration." See, e.g., United States v. Lewis, ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...sk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on ...er probability of occurrence and lower loss are handled later. In practice the process can be very difficult, and balancing between risks with a high prob ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...puter offenses, an amendment in 1994 allows civil actions to brought under the statute, as well. ==How the CFAA Works== ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...te) and 'Corporate and Auditing Accountability and Responsibility Act' (in the United States House of Representatives) and commonly called '''Sarbanes–Oxl ...e share prices of affected companies collapsed, shook public confidence in the nation's capital market or securities markets. ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...telephone or learn whom the suspect has called. This chapter explains how the electronic surveillance statutes apply to criminal investigations involving ...with these statutes may result in civil and criminal liability, and in the case of Title III, may also result in suppression of evidence. ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...cusses the limited circumstances in which statutes or other rules prohibit the government from using search warrants to obtain computers or electronic med ...uld be chosen after considering the many possible roles of the computer in the offense: ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...eorge W. Bush|President George W. Bush]] on October 26, 2001. The title of the act is a ten letter acronym (USA PATRIOT) that stands for: ...e [[domestic terrorism]], thus enlarging the number of activities to which the USA PATRIOT Act’s expanded law enforcement powers can be applied. ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...to search for and seize evidence without a warrant. This chapter explains the constitutional limits of warrantless searches and seizures in cases involvi The Fourth Amendment states: ...
    154 KB (23,956 words) - 13:16, 5 August 2011