Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...ternational standard for [[Compliance#ITIL_IT_Infrastructure_Library: | IT Service Management]]. It was developed in 2005, by the BSI Group. It is based on an ...f service management processes that are essential for the delivery of high quality services.<br> ...
    2 KB (298 words) - 14:25, 23 April 2010
  • The purposes of this sub-chapter are to:<br> ...al and tribal governments, and other persons resulting from the collection of information by or for the Federal Government;<br> ...
    3 KB (414 words) - 10:37, 1 June 2010
  • ...r balance between the need for change and the potential detrimental impact of changes. ...ing and recording of changes, assessing the impact, cost, benefit and risk of proposed changes, developing business justification and obtaining approval, ...
    4 KB (523 words) - 10:24, 23 April 2010
  • ...introduced to software that had no obvious requirement other than the whim of the application developer. Quite often these unnecessary changes introduced ...computer and computer network and or network environments are the upgrade of operating systems, network routing tables or the electrical power systems s ...
    3 KB (533 words) - 14:15, 23 April 2010
  • ...d to seek the buyer's consent in case of delay. The FTC provides a summary of Law Enforcement Efforts to Combat Internet Auction Fraud. ...lt in an enforceable contract, giving rise to a cause of action for breach of contract. ...
    3 KB (428 words) - 17:03, 13 April 2011
  • ...Title I of the ECPA, it covered only wire and oral communications. Title I of the ECPA extended that coverage to electronic communications. Table of contents [hide] ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • ...Software Engineering Institute (SEI). Like any model, it is an abstraction of an existing system. Unlike many that are derived in academia, this model is ...) was originally developed as a tool for objectively assessing the ability of government contractors' ''processes'' to perform a contracted software proj ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...as to its condition, quality, or value." Id. (quoting Restatement (Second) of Torts § 218(b)). ...ent legal protection of the possessor's interest in the mere inviolability of his chattel is afforded by his privilege to use reasonable force to protect ...
    13 KB (1,987 words) - 10:22, 12 April 2011
  • ...o providing the full content of this wiki-based project to the public free of charge.<br> ...unity project. The intention is ultimately to raise the proficiency level of information security auditors, security practitioners, lawyers and legal pr ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...independent and have been developed to provide guidance across the breadth of IT infrastructure, development, and operations. ...[http://www.ogc.gov.uk/ Office of Government Commerce] (OGC). The content of the books is also protected by Crown Copyright. ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...r work to which the state law claim is being applied falls within the type of works protected by the Copyright Act under Sections 102 and 103. See 17 U.S ...s activities were a competitive effect on the NBA’s market and any showing of free riding on Motorola’s part. ...
    10 KB (1,594 words) - 10:19, 12 April 2011
  • ...om a unique source, and to distinguish its products or services from those of other entities. *'''service mark symbol ℠''' (for an unregistered service mark, that is, a mark used to promote or brand services) ...
    39 KB (6,281 words) - 14:29, 26 April 2011
  • '''Electronic data interchange''' ('''EDI''') is the structured transmission of data between organizations by electronic means. It is used to transfer elec ...cks with appropriate EDI messages. It also refers specifically to a family of standards. ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ...1127. Service marks identify services as opposed to goods. Trademarks and service marks must be generally distinctive. ...connection with the sale, offering for sale, distribution, or advertising of any goods or services on or in connection” therewith when “such use is like ...
    17 KB (2,794 words) - 10:00, 13 April 2011
  • ...tent, sites, platforms, types of equipment that may be attached, and modes of communication. ...owever.) The possibility of regulations designed to mandate the neutrality of the Internet has been subject to fierce debate, especially in the United St ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...y widely according to whether the risk management method is in the context of project management, security, risk analysis, industrial processes, financia ...negative effect of the risk, and accepting some or all of the consequences of a particular risk. ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...Administrative Simplification (AS) provisions, requires the establishment of national standards for electronic health care transactions and national ide ...eness of the nation's health care system by encouraging the widespread use of [[electronic data interchange]] in the U.S. health care system. ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming f ...occurrence but lower loss vs. a risk with high loss but lower probability of occurrence can often be mishandled.<br> ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, and symbols, names, imag ...their performances, producers of phonograms in their recordings, and those of broadcasters in their radio and television programs. For an introduction to ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...s a judicially created defense and was later codified in the Copyright Act of 1976. Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 576 (1994). 17 U.S.C. § 107 defines fair use as a limitation on the exclusive rights of copyright. ...
    31 KB (4,913 words) - 07:20, 11 April 2011
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)