Search results

Jump to navigation Jump to search
View ( | next 20) (20 | 50 | 100 | 250 | 500)
  • ===Federal Law=== ...Prompt Delivery Rules,”; (iiii) “How to Comply with the Children’s Online Privacy Protection Rule,” http://www.ftc.gov/bcp/conline/pubs/buspubs/coppa.htm. ...
    16 KB (2,394 words) - 13:40, 26 April 2011
  • ...d content of any User's activities involving Company Internet Resources to law enforcement officials or other third parties without any prior notice to th :'''F. Privacy Expectations''' ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ...Trade Commission has actively asserted its authority to challenge Internet privacy policies and practices that may be “unfair and deceptive” and thus violate In 1998, the FTC announced four elements necessary to protecting consumer privacy: ...
    31 KB (4,666 words) - 13:19, 26 April 2011
  • ...mulgate standards and guidance pertaining to the efficiency, security, and privacy of Federal computer systems. Authorizes the President to disapprove or modi ...e pilot program four years after its establishment, unless reauthorized by law.<br> ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • The Administration Simplification provisions also address the security and privacy of health data. The standards are meant to improve the efficiency and effec ...S has promulgated five rules regarding Administrative Simplification: the Privacy Rule, the Transactions and Code Sets Rule, the Security Rule, the Unique Id ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...of any User's activities involving Company Telecommunications Resources to law enforcement officials or other third parties without any prior notice to th :'''I. Privacy Expectations'''<br> ...
    10 KB (1,473 words) - 14:13, 1 May 2010
  • ...m's subpoena may not be enforced consistent with the plain language of the Privacy Act because the exceptions enumerated in § 2702(b) do not include civil dis ...are revealed. However, the case was mooted on appeal by changes to the NSL law. ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • ...d States District Court or Court of Appeals judge, a wiretap order permits law enforcement to intercept communications for up to thirty days. 18 U.S.C. §§ ...eeds to protect their rights and property with their subscribers' right to privacy in their communications. See United States v. Harvey, 540 F.2d 1345, 1351 ( ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • # It must be prepared by an applicant identified as a law enforcement or investigative officer. The application must be in writing, s ...er under circumstances where the parties enjoy a reasonable expectation of privacy. 18 U.S.C. § 2510(2). An "electronic communication" most commonly involves ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • * Low security/privacy protection on photos that are easily clickable and downloaded on social net ...ion of personal identifiers is made possible through serious breaches of [[privacy]]. For consumers, this is usually a result of them naively providing their ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...banners may establish the network owner's common authority to consent to a law enforcement search. ...on of privacy in the network? A user who lacks a reasonable expectation of privacy in a network will not be able to claim that any search of the network viola ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ;Absolute non-discrimination: Columbia Law School professor Tim Wu: "Network neutrality is best defined as a network d ;First come first served: According to Imprint Magazine, Cardozo Law School professor Susan P. Crawford "believes that a neutral Internet must f ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ....S.C. §§ 3121-3127, first passed as part of the Electronic Communications Privacy Act of 1986. Failure to comply with these statutes may result in civil and ...ents (much like a letter inside an envelope). The Pen/Trap statute permits law enforcement to obtain the addressing information of Internet communications ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...") is an [[Act of Congress|Act of the U.S. Congress]] that was signed into law by [[George W. Bush|President George W. Bush]] on October 26, 2001. The tit ...ired (to) Intercept (and) Obstruct Terrorism ''Act of 2001''.<ref>[[Public Law]] {{USPL|107|56}}</ref> ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...ires a warrant. First, does the search violate a reasonable expectation of privacy? And if so, is the search nonetheless permissible because it falls within a B. The Fourth Amendment's "Reasonable Expectation of Privacy" in Cases Involving Computers ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ...rized by a warrant may be opened immediately; the individual's interest in privacy must give way to the magistrate's official determination of probable cause. ...___, 2009 WL 2151348 (9th Cir. July 21, 2009), the Ninth Circuit held that law enforcement is not necessarily entitled to examine a computer that may cont ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...fsky v. Gilmore, 167 F.3d 191 (4th Cir. 1999). The court upheld a Virginia law restricting state employees from accessing “sexually explicit” material on ...nst educators at his school, was not a “true threat” under First Amendment law. The court nonetheless upheld the student’s suspension by the school distri ...
    32 KB (4,920 words) - 19:22, 10 April 2011
View ( | next 20) (20 | 50 | 100 | 250 | 500)