Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...that collects, uses or discloses personal information. To comply with the law businesses must, inter alia: disclose the purpose of the data collection an ...ility for educating and assisting organizations in relation to the privacy law. The legislation establishes the National Privacy Principles (the “NPPs”) a ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • ...y that property or contracts are, as it is a domain covering many areas of law and regulation. Some leading topics include [[intellectual property]], [[p ...sdictional code, legal practitioners are generally left with a conflict of law issue. ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...he Secretary of Commerce of standards and guidelines pertaining to Federal computer systems; (5) designate executive agents for information technology acquisit ...ive such standards when compliance would adversely affect the mission of a computer operator or cause a major adverse financial impact on such operator which i ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...that vary with the community and from one nation to another. Under current law, the legal question of whether speech is obscene is determined partly by re ...patently offensive way, sexual conduct specifically defined by applicable law; ...
    6 KB (925 words) - 18:53, 10 April 2011
  • #[[5 Ways to Make Your Law Office More Profitable | 5 Ways to Make Your Law Office More Profitable]] ...ment in Law Firms | Avoid the Run-Around: Smarter Facilities Management in Law Firms]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...tors must consider two issues when asking whether a government search of a computer requires a warrant. First, does the search violate a reasonable expectation ...om using search warrants to obtain computers or electronic media. A sample computer search warrant appears in Appendix F. ...
    10 KB (1,477 words) - 13:29, 5 August 2011
  • ===Computer Fraud and Abuse Act=== ...munication.” 18 U.S.C. § 1030(a)(2)(C), (g). The CFAA targets attacks on computer systems that cause damage or destruction to electronic data. See ''Int'l Ai ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...ean Union. It is an important component of EU [[privacy]] and human rights law. The right to [[privacy]] is a highly developed area of law in Europe. All the member states of the European Union (EU) are also signat ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • ...ing, National Security and the “Adverse Inference” Problem, 22 SANTA CLARA COMPUTER & HIGH TECH. L.J. 757, 764-766 (2006); Susan Freiwald, Uncertain Privacy: C ===Computer Fraud and Abuse Act=== ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...in connection therewith, subpart A, of this part or any provision of state law that supersedes any provision of subpart B, and in connection therewith, su (2) Examples. Examples of a bona fide error include clerical, calculation, computer malfunction and programming, and printing errors, except that an error of l ...
    4 KB (689 words) - 12:28, 16 October 2014
  • ...in connection therewith, subpart A, of this part or any provision of state law that supersedes any provision of subpart B, and in connection therewith, su (2) Examples. Examples of a bona fide error include clerical, calculation, computer malfunction and programming, and printing errors, except that an error of l ...
    4 KB (689 words) - 12:30, 16 October 2014
  • ...t filed against defendant for allegedly using banner ads that impersonated computer error messages that tricked users into visiting defendant’s website). ===Federal Law=== ...
    16 KB (2,394 words) - 13:40, 26 April 2011
  • ...group's interest is to keep the information private. One of the goals of [[computer security]] is [[confidentiality]]. [[Identity theft]], for example, is a se ...other information categories that often receive special treatment in state law.<br> ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ...r 12, 1998 by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended [[Title 17 ...mances and Phonograms Treaties Implementation Act]], amends U.S. copyright law to comply with the WIPO Copyright Treaty and the WIPO Performances and Phon ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ==Law in Canada== * The organization is instructed to refrain from doing so by a law enforcement agency that is investigating the theft, loss or unauthorized ac ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • ...urisdiction]]. Fraud is a crime, and also a [[Civil law (common law)|civil law]] violation. Defrauding people or entities of money or valuables is a commo ...g identity and legitimacy online, and the simplicity with which [[cracker (computer security)|cracker]]s can divert browsers to dishonest sites and steal credi ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...action claims under the Wiretap Act, the Stored Communications Act and the Computer Fraud and Abuse Act. Pharmatrak sold a service to pharmaceutical companies ...g or disclosing information gained from unauthorized access to a protected computer in violation of the CFAA. Defendant did not immediately surrender his lapto ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • ...ated Virginia Computer Crimes Act's prohibition against use of computer or computer network without authority and with the intent to convert the property of an ...al jurisdiction over company and president. West's Ann.Md.Code, Commercial Law, § 14-3001. MaryCLE, LLC v. First Choice Internet, Inc., 166 Md. App. 481, ...
    8 KB (1,176 words) - 10:17, 5 May 2011
  • ...w No. 108-187, was S.877 of the 108th United States Congress), signed into law by President of the United States George W. Bush on December 16, 2003, esta ...is key regarding the CAN-SPAM legislation." In January 2004, the month the law went into effect, less than 1% of spam complied with the CAN-SPAM Act of 20 ...
    26 KB (4,026 words) - 12:15, 5 May 2011
  • ...rs shall abide by and comply with any and all copyright laws pertaining to computer software and by any software license agreements that are legally applicable ...ftware installation or use on Company Electronic Communications Systems to law enforcement officials or other third parties without any prior notice to th ...
    7 KB (953 words) - 14:13, 1 May 2010
View ( | ) (20 | 50 | 100 | 250 | 500)