Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...ean Union. It is an important component of EU [[privacy]] and human rights law. The right to [[privacy]] is a highly developed area of law in Europe. All the member states of the European Union (EU) are also signat ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • ...w No. 108-187, was S.877 of the 108th United States Congress), signed into law by President of the United States George W. Bush on December 16, 2003, esta ...is key regarding the CAN-SPAM legislation." In January 2004, the month the law went into effect, less than 1% of spam complied with the CAN-SPAM Act of 20 ...
    26 KB (4,026 words) - 12:15, 5 May 2011
  • ...urisdiction]]. Fraud is a crime, and also a [[Civil law (common law)|civil law]] violation. Defrauding people or entities of money or valuables is a commo Types of criminal fraud include: ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...r electronic communications. Title II of ECPA created a new chapter of the criminal code dealing with access to stored communications and transaction records, ...e communication and regulates real-time electronic surveillance in federal criminal investigations. See [[Privacy: Wiretap Act | main article on Wiretap Act]]. ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...r electronic communications. Title II of ECPA created a new chapter of the criminal code dealing with access to stored communications and transaction records, ...e communication and regulates real-time electronic surveillance in federal criminal investigations. See main article on Wiretap Act. 18 U.S.C. §§ 2510-2522 was ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • # It must be prepared by an applicant identified as a law enforcement or investigative officer. The application must be in writing, s ...ates that each affiant swears to the entire affidavit. If a State or local law enforcement officer is the affiant in a Federal electronic surveillance aff ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • ...about each other. Issues have also been raised that privacy can encourage criminal activity as it makes it easier for criminals to hide their unlawful activit ...other information categories that often receive special treatment in state law.<br> ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ...d to disclose electronic communications pursuant to a civil--as opposed to criminal--discovery subpoena"). ...cords or other information sought, are relevant and material to an ongoing criminal investigation.” 18 U.S.C. § 2703(d); see also In re United States for an Or ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • * Criminal identity theft (posing as another person when apprehended for a crime) === Criminal identity theft === ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...''Sarbanes–Oxley''', '''SarBox''' or '''SOX''', is a United States federal law enacted on July 30, 2002. It is named after sponsors U.S. Senator Paul Sarb ...mmission (SEC) to implement rulings on requirements to comply with the new law. Harvey Pitt, the 26th chairman of the United States Securities and Exchang ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • :::'''(ii)''' the offense was committed in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United Stat :'''(10)''' the term "conviction" shall include a conviction under the law of any State for a crime punishable by imprisonment for more than 1 year, a ...
    15 KB (2,463 words) - 11:31, 1 May 2010
  • ...d. The Court declined to exercise supplemental jurisdiction over the state law claim in the interest of comity. ...purposes of the Stored Communications Act. The court further held that the law excepted from liability defendants’ accessing of those cookies as a party t ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • ...banners may establish the network owner's common authority to consent to a law enforcement search. ...o real-time interception pursuant to 18 U.S.C. § 2511(2)(c) (monitoring by law enforcement agency) or § 2511(2)(d) (provider monitoring). ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...ing a customer's ZIP code is illegal in California, where the state's 1971 law prohibits merchants from requesting or requiring a card-holder's "personal Application fraud happens when a criminal uses stolen or fake documents to open an account in another person's name. ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ==Law in Canada== ...ts under other legislation, federal anti-spam legislation, identity theft/ criminal code etc.) that govern the protection of personal information in the privat ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • # Marczeski v. Law, 122 F.Supp.2d 315, 327 (D. Conn. 2000) (individual who created private “ch ...nc. v. Keynetics, Inc., 422 F. Supp. 2d 523 (D. Md. 2006) (state anti-spam law); Doe v. MySpace, 528 F.3d 413 (5th Cir. 2008). (negligence and gross negli ...
    38 KB (5,571 words) - 14:45, 10 April 2011
  • ...re ideas, and are protected as such; protection of inventions under patent law does not require that the invention be represented in a physical embodiment ...e and arrangement of words, musical notes, colors and shapes. So copyright law protects the owner of property rights against those who copy or otherwise t ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...r 12, 1998 by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended [[Title 17 ...mances and Phonograms Treaties Implementation Act]], amends U.S. copyright law to comply with the WIPO Copyright Treaty and the WIPO Performances and Phon ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...otected computer.”18 U.S.C. § 1030. While the CFAA is primarily a criminal law intended to reduce the instances of malicious interferences with computer s There are seven types of criminal activity enumerated in the CFAA: obtaining national security information, c ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...d. This chapter explains how the electronic surveillance statutes apply to criminal investigations involving computers and also discusses how to obtain cell-si ...Act of 1986. Failure to comply with these statutes may result in civil and criminal liability, and in the case of Title III, may also result in suppression of ...
    97 KB (14,928 words) - 13:21, 5 August 2011
View ( | ) (20 | 50 | 100 | 250 | 500)