Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...sel II believed that such an international standard could help protect the international financial system from the types of problems that might arise should a major ...cord to Incorporate Market Risks, and the November 2005 paper on Basel II: International Convergence of Capital Measurement and Capital Standards: A Revised Framewo ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ...re ideas, and are protected as such; protection of inventions under patent law does not require that the invention be represented in a physical embodiment ...e and arrangement of words, musical notes, colors and shapes. So copyright law protects the owner of property rights against those who copy or otherwise t ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...overy solutions. A function may also be considered critical if dictated by law. ===International Organization for Standardization=== ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ...as such terms are defined in paragraphs (1) and (3) of section 1(b) of the International Banking Act of 1978); and<br> :'''(10)''' the term "conviction" shall include a conviction under the law of any State for a crime punishable by imprisonment for more than 1 year, a ...
    15 KB (2,463 words) - 11:31, 1 May 2010
  • ...r section 21 of the Federal Deposit Insurance Act or section 123 of Public Law 91-508, is liable to the United States Government for a civil penalty of no (7) Penalties for international counter money laundering violations.--The Secretary may impose a civil mone ...
    9 KB (1,369 words) - 23:09, 1 November 2012
  • ===Pre-Anti-Cybersquatting Consumer Protection Act case law=== ...ors used to determine bad faith weighed in favor of Societe, in particular International Bancorp’s intent to divert consumers from Societe’s Web site. ...
    29 KB (4,582 words) - 10:16, 13 April 2011
  • ...r 12, 1998 by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended [[Title 17 ...mances and Phonograms Treaties Implementation Act]], amends U.S. copyright law to comply with the WIPO Copyright Treaty and the WIPO Performances and Phon ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...''Sarbanes–Oxley''', '''SarBox''' or '''SOX''', is a United States federal law enacted on July 30, 2002. It is named after sponsors U.S. Senator Paul Sarb ...number of major accounting scandals including those affecting Enron, Tyco International, Adelphia Communications Corporation, Peregrine Systems and WorldCom. These ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ==Law in Canada== Interprovincial and international collection, use and disclosure of personal information ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • ...well defined, written objectives. Corporate governance must go well beyond law. The quantity, quality and frequency of financial and managerial disclosur ...rule, compliance with these governance recommendations is not mandated by law, although the codes linked to stock exchange listing requirements may have ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ...st attacks, the controversial Act expands the type of information to which law enforcement officials may obtain access and permits service providers to di <li>Section 210 increases the types of information to which law enforcement officials may obtain access by requiring them to meet only the ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...rds sought “are relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities....” 18 U.S.C. § 2709, as ...are revealed. However, the case was mooted on appeal by changes to the NSL law. ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • ...st attacks, the controversial Act expands the type of information to which law enforcement officials may obtain access and permits service providers to di # Section 210 increases the types of information to which law enforcement officials may obtain access by requiring them to meet only the ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ;Absolute non-discrimination: Columbia Law School professor Tim Wu: "Network neutrality is best defined as a network d ;First come first served: According to Imprint Magazine, Cardozo Law School professor Susan P. Crawford "believes that a neutral Internet must f ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...n the US are incorporated under corporate administration friendly Delaware law, and because the US's wealth has been increasingly securitized into various ...chael Jensen's "The Separation of Ownership and Control" (1983, Journal of Law and Economics) firmly established agency theory as a way of understanding c ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...ing a customer's ZIP code is illegal in California, where the state's 1971 law prohibits merchants from requesting or requiring a card-holder's "personal ...rather just the credit card account number itself is stolen, then Federal Law guarantees card holders have zero liability to the credit card issuer. ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...otected computer.”18 U.S.C. § 1030. While the CFAA is primarily a criminal law intended to reduce the instances of malicious interferences with computer s ...caused deletion of files would violate the Computer Fraud and Abuse Act." International Airport Centers, L.L.C. v. Citrin, 440 F.3d 418 (7th Cir. March 8, 2006). ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...") is an [[Act of Congress|Act of the U.S. Congress]] that was signed into law by [[George W. Bush|President George W. Bush]] on October 26, 2001. The tit ...ired (to) Intercept (and) Obstruct Terrorism ''Act of 2001''.<ref>[[Public Law]] {{USPL|107|56}}</ref> ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...d in Canada constituted an act of direct infringement under U.S. copyright law. The court concluded that the potential infringement at issue did not occur ...ty Studios, 464 U.S. 417, 434 (1984), courts have developed several common law doctrines of secondary liability: contributory infringement, vicarious infr ...
    27 KB (4,215 words) - 07:04, 11 April 2011
  • ...banners may establish the network owner's common authority to consent to a law enforcement search. ...o real-time interception pursuant to 18 U.S.C. § 2511(2)(c) (monitoring by law enforcement agency) or § 2511(2)(d) (provider monitoring). ...
    83 KB (12,981 words) - 12:42, 5 August 2011
View ( | ) (20 | 50 | 100 | 250 | 500)