Search results

Jump to navigation Jump to search
View ( | next 20) (20 | 50 | 100 | 250 | 500)
  • ...ernment. A government entity generally must provide a subpoena, warrant or court order to obtain information about a user that is stored by the communicatio ...§ 3121-3127 governs pen registers and trap and trace devices, empowering a court to issue an order “authorizing the installation and use of a pen register o ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...erfeit Access Device and Abuse Act that was passed in 1984 and essentially states that, whoever intentionally accesses a computer without authorization or ex ...usively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...communications are fully protected by the Fourth Amendment. Katz v. United States, 389 U.S. 347, 353-354 (1967). The Government must satisfy stringent proced However, the Supreme Court has found no reasonable expectation of privacy in telephone numbers dialed ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...em administrator's common authority to consent to a search under to United States v. Matlock, 415 U.S. 164 (1974). (2) WARNING! This computer system is the property of the United States Department of Justice and may be accessed only by authorized users. Unautho ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...v. Associated Press, 52 F. Supp. 362, 372 (S.D.N.Y. 1943) (opinion of the court by Judge Learned Hand), aff'd, 326 U.S. 1 (1945) ...hallenge in numerous jurisdictions, with varying results. The U.S. Supreme Court ultimately resolved the circuit split and held sections of the CPPA to be o ...
    32 KB (4,920 words) - 19:22, 10 April 2011
  • ...ick “I agree” (or a similar form of consent) to view the site in full. The court distinguished “shrinkwrap license” agreements from the Ticketmaster terms a ...software in violation of Adobe’s End User License Agreement (“EULA”). The court held that the transfer of the software to the plaintiff was a sale, not a l ...
    18 KB (2,884 words) - 17:00, 13 April 2011
  • ...the same and fails to deliver it to the officer or employee of the United States entitled to receive it; (B) information from any department or agency of the United States; or ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...luded that the potential infringement at issue did not occur in the United States because it “was only completed in Canada once the signal was received and v ...ating system's error log while diagnosing a problem with the computer, the court found that the representation in RAM was "sufficiently permanent or stable ...
    27 KB (4,215 words) - 07:04, 11 April 2011
  • ...mmonly called '''Sarbanes–Oxley''', '''SarBox''' or '''SOX''', is a United States federal law enacted on July 30, 2002. It is named after sponsors U.S. Senat ...s to comply with the new law. Harvey Pitt, the 26th chairman of the United States Securities and Exchange Commission (SEC), led the SEC in the adoption of do ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...ation of Title III to use a pen register or trap and trace device); United States Telecom Ass'n v. FCC, 227 F.3d 450, 453-54 (D.C. Cir. 2000) (contrasting pe ...essing information for phone calls and individual Internet packets using a court order. Conversely, the interception of email contents, including the subjec ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...gration authorities in detaining and deporting [[Immigration in the United States|immigrants]] suspected of terrorism-related acts. The act also expanded the ...House of Representatives|House]] by 357 to 66 (of 435) and in the [[United States Senate|Senate]] by 98 to 1 and was supported by members of both the Republi ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...ns any investigator or attorney should bear in mind before applying to the court for a warrant. Section C discusses the issues that arise in drafting a comp ...minal evidence will be found in the place searched. See Brinegar v. United States, 338 U.S. 160, 175 (1949). Once a magistrate judge finds probable cause and ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...f the Internet has been subject to fierce debate, especially in the United States. ...f the Internet Protocol, has called the term net neutrality a "slogan" and states that he opposes establishing it, but he admits that he is against the fragm ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...No. C 4047, 2002 FTC LEXIS 22 (Fed. Trade Comm’n May 8, 2002), wherein the Court issued an order in conformance with the terms of the above settlement agree (4) United States v. The Ohio Art Co., Civ. Action No. 027203 (N.D. Ohio 2002); File No. 022- ...
    31 KB (4,666 words) - 13:19, 26 April 2011
  • The Fourth Amendment states: ...izure. See Berger v. New York, 388 U.S. 41, 59-60 (1967). Furthermore, the Court has held that a "'search' occurs when an expectation of privacy that societ ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • Section 230 of Title 47 of the United States Code (47 U.S.C. § 230) was passed as part of the much-maligned Communicatio ...to evade the reach of the CDA." 640 F. Supp. 2d at 1196. Furthermore, the court stressed that the CDA “must be interpreted to protect websites not merely f ...
    38 KB (5,571 words) - 14:45, 10 April 2011
View ( | next 20) (20 | 50 | 100 | 250 | 500)