Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...cing Warner & Co. v. Eli Lilly & Co., 265 U.S. 526 (1924) (applying common law concept of contributory infringement). ...ena, 839 F. Supp. 1552 (M.D. Fla. 1993). Defendant operated a subscription computer bulletin board service that distributed unauthorized copies of copyrighted ...
    8 KB (1,249 words) - 10:18, 13 April 2011
  • ...banners may establish the network owner's common authority to consent to a law enforcement search. ...o real-time interception pursuant to 18 U.S.C. § 2511(2)(c) (monitoring by law enforcement agency) or § 2511(2)(d) (provider monitoring). ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...d States District Court or Court of Appeals judge, a wiretap order permits law enforcement to intercept communications for up to thirty days. 18 U.S.C. §§ ...cations if it is configured such that keystrokes are not recorded when the computer's modem is in use). ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • ...music, paintings and sculptures, films and technology-based works such as computer programs and electronic databases. In most European languages other than En ...re ideas, and are protected as such; protection of inventions under patent law does not require that the invention be represented in a physical embodiment ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...e of federal trademark law and would “create a species of mutant copyright law that limits the public’s federal right to copy and use." Id. at 2048 (inter ...d at providing travel and lodging arrangements for travelers to the Comdex computer convention run by Key3Media, infringed Key3Media’s registered trademark COM ...
    17 KB (2,794 words) - 10:00, 13 April 2011
  • ...okseller providing forum for others to submit book reviews is “interactive computer service” provider (“ICS provider”)); # Marczeski v. Law, 122 F.Supp.2d 315, 327 (D. Conn. 2000) (individual who created private “ch ...
    38 KB (5,571 words) - 14:45, 10 April 2011
  • ==Computer Fraud and Abuse Act== ...es of malicious interferences with computer systems and to address federal computer offenses, an amendment in 1994 allows civil actions to brought under the st ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ===Pre-Anti-Cybersquatting Consumer Protection Act case law=== ...ng others' trademarks; and defendant had been using the domain name in its computer business since 1994. ...
    29 KB (4,582 words) - 10:16, 13 April 2011
  • ...Discoveries.” In order to foster development of creative works, copyright law provides a limited grant of exclusive rights. This Copyright law protects only creative works, not facts. See, e.g., Feist Publ’ns, Inc. v. ...
    14 KB (2,130 words) - 06:38, 11 April 2011
  • ...Gates Rubber Co. v. Bando Chem. Indus., 9 F.3d 823, 832 (10th Cir. 1993); Computer Assoc. Int’l, Inc. v. Altai, Inc., 982 F.2d 693, 701 (2d Cir. 1992) (requir ...d in Canada constituted an act of direct infringement under U.S. copyright law. The court concluded that the potential infringement at issue did not occur ...
    27 KB (4,215 words) - 07:04, 11 April 2011
  • ...he devastating effects that Zeus (or other software like Zeus) can do to a computer and the user. For example, the article stated that programs like Zeus can ...mbers etc. into IT equipment located in public places ([[Shoulder surfing (computer security)|shoulder surfing]]) ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...are revealed. However, the case was mooted on appeal by changes to the NSL law. A 2007 case under the revised law, Doe v. Gonzales, 500 F. Supp. 2d 379 (S.D.N.Y. 2007), held: ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • ...ing a customer's ZIP code is illegal in California, where the state's 1971 law prohibits merchants from requesting or requiring a card-holder's "personal In the past, carders used computer programs called "generators" to produce a sequence of credit card numbers, ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...App. 3d 71, 76 (1989) (statute runs from date of “publication”). At common law, a statement is “published” each time the statement is distributed or utter ...t make a pre-litigation demand for correction. Here, the court held that a computer bulletin board was not a periodical and therefore the retraction statute di ...
    17 KB (2,553 words) - 14:51, 10 April 2011
  • ...urt, including hearsay and the foundation to establish the authenticity of computer records. Many courts have categorically determined that computer records are admissible under Federal Rule of Evidence 803(6), the hearsay e ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...rime cases, agents may want to monitor a hacker as he breaks into a victim computer system or set up a "cloned" email account to monitor a suspect sending or r ...ents (much like a letter inside an envelope). The Pen/Trap statute permits law enforcement to obtain the addressing information of Internet communications ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...s or services. This case was distinguished in Nissan Motor Corp. v. Nissan Computer Corp., 2002 U.S. Dist. LEXIS 6365 (C.D. Cal. 2002) on other grounds. See su ...No. 1:01 CV 3359 TWT (N.D. Ga. Mar. 31, 2003). Federal trademark dilution law does not provide a cause of action for a tarnishment claim arising from the ...
    27 KB (4,223 words) - 10:08, 13 April 2011
  • # It must be prepared by an applicant identified as a law enforcement or investigative officer. The application must be in writing, s ...display paging devices or fax machines, but also includes electronic mail, computer transmissions, and, in some cases, satellite transmissions. It does not inc ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • ...statute when, on occasion, it would stifle the very creativity which that law is designed to foster.” Campbell, 510 U.S. at 577 (internal quotation marks ...he already owned the CD by placing his copy of the commercial CD into his computer’s CD-ROM drive for several seconds or by purchasing the CD from one of defe ...
    31 KB (4,913 words) - 07:20, 11 April 2011
  • ;Absolute non-discrimination: Columbia Law School professor Tim Wu: "Network neutrality is best defined as a network d ;First come first served: According to Imprint Magazine, Cardozo Law School professor Susan P. Crawford "believes that a neutral Internet must f ...
    52 KB (7,736 words) - 20:12, 1 October 2011
View ( | ) (20 | 50 | 100 | 250 | 500)