Search results

Jump to navigation Jump to search

Page title matches

  • 1
    ==Footnote 1== ...
    394 bytes (57 words) - 12:40, 16 October 2014
  • == Requirement 1: Install and maintain a firewall configuration to protect data. == :'''[[PCI-1.1:|PCI-1.1 Establish firewall configuration standards that include:]]'''<br> ...
    5 KB (702 words) - 12:20, 16 June 2010

Page text matches

  • ===Section 1=== ...
    846 bytes (82 words) - 12:24, 16 October 2014
  • 2
    See, e.g., U. C. C. § 1-201(39) (1992). ...
    55 bytes (8 words) - 12:37, 16 October 2014
  • :'''(1)''' intentionally accesses without authorization a facility through which a :'''(1)''' if the offense is committed for purposes of commercial advantage, malic ...
    2 KB (351 words) - 11:15, 9 June 2010
  • :'''(1)''' Each year each agency shall have performed an independent evaluation of :'''(1)''' for each agency with an Inspector General appointed under the Inspector ...
    4 KB (634 words) - 13:00, 4 June 2010
  • Formally: ISO 20000-1 ('part 1') "promotes the adoption of a '''service management system''', integrated p ...t within the scope of ISO 20000-1. It comprises the same sections as 'part 1' but excludes the 'Requirements for a Management system' as no requirements ...
    2 KB (298 words) - 14:25, 23 April 2010
  • :'''(1)''' Each year each agency shall have performed an independent evaluation of :'''(1)''' for each agency with an Inspector General appointed under the Inspector ...
    4 KB (682 words) - 19:17, 3 June 2010
  • :1. All printed information shall be handled based on its confidentiality clas ..."background: white; border: 1px solid black; padding: 1em;"><table border="1"> ...
    5 KB (683 words) - 18:18, 23 January 2014
  • 1
    ==Footnote 1== ...
    394 bytes (57 words) - 12:40, 16 October 2014
  • === Chapter 1 - [[Defamation]]=== ...
    2 KB (209 words) - 09:53, 13 April 2011
  • {| id="table1" width="100%" border="1" | 1.0 ...
    6 KB (752 words) - 14:02, 1 May 2010
  • ...fornia State Senator Peace on February 12, 2002, and became operative July 1, 2003. (1) Any agency that owns or licenses computerized data that includes personal ...
    3 KB (522 words) - 13:52, 26 October 2011
  • (1) Any actual damage sustained by that person as a result of the failure;<br> ...ability under this paragraph shall not be less than $100 nor greater than $1,000; and<br> ...
    4 KB (689 words) - 12:28, 16 October 2014
  • (1) Any actual damage sustained by that person as a result of the failure;<br> ...ability under this paragraph shall not be less than $100 nor greater than $1,000; and<br> ...
    4 KB (689 words) - 12:30, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    5 KB (728 words) - 14:07, 1 May 2010
  • '''(1)''' provides information security protections commensurate with the risk an ...
    709 bytes (103 words) - 10:41, 2 June 2010
  • '''(1)''' provides information security protections commensurate with the risk an ...
    709 bytes (103 words) - 21:02, 3 June 2010
  • :'''(1)''' developing and overseeing the implementation of policies, principles, s :'''(8)''' reporting to Congress no later than March 1 of each year on agency compliance with the requirements of this subchapter, ...
    4 KB (671 words) - 10:44, 1 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    7 KB (953 words) - 14:13, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ...ce on the processes, principles and terminology recommended for BCM. Part 1 offers good practice advice on the things that ought to be considered to ac ...t 2 describes a how the business continuity arrangements described in part 1 can be managed systematically using a documented BCMS. Since part 2 is a p ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...signatures as sufficient for government contracts under 31 U.S.C. 1501(a)(1): "The electronic symbol proposed for use by certifying officers . . . embo ...
    695 bytes (105 words) - 12:39, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    7 KB (976 words) - 14:17, 1 May 2010
  • :'''(1)''' promulgating information security standards under section 11331 of titl :'''(8)''' reporting to Congress no later than March 1 of each year on agency compliance with the requirements of this sub-chapter ...
    3 KB (414 words) - 11:45, 4 June 2010
  • '''(1)''' minimize the paperwork burden for individuals, small businesses, educat ::'''(B)''' security of information, including section 11332 of title 40 [1] ; and<br> ...
    3 KB (414 words) - 10:37, 1 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • (a)(1) A domestic financial institution or nonfinancial trade or business, and a ...to not less than 2 times the amount of the transaction, but not more than $1,000,000, on any financial institution or agency that violates any provision ...
    9 KB (1,369 words) - 23:09, 1 November 2012
  • ...apter, section 11331 of title 40, or section 20 of the National Standards [1] and Technology Act (15 U.S.C. 278g–3) may be construed as affecting the au ...
    851 bytes (128 words) - 21:01, 3 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    10 KB (1,473 words) - 14:13, 1 May 2010
  • :'''(1)''' be responsible for—<br> :'''(1)''' periodic assessments of the risk and magnitude of the harm that could r ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...apter, section 11331 of title 40, or section 20 of the National Standards [1] and Technology Act (15 U.S.C. 278g–3) may be construed as affecting the au ...
    940 bytes (143 words) - 21:44, 1 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • :'''(1)''' be responsible for—<br> :'''(1)''' periodic assessments of the risk and magnitude of the harm that could r ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • 1. '''Confidentiality''' Image:Information Classification Standard(1).png|Information Classification Standard page two of eight. ...
    5 KB (583 words) - 17:44, 23 January 2014
  • '''(1)''' provide a comprehensive framework for ensuring the effectiveness of inf ...
    1 KB (192 words) - 10:33, 1 June 2010
  • '''(1)''' provide a comprehensive framework for ensuring the effectiveness of inf ...
    1 KB (192 words) - 10:36, 1 June 2010
  • :'''(1)''' having knowingly accessed a computer without authorization or exceeding ...e of the computer and the value of such use is not more than $5,000 in any 1-year period;<br> ...
    15 KB (2,463 words) - 11:31, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • :'''(1)''' provide timely technical assistance to operators of agency information ...
    1 KB (196 words) - 19:07, 3 June 2010
  • ...ade Law (UNCITRAL), 29th Sess., art. 7(1), at 3, U.N. Doc. A/CN.9/XXIX/CRP.1/Add.13 (1996) ("Where a law requires a signature of a person, that requirem ...
    1 KB (161 words) - 12:29, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • ...nuary). Authentication: A pillar of information assurance. SC Magazine, 21(1), 55. Retrieved October 30, 2011, from ProQuest Computing. (Document ID: 1 .../www.e-publishing.af.mil/shared/media/epubs/AFI33-203V1.pdf AFI 33-203 Vol 1], Emission Security (Soon to be AFSSI 7700) ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...5(a)(3)(A), (4)(A), 7(g)(1), 5 U.S.C.A. §§ 7704(a)(3)(A), (4)(A), 7706(g)(1). Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th Cir. 2 ...e sender's domain name. CAN-SPAM Act, §§ 5(a)(1, 6), 15 U.S.C.A. § 7704(a)(1, 6). Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th Cir ...
    8 KB (1,176 words) - 10:17, 5 May 2011
  • Image:Vulnerability Assessment and Management Standard(1).png|Vulnerability Assessment and Management Standard page two of five. ...
    2 KB (230 words) - 19:16, 14 January 2014
  • ### SHA-1 with 128-bit or 160 bit key Image:Encryption Standard(1).png|Encryption Standard page two of eight ...
    4 KB (558 words) - 15:12, 21 January 2014
  • ...D.N.Y. 1943) (opinion of the court by Judge Learned Hand), aff'd, 326 U.S. 1 (1945). ...
    1 KB (184 words) - 18:49, 10 April 2011
  • Computer Crime Prevention Law — Ill. Rev. Stat., ch. 38, §§ 16D-1 to -7<br> Ind. Code § 35-43-1-4<br> ...
    9 KB (1,358 words) - 22:11, 5 September 2011
  • {| id="table1" width="100%" border="1" | 1.0 ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • ...e under these three statutes. This manual reflects that division: Chapters 1 and 2 address the Fourth Amendment law of search and seizure, and Chapters Chapter 1 explains the restrictions that the Fourth Amendment places on the warrantle ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • Image:Asset Information Labeling Standard(1).png|Asset Information Labeling Standard page two of six. ...
    2 KB (258 words) - 16:26, 24 September 2014
  • ...54 FR 13864, April 6, 1989; 56 FR 13754, April 4, 1991; 58 FR 17084, April 1, 1993; 59 FR 40204, Aug. 5, 1994; 73 FR 44599, July 30, 2008; 74 FR 36094, ...
    1 KB (152 words) - 12:28, 16 October 2014
  • ...vice organization's controls over a minimum six month period (e.g. January 1, 2012 to June 30, 2012). The contents of each type of report is described i {| id="table1" width="100%" border="1" ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...B), with respect to information technology in the Federal Government, to: (1) exercise capital planning control; (2) promote the improvement of the acqu * '''(Sec. 5113)''' Requires the OMB Director to: (1) encourage performance- and results-based management in fulfilling his resp ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...ed online for a minimum of thirty (30) days and retained for at least one (1) year and in accordance with legal and regulatory requirements. Image:Availability Protection Standard(1).png|Availability Protection Standard page two of eight. ...
    5 KB (646 words) - 21:03, 15 January 2014
  • Image:Employee Ongoing Security Awareness Standard(1).png|Employee Ongoing Security Awareness Standard page two of five. ...
    2 KB (275 words) - 17:10, 23 January 2014
  • (1) Any person subject to the act and this part shall retain evidence of compl ...
    1 KB (194 words) - 12:27, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,711 words) - 14:16, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    14 KB (1,956 words) - 14:16, 1 May 2010
  • ...orgery possible. The Guidelines seek to address this problem in two ways, (1) by requiring a subscriber, who holds the private key, to use a degree of c ...
    2 KB (244 words) - 12:37, 16 October 2014
  • 47 U.S.C. § 230(c)(1), and that: Immunity under Section 230 requires that: (1) the defendant is a provider or user of an interactive computer service; (2 ...
    6 KB (919 words) - 14:33, 10 April 2011
  • Image:Asset Identification and Classification Standard(1).png|Asset Identification and Classification Standard page two of six. ...
    2 KB (295 words) - 15:20, 13 January 2014
  • ...rk owner may bring a cause of action against a domain name registrant who (1) has a bad faith intent to profit from the mark and (2) registers, traffics ...at the first two prongs of Mayflower's ACPA claim were easily met because (1) their registered trademark was distinctive and (2) Defendant’s “mayflowerv ...
    10 KB (1,540 words) - 12:16, 21 March 2011
  • '''(1)''' the term '''agency''' means any executive department, military departme ...l not include a collection of information described under section 3518 (c)(1);<br> ...
    5 KB (795 words) - 00:35, 1 June 2010
  • Image:Information Security Program Charter(1).png|Asset Identification and Classification Standard page two of five. ...
    2 KB (316 words) - 15:19, 13 January 2014
  • (1) The purpose of section 552 of title 5, United States Code, popularly known ::(1) foster democracy by ensuring public access to agency records and informati ...
    18 KB (2,889 words) - 10:47, 22 May 2010
  • ::''(1) accurately reflects the information set forth in the record after it was f :''(1) discussed situations where "...contract may be formed by the interaction o ...
    9 KB (1,499 words) - 11:31, 30 October 2011
  • {| id="table1" width="100%" border="1" | 1.0 ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...ion while it is in electronic storage in such system.” 18 U.S.C. § 2701(a)(1)-(2). However, it does not apply to an "electronic communication [that] is ...nic storage by that service,” with limited exceptions. 18 U.S.C. § 2702(a)(1). ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • ...te a claim for misappropriation of trade secrets, a party must show that: (1) the information incorporates a trade secret; (2) the party took reasonable ...pattern, compilation, program, device, method, technique or process that: (1) derives independent economic value, actual or potential, from not being ge ...
    7 KB (1,065 words) - 16:48, 13 April 2011
  • ### Passwords must contain at least one (1) alphabetic and one (1) non-alphabetic character. Image:Access Control Standard(1).png|Access Control Standard page two of eleven. ...
    8 KB (1,182 words) - 19:41, 15 January 2014
  • ...eported immediately to Infrastructure Services and Information Security at 1-888-896-7580 and provide relevant information including name, employee numb Image:Anti-Virus Standard(1).png|Anti-Virus Standard page two of eight. ...
    5 KB (765 words) - 20:00, 15 January 2014
  • :'''(1)''' The term '''information security''' means protecting information and in ...
    2 KB (327 words) - 00:58, 1 June 2010
  • Image:Threat Assessment and Monitoring Standard(1).png|Threat Assessment and Monitoring Standard page two of six. ...
    3 KB (365 words) - 19:25, 14 January 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    9 KB (1,430 words) - 14:56, 28 August 2009
  • :'''(1)''' the term '''information security''' means protecting information and in ...
    3 KB (368 words) - 00:50, 1 June 2010
  • '''1.''' Applicability of Federal Rules of Criminal Procedure<br> ...
    2 KB (360 words) - 12:30, 16 October 2014
  • Image:Information Systems and Technology Security Policy(1).png|Information Systems and Technology Security Policy page two of six. ...
    4 KB (465 words) - 15:46, 13 January 2014
  • Image:Asset Management Standard(1).png|Asset Management Standard page two of six. ...
    3 KB (389 words) - 17:40, 14 January 2014
  • Image:Security Awareness Standard(1).png|Security Awareness Standard page two of five. ...
    3 KB (418 words) - 19:53, 14 January 2014
  • Image:Acceptable Use Standard(1).png|Acceptable Use Standard page two of six. ...
    3 KB (464 words) - 17:48, 14 January 2014
  • : '''1.''' Such subpoena is authorized by law and there is reason to believe that ...
    3 KB (452 words) - 12:29, 16 October 2014
  • ...communications unless a statutory exception applies. See 18 U.S.C. § 2511(1). In general, these prohibitions bars third parties (including the governme ...ement to intercept communications for up to thirty days. 18 U.S.C. §§ 2516(1), 2518(5). 18 U.S.C. §§ 2516-2518 imposes several formidable requirements t ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • U.S. Copyright laws are enacted pursuant to Article 1, Section 8 of the U.S. Constitution, which provides that “[t]he Congress sh ...t required under U.S. law, although copies of works published before March 1, 1989, must bear the notice or risk loss of copyright protection. The notic ...
    14 KB (2,130 words) - 06:38, 11 April 2011
  • Image:End User Computing and Technology Policy(1).png|End User Computing and Technology Policy page two of six. ...
    4 KB (507 words) - 14:58, 21 January 2014
  • [[AI1:| '''1 Identify Automated Solutions''']]<br> [[AI1.1:| 1.1 Definition and Maintenance of Business Functional and Technical Requirement ...
    3 KB (341 words) - 19:07, 14 June 2007
  • Image:Auditing Standard(1).png|Auditing Standard page two of seven. ...
    3 KB (444 words) - 20:12, 15 January 2014
  • ...tion. The court also held that the Communications Decency Act (see Chapter 1 (B)(3) above) would not shield ISPs from secondary liability for their user ...classic or nominative, applies when an allegedly infringing term is used (1) not as a trademark, but (2) fairly and in good faith (3) to describe the g ...
    8 KB (1,249 words) - 10:18, 13 April 2011
  • (1) The inappropriate use of “frames” and linking; ...ar website. See Complaint, Carstens v. Bonzi Software, Inc., No. 02-207199-1 (Wash. Sup. Ct. 2003) (suit filed against defendant for allegedly using ban ...
    16 KB (2,394 words) - 13:40, 26 April 2011
  • ...f’d, 526 U.S. 1061 (1999), the court upheld the validity of Section 223(a)(1)(A)(ii) of the CDA, which makes it a crime to transmit an “indecent” comput ...
    3 KB (402 words) - 18:54, 10 April 2011
  • # Lubin v. Agora, Inc., 389 Md. 1, 22, 882 A.2d 833, 846 (2005) (denying enforcement of subpoenas that would ...an anonymous internet speaker's identity, the requesting party must show: (1) the speaker has been given adequate notice and a reasonable opportunity to ...
    15 KB (2,359 words) - 19:34, 10 April 2011
  • ...bure v. Lacambre, Tribunal de Grande Instance de Paris, Ref. 55181/98, No. 1/JP (Fr. June 9, 1998). Under French law, an Internet service provider is re ...Designtechnica Corp. and Google UK and Google Inc., [2009] EWHC 1765 (QB)=[1]. The UK High Court ruled that Google was not a publisher of defamatory sta ...
    6 KB (895 words) - 14:52, 10 April 2011
  • :Section 101(c)(1)(C) states that the consumer also ''"consent electronically, in a manner th ...
    3 KB (456 words) - 11:26, 30 October 2011
  • [[ISO 20000]] defines the objective of ''Change management'' (part 1, 9.2) as:<br> ...
    4 KB (523 words) - 10:24, 23 April 2010
  • {| id="table1" width="100%" border="1" {| id="table1" width="100%" border="1" ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • ...ng. Tim O'Shea and Jared Strauss took responsibility for revising Chapters 1 and 5, Josh Goldfoot for revising Chapter 2, Michelle Kane for revising Cha ...
    3 KB (438 words) - 12:32, 5 August 2011
  • Volume 1, Governance Documentation and Information Technology Security Policies Demy ...ty-Evaluation/dp/1468063871/ref=sr_1_1?s=books&ie=UTF8&qid=1330543900&sr=1-1 Governance Documentation and Information Technology Security Policies Demys ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • * [[Media:NISTSP800-37.pdf | NIST Special Publication 800-37 Revision 1]], Guide for Security Authorization of Federal Information Systems: A Secur * [[Media:NISTSP800-60.pdf | NIST Special Publication 800-60]], Revision 1, Guide for Mapping Types of Information and Information Systems to Security ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • Prison Planet.com August 1, 2013 Every thing the elite do is designed to stunt human kind, what type o ...
    3 KB (411 words) - 12:27, 16 October 2014
  • Basel II uses a "three pillars" concept; (1) Capital requirement (addressing risk), (2) Bank regulation Supervisory rev 1. Standardized Approach ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ...93-177 February 1993, Capability Maturity Model SM for Software, Version 1.1) and as a book by the same authors in 1995. ...ined/confirmed as a standard business process, and decomposed to levels 0, 1 and 2 (the latter being Work Instructions). ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    14 KB (2,165 words) - 16:53, 22 September 2009
  • Image:Asset Protection Standard(1).png|Asset Protection Standard page two of seven. ...
    5 KB (673 words) - 18:16, 14 January 2014
  • ...n in an effort to provide citizens with safeguards for their personal data.1 Some of these laws apply both to data transfers internally within a nation’ (1) EU Standards for Processing Personal Data. ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • ...ation about others in their databases must ensure that such information is 1) Materially, 2) Truthful complete, 3) Accurate, and 4) Individuals have acc ...
    4 KB (561 words) - 16:45, 29 August 2014
  • Image:Configuration Management Standard(1).png|Configuration Management Standard page two of nine. ...
    5 KB (681 words) - 21:56, 15 January 2014
  • (1) A Federal Reserve;<br> ...
    4 KB (657 words) - 23:02, 1 November 2012
  • ...a elements, when either the name or the data elements are not encrypted: (1) Social security number. (2) Driver's license number or California Identifi ...e constitution declares privacy an inalienable right in Article 1, Section 1. ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • '''1.''' The elements that must be proved to establish defamation typically are: ...rifiable fact is not actionable. Milkovich v. Lorain Journal Co., 497 U.S. 1, 20 (1990) (not defamatory if statement "cannot ‘reasonably [be] interprete ...
    9 KB (1,422 words) - 14:29, 10 April 2011
  • 1. 15 U.S.C. § 1114 prohibits using: ...rs that vary somewhat between jurisdictions. The primary factors include: (1) strength of the mark; (2) market proximity of the goods involved; (3) simi ...
    17 KB (2,794 words) - 10:00, 13 April 2011
  • == Requirement 1: Install and maintain a firewall configuration to protect data. == :'''[[PCI-1.1:|PCI-1.1 Establish firewall configuration standards that include:]]'''<br> ...
    5 KB (702 words) - 12:20, 16 June 2010
  • Image:Incident Response Standard(1).png|Incident Response Standard page two of nine. ...
    5 KB (737 words) - 15:24, 21 January 2014
  • ...n may not be presented to a magistrate. See 18 U.S.C. §§ 2510(9) and 2516(1); see also In re United States of America, 10 F.3d 931 (2d Cir. 1993), cert ...origin and the point of reception, i.e., telephone calls. 18 U.S.C. § 2510(1). This includes cellular phones, cordless phones, voice mail, and voice pag ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • [[PO1:| '''1 Define a Strategic IT Plan''']]<br> [[PO1.1:| 1.1 IT Value Management]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • * Eddie Antar, founder of Crazy Eddie, who has about $1 billion worth of judgments against him stemming from fraudulent accounting ...Monus, founder of Phar-Mor, which ultimately cost its investors more than $1 billion. ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...le I requires that any preexisting condition begin to be covered on August 1, 2006.<br> ...ting the rule, CMS granted a one-year extension to all parties. On January 1, 2012 the newest version 5010 becomes effective, replacing the version 4010 ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • #''' Web Bugs.''' Web bugs are small, transparent image files, typically 1-by-1 pixel in size, placed on websites or in email messages. Site operators and ...57. In Viacom v. YouTube, 2008 WL 2627388 (S.D.N.Y. 2008) (slip. at p. 20)[1], the court held that YouTube was a remote computing service (and therefore ...
    14 KB (2,207 words) - 17:22, 13 April 2011
  • ...le to the heirs and assignees of deceased persons. Civil Code Section 3344.1. New York Civil Rights Law sections 50 and 51 create a private right of act ...under the common law, a plaintiff must plead and prove that a defendant "(1) used plaintiff’s identity; (2) appropriated plaintiff’s name and likeness ...
    11 KB (1,744 words) - 16:53, 13 April 2011
  • ...gh its confidentiality continued to be protected under 18 U.S.C. § 1030(a)(1). To remedy this situation in the 1996 Act, 18 U.S.C. § 1030(a)(5) was redr ...
    5 KB (773 words) - 11:40, 27 August 2011
  • # Voice-Tel Enters., Inc. v. Joba Inc., No. 1:01 CV 3359 TWT (N.D. Ga. Mar. 31, 2003). Federal trademark dilution law doe ...the court can proceed to the likelihood of confusion analysis. See, e.g., 1-800 Contacts v. WhenU.com, 414 F.3d 400, 412 (2d Cir. 2005)(“‘use’ must be ...
    27 KB (4,223 words) - 10:08, 13 April 2011
  • Image:Electronic Mail Acceptable Use Standard(1).png|Electronic Mail Acceptable Use Standard page two of nine. ...
    7 KB (974 words) - 19:34, 16 January 2014
  • CIPA made amendments to three federal funding programs: (1) the Elementary and Secondary Education Act of 1965, which provides aid to ...
    5 KB (707 words) - 19:01, 10 April 2011
  • ...on Technology Security Policies Demystified'', Amazon Publishing, ISBN 978-1-4680-6387-5 ...for Information technology Governance'', IDEA Group Publishing, 2004, ISBN 1-59140-284-0 ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...s, 248 U.S. 215 (1918). The elements central to such a claim are whether: (1) the plaintiff generates or collects information, at some cost or expense, ...based on accessing a computer system, the plaintiff must establish that: (1) defendant intentionally and without authorization interfered with plaintif ...
    10 KB (1,594 words) - 10:19, 12 April 2011
  • ...ards Institution (BSI) released an independent standard for BCP — BS 25999-1. Prior to the introduction of [[BS 25999]], BCP professionals relied on inf * [[BS 25999-1:2006]] Business Continuity Management Part 1: Code of practice ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ...not only explicit threats to cause damage to a computer, but also threats (1) to steal data on a victim’s computer, (2) to publicly disclose stolen data * [[USC 18 1030 | 18 USC 1030(a)(1)]]: Computer Espionage ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...d., et al., 2007 WL 935703, 35 Media L. Rep. 2451 (S.D. Ca. March 7, 2007)[1] ("Plaintiffs’ first argument–that the SPR does not apply to statements mad Cal. Code Civ. Pro § 425.16(b)(1). The purpose of the anti-SLAPP statute is “to allow early dismissal of mer ...
    17 KB (2,553 words) - 14:51, 10 April 2011
  • ...2002). The court held that "browse-wrap" licenses are not enforceable when 1) associated with free software downloadable at the click of a button, witho # Cairo, Inc. v. CrossMedia Services, Inc., 2005 WL 756610 (N.D. Cal., April 1, 2005). The court held that a party's repeated and automated use of another ...
    18 KB (2,884 words) - 17:00, 13 April 2011
  • ...spass based on accessing a computer system, the plaintiff must establish: (1) defendant intentionally and without authorization interfered with plaintif ...based on accessing a computer system, the plaintiff must establish that: (1) defendant intentionally and without authorization interfered with plaintif ...
    13 KB (1,987 words) - 10:22, 12 April 2011
  • ...lleged violations of CASL ($200 for each contravention up to a maximum of $1 million each day for a violation of the provisions addressing unsolicited e ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • ...did not investigate the actual data practices of the canvassed sites. See [1]. (1) U.S. v. Mrs. Fields Famous Brands, Inc., Civ. Action No. 2:03cv205 (D. Ut. ...
    31 KB (4,666 words) - 13:19, 26 April 2011
  • (1) You are accessing a U.S. Government information system, which includes thi 1. The United States government is investigating [crime summary]. The investi ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • In United States v. Arnold[1], the Ninth Circuit held that the Fourth Amendment does not require governm ...
    5 KB (848 words) - 13:21, 26 April 2011
  • ...ately US$480 to US$1,534,275, based upon an exchange rate of MxP$13 per US$1). With regard to violations committed concerning the processing of sensitiv ...
    18 KB (2,869 words) - 17:46, 29 August 2014
  • * (1) exclusively for the use of a financial institution or the United States Go 1. '''United States v. Stegora, 849 F.2d 291, 292 (8th Cir. 1988)''' ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...land Security Act Section 225 expanded the power of PATRIOT Section 212 by 1) lowering the relevant standard from "reasonable belief" of a life-threaten ...ho willfully disclose a record in violation of the Act, 5 U.S.C. § 552a(i)(1). ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...land Security Act Section 225 expanded the power of PATRIOT Section 212 by 1) lowering the relevant standard from "reasonable belief" of a life-threaten violation of the Act, 5 U.S.C. § 552a(i)(1). ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...atter asserted." Fed. R. Evid. 801(c) (emphasis added). "A 'statement' is (1) an oral or written assertion or (2) nonverbal conduct of a person, if it i ...hether the records are hearsay. See, e.g., Haag v. United States, 485 F.3d 1, 3 (1st Cir. 2007); United States v. Fujii, 301 F.3d 535, 539 (7th Cir. 200 ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • * A maximum penalty amount of $1.5 million for all violations of an identical provision.<br> ...ited States House of Representatives: 104 H.R. 3103, H. Rept. 104-469, Pt. 1, H. Rept. 104-736 ...
    9 KB (1,358 words) - 16:25, 6 September 2011
  • ...o requirements to establish a prima facie case of copyright infringement: (1) ownership of the allegedly infringed material and (2) violation by the all ...either direct evidence, which is rare, or by indirect evidence that shows (1) the defendant had access to plaintiff’s work, and (2) the defendant’s work ...
    27 KB (4,215 words) - 07:04, 11 April 2011
  • Image:BYOD Acceptable Use Standard(1).png|BYOD Acceptable Use Standard page two of eleven. ...
    10 KB (1,433 words) - 18:15, 14 January 2014
  • ...gislation." In January 2004, the month the law went into effect, less than 1% of spam complied with the CAN-SPAM Act of 2003. Later modifications changed the original CAN-SPAM Act of 2003 by (1) Adding a definition of the term "person"; (2) Modifying the term "sender"; ...
    26 KB (4,026 words) - 12:15, 5 May 2011
  • In effect from 1 March, 2002, all the member states of the EU except Denmark accepted Brusse ....S.2d 844 (Sup 1999); West's Key Number Digest, Corporations Key Symbol665(1). ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • ...es, [http://www.copyright.gov/title17/92chap12.html#1201 17 U.S.C. 1201(a)(1)] requires that the Librarian of Congress issue exemptions from the prohibi ...its corporate parent Google for copyright infringement seeking more than $1 billion in damages. The complaint was filed in the U.S. District Court for ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...hes ever, accounting for over four million records, resulted in only about 1,800 instances of identity theft, according to the company whose systems wer '''135.1 General dishonesty''' ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...ights for customers and subscribers of computer network service providers.[1] There are three main substantive components to this system, which serves t ...
    10 KB (1,477 words) - 13:29, 5 August 2011
  • '''1. System Characterization'''<br> '''1.''' System Characterization: In assessing risks for an IT system, the first ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...PM Group] to be its commercial partner for ITIL accreditation from January 1, 2007. What is now called ITIL version 1, developed under the auspices of the CCTA was entitled "Government Informat ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • If the RTO is set to 4 hours and the RPO to 1 hour, then a mirror copy of production data must be continuously maintained ...
    13 KB (2,264 words) - 11:10, 27 October 2012
  • ...govern the mine-run of relationships between strangers. Subsection 230(c)(1) creates a baseline rule: no liability for publishing or speaking the conte ...or Co. v. GreatDomains.com, Inc., No. 00-CV-71544-DT, 2001 WL 1176319, at *1 (E.D. Mich. Sept. 25, 2001) (holding that if defendant violated federal tra ...
    38 KB (5,571 words) - 14:45, 10 April 2011
  • 1. Definition of Pen Register and Trap and Trace Device ...f a pen/trap device anywhere in the United States. See 18 U.S.C. § 3123(a)(1). The court will not conduct an "independent judicial inquiry into the vera ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • Effective January 1, 2015, California law will require that operators of websites or online ser ...
    14 KB (2,027 words) - 15:57, 29 August 2014
  • # Cline v. 1-888-PLUMBING, 146 F. Supp. 2d 351 (S.D.N.Y. 2001). The district court held ...found there was no likelihood of confusion and hence no infringement when (1) the parties’ marks were not similar because defendant used “are” instead o ...
    29 KB (4,582 words) - 10:16, 13 April 2011
  • ...D.N.Y. 1943) (opinion of the court by Judge Learned Hand), aff'd, 326 U.S. 1 (1945) ...trol." Id. at 1090. The school later settled, agreeing to pay the student $1 in damages and $6,000 in legal fees. ...
    32 KB (4,920 words) - 19:22, 10 April 2011
  • ...nal (Nice) Classification of Goods and Services into 45 Trademark Classes (1 to 34 cover goods, and 35 to 45 services). The idea of this system is to sp ...by requiring the harmonisation of applicable laws. For example, Article 15(1) of TRIPS provides a definition for "sign" which is used as or forms part o ...
    39 KB (6,281 words) - 14:29, 26 April 2011
  • 1) A computer can be contrabandeither because the computer is a repository of 1) It may be necessary to prove that a particular individual put contraband o ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...documents. For example, a business may receive the bulk of their goods by 1 or 2 day shipping and all of their invoices by mail. The existing process m ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ...lectual Property". ''Journal of Libertarian Studies'' 15.2 (Spring 2001): 1-53. [http://www.mises.org/journals/jls/15_2/15_2_1.pdf] ...d Copyright''. 3rd ed. New York: West/Wadsworth, 2000. ISBN 0-314-23519-1. ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...ess--not Less'', Brasseys Inc (November, 2004), hardcover, 224 pages, ISBN 1-57488-916-8 ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ...a single transaction may involve the laws of at least three jurisdictions: 1) the laws of the state/nation in which the user resides, 2) the laws of the ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...ted from preventing users of its broadband Internet access service from-- (1) sending and receiving lawful content of their choice; (2) running lawful a ...ns "Marsden C. Net Neutrality: Towards a Co-regulatory Solution at Chapter 1". ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...by 357 to 66 (of 435) and in the [[United States Senate|Senate]] by 98 to 1 and was supported by members of both the Republican and Democratic parties. ...w.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00001956----000-.html#FN-1 Cornell University], this was probably mistakenly added by law makers</ref> ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...with average revenues of $4.7 billion, the average compliance costs were $1.7 million (0.036% of revenue). The 2006 study indicated that, for 200 compa ...ang (2005): This research paper estimated SOX compliance costs as high as $1.4 trillion, by measuring changes in market value around key SOX legislative ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...ed a settlement agreement. The terms of the settlement required Alexa to: (1) delete four digits of the IP addresses in its databases, (2) add privacy p ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • Chapter 1 1. General Principles ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ...holistic conclusion. The analysis is not a simple arithmetic "3 in favor, 1 against" affair. In Perfect 10 v. Amazon.com, the court ruled that the four ...
    31 KB (4,913 words) - 07:20, 11 April 2011
  • ...oupings such as low, medium, and high risk or a numerical sequence such as 1 through 5)'''.<br> ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...hey usually hired and fired the President, or Chief Executive Officer CEO).1 ...ly on [http://www.wbcsd.org/includes/getTarget.asp?type=p&id=MTE0OA&doOpen=1&ClickMenu=LeftMenu accountability and reporting], and in 2004 created an [h ...
    45 KB (6,604 words) - 15:20, 15 April 2010