Search results

Jump to navigation Jump to search
  • This Chapter provides an overview of defamation (libel) law, including a discussion of the constitutional and statutory privileges that E. [[International Defamation Decisions]] ...
    385 bytes (49 words) - 13:45, 10 April 2011
  • ...ess., art. 7(1), at 3, U.N. Doc. A/CN.9/XXIX/CRP.1/Add.13 (1996) ("Where a law requires a signature of a person, that requirement is met in relation to a ...
    1 KB (161 words) - 12:29, 16 October 2014
  • ...andardize bill/invoice data transmitted electronically ("e-billed") from a law firm to a corporate client. It is abbreviated '''LEDES''' and is usually pr ...w Firm and Law Department Services Group. Members of the committee include law firms, corporate legal departments, electronic billing vendors and time and ...
    3 KB (412 words) - 11:45, 27 August 2011
  • # [[International Defamation Decisions]] # [[International Content Regulation]] ...
    2 KB (209 words) - 09:53, 13 April 2011
  • The law prohibits unauthorized obtaining of "information from any protected compute ...9 U.S. 244 (1991). To ensure clarity, the statute was amended to reference international communications explicitly.</blockquote> ...
    5 KB (773 words) - 11:40, 27 August 2011
  • ...substance from public international law, conflict of laws, constitutional law and the powers of the Executive (government) and Legislature branches of go ...the states to legislate against many types of crime, the federal criminal law must have an appropriate jurisdictional basis to avoid constitutional chall ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • ==Law in Mexico== ...deral de Protección de Datos Personales en Posesión de Particulares) (the ‘Law’) was enacted and entered into force on 6 July 2010. ...
    18 KB (2,869 words) - 17:46, 29 August 2014
  • ...e in criminal cases. The purpose of this publication is to provide Federal law enforcement agents and prosecutors with systematic guidance that can help t ...nual reflects that division: Chapters 1 and 2 address the Fourth Amendment law of search and seizure, and Chapters 3 and 4 focus on the statutory issues, ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • Following are dispositions of defamation claims brought in international courts. These judgments would probably not be enforceable in U.S. courts. S ...Jones & Co. v. Gutnick (2002) HCA 56. The Court also noted that Australian law does not espouse the “single publication” rule adopted in much of the U.S. ...
    6 KB (895 words) - 14:52, 10 April 2011
  • ...y that property or contracts are, as it is a domain covering many areas of law and regulation. Some leading topics include [[intellectual property]], [[p ...sdictional code, legal practitioners are generally left with a conflict of law issue. ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...ted by copyright law and (ii) where the particular work to which the state law claim is being applied falls within the type of works protected by the Copy ...Basketball Ass’n v. Motorola, Inc., 105 F.3d 841 (2d Cir. 1997); see also International News Serv. v. Associated Press, 248 U.S. 215 (1918). The elements central t ...
    10 KB (1,594 words) - 10:19, 12 April 2011
  • ...As privacy legislation continues to build momentum internationally, these international privacy issues will become increasingly important to individuals and busine ...that collects, uses or discloses personal information. To comply with the law businesses must, inter alia: disclose the purpose of the data collection an ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • #[[5 Ways to Make Your Law Office More Profitable | 5 Ways to Make Your Law Office More Profitable]] ...ment in Law Firms | Avoid the Run-Around: Smarter Facilities Management in Law Firms]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...ive initiatives, it’s no wonder that Lazarus Alliance has become a leading international name synonymous with leadership, quality, customer service and innovation.< ...Alliance specializes in IT security, risk, privacy, governance, cyberspace law and compliance leadership solutions and is fully dedicated to global succes ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ===Federal Law=== ...cal assistance the company would provide to purchasers); FTC v. Streamline International Inc., No. 01-6885, (S.D. Fla. 2001), http://www.ftc.gov/opa/2001/06/ stream ...
    16 KB (2,394 words) - 13:40, 26 April 2011
  • ...other information categories that often receive special treatment in state law.<br> * For law enforcement ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ...at trademark. However, registration is not required. The owner of a common law trademark may also file suit, but an unregistered mark may be protectable o ...imes be called a service mark, particularly in the United States trademark law. ...
    39 KB (6,281 words) - 14:29, 26 April 2011
  • ...ean Union. It is an important component of EU [[privacy]] and human rights law. The right to [[privacy]] is a highly developed area of law in Europe. All the member states of the European Union (EU) are also signat ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • The '''Computer Fraud and Abuse Act''' is a law passed by the United States Congress in 1984 intended to reduce cracking of * Including state law offenses as priors for sentencing; and ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...urisdiction]]. Fraud is a crime, and also a [[Civil law (common law)|civil law]] violation. Defrauding people or entities of money or valuables is a commo ...e fraud, and the Internet ([[computer crime]] and [[Internet fraud]]). The international dimensions of the web and ease with which users can hide their location, th ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...sel II believed that such an international standard could help protect the international financial system from the types of problems that might arise should a major ...cord to Incorporate Market Risks, and the November 2005 paper on Basel II: International Convergence of Capital Measurement and Capital Standards: A Revised Framewo ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ...re ideas, and are protected as such; protection of inventions under patent law does not require that the invention be represented in a physical embodiment ...e and arrangement of words, musical notes, colors and shapes. So copyright law protects the owner of property rights against those who copy or otherwise t ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...overy solutions. A function may also be considered critical if dictated by law. ===International Organization for Standardization=== ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ...as such terms are defined in paragraphs (1) and (3) of section 1(b) of the International Banking Act of 1978); and<br> :'''(10)''' the term "conviction" shall include a conviction under the law of any State for a crime punishable by imprisonment for more than 1 year, a ...
    15 KB (2,463 words) - 11:31, 1 May 2010
  • ...r section 21 of the Federal Deposit Insurance Act or section 123 of Public Law 91-508, is liable to the United States Government for a civil penalty of no (7) Penalties for international counter money laundering violations.--The Secretary may impose a civil mone ...
    9 KB (1,369 words) - 23:09, 1 November 2012
  • ===Pre-Anti-Cybersquatting Consumer Protection Act case law=== ...ors used to determine bad faith weighed in favor of Societe, in particular International Bancorp’s intent to divert consumers from Societe’s Web site. ...
    29 KB (4,582 words) - 10:16, 13 April 2011
  • ...r 12, 1998 by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended [[Title 17 ...mances and Phonograms Treaties Implementation Act]], amends U.S. copyright law to comply with the WIPO Copyright Treaty and the WIPO Performances and Phon ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...''Sarbanes–Oxley''', '''SarBox''' or '''SOX''', is a United States federal law enacted on July 30, 2002. It is named after sponsors U.S. Senator Paul Sarb ...number of major accounting scandals including those affecting Enron, Tyco International, Adelphia Communications Corporation, Peregrine Systems and WorldCom. These ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ==Law in Canada== Interprovincial and international collection, use and disclosure of personal information ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • ...well defined, written objectives. Corporate governance must go well beyond law. The quantity, quality and frequency of financial and managerial disclosur ...rule, compliance with these governance recommendations is not mandated by law, although the codes linked to stock exchange listing requirements may have ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ...st attacks, the controversial Act expands the type of information to which law enforcement officials may obtain access and permits service providers to di <li>Section 210 increases the types of information to which law enforcement officials may obtain access by requiring them to meet only the ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...rds sought “are relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities....” 18 U.S.C. § 2709, as ...are revealed. However, the case was mooted on appeal by changes to the NSL law. ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • ...st attacks, the controversial Act expands the type of information to which law enforcement officials may obtain access and permits service providers to di # Section 210 increases the types of information to which law enforcement officials may obtain access by requiring them to meet only the ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ;Absolute non-discrimination: Columbia Law School professor Tim Wu: "Network neutrality is best defined as a network d ;First come first served: According to Imprint Magazine, Cardozo Law School professor Susan P. Crawford "believes that a neutral Internet must f ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...n the US are incorporated under corporate administration friendly Delaware law, and because the US's wealth has been increasingly securitized into various ...chael Jensen's "The Separation of Ownership and Control" (1983, Journal of Law and Economics) firmly established agency theory as a way of understanding c ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...ing a customer's ZIP code is illegal in California, where the state's 1971 law prohibits merchants from requesting or requiring a card-holder's "personal ...rather just the credit card account number itself is stolen, then Federal Law guarantees card holders have zero liability to the credit card issuer. ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...otected computer.”18 U.S.C. § 1030. While the CFAA is primarily a criminal law intended to reduce the instances of malicious interferences with computer s ...caused deletion of files would violate the Computer Fraud and Abuse Act." International Airport Centers, L.L.C. v. Citrin, 440 F.3d 418 (7th Cir. March 8, 2006). ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...") is an [[Act of Congress|Act of the U.S. Congress]] that was signed into law by [[George W. Bush|President George W. Bush]] on October 26, 2001. The tit ...ired (to) Intercept (and) Obstruct Terrorism ''Act of 2001''.<ref>[[Public Law]] {{USPL|107|56}}</ref> ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...d in Canada constituted an act of direct infringement under U.S. copyright law. The court concluded that the potential infringement at issue did not occur ...ty Studios, 464 U.S. 417, 434 (1984), courts have developed several common law doctrines of secondary liability: contributory infringement, vicarious infr ...
    27 KB (4,215 words) - 07:04, 11 April 2011
  • ...banners may establish the network owner's common authority to consent to a law enforcement search. ...o real-time interception pursuant to 18 U.S.C. § 2511(2)(c) (monitoring by law enforcement agency) or § 2511(2)(d) (provider monitoring). ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...statute when, on occasion, it would stifle the very creativity which that law is designed to foster.” Campbell, 510 U.S. at 577 (internal quotation marks ...used for a new purpose, even if the work is unchanged. Nuñez v. Caribbean International News Corp., 235 F.3d 18 (1st Cir. 2000) (modeling photo taken for portfolio ...
    31 KB (4,913 words) - 07:20, 11 April 2011
  • ...dology you are comfortable with but I would strongly suggest leveraging an international standard such as the ISO 27000 series, but particularly ISO 27005 for IT se ...bilities, otherwise known as the means, the motive, and the opportunity in law enforcement circles, is an employee or third party with access to the centr ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...h as a briefcase or file cabinet. The Fourth Amendment generally prohibits law enforcement from accessing and viewing information stored in a computer if ...ledger contains some information that falls within the scope of a warrant, law enforcement may seize the entire ledger, rather than individual responsive ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ...equently, the Fourth Circuit's reasoning in Washington likely remains good law. ...s."). In dicta in Melendez-Diaz, the Supreme Court noted that under common law, "[a] clerk could by affidavit authenticate or provide a copy of an otherwi ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...___, 2009 WL 2151348 (9th Cir. July 21, 2009), the Ninth Circuit held that law enforcement is not necessarily entitled to examine a computer that may cont .... 2005) ("[i]nformation a year old is not necessarily stale as a matter of law, especially where child pornography is concerned"); United States v. Riccar ...
    138 KB (21,660 words) - 13:18, 5 August 2011