Search results

Jump to navigation Jump to search
  • Not restrained by the First Amendment, countries outside of the United States have begun to regulate online content as they would publications or speech # Germany v. CompuServe Deutschland (Bavaria 1999). A regional court reversed the conviction of Felix Somm, the former head of CompuServe German ...
    2 KB (314 words) - 19:35, 10 April 2011
  • United States courts use the Miller test for determining whether speech or expression is ...ems from Miller v. California, 413 U.S. 15 (1973), in which the US Supreme Court held that material is obscene if each of the following factors is satisfied ...
    6 KB (925 words) - 18:53, 10 April 2011
  • ...schools; (2) the Library Services Technology Act, which provides grants to states for support of libraries; and (3) the E-rate program, under the Communicati ...associations and website publishers. Under a strict scrutiny analysis, the court held that because CIPA conditioned federal funding on public libraries’ use ...
    5 KB (707 words) - 19:01, 10 April 2011
  • ...District of Columbia and of the territories and possessions of the United States, and their various subdivisions; or ...ersons, other than agencies, instrumentalities, or employees of the United States; or ...
    5 KB (795 words) - 00:35, 1 June 2010
  • (2) Such additional amount as the court may allow, except that--<br> ...the action, together with a reasonable attorney's fee as determined by the court.<br> ...
    4 KB (689 words) - 12:30, 16 October 2014
  • (2) Such additional amount as the court may allow, except that--<br> ...the action, together with a reasonable attorney's fee as determined by the court.<br> ...
    4 KB (689 words) - 12:28, 16 October 2014
  • Unlike state laws that emanate from the common law right of the states to legislate against many types of crime, the federal criminal law must hav Supranational organizations provide mechanisms whereby disputes between states may be resolved through arbitration or mediation. When a country is recogni ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • ...by the Justice Department and signed by a United States District Court or Court of Appeals judge, a wiretap order permits law enforcement to intercept comm ...to gather evidence of crime unrelated to their rights or property. United States v. Harvey, 540 F.2d 1345, 1352 (8th Cir. 1976). ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • “Addressing the threshold of copyright-ability . . ., the Supreme Court [has] held that ‘[t]he sine qua non of copyright[ability] is originality’ a ...ve works” provision of the Copyright Act. 17 U.S.C. § 201(c). The district court granted summary judgment for defendants. ...
    6 KB (1,026 words) - 06:44, 11 April 2011
  • (1) The purpose of section 552 of title 5, United States Code, popularly known as the Freedom of Information Act, is to require agen Section 552(f) of title 5, United States Code, is amended to read as follows:<br> ...
    18 KB (2,889 words) - 10:47, 22 May 2010
  • The '''Computer Fraud and Abuse Act''' is a law passed by the United States Congress in 1984 intended to reduce cracking of computer systems and to add ...usively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...ppen, he registered their other trademark, Panaflex, as a domain name. The Court held that the Federal Trademark Dilution Act could be violated without the ...e mark “is widely recognized by the general consuming public of the United States as a designation of source of the goods or services of the mark's owner.” ...
    10 KB (1,540 words) - 12:16, 21 March 2011
  • ...ors should always be concerned with admissibility issues that may arise in court proceedings. Chapter 5 addresses both hearsay and Confrontation Clause issu ...ices. Further, several sections within the Criminal Division of the United States Department of Justice in Washington, D.C., have expertise in computer-relat ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • ...iacom v. YouTube, 2008 WL 2627388 (S.D.N.Y. 2008) (slip. at p. 20)[1], the court held that YouTube was a remote computing service (and therefore ECPA prohib A district court held that retrieving for subscribers text messages that had been sent over ...
    14 KB (2,207 words) - 17:22, 13 April 2011
  • ...a magistrate. See 18 U.S.C. §§ 2510(9) and 2516(1); see also In re United States of America, 10 F.3d 931 (2d Cir. 1993), cert. denied, 115 S. Ct. 64 (1994). ...oving wire or electronic interception, the application must state, and the court order must indicate, that a particular named subject is using various and c ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • ...United States George W. Bush on December 16, 2003, establishes the United States' first national standards for the sending of commercial e-mail and requires ...rs to get permission before they send marketing messages. It also prevents states from enacting stronger anti-spam protections, and prohibits individuals who ...
    26 KB (4,026 words) - 12:15, 5 May 2011
  • ...CA amended [[Title 17 of the United States Code|Title 17]] of the [[United States Code]] to extend the reach of copyright, while limiting the liability of th ...ally requires separate legislation by or within each of the Union's member states.) ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...iary issues arising when the government seeks to admit computer records in court, including hearsay and the foundation to establish the authenticity of comp ...the term has the connotation of a positive declaration." See, e.g., United States v. Lewis, 902 F.2d 1176, 1179 (5th Cir. 1990); Lexington Ins. Co. v. W. Pen ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...party to a copyright treaty; (2) the work is first published in the Unites States or a country that is a party to the Universal Copyright Convention; (3) the ...uter to another in the absence of any perceptible rendition." Instead, the court found that such activities were more appropriately classified as "reproduct ...
    14 KB (2,130 words) - 06:38, 11 April 2011
  • As the Supreme Court has held, “Anonymity is a shield from the tyranny of the majority,” that “e ...eview “must be undertaken and analyzed on a case-by-case basis,” where the court’s “guiding principle is a result based on a meaningful analysis and a prope ...
    15 KB (2,359 words) - 19:34, 10 April 2011
  • ...ernment. A government entity generally must provide a subpoena, warrant or court order to obtain information about a user that is stored by the communicatio ...§ 3121-3127 governs pen registers and trap and trace devices, empowering a court to issue an order “authorizing the installation and use of a pen register o ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...erfeit Access Device and Abuse Act that was passed in 1984 and essentially states that, whoever intentionally accesses a computer without authorization or ex ...usively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...communications are fully protected by the Fourth Amendment. Katz v. United States, 389 U.S. 347, 353-354 (1967). The Government must satisfy stringent proced However, the Supreme Court has found no reasonable expectation of privacy in telephone numbers dialed ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...em administrator's common authority to consent to a search under to United States v. Matlock, 415 U.S. 164 (1974). (2) WARNING! This computer system is the property of the United States Department of Justice and may be accessed only by authorized users. Unautho ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...v. Associated Press, 52 F. Supp. 362, 372 (S.D.N.Y. 1943) (opinion of the court by Judge Learned Hand), aff'd, 326 U.S. 1 (1945) ...hallenge in numerous jurisdictions, with varying results. The U.S. Supreme Court ultimately resolved the circuit split and held sections of the CPPA to be o ...
    32 KB (4,920 words) - 19:22, 10 April 2011
  • ...ick “I agree” (or a similar form of consent) to view the site in full. The court distinguished “shrinkwrap license” agreements from the Ticketmaster terms a ...software in violation of Adobe’s End User License Agreement (“EULA”). The court held that the transfer of the software to the plaintiff was a sale, not a l ...
    18 KB (2,884 words) - 17:00, 13 April 2011
  • ...the same and fails to deliver it to the officer or employee of the United States entitled to receive it; (B) information from any department or agency of the United States; or ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...luded that the potential infringement at issue did not occur in the United States because it “was only completed in Canada once the signal was received and v ...ating system's error log while diagnosing a problem with the computer, the court found that the representation in RAM was "sufficiently permanent or stable ...
    27 KB (4,215 words) - 07:04, 11 April 2011
  • ...mmonly called '''Sarbanes–Oxley''', '''SarBox''' or '''SOX''', is a United States federal law enacted on July 30, 2002. It is named after sponsors U.S. Senat ...s to comply with the new law. Harvey Pitt, the 26th chairman of the United States Securities and Exchange Commission (SEC), led the SEC in the adoption of do ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...ation of Title III to use a pen register or trap and trace device); United States Telecom Ass'n v. FCC, 227 F.3d 450, 453-54 (D.C. Cir. 2000) (contrasting pe ...essing information for phone calls and individual Internet packets using a court order. Conversely, the interception of email contents, including the subjec ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...gration authorities in detaining and deporting [[Immigration in the United States|immigrants]] suspected of terrorism-related acts. The act also expanded the ...House of Representatives|House]] by 357 to 66 (of 435) and in the [[United States Senate|Senate]] by 98 to 1 and was supported by members of both the Republi ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...ns any investigator or attorney should bear in mind before applying to the court for a warrant. Section C discusses the issues that arise in drafting a comp ...minal evidence will be found in the place searched. See Brinegar v. United States, 338 U.S. 160, 175 (1949). Once a magistrate judge finds probable cause and ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...f the Internet has been subject to fierce debate, especially in the United States. ...f the Internet Protocol, has called the term net neutrality a "slogan" and states that he opposes establishing it, but he admits that he is against the fragm ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...No. C 4047, 2002 FTC LEXIS 22 (Fed. Trade Comm’n May 8, 2002), wherein the Court issued an order in conformance with the terms of the above settlement agree (4) United States v. The Ohio Art Co., Civ. Action No. 027203 (N.D. Ohio 2002); File No. 022- ...
    31 KB (4,666 words) - 13:19, 26 April 2011
  • The Fourth Amendment states: ...izure. See Berger v. New York, 388 U.S. 41, 59-60 (1967). Furthermore, the Court has held that a "'search' occurs when an expectation of privacy that societ ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • Section 230 of Title 47 of the United States Code (47 U.S.C. § 230) was passed as part of the much-maligned Communicatio ...to evade the reach of the CDA." 640 F. Supp. 2d at 1196. Furthermore, the court stressed that the CDA “must be interpreted to protect websites not merely f ...
    38 KB (5,571 words) - 14:45, 10 April 2011