Search results

Jump to navigation Jump to search
View ( | next 50) (20 | 50 | 100 | 250 | 500)
  • ...he devastating effects that Zeus (or other software like Zeus) can do to a computer and the user. For example, the article stated that programs like Zeus can ...mbers etc. into IT equipment located in public places ([[Shoulder surfing (computer security)|shoulder surfing]]) ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...are revealed. However, the case was mooted on appeal by changes to the NSL law. A 2007 case under the revised law, Doe v. Gonzales, 500 F. Supp. 2d 379 (S.D.N.Y. 2007), held: ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • ...ing a customer's ZIP code is illegal in California, where the state's 1971 law prohibits merchants from requesting or requiring a card-holder's "personal In the past, carders used computer programs called "generators" to produce a sequence of credit card numbers, ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...App. 3d 71, 76 (1989) (statute runs from date of “publication”). At common law, a statement is “published” each time the statement is distributed or utter ...t make a pre-litigation demand for correction. Here, the court held that a computer bulletin board was not a periodical and therefore the retraction statute di ...
    17 KB (2,553 words) - 14:51, 10 April 2011
  • ...urt, including hearsay and the foundation to establish the authenticity of computer records. Many courts have categorically determined that computer records are admissible under Federal Rule of Evidence 803(6), the hearsay e ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...rime cases, agents may want to monitor a hacker as he breaks into a victim computer system or set up a "cloned" email account to monitor a suspect sending or r ...ents (much like a letter inside an envelope). The Pen/Trap statute permits law enforcement to obtain the addressing information of Internet communications ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...s or services. This case was distinguished in Nissan Motor Corp. v. Nissan Computer Corp., 2002 U.S. Dist. LEXIS 6365 (C.D. Cal. 2002) on other grounds. See su ...No. 1:01 CV 3359 TWT (N.D. Ga. Mar. 31, 2003). Federal trademark dilution law does not provide a cause of action for a tarnishment claim arising from the ...
    27 KB (4,223 words) - 10:08, 13 April 2011
  • # It must be prepared by an applicant identified as a law enforcement or investigative officer. The application must be in writing, s ...display paging devices or fax machines, but also includes electronic mail, computer transmissions, and, in some cases, satellite transmissions. It does not inc ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • ...statute when, on occasion, it would stifle the very creativity which that law is designed to foster.” Campbell, 510 U.S. at 577 (internal quotation marks ...he already owned the CD by placing his copy of the commercial CD into his computer’s CD-ROM drive for several seconds or by purchasing the CD from one of defe ...
    31 KB (4,913 words) - 07:20, 11 April 2011
  • ;Absolute non-discrimination: Columbia Law School professor Tim Wu: "Network neutrality is best defined as a network d ;First come first served: According to Imprint Magazine, Cardozo Law School professor Susan P. Crawford "believes that a neutral Internet must f ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...fsky v. Gilmore, 167 F.3d 191 (4th Cir. 1999). The court upheld a Virginia law restricting state employees from accessing “sexually explicit” material on # Computer Xpress v. Jackson, 93 Cal. App. 4th 993 (2001). The court ruled that critic ...
    32 KB (4,920 words) - 19:22, 10 April 2011
  • ...overy solutions. A function may also be considered critical if dictated by law. * Hacker (computer security)|Cyber attack ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ...nforceable where the EULA was “prominently displayed on the program user’s computer screen before the software could be installed,” and the user was required t ...rnet Gateway, Inc., 334 F. Supp. 2d 1164 (E.D. Mo. 2004). The court held a computer game's click-wrap EULA and TOU were enforceable and not unconscionable. The ...
    18 KB (2,884 words) - 17:00, 13 April 2011
  • ...") is an [[Act of Congress|Act of the U.S. Congress]] that was signed into law by [[George W. Bush|President George W. Bush]] on October 26, 2001. The tit ...ired (to) Intercept (and) Obstruct Terrorism ''Act of 2001''.<ref>[[Public Law]] {{USPL|107|56}}</ref> ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...om using search warrants to obtain computers or electronic media. A sample computer search warrant appears in Appendix F. ...strategy should be chosen after considering the many possible roles of the computer in the offense: ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...tors must consider two issues when asking whether a government search of a computer requires a warrant. First, does the search violate a reasonable expectation ...ohibits law enforcement from accessing and viewing information stored in a computer if it would be prohibited from opening a closed container and examining its ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ...0 days upon request. They also must disclose PHI when required to do so by law, such as reporting suspected child abuse to state child welfare agencies.<b * '''''Technical Safeguards''''' – controlling access to computer systems and enabling covered entities to protect communications containing ...
    32 KB (4,732 words) - 19:36, 29 November 2013
View ( | next 50) (20 | 50 | 100 | 250 | 500)