Search results

Jump to navigation Jump to search

Page title matches

  • ==Law in United States== ...onal privacy or data security laws, and hundreds of such laws among its 50 states. (California alone has more than 25 state privacy and data security laws). ...
    14 KB (2,027 words) - 15:57, 29 August 2014

Page text matches

  • 9
    ...hout the United States and in much of the British Commonwealth outside the United Kingdom. ...
    409 bytes (60 words) - 15:28, 3 April 2007
  • ...973 F.2d 1441 (9th Cir. 1992), cert. denied, 113 S.Ct. 1859 (1993); United States v. Villegas, 1993 WL 535013 (S.D.N.Y. December 22, 1993).<br> ...
    2 KB (239 words) - 14:57, 21 May 2010
  • ==United States== As members of the Union, states have no powers of external sovereignty, but, subject to the Federal Constit ...
    2 KB (331 words) - 11:27, 5 March 2009
  • ...ed in interstate commerce.[[FN67]] This act amended Title 18 of the United States code to provide, for the first time, federal criminal liability for theft o ...ederal act does not preempt state trade secret protection, therefore, many states have enacted statutes that either punish the theft of trade secrets per se ...
    709 bytes (109 words) - 11:10, 18 February 2009
  • ...United States, or into the United States from any place outside the United States, shall make a report thereof. A person is deemed to have caused such transp ...orted, mailed, or shipped to such person from any place outside the United States with respect to which a report has not been filed under paragraph (a) of th ...
    4 KB (657 words) - 23:02, 1 November 2012
  • ...ude individuals from the preliminary hearing has been upheld by the United States Supreme Court. Limits on this right have also resulted from state legislati ...
    788 bytes (122 words) - 13:46, 22 February 2009
  • ...ll as industry-initiated rules. Laws have been passed by nearly all the US states (see partial list below). The first state to pass a credit freeze law was C ...tive way to prevent financial [[identity theft]]. Each year in the United States, approximately 15 percent of all cases of identity theft are cases of new a ...
    4 KB (663 words) - 12:59, 12 November 2011
  • ...ses are settled by plea bargain than any other way,[[FN68]] and the United States Supreme Court has upheld the validity of plea bargaining.[[FN69]] A plea ba ...
    843 bytes (141 words) - 17:48, 22 February 2009
  • ...Accreditation Process''' ('''DIACAP''') is a process defined by the United States Department of Defense (DoD) for managing risk. DIACAP replaced the former p [[Category:United States Department of Defense|Information Technology Security]] ...
    2 KB (229 words) - 10:14, 15 April 2012
  • [[Privacy Laws in United States]]<br> [[Privacy Laws in United Kingdom]]<br> ...
    2 KB (382 words) - 15:39, 29 August 2014
  • ...tected computers''' is a term used in Title 18, Section 1030 of the United States Code, (the [[Computer Fraud and Abuse Act]]) which prohibits a number of di ...usively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or ...
    5 KB (773 words) - 11:40, 27 August 2011
  • ...ce Certification and Accreditation Process''' ('''DIACAP''') is the United States Department of Defense (DoD) process to ensure that [[risk management]] is a [[Category:United States Department of Defense|Information Assurance Certification and Accreditation ...
    2 KB (322 words) - 10:16, 15 April 2012
  • * [[USC_2712 | 2712]]. Civil actions against the United States ...
    846 bytes (82 words) - 12:24, 16 October 2014
  • Not restrained by the First Amendment, countries outside of the United States have begun to regulate online content as they would publications or speech ...ment by chilling protected speech that occurs simultaneously in the United States. ...
    2 KB (314 words) - 19:35, 10 April 2011
  • ...storage and retrieval device as in a closed container."). See also United States v. Long, 64 M.J. 57 (CAAF 2006) (finding REOP in emails defendant sent from ...nited States v. Walser, 275 F.3d 981, 986 (10th Cir. 2001). But see United States v. Gorshkov, 2001 WL 1024026, at *2 (W.D. Wash. May 23, 2001) (holding that ...
    5 KB (848 words) - 13:21, 26 April 2011
  • ...losure of information to Congress or the Comptroller General of the United States. ...
    851 bytes (128 words) - 21:01, 3 June 2010
  • ...he longstanding general principle that those who do business in the United States must accept the burdens along with the benefits of U.S. law. ...
    899 bytes (139 words) - 10:48, 16 March 2010
  • ...the same and fails to deliver it to the officer or employee of the United States entitled to receive it;<br> ::'''(B)''' information from any department or agency of the United States; or<br> ...
    15 KB (2,463 words) - 11:31, 1 May 2010
  • ...re of information to the Congress or the Comptroller General of the United States. While this sub-chapter is in effect, sub-chapter II of this chapter shall ...
    940 bytes (143 words) - 21:44, 1 June 2010
  • Enemies of the United States.<br> ...
    2 KB (305 words) - 17:31, 3 August 2006
  • Enemies of the United States.<br> ...
    2 KB (309 words) - 17:34, 3 August 2006
  • # In Reno v. ACLU, 521 U.S. 844 (1997), the United States Supreme Court affirmed the lower court decision finding the above provision # In Playboy Entm’t, Inc. v. United States, 30 F. Supp. 2d 702 (D. Del. 1998), aff’d, 529 U.S. 803 (2000), the court d ...
    3 KB (402 words) - 18:54, 10 April 2011
  • ...ublic Law No. 100-235 (H.R. 145), (Jan. 8, 1988), was passed by the United States Congress. It was passed to improve the security and privacy of sensitive in ...
    1 KB (168 words) - 11:37, 23 May 2010
  • ...District of Columbia and of the territories and possessions of the United States, and their various subdivisions; or ...ersons, other than agencies, instrumentalities, or employees of the United States; or ...
    5 KB (795 words) - 00:35, 1 June 2010
  • ==Other U.S. States that have passed similar laws== Laws of this nature are being passed by legislatures all over the United States. Colorado, Connecticut, Delaware, Florida, Georgia, Louisiana, Maine, Minne ...
    3 KB (488 words) - 13:02, 12 November 2011
  • United States courts use the Miller test for determining whether speech or expression is In United States v. Kilbride, 584 F.3d 1240 (9th Cir. 2009), the defendant argued that becau ...
    6 KB (925 words) - 18:53, 10 April 2011
  • ...is, and always will be, folly; but we have staked upon it our all." United States v. Associated Press, 52 F. Supp. 362, 372 (S.D.N.Y. 1943) (opinion of the c ...
    1 KB (184 words) - 18:49, 10 April 2011
  • (1) The purpose of section 552 of title 5, United States Code, popularly known as the Freedom of Information Act, is to require agen Section 552(f) of title 5, United States Code, is amended to read as follows:<br> ...
    18 KB (2,889 words) - 10:47, 22 May 2010
  • However, when authorized by the Justice Department and signed by a United States District Court or Court of Appeals judge, a wiretap order permits law enfor ...to gather evidence of crime unrelated to their rights or property. United States v. Harvey, 540 F.2d 1345, 1352 (8th Cir. 1976). ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • ...schools; (2) the Library Services Technology Act, which provides grants to states for support of libraries; and (3) the E-rate program, under the Communicati ...(h)(7)(D), (l)(2). CIPA was challenged in American Library Ass’n v. United States, 201 F. Supp. 2d 401 (E.D. Pa. 2002), by a group of libraries, library asso ...
    5 KB (707 words) - 19:01, 10 April 2011
  • ...ials. It has been shown that, in 1990, 87% of the population of the United States could be uniquely identified by gender, ZIP code, and full date of birth. === United States of America === ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • ...onference of Commissioners on Uniform State Laws]] (NCCUSL). Since then 47 States, the District of Columbia, Puerto Rico, and the U.S. Virgin Islands have ad ...laws recognizing electronic signatures (Illinois, New York, and Washington states) ...
    9 KB (1,499 words) - 11:31, 30 October 2011
  • ...nal or tortuous act in violation of the Constitution or laws of the United States or any State—<br> ...
    2 KB (351 words) - 11:15, 9 June 2010
  • ...gnatures in Global and National Commerce Act''' ('''ESIGN''') is a United States federal law passed by the U.S. Congress to facilitate the use of [[electron :Section 101(c)(1)(C) states that the consumer also ''"consent electronically, in a manner that reasonab ...
    3 KB (456 words) - 11:26, 30 October 2011
  • Unlike state laws that emanate from the common law right of the states to legislate against many types of crime, the federal criminal law must hav Supranational organizations provide mechanisms whereby disputes between states may be resolved through arbitration or mediation. When a country is recogni ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • ...to notify: (i) each individual who is a citizen or resident of the United States whose unsecured PHR identifiable health information was acquired by an unau * United States Department of Health and Human Services (HHS) Security Standards; Final Rul ...
    9 KB (1,358 words) - 16:25, 6 September 2011
  • The '''Computer Fraud and Abuse Act''' is a law passed by the United States Congress in 1984 intended to reduce cracking of computer systems and to add ...usively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • .... No. 106-102, 113 Stat. 1338 (November 12, 1999), is an Act of the United States Congress which repealed the Glass-Steagall Act, opening up competition amon ...g health information, and for other purposes., In The Senate of the United States, July 25 (legislative day, JULY 21), 2003)include:<br> ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • ...to [[privacy]] is a highly developed area of law in Europe. All the member states of the European Union (EU) are also signatories of the European Convention ...ion realized that diverging data protection legislation amongst EU member states impeded the free flow of data within the EU and accordingly proposed the Da ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • ...merce, and thus does not violate the dormant Commerce Clause of the United States Constitution; the act does not directly regulate commerce occurring wholly * [http://www.spamlaws.com/cases/kelley.shtml United States v. Kelley (9th Cir. 2007)] ...
    8 KB (1,176 words) - 10:17, 5 May 2011
  • ...ation concerning computer-generated evidence was aptly expressed by United States Circuit Court Judge Van Graafeiland, in a dissent, when he or she voiced a ...
    3 KB (506 words) - 20:06, 22 February 2009
  • ...g to help, generous, and extremely sensitive. From sergeants in the United States Army to blue collar workers, those who have known him or her found my clien ...
    5 KB (770 words) - 21:45, 22 February 2009
  • ...at was designed to accommodate legal bills generated outside of the United States. It includes all of the fields in the LEDES 1998B format, plus additional ...
    3 KB (412 words) - 11:45, 27 August 2011
  • ...ces Act (FDCPA), it forms the base of consumer credit rights in the United States. It was originally passed in 1970, and is enforced by the US Federal Trade ...o maintain certain records, to require that certain transactions in United States currency be reported to the Department of the Treasury, and for other purpo ...
    12 KB (1,814 words) - 12:01, 19 July 2012
  • ==Law in United States== ...onal privacy or data security laws, and hundreds of such laws among its 50 states. (California alone has more than 25 state privacy and data security laws). ...
    14 KB (2,027 words) - 15:57, 29 August 2014
  • ...a magistrate. See 18 U.S.C. §§ 2510(9) and 2516(1); see also In re United States of America, 10 F.3d 931 (2d Cir. 1993), cert. denied, 115 S. Ct. 64 (1994). ...1995); United States v. Marcy, 777 F. Supp. 1400 (N.D. Ill. 1991); United States v. Martin, 599 F.2d 880 (9th Cir.), cert. denied, 441 U.S. 962 (1979). ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • ...h law enforcement in the investigation of terrorist activity in the United States. In Financial Institution Letter 87-2001, dated September 28, 2001, banking * [http://www.unodc.org/unodc/en/money_laundering.html United Nations Money Laundering Home Page]<br> ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • ...ave the force of law or a U.S. Department of Justice directive. See United States v. Caceres, 440 U.S. 741 (1979).<br> ...
    3 KB (438 words) - 12:32, 5 August 2011
  • ==United Kingdom== ...Serious Fraud Office (United Kingdom)]] is an arm of the Government of the United Kingdom, accountable to the Attorney-General. ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...Insurance Act or section 123 of Public Law 91-508, is liable to the United States Government for a civil penalty of not more than the greater of the amount ( ...ragraph (A) shall be reduced by the amount of any forfeiture to the United States in connection with the transaction with respect to which such penalty is im ...
    9 KB (1,369 words) - 23:09, 1 November 2012
  • ...ices. Further, several sections within the Criminal Division of the United States Department of Justice in Washington, D.C., have expertise in computer-relat ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • ...erwise communicate via an electronic network is an ECSP. See, e.g., United States v. Mullins, 992 F.2d 1472, 1478 (9th Cir. 1993) (airline that provides trav ...s through netscape.net, is a provider of ECS); In re Application of United States for an Order Pursuant to 18 U.S.C. § 2703(D), 157 F. Supp. 2d 286, 289 (S.D ...
    14 KB (2,207 words) - 17:22, 13 April 2011
  • ...pted as an [[encryption]] standard by the Federal government of the United States. It has been analyzed extensively and is now used worldwide, as was the ca ...nada. The use of validated cryptographic modules is required by the United States Government for all unclassified uses of cryptography. The Government of Can ...
    18 KB (2,766 words) - 11:41, 28 March 2008
  • ...United States George W. Bush on December 16, 2003, establishes the United States' first national standards for the sending of commercial e-mail and requires ...rs to get permission before they send marketing messages. It also prevents states from enacting stronger anti-spam protections, and prohibits individuals who ...
    26 KB (4,026 words) - 12:15, 5 May 2011
  • ...the term has the connotation of a positive declaration." See, e.g., United States v. Lewis, 902 F.2d 1176, 1179 (5th Cir. 1990); Lexington Ins. Co. v. W. Pen .... 2007); United States v. Fujii, 301 F.3d 535, 539 (7th Cir. 2002); United States v. Briscoe, 896 F.2d 1476, 1494 (7th Cir. 1990). ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...c library, bookstore or newsstand”). It reflects “the policy of the United States . . . to preserve the vibrantand competitive free market that presently exi ...nconsistent with the provisions of the Act. However, the statute expressly states that it has no effect on federal criminal law, intellectual property law, a ...
    6 KB (919 words) - 14:33, 10 April 2011
  • (d) Jurisdiction. Any action under this section may be brought in any United States district court or in any other court of competent jurisdiction, and shall b ...
    4 KB (689 words) - 12:28, 16 October 2014
  • (d) Jurisdiction. Any action under this section may be brought in any United States district court or in any other court of competent jurisdiction, and shall b ...
    4 KB (689 words) - 12:30, 16 October 2014
  • ...e mark “is widely recognized by the general consuming public of the United States as a designation of source of the goods or services of the mark's owner.” ...se of trademarks or any use protected by the First Amendment to the United States Constitution, which includes gripe sites. In ''Mayflower Transit, L.L.C. v. ...
    10 KB (1,540 words) - 12:16, 21 March 2011
  • ...party to a copyright treaty; (2) the work is first published in the Unites States or a country that is a party to the Universal Copyright Convention; (3) the # '''Foreign Application.''' In many countries outside the United States, authors have personal or “moral rights” apart from and in addition to prop ...
    14 KB (2,130 words) - 06:38, 11 April 2011
  • ...es incarceration and the loss of many other civil liberties. In the United States, a criminal defendant is presumed innocent of the charges against them unti ...
    6 KB (1,070 words) - 10:18, 11 August 2009
  • ...ess with whom the transaction takes place. So a user in one of the United States conducting a transaction with another user in Britain through a server in C ==Internet regulation in the United States== ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...CA amended [[Title 17 of the United States Code|Title 17]] of the [[United States Code]] to extend the reach of copyright, while limiting the liability of th ...ally requires separate legislation by or within each of the Union's member states.) ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...mmonly called '''Sarbanes–Oxley''', '''SarBox''' or '''SOX''', is a United States federal law enacted on July 30, 2002. It is named after sponsors U.S. Senat ...s to comply with the new law. Harvey Pitt, the 26th chairman of the United States Securities and Exchange Commission (SEC), led the SEC in the adoption of do ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...em administrator's common authority to consent to a search under to United States v. Matlock, 415 U.S. 164 (1974). (2) WARNING! This computer system is the property of the United States Department of Justice and may be accessed only by authorized users. Unautho ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...o been reversed and remanded upon review by the Eighth Circuit in ''United States v. Bach'', 310 F.3d 1063 (8th Cir. 2002). ...a person in violation of this section may bring a civil action in a United States district court.) ''See also Camfield v. City of Oklahoma City'', 248 F.3d 1 ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...cts, it may sometimes be called a service mark, particularly in the United States trademark law. * United Kingdom: 1876;– The Bass Brewery Red Triangle was the first trademark to be ...
    39 KB (6,281 words) - 14:29, 26 April 2011
  • In 2004, the United Kingdom enacted the Civil Contingencies Act 2004, instructing emergency ser ...ed States General Accounting Office Y2k BCP Guide] (August 1998). ''United States Government Accountability Office''. ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • The Fourth Amendment states: ...ference with an individual's possessory interests in that property,"United States v. Jacobsen, 466 U.S. 109, 113 (1984), and the Court has also characterized ...
    10 KB (1,477 words) - 13:29, 5 August 2011
  • ...communications are fully protected by the Fourth Amendment. Katz v. United States, 389 U.S. 347, 353-354 (1967). The Government must satisfy stringent proced ...lso been reversed and remanded upon review by the Eighth Circuit in United States v. Bach, 310 F.3d 1063 (8th Cir. 2002). ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...ngoing criminal investigation.” 18 U.S.C. § 2703(d); see also In re United States for an Order Pursuant to 18 U.S.C. 2703(d), 36 F. Supp. 2d 430 (D. Mass. 19 ...erwise communicate via an electronic network is an ECSP. See, e.g., United States v. Mullins, 992 F.2d 1472, 1478 (9th Cir. 1993) (airline that provides trav ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • On September 30, 2005, the four United States Department of the Treasury banking agencies (the Office of the Comptroller ...imelines and use of the varying methodologies being restricted. The United States' various regulators have agreed on a final approach. They have ''required'' ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • In their May 1998 testimony before the United States Senate, the Federal Trade Commission (FTC) discussed the sale of Social Sec ...nd under the Criminal Code 1899 (QLD). Other States and Territories are in states of development in respect of regulatory frameworks relating to identity the ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...the same and fails to deliver it to the officer or employee of the United States entitled to receive it; (B) information from any department or agency of the United States; or ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...en abrogated by the Uniform Single Publication Act (USPA), adopted in most states, which provides that all issues of a mass media communication merge into on In some states, there are legal privileges protecting fair comments about public proceedin ...
    17 KB (2,553 words) - 14:51, 10 April 2011
  • ...erfeit Access Device and Abuse Act that was passed in 1984 and essentially states that, whoever intentionally accesses a computer without authorization or ex ...usively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • In the United States, cryptography is legal for domestic use, but there has been much conflict o Another contentious issue connected to cryptography in the United States is the influence of the National Security Agency in cipher development and ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • ...f information technology related matters in contemporary organizations and states that strategic IT decisions should be owned by the corporate board, rather ...ul operational Service management of IT, developed and maintained by the [[United Kingdom]]'s [[Office of Government Commerce]], in partnership with the [[IT ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...icts the concept of an independent auditor. Changes enacted in the United States in the form of the Sarbanes-Oxley Act prohibit accounting firms from provid In the United States, the main problem is the conflict of interest between widely-dispersed shar ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • (d) The Directive requires member states to provide individuals with judicial remedies and a right to compensation f (e) Article 25 of the Directive prohibits member states from transferring personal data to countries outside the European Union tha ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • ...ion security to the economic and national security interests of the United States. Title III of the [[Media:E-Government-Act-2002.pdf | E-Government Act]], e ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • ...ounting and administrative controls under section 3512 of title 31, United States Code,[3] (known as the “Federal Managers Financial Integrity Act”); and<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...t to inclusion of an article in a collective work.” Id. at 171. The United States Supreme Court agreed with the Second Circuit, finding that “[t]he Publisher ...
    6 KB (1,026 words) - 06:44, 11 April 2011
  • ...Nancy Kassebaum. Title I of HIPAA protects health insurance in the United States coverage for workers and their families when they change or lose their jobs ...the Privacy Rule is not being upheld can file a complaint with the United States Department of Health and Human Services Office for Civil Rights (OCR).<br> ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • * The United Nations -recommended UN/EDIFACT is the only international standard and is p * The United States standard ANSI ASC X12 (X12) is predominant in North America. ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ...ation of Title III to use a pen register or trap and trace device); United States Telecom Ass'n v. FCC, 227 F.3d 450, 453-54 (D.C. Cir. 2000) (contrasting pe ...ent on its way (roughly analogous to the postmark on a letter). See United States v. Forrester, 512 F.3d 500, 510 (9th Cir. 2008) (email to/from addresses an ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...f the Internet has been subject to fierce debate, especially in the United States. ...f the Internet Protocol, has called the term net neutrality a "slogan" and states that he opposes establishing it, but he admits that he is against the fragm ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ==History - United States== ...dicts the concept of an independent auditor. Changes enacted in the United States in the form of the Sarbanes-Oxley Act (in response to the Enron situation a ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...gration authorities in detaining and deporting [[Immigration in the United States|immigrants]] suspected of terrorism-related acts. The act also expanded the ...House of Representatives|House]] by 357 to 66 (of 435) and in the [[United States Senate|Senate]] by 98 to 1 and was supported by members of both the Republi ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...minal evidence will be found in the place searched. See Brinegar v. United States, 338 U.S. 160, 175 (1949). Once a magistrate judge finds probable cause and ...e or contraband that will exist in the location to be searched. See United States v. Reyes, 798 F.2d 380, 382 (10th Cir. 1986) (noting that "in the age of mo ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...transactions this translates to billions of dollars. In 2006, fraud in the United Kingdom alone was estimated at £535 million or US $750–830 million at preva ===United States=== ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • The Fourth Amendment states: ...ference with an individual's possessory interests in that property,"United States v. Jacobsen, 466 U.S. 109, 113 (1984), and the Court has also characterized ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ...e Convention for the Protection of Literary and Artistic Works (Article 2) states: “The expression ‘literary and artistic works’ shall include every producti ...rule, rather than an explicit limitation. Article 9(2) states that Member States may provide for free reproduction in special cases where the acts do not co ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...is, and always will be, folly; but we have staked upon it our all." United States v. Associated Press, 52 F. Supp. 362, 372 (S.D.N.Y. 1943) (opinion of the c ...ct (see subsection D, above), which was upheld as constitutional in United States v. American Library Ass’n, 123 S. Ct. 2297 (2003) (see subsection D(5), abo ...
    32 KB (4,920 words) - 19:22, 10 April 2011
  • ...chnum.htm&r=1&f=G&l=50&s1=7676427.PN.&OS=PN/7676427&RS=PN/7676427 United States Patent and Trademark Office Patent 7,676,427 System and Method of Continuou ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • (4) United States v. The Ohio Art Co., Civ. Action No. 027203 (N.D. Ohio 2002); File No. 022- (5) United States v. Lisa Frank, Inc. (E.D. Va. 2001), File No. 012-3050 (Fed. Trade Comm’n O ...
    31 KB (4,666 words) - 13:19, 26 April 2011
  • ...luded that the potential infringement at issue did not occur in the United States because it “was only completed in Canada once the signal was received and v ...
    27 KB (4,215 words) - 07:04, 11 April 2011
  • ...ed when the government has unchecked access to reading records. See United States v. Rumely, 345 U.S. 41, 57 (1953) (Douglas, J., concurring) (“Once the gove ...
    15 KB (2,359 words) - 19:34, 10 April 2011
  • ...n domestic or foreign institutions that have offices located in the United States. CHIPS is run by CHIP Co. L.L.C., a subsidiary of the Clearing House. ...ecks drawn on depository institutions located in all regions of the United States. ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...ITIL'' and ''IT Infrastructure Library'' are Registered Trade Marks of the United Kingdom's [http://www.ogc.gov.uk/ Office of Government Commerce] (OGC). The ...ed into the Office of Government Commerce (OGC), which is an Office of the United Kingdom's HM Treasury and disappeared as a distinct organization. ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...shrinkwrap license" comes from the packaging on the outside of a CD, which states that opening the package constitutes adherence to the license agreement.) T ...er those terms are "so one-sided as to 'shock the conscience.' " Kinney v. United HealthCare Services, Inc., 70 Cal.App.4th 1322 (Cal.App. 4 Dist., 1999). ...
    18 KB (2,884 words) - 17:00, 13 April 2011
  • Section 230 of Title 47 of the United States Code (47 U.S.C. § 230) was passed as part of the much-maligned Communicatio ...
    38 KB (5,571 words) - 14:45, 10 April 2011