Search results

Jump to navigation Jump to search
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)
  • ...ween the Internet and system components, including the choke router at the Internet, the DMZ router and firewall, the DMZ cardholder segment, the perimeter rou ...
    446 bytes (56 words) - 12:06, 16 June 2010
  • ...older data environment to the Internet such that outbound traffic can only access IP addresses within the DMZ.'''<br> ...ound traffic from the cardholder data environment to the Internet can only access IP addresses within the DMZ.<br> ...
    2 KB (276 words) - 11:07, 16 June 2010
  • ...loyees’ email access. Often, seemingly insignificant paths to and from the Internet can provide unprotected pathways into key systems. Firewalls are a key prot ...-control.jpg]] [[PCI-1.1.3:|PCI-1.1.3 Requirements for a firewall at each Internet connection and between any demilitarized zone (DMZ) and the internal networ ...
    5 KB (702 words) - 12:20, 16 June 2010
  • ...] The ECPA also criminalizes obtaining, altering, or preventing authorized access to electronic storage.[[FN65]] Under the ECPA, it is a crime to break into ...servers:''' Search and seizure of defendant's e-mail files from server of Internet service provider (ISP) by technicians of ISP was reasonable under Fourth Am ...
    3 KB (456 words) - 11:09, 18 February 2009
  • ...d turn off computer to control information that came into their homes from internet. U.S.C.A. Const. Amend. 1; M.C.L.A. § 722.675(1). Cyberspace Communications ...preventing use of library computers to view online pornography. Children's Internet Protection Act, § 1701, 114 Stat. 2763A-335. Miller v. Northwest Region Lib ...
    4 KB (578 words) - 12:38, 18 February 2009
  • ...nces, network segmentation, and intrusion detection) are used to authorize access and control information flows from and to networks. ...has policies and procedures regarding program development, program change, access to programs and data, and computer operations, which are periodically revie ...
    6 KB (781 words) - 12:31, 23 June 2006
  • ...ime. California, for example, defines computer crime to be the intentional access of a computer system "for the purpose" of a scheme or artifice to defraud o ...zed access to computer systems, have argued in defense that they attempted access to computer systems not knowing what systems they might get into.[[FN5]] ...
    3 KB (513 words) - 18:22, 22 February 2009
  • ...activity. An individual with a remote terminal at his or her home may get access to the victim's computer system from virtually anywhere there is a phone co ...from gaining access to a computer that is not reflected by a change in the access code. ...
    4 KB (717 words) - 18:04, 22 February 2009
  • ...e Internet (for example, laptops used by employees), and which are used to access the organization’s network, have personal firewall software installed and a ...
    442 bytes (66 words) - 12:09, 16 June 2010
  • :'''Prohibit direct public access between external networks and any system component that stores cardholder i :* To determine that direct access between external public networks and components storing cardholder data are ...
    2 KB (308 words) - 11:40, 3 March 2007
  • =='''Sample Internet Acceptable Use Standard'''== This Internet Acceptable Use Standard builds on the objectives established in the [[Sampl ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • Under federal law, it is illegal to use any unauthorized access device, including a computer, to obtain money, goods, services, or any othe ...uirement of the Digital Millennium Copyright Act (DMCA), where it provided Internet service provider with information that identified two newsgroup sites creat ...
    4 KB (642 words) - 11:15, 18 February 2009
  • ...sed had a password known only to her, and system's log-on banner described access to "monitor" the computer system, not to engage in law enforcement intrusio ...ted that in general, all computer and electronic files should be free from access by any but the authorized user of those files, and defendant's computer was ...
    5 KB (741 words) - 18:58, 22 February 2009
  • ...ts and passwords have been changed. (Use vendor manuals and sources on the Internet to find vendor-supplied accounts and passwords.)'''<br> ::::* Default SNMP community strings on access points were changed. ...
    3 KB (369 words) - 14:23, 27 February 2007
  • ...re sent from your computer through the Internet via cleartext. Anyone with access to the medium used to carry the data (the routers, computers, telecommunica ...
    1 KB (218 words) - 16:40, 14 June 2007
  • ...e Internet (for example, laptops used by employees), and which are used to access the organization’s network, have personal firewall software installed and a ...standards are acceptable and that updates are current prior to authorizing access to employee-owned or mobile end point devices.'''<br> ...
    2 KB (296 words) - 10:57, 16 June 2010
  • :'''DCIDs: Director of Central Intelligence Directives.''' Protecting Special Access Program Information Within Information Systems policy excerpt: [[Media:JAFA ...evelopment of Internet Acceptable Use Standards:''' [[Media:Development-of-Internet-Acceptable-Use-Standards.pdf]]<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • Third party personnel who have been granted access to Company information or systems are covered by this standard and must com ...any information systems and equipment including Electronic Mail Resources, Internet Resources, and Telecommunications Resources.<br> ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • ...h as Secure Sockets Layer (SSL), Point-to-Point Tunneling Protocol (PPTP), Internet Protocol Security (IPSEC) to safeguard sensitive cardholder data during tra ...] (e.g., SSL) wherever cardholder data is transmitted or received over the Internet by performing the following:'''<br> ...
    2 KB (346 words) - 12:22, 31 January 2014
  • ...ing for schools and libraries on the installation of filtering software on Internet-ready computers to block objectionable content. ...) the E-rate program, under the Communications Act of 1934, which provides Internet and telecommunications subsidies to schools and libraries. ...
    5 KB (707 words) - 19:01, 10 April 2011
  • ...Develop and maintain secure systems and applications and implement Strong Access Control Measures. == * Unscrupulous individuals use security vulnerabilities to gain privileged access to systems. Many of these vulnerabilities are fixed via vendor security pat ...
    4 KB (578 words) - 18:46, 28 February 2007
  • ...ous, fraudulent, or economic reasons. Additionally, the degree of internal access granted to some users increases the risk of accidental damage or loss of in ...n information on all new employees. The sensitivity of a particular job or access level may warrant additional background and credit checks. Institutions sho ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ...e National Institute of Standards and Technology (NIST), CobiT, HIPAA, the Internet Security Forum (ISF), and ISO 27002 each provide robust guidance on physica ...nes Physical and Environmental Security objectives to prevent unauthorized access, damage and interference to business premises and information; prevent loss ...
    4 KB (592 words) - 19:28, 14 June 2007
  • ...ad within minutes (some say even seconds) with devastating consequences to Internet and otherwise. ...to recognize the safety of a limited set of programs (e.g., those that can access or modify only a given subset of machine resources) while rejecting both so ...
    4 KB (570 words) - 19:02, 14 June 2007
  • By not allowing access to the Internet from company resources.<br> ...
    2 KB (305 words) - 17:31, 3 August 2006
  • By not allowing access to the Internet from company resources.<br> ...
    2 KB (309 words) - 17:34, 3 August 2006
  • ...y to the Internet (e.g., laptops used by employees), and which are used to access the organization’s network, have personal firewall software installed and a ...
    3 KB (340 words) - 11:39, 3 March 2007
  • ...ed by others to perform work on Company premises, or who have been granted access to Company information or systems, are covered by this standard and must co ...any information systems and equipment including Electronic Mail Resources, Internet Resources, and Telecommunications Resources.<br> ...
    6 KB (857 words) - 12:22, 19 July 2007
  • ...e, or have read or write permission to a socket for communicating over the Internet.<br> ...
    2 KB (341 words) - 18:37, 14 June 2007
  • ...the logging information is in line with business requirements in terms of access rights and retention requirements.<br> ::'''4. Risk: Users may have inappropriate access to the application system.'''<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...sms. The code also can be hidden in programs that are downloaded from the Internet or brought into the institution on diskette. At times, the malicious code ...Most malicious code is general in application, potentially affecting all Internet users with whatever operating system or application the code needs to funct ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ...ed by others to perform work on Company premises, or who have been granted access to and use of Company information or systems are covered by this standard a ...able Use Standard:|'''Sample Electronic Mail Acceptable Use Standard''']], Internet Resources, and Telecommunications Resources.<br> ...
    7 KB (953 words) - 14:13, 1 May 2010
  • ...es also have attempted to regulate material distributed to minors over the Internet, with mixed success. ...itutional a state statute that prohibited sending sexual material over the Internet with the intent to seduce minors. But see Hatch v. Superior Court, 80 Cal. ...
    4 KB (639 words) - 19:02, 10 April 2011
  • ...to restrict access to sites based on geographic locale of each particular Internet user, COPA essentially required that every publisher abide by the most rest ...nment must independently link all images upon which conviction is based to Internet. 18 U.S.C.A. § 2252A(a)(5)(B). U.S. v. Henriques, 234 F.3d 263 (5th Cir. 20 ...
    9 KB (1,358 words) - 11:00, 18 February 2009
  • ...to restrict access to sites based on geographic locale of each particular Internet user, COPA essentially required that every publisher abide by the most rest ...nment must independently link all images upon which conviction is based to Internet. 18 U.S.C.A. § 2252A(a)(5)(B). U.S. v. Henriques, 234 F.3d 263 (5th Cir. 20 ...
    9 KB (1,359 words) - 12:35, 18 February 2009
  • ...each type of crime has a range of punishments. In California, for example, access to defraud can be treated as a felony, involving punishment of up to three ...ed sexual conduct was not available after conviction of attempting via the internet to persuade a minor to engage in sexual activity and traveling in interstat ...
    4 KB (680 words) - 12:52, 18 February 2009
  • ...ave committed the crime. Where a log is maintained of individuals who have access to the computer, it may be possible to elicit an admission that no effort w ...of expert regarding availability of allegedly comparable materials on the Internet, as mere availability of such materials did not show that community accepte ...
    3 KB (431 words) - 21:02, 22 February 2009
  • ...fferent coding errors can be exploited by an attacker to gain unauthorized access to a computer system. In addition, design considerations for minimizing the ...nt is also relevant to traditional dial-up users (users who connect to the Internet using a modem).<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...an include advising employees of the existence of a trade secret, limiting access to the information to a "need to know basis," requiring employees to sign c ==Disclosure over the Internet== ...
    7 KB (1,065 words) - 16:48, 13 April 2011
  • :* How would the department function if mainframe, network and/or Internet access were not available? ...
    3 KB (453 words) - 18:45, 25 April 2007
  • Mere allegation that senders of unsolicited e-mails failed to remove Internet access service provider within ten days of telephone call to senders' general coun ...e-mail headers referring to non-functional e-mail address as sender and an Internet domain not linked to sender did not make the headers materially false or ma ...
    8 KB (1,176 words) - 10:17, 5 May 2011
  • ...t access to media, while ensuring that all employees have authorization to access the minimum data required to perform their responsibilities. More sensitive ...beacons, and remote deletion capabilities. The latter two controls can be Internet-based. Homing beacons send a message to the institution whenever they are ...
    9 KB (1,246 words) - 18:20, 10 April 2007
  • ...ata center has adequate physical security controls to prevent unauthorized access to the data center. :* Data Center Personnel – All data center personnel should be authorized to access the data center (key cards, login ID’s, secure passwords, etc.). Data cente ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...rey v. Demon Internet Ltd., 1999 WL 477647 (High Ct. U.K. 1999). Defendant Internet service provider, hosted a newsgroup that contained a posting defamatory of ...available online will be considered to be republished each time that users access it. Defendant printed articles identifying plaintiff as “a suspected Mafia ...
    6 KB (895 words) - 14:52, 10 April 2011
  • ...jurisdictions and are subject to laws independent of their presence on the Internet. Trout, B. (2007). "Cyberlaw: A Legal Arsenal For Online Business", New Yor ...mits of that nation. This is particularly problematic as the medium of the Internet does not explicitly recognize sovereignty and territorial limitations. Ther ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...on service is provided;” or “(2) intentionally exceeds an authorization to access that facility; and thereby obtains...[an] electronic communication while it ...t Service Provider Association, Electronic Evidence Compliance—A Guide for Internet Service Providers, 18 BERKELEY TECH. L. J. 945, 965 (2003) ([No Stored Comm ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • *Implement strict access controls and permissions. ...s largest payment networks, Visa and MasterCard have established mandatory Internet and Intranet security guidelines that merchants must follow known as the Pa ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • * Put a firewall between your server and the Internet. * Allow linked server access only to those logins that need it. ...
    7 KB (1,018 words) - 13:53, 14 May 2007
  • The Federal Trade Commission has formed an Internet Advertising Group within the Bureau of Consumer Protection’s Division of Ad ...Marketing on the Internet: The Rules of the Road,”; (iii) “Selling on the Internet: Prompt Delivery Rules,”; (iiii) “How to Comply with the Children’s Online ...
    16 KB (2,394 words) - 13:40, 26 April 2011
  • ...serve the vibrantand competitive free market that presently exists for the Internet and other interactive computer services, unfettered by Federal or State reg ===Protections for Restricting Access=== ...
    6 KB (919 words) - 14:33, 10 April 2011
  • ...detection and repair software, security awareness, and appropriate system access and change management controls.''' ...rs should ensure that qualified sources, e.g. reputable journals, reliable Internet sites or suppliers producing software protecting against malicious code, ar ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ...keys or other failures in the encryption process can deny the institution access to the encrypted data. The products used and administrative controls shoul :* Storing keys, including how authorized users obtain access to keys; ...
    13 KB (2,019 words) - 11:46, 28 March 2008
  • ...graphy trial of material obtained by user after user obtained unauthorized access to computer; user had provided information leading to conviction of child p ...
    6 KB (951 words) - 18:43, 22 February 2009
  • ...in doing so, accesses, permits access to, causes access to or attempts to access a computer, computer network, computer data, computer resources, computer s ...Russia, gained root access to business's computers in Connecticut obtained access to business's intangible property, for purposes of Computer Fraud and Abuse ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • :* Internet connectivity :* Increased access to systems and customer information ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...ing the level of First Amendment protection that should be applied to” the Internet). ==Right to Speak Anonymously on the Internet== ...
    15 KB (2,359 words) - 19:34, 10 April 2011
  • * galleta : recover Internet Explorer cookies * hogwash : access control based on snort sigs ...
    8 KB (1,058 words) - 12:30, 5 August 2011
  • ...rtext-only attacks). In a [[known-plaintext attack]], the cryptanalyst has access to a ciphertext and its corresponding plaintext (or to many such pairs). In ...evices, and are called ''[[side-channel attack]]s''. If a cryptanalyst has access to, say, the amount of time the device took to encrypt a number of plaintex ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • Category: Informational COLT Internet This memo provides information for the Internet community. It does ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • Most Internet service providers, websites and other online services ask users for some pe ...ds viewed, purchases made and more. This record of a user’s session on the Internet is sometimes called “clickstream” or “transactional” data. Examples of such ...
    14 KB (2,207 words) - 17:22, 13 April 2011
  • ...he court rejected plaintiff’s argument that the ongoing availability of an Internet publication constituted a continuing wrong that extended the one-year statu ...The court applied the single publication rule to a letter published on the Internet. ...
    17 KB (2,553 words) - 14:51, 10 April 2011
  • ...n significant legislative steps to regulate electronic data protection and internet commerce. However, this regime remains a work in progress. * Company's internet address or URL ...
    8 KB (1,135 words) - 17:53, 29 August 2014
  • ...cient, it has become much more important as information technology and the Internet have made it easier to collect PII, leading to a profitable market in colle ...ith any required security code, access code, or password that would permit access to an individual's financial account. (f) For purposes of this section, "pe ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • ...rs or governments on consumers' access to networks that participate in the internet. Specifically, network neutrality would prevent restrictions on content, si ...) The possibility of regulations designed to mandate the neutrality of the Internet has been subject to fierce debate, especially in the United States. ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...r to register by name and to click an "I agree" button before gaining full access to the site. ...screen below the download button. The court held that a reasonably prudent Internet user in circumstances such as these would not have known or learned of the ...
    18 KB (2,884 words) - 17:00, 13 April 2011
  • To verify a digital signature, the verifier must have access to the signer's public key and have assurance that it corresponds to the si ...ency, but also of reliability. An open system of communication such as the Internet needs a system of identity authentication to handle this scenario. ...
    22 KB (3,420 words) - 15:18, 3 April 2007
  • ==Access Control== ...l is to allow access by authorized individuals and devices and to disallow access to all others.<br> ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • # Access—data subjects should be allowed to access their data and make corrections to any inaccurate data; and ...protection rules. The directive was written before the breakthrough of the Internet, and to date there is little jurisprudence on this subject. ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • f) Does the banner state which users are authorized to access the network and the consequences of unauthorized use of the network? Such n ...vernment computer network may require a broadly worded banner that permits access to all types of electronic information. ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...dition, the DMCA heightens the penalties for copyright infringement on the Internet. Passed on October 12, 1998 by a unanimous vote in the United States Senate ...he field of copyright, the exemption from direct and indirect liability of internet service providers and other intermediaries (Title II of the DMCA), was sepa ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...nowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained information that has been det ...entionally accesses a computer without authorization or exceeds authorized access, and thereby obtains-- ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...yed by others to perform work on Company premises or who have been granted access to Company information or systems, are covered by this policy and must comp ...nal practice of using social engineering over the telephone system to gain access to private personal and financial information from the public for the purpo ...
    14 KB (2,165 words) - 16:53, 22 September 2009
  • ...no, 521 U.S. 844 (1997), cases demonstrate, regulation of content over the Internet is challenging in light of the protections guaranteed under the First Amend ...adequate procedural safeguards. This holding is reversed by the Children’s Internet Protection Act (see subsection D, above), which was upheld as constitutiona ...
    32 KB (4,920 words) - 19:22, 10 April 2011
  • ...nal security, Congress has been active in changing the legal landscape for access to real-time and stored communications. Despite these amendments, detailed .... Title II of ECPA created a new chapter of the criminal code dealing with access to stored communications and transaction records, commonly known as the “[[ ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...at employees authorized by the institution will have reasonable and timely access to the work papers prepared by the outsourcing vendor. ...to maintain proprietary software that allows the institution and examiners access to electronic work papers during a specified period. ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...or was convicted under the Act for causing damage and gaining unauthorized access to federal interest computers. This case in part led to the 1996 amendment ...s "patently unlawful", "bad faith" and "at least gross negligence" to gain access to stored email is a breach of this act and the [[Stored Communications Act ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...Federal Trade Commission has actively asserted its authority to challenge Internet privacy policies and practices that may be “unfair and deceptive” and thus # Access for consumers to their own personal information to ensure accuracy. ...
    31 KB (4,666 words) - 13:19, 26 April 2011
  • ...m of speech, but this section survived and has been a valuable defense for Internet intermediaries ever since. "By its plain language, § 230 creates a federal # Carafano v. Metrosplash.com, Inc., 339 F.3d 1119 (9th Cir. 2003) (Internet dating service provider was entitled to Section 230 immunity from liability ...
    38 KB (5,571 words) - 14:45, 10 April 2011
  • ...er. In this case there is now effectively more than one key that provides access: the old [[cryptographic key]] and a ''key'' composed of the newly discover ...bilities in various versions of Microsoft Windows, its default web browser Internet Explorer, and its mail applications Microsoft Outlook and Outlook Express h ...
    11 KB (1,798 words) - 14:44, 14 June 2007
  • ...nal security, Congress has been active in changing the legal landscape for access to real-time and stored communications. Despite these amendments, detailed .... Title II of ECPA created a new chapter of the criminal code dealing with access to stored communications and transaction records, commonly known as the “St ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...s other than sending a reply email message or visiting a single page on an Internet website. ...t or promotion of a commercial product or service (including content on an Internet website operated for a commercial purpose)." It exempts "transactional or r ...
    26 KB (4,026 words) - 12:15, 5 May 2011
  • ...b site at the time they gave permission for the use of their names to gain access. Thus, the pilots were not “users” of the Web site when they gave authoriza ...ng defendant from using or disclosing information gained from unauthorized access to a protected computer in violation of the CFAA. Defendant did not immedia ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • ...entionally accesses a computer without authorization or exceeds authorized access, and thereby obtains information from any protected computer if the conduct ==Access== ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • * Inappropriate user access to information systems :* Access all records and staff necessary to conduct the audit ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • Acronym for access control list '''Administrative access''' ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...steal credit card details have all contributed to the very rapid growth of Internet fraud. * [[Identity and Access Management]] ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...econdary access vectors such as Internet facing application administrative access. * Firewall egress rules permit unrestricted access from trusted networks inside going out facilitating data leakage through al ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...s very important to manage and limit access to your systems. This includes access for your employees, partners and even customers. ...of the institution’s information technology as well as to identifying the access and storage points for confidential customer and corporate information. ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • The growth of the Web and other Internet technologies has and will continue to raise a number of copyright issues co ...t show evidence sufficient that a reasonable fact finder, considering both access and similarity of the works, could find that the second work was copied fro ...
    27 KB (4,215 words) - 07:04, 11 April 2011
  • ...eir acquisition and use. This marks the first time that the public has had access to a cipher approved by NSA for encryption of TOP SECRET information. Many ...0 million chosen plaintexts. Some say the attack is not practical over the internet with a distance of one or more hops. ...
    18 KB (2,766 words) - 11:41, 28 March 2008
  • ...ile containing both written text and file creation, last written, and last access dates; chat room logs that identify the participants and note the time and ...ternet technologies permit users to send effectively anonymous emails, and Internet Relay Chat channels permit users to communicate without disclosing their re ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...r, the court stated that its holding does not affect the legal remedies of Internet service providers (ISPs) against senders of unsolicited commercial email (U ...was unauthorized because “eBay’s servers are private property, conditional access to which eBay grants the public.” Id. at 1070. The court also held that the ...
    13 KB (1,987 words) - 10:22, 12 April 2011
  • Title III and the Pen/Trap statute regulate access to different types of information. Title III permits the government to obta ...tle III. The primary difference between an Internet pen/trap device and an Internet Title III intercept device is that the former is designed to capture and re ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...nd inventors by the provision of a special reward, and to allow the public access to the products of their genius after the limited period of exclusive contr ...erlying source code, is deemed published when the site becomes live on the Internet. See Getaped.com, Inc. v. Cangemi, 188 F. Supp. 2d 398, 402 (S.D.N.Y. 2002) ...
    14 KB (2,130 words) - 06:38, 11 April 2011
  • ...be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The v * Exploiting insider access and abusing the rights of privileged IT users to access personal data on their employers' systems ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...ore, customize and listen to the recordings contained on their CDs via the Internet. Id. at 350. MP3.com purchased tens of thousands of CDs in which plaintiffs ...y price" (internal quotations omitted). The website did not sell copies or access, and the defendants maintained they did not earn advertising revenue. Thoug ...
    31 KB (4,913 words) - 07:20, 11 April 2011
  • ...(finding no reasonable expectation of privacy in information placed on the Internet); United States v. Butler, 151 F. Supp. 2d 82, 83-84 (D. Me. 2001) (finding ...mation to third parties electronically, such as by sending data across the Internet, or a user may leave information on a shared computer network. When law enf ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ...ations record additional information on the hard drive, such as records of Internet usage, the attachment of peripherals and flash drives, and the times the co ...individual put contraband on the hard drive, rather than someone else with access to the computer. This might be shown through evidence that a particular use ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...one, e-mail, and financial records without a court order, and the expanded access of law enforcement agencies to business records, including library and fina ...triot/ Analysis of Specific USA PATRIOT Act Provisions: Pen Registers, the Internet and Carnivore], [[Electronic Privacy Information Center]]. Accessed Decembe ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...orks available to the public “in such a way that members of the public can access these works from a place and at a time individually chosen by them”. Most n ...ally. The owner may, for example, post copyright protected material on the Internet and leave it free for anybody to use, or may restrict the abandonment to no ...
    46 KB (7,265 words) - 12:09, 2 May 2010
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)