Search results

Jump to navigation Jump to search
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)
  • ...ent's effort to avoid a transaction. See Baum, supra note 16, at 6 (1994). See Guideline 1.20 (nonrepudiation), particularly Comment 1.20.1. ...
    236 bytes (29 words) - 12:33, 16 October 2014
  • ==See Also== ...
    510 bytes (66 words) - 22:59, 1 November 2012
  • ...ic examination of the advantages and disadvantages of formal requirements, see Jhering, supra note 5, at 470-504. ...
    787 bytes (112 words) - 12:40, 16 October 2014
  • 2
    See, e.g., U. C. C. § 1-201(39) (1992). ...
    55 bytes (8 words) - 12:37, 16 October 2014
  • It also provides guidance to those advising, informing, or assisting directors. ==See also== ...
    1 KB (147 words) - 12:21, 2 May 2010
  • ...which provides assurance that the information signed has not been altered. See Guideline 35 (authentication). ...
    205 bytes (26 words) - 12:28, 16 October 2014
  • == See also == ...
    2 KB (237 words) - 11:16, 27 October 2012
  • See generally Ford, supra note 16, at 71-75; Charlie Kaufman, Radia Perlman & M ...
    230 bytes (29 words) - 12:38, 16 October 2014
  • == See also == ...
    2 KB (272 words) - 11:15, 27 October 2012
  • ...saction is a license of intellectual property rather than a sale of goods. See Softman Products Co., LLC v. Adobe Sys., Inc., 171 F. Supp. 2d 1075 (C.D. C ...dify [[Uniform Commercial Code]], by introducing new article (Article 2B), also known as UCC2B. ...
    2 KB (317 words) - 11:12, 30 October 2011
  • ...izations or even deny them access for not meeting network operating rules. Also, if fraud occurs and your organization has not completed the audit requirem ==See Also== ...
    2 KB (235 words) - 09:48, 23 October 2012
  • ...have demonstrated a purpose to thwart interception by changing facilities. See United States v. Gaytan, 74 F.3d 545 (5th Cir. 1996); United States v. Pett ...l, an Assistant Attorney General, or an Acting Assistant Attorney General. See 18 U.S.C. § 2518(11)(a)(i) and (b)(i). ...
    2 KB (239 words) - 14:57, 21 May 2010
  • ==See also== ...
    2 KB (249 words) - 10:56, 27 October 2012
  • ...more thorough examination of properties desirable in a digital signature, see generally Bruce Schneier, Applied Cryptography: Protocols, Algorithms and S ...
    394 bytes (48 words) - 12:36, 16 October 2014
  • See generally Ford, supra note 16, at 75-84. Computer Communications Security 7 ...
    363 bytes (43 words) - 12:40, 16 October 2014
  • 1
    ...g assurance that the message has not been modified or replaced in transit. See Guideline 28 (authentication). ...
    394 bytes (57 words) - 12:40, 16 October 2014
  • == See also == ...
    2 KB (298 words) - 14:25, 23 April 2010
  • *'''XML E-Billing version 2''', ratified in 2006 but yet to see adoption, is intended to improve upon LEDES 2000. == See also == ...
    3 KB (412 words) - 11:45, 27 August 2011
  • ...assessed both currently and in the light of future technological advance. See generally, Schneier, supra note 18, at § 7.5, 166-67. ...
    402 bytes (62 words) - 12:39, 16 October 2014
  • :Section 101(c)(1)(C) states that the consumer also ''"consent electronically, in a manner that reasonably demonstrates that th ==See also== ...
    3 KB (456 words) - 11:26, 30 October 2011
  • == See also == ...
    4 KB (523 words) - 10:24, 23 April 2010
  • ...isk management]], [[Change_control | change management]], and controls. It also provides guidance relating to accountability and role types. == See also == ...
    3 KB (461 words) - 14:19, 23 April 2010
  • ...anisms are not enough to prevent difficult factual questions from arising. See, e.g., Citizens Nat'l Bank of Downers Grove v. Morman, 78 Ill. App. 3d 1037 ...
    661 bytes (98 words) - 12:28, 16 October 2014
  • ==See Also== ...
    5 KB (705 words) - 11:39, 30 May 2015
  • ...tion and the other has an incentive to prove that it was made or received. See Charles R. Merrill, A Cryptographic Primer, The Internet and Business: A La ...
    1 KB (144 words) - 12:26, 16 October 2014
  • == See also == ...
    5 KB (785 words) - 11:34, 27 October 2012
  • ...ctronic data storage and retrieval device as in a closed container."). See also United States v. Long, 64 M.J. 57 (CAAF 2006) (finding REOP in emails defen ...omputer." United States v. Walser, 275 F.3d 981, 986 (10th Cir. 2001). But see United States v. Gorshkov, 2001 WL 1024026, at *2 (W.D. Wash. May 23, 2001) ...
    5 KB (848 words) - 13:21, 26 April 2011
  • ...n electronic or other medium and is retrievable in perceivable form.." See also, Model Law on Electronic Commerce, United Nations Commission on Internation ...
    1 KB (161 words) - 12:29, 16 October 2014
  • ...phreakers" (i.e., hackers who penetrate telecommunications computers). It also specifically includes those computers used in "foreign" communications. Wit ==See also== ...
    5 KB (773 words) - 11:40, 27 August 2011
  • ...dustry-initiated rules. Laws have been passed by nearly all the US states (see partial list below). The first state to pass a credit freeze law was Califo ...dit report before issuing a loan in the borrower's name. If lenders cannot see the borrower's credit report, it is unlikely the lender will issue a loan i ...
    4 KB (663 words) - 12:59, 12 November 2011
  • ...f wire and electronic communications unless a statutory exception applies. See 18 U.S.C. § 2511(1). In general, these prohibitions bars third parties (inc ...property with their subscribers' right to privacy in their communications. See United States v. Harvey, 540 F.2d 1345, 1351 (8th Cir. 1976) ("The federal ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • ...ntire categories of control may not be deemed necessary. The standards are also open ended in the sense that the information security controls are 'suggest ...izations in the telecomms industry (see [[ISO/IEC 27011]]) and healthcare (see [[ISO 27799]]), with additional guidelines for the financial services and o ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...a spoken defamation. State laws often define defamation in specific ways. See, e.g., California Civ. Code §§ 44, 45, 45a, 46. ...statement whose “gist” or “sting” is substantially true is not actionable. See, e.g., Masson v. New Yorker Magazine, 501 U.S. 496, 516 (1991) ("[A] statem ...
    9 KB (1,422 words) - 14:29, 10 April 2011
  • Note: See subpart F of part 597 for the relationship between this section and part 59 ...
    1 KB (204 words) - 23:05, 1 November 2012
  • ...y with certain provisions of the Federal electronic surveillance statutes. See the Criminal Resource Manual at 32 for additional discussion of video surve ...
    2 KB (227 words) - 15:30, 21 May 2010
  • ...Press, Inc., No. 93 Civ. 2515, 1994 WL 419847 (S.D.N.Y. May 4, 1994); see also Telnikoff v. Matusevitch, 25 Media L. Rep. 2473 (Md. Ct. App. 1997), aff’d, ...a warning that the allegations might be untrue was not only defamation but also irresponsible journalism. ...
    6 KB (895 words) - 14:52, 10 April 2011
  • ...e schemes, but providing adequate security for many types of applications. See generally Schneier, supra note 18, at § 2.7, 41-44. ...
    2 KB (244 words) - 12:37, 16 October 2014
  • ...tional rule against liability without fault.” Lewis, 83 F.R.D. at 463; see also Gertz v. Robert Welch, Inc., 418 U.S. 323, 347 (1974). Consequently, those ...ebate about who is or is not a “distributor” or “publisher” in cyberspace. See, e.g., Stratton Oakmont, 23 Media L. Rep. at 1794 (holding that online serv ...
    6 KB (919 words) - 14:33, 10 April 2011
  • ...ns, in breach of a confidential relationship, to acquire the trade secret. See, e.g., Data Gen. Corp. v. Grumman Sys. Support Corp., 36 F.3d 1147, 1165 (1 ...ormation to its licensees, vendors, or third parties for limited purposes. See, e.g., Rockwell Graphic Sys., Inc. v. DEV Industries, Inc., 925 F.2d 174 (7 ...
    7 KB (1,065 words) - 16:48, 13 April 2011
  • ...ion in digital form, the full range of IA encompasses not only digital but also analog or physical form. == See also == ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ==See also== ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...9 U.S. 340, 349 (1991). Only expression, but not ideas, are copyrightable. See 17 U.S.C. § 102(b); Eldred v. Ashcroft, U.S. 537, 219 (2003); Baker v. Seld ....S. 769 (2003) (rejecting constitutional challenge to term extension); see also Dastar Corp. v. Twentieth Century Fox Film Corp., 539 U.S. 23, 31 (2003) (a ...
    14 KB (2,130 words) - 06:38, 11 April 2011
  • ...tutional protection in one community may enjoy full protection in another. See Miller v California, 413 U.S. 15, 32-33 (1973). Federal venue rules permit See main article on 2257 Reporting Requirements. ...
    6 KB (925 words) - 18:53, 10 April 2011
  • ...hat] is readily accessible to the general public." 18 U.S.C. § 2511(2)(g). See, e.g. Orin S. Kerr, A User’s Guide to the Stored Communications Act, and a ...exception for a civil discovery order on behalf of a private party."); see also Federal Trade Comm’n v. Netscape Communications Corp., 196 F.R.D. 559, 561 ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • ...ss took a new approach with the Children’s Internet Protection Act (CIPA). See, e.g. Reno v. ACLU, 521 U.S. 844 (1997) (overturning the Communications Dec ...and allows local determinations as to what content is suitable for minors. See 47 U.S.C. § 254(h)(7)(D), (l)(2). CIPA was challenged in American Library A ...
    5 KB (707 words) - 19:01, 10 April 2011
  • ...oes not apply to those employees and other parties with a specific need to see full credit card numbers. ...
    2 KB (346 words) - 12:22, 31 January 2014
  • ...'s] name or likeness." Restatement (Second) of Torts sec. 652A (1977); see also William L. Prosser, Privacy, 48 Cal. L. Rev. 383, 398-407 (1960). The right ...connection between the use and the commercial purpose. Id. at 417-18; see also Michaels v. Internet Entmt. Group, Inc., 5 F. Supp.2d 823, 837 (C.D. Cal. 1 ...
    11 KB (1,744 words) - 16:53, 13 April 2011
  • ...ated electronic records and signatures which are not part of a transaction also are not covered by this Act.'' ==See Also== ...
    9 KB (1,499 words) - 11:31, 30 October 2011
  • ...e type of works protected by the Copyright Act under Sections 102 and 103. See 17 U.S.C. § 301. ...ional Basketball Ass’n v. Motorola, Inc., 105 F.3d 841 (2d Cir. 1997); see also International News Serv. v. Associated Press, 248 U.S. 215 (1918). The elem ...
    10 KB (1,594 words) - 10:19, 12 April 2011
  • ...“Back” button or by generating repeated pop-up windows (“mousetrapping”). See http://www.ftc. gov/opa/2001/10/cupcake.htm (FTC charges company that pract ...arch engine results without clear disclosure that they are advertisements. See ategory_id=24&article_id=33; “FTC Staff Recommendations to Search Engines: ...
    16 KB (2,394 words) - 13:40, 26 April 2011
  • In addition to direct requests for information, most online services also use some form of tracking technology to collect information while a user “s ...its. Important to website operators and their advertisers, such technology also allows Web sites to develop profiles of page views (“hits”) to the site or ...
    14 KB (2,207 words) - 17:22, 13 April 2011
  • ...I, leading to a profitable market in collecting and reselling PII. PII can also be exploited by criminals to Stalking or [[identity theft|steal the identit The combination of a name with a context may also be considered PII; for example, if a persons' name is on a list of patients ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • ...t to Orin S. Kerr, principal author of the 2001 edition. The editors would also like to thank the members of the CHIP working group.<br> ...does not have the force of law or a U.S. Department of Justice directive. See United States v. Caceres, 440 U.S. 741 (1979).<br> ...
    3 KB (438 words) - 12:32, 5 August 2011
  • ...tute begins to run at the earliest distribution of any copy of that issue. See Strick v. Superior Court, 143 Cal. App. 3d 916, 922 (1983). Hebrew Academy ...he Internet–is foreclosed by Traditional Cat Ass’n, 118 Cal.App.4th 392"). Also, posting links on a website to allegedly defamatory statements, or sending ...
    17 KB (2,553 words) - 14:51, 10 April 2011
  • ...mark is inherently distinctive or that it has acquired secondary meaning. See, e.g., A.J. Canfield Co. v. Honickman, 808 F.2d 291 (3d Cir. 1986). ...confusion in the marketplace as to source or origin of a good or service. See Accuride Int’l, Inc. v. Accuride Corp., 871 F.2d 1531 (9th Cir. 1989). Like ...
    17 KB (2,794 words) - 10:00, 13 April 2011
  • ...e. Thus, in the U.S., Jake Baker faced criminal charges for his e-conduct (see Free Speech), and numerous users of peer-to-peer file-sharing software were ...or by whom the law of the Internet will be enforced. Instead, the authors see market mechanisms, like those that Medieval merchants used, guiding Interne ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...are development, and these examples include many ''Shrinkwrap'' companies (also called ''commercial-off-the-shelf'' or "COTS" firms or ''software package'' ==See also== ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...ole focused on the governance and control of IT at an enterprise level. It also requires passing a 4-hour test, designed to evaluate an applicant's underst == See also == ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...-settled that the First Amendment shelters the right to speak anonymously. See Buckley v. Am. Constitutional Law Foundation, 525 U.S. 182, 200 (1999) (inv ...y before enforcement of subpoenas to identify anonymous Internet speakers. See, e.g., Dendrite, 775 A.2d at 771 (strict procedural safeguards must be impo ...
    15 KB (2,359 words) - 19:34, 10 April 2011
  • ...e injury." Thrifty-Tel, Inc. v. Bezenek, 46 Cal. App. 4th 1559 (1996); see also America Online, Inc. v. IMS, 24 F.Supp.2d 548, 550 (E.D.Va.1998) ("A trespa ...defendant's unauthorized use proximately resulted in damage to plaintiff. See e.g. Thrifty-Tel, Inc. v. Bezenek, 46 Cal. App. 4th 1559 (1996) (holding th ...
    13 KB (1,987 words) - 10:22, 12 April 2011
  • In addition to the three big CRAs, the FCRA also classifies dozens of other information technology companies as "nationwide ...ta deleted because it was in error. The accuracy of credit report data was also mentioned in written testimony by Allstate Insurance before the Michigan in ...
    12 KB (1,814 words) - 12:01, 19 July 2012
  • ...e duty to screen registrants for potential trademark violations. The court also held that defendant did not commit contributory infringement merely by allo ...orrective action. The court also held that the Communications Decency Act (see Chapter 1 (B)(3) above) would not shield ISPs from secondary liability for ...
    8 KB (1,249 words) - 10:18, 13 April 2011
  • ...ates real-time electronic surveillance in federal criminal investigations. See [[Privacy: Wiretap Act | main article on Wiretap Act]]. 18 U.S.C. §§ 2510-2 ...es not prohibit disclosure of user information to non-government entities. See [[Privacy: Stored Communications Act | main article on Stored Communication ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...oes not constitute a Fourth Amendment "search" and no warrant is required. See Illinois v. Andreas, 463 U.S. 765, 771 (1983). In addition, a warrantless s ...eillance statutes apply to criminal investigations involving computers and also discusses how to obtain cell-site location information for cellular phones. ...
    10 KB (1,477 words) - 13:29, 5 August 2011
  • ...erms before responding to Netscape's invitation to download free software. See id. at 32. Further, the court concluded, "where consumers are urged to down ...es alleged that FareChase was accessing and “scraping” the AA.com site and also selling to travel agents and online travel systems “Web Automation” softwar ...
    18 KB (2,884 words) - 17:00, 13 April 2011
  • N/A (see National Data Protection Authority section). ...
    5 KB (747 words) - 16:25, 29 August 2014
  • Directive 95/46/EC, also known as the '''Data Protection Directive''' on the protection of individua ...rea of law in Europe. All the member states of the European Union (EU) are also signatories of the European Convention on Human Rights (ECHR). Article 8 of ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • ...is obtaining computer records in criminal investigations, prosecutors must also bear in mind the admissibility of that evidence in court proceedings. Compu ...s have held that "the term has the connotation of a positive declaration." See, e.g., United States v. Lewis, 902 F.2d 1176, 1179 (5th Cir. 1990); Lexingt ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...eted). Smith v. Maryland has been repeatedly criticized by legal scholars. See, e.g., Daniel J. Solove, Digital Dossiers and the Dissipation of Fourth Ame ...ates real-time electronic surveillance in federal criminal investigations. See main article on Wiretap Act. 18 U.S.C. §§ 2510-2522 was first passed as Tit ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...must show ownership of the copyright and copying by the defendant.”); see also LGS Architects, Inc. v. Concordia Homes of Nev., 434 F.3d 1150, 1156 (9th C ...laintiff must also show that the copying was a result of a volitional act. See Religious Tech. Ctr v. Netcom On-Line Commc’n Servs., Inc., 907 F. Supp. 13 ...
    27 KB (4,215 words) - 07:04, 11 April 2011
  • ...e integrity of information can be evaluated at any given point of time, it also means that the information is able to be verified constantly for errors, fr ...as metrics, analytics, and alarms pertaining to financial information were also introduced. ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • Numerous state legislatures also have attempted to regulate material distributed to minors over the Internet ...ng sexual material over the Internet with the intent to seduce minors. But see Hatch v. Superior Court, 80 Cal. App. 4th 170 (2000) (upholding constitutio ...
    4 KB (639 words) - 19:02, 10 April 2011
  • See also copyright issues with linking. ...puter Corp., 2002 U.S. Dist. LEXIS 6365 (C.D. Cal. 2002) on other grounds. See subsection C(5)(c) below). ...
    27 KB (4,223 words) - 10:08, 13 April 2011
  • ...data or personally identifiable information regarding children. Muris has also held out the possibility that federal regulators will seed lists with names ...y, security, advertising, and other consumer protection issues they raise. See http://www.ftc.gov/bcp/reports/wirelesssummary.pdf. ...
    31 KB (4,666 words) - 13:19, 26 April 2011
  • ...while maintaining competitive advantage and value system integrity”. It is also called ''business continuity and resiliency planning'' (BCRP). A business c ...ceptability are affected by the cost of recovery solutions. A function may also be considered critical if dictated by law. ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ...r attempts to commit an offense under the Computer Fraud and Abuse Act but also those who conspire to do so.<br> ...o criminalize not only explicit threats to cause damage to a computer, but also threats (1) to steal data on a victim’s computer, (2) to publicly disclose ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...t be presented to a magistrate. See 18 U.S.C. §§ 2510(9) and 2516(1); see also In re United States of America, 10 F.3d 931 (2d Cir. 1993), cert. denied, 1 ...most commonly involves digital-display paging devices or fax machines, but also includes electronic mail, computer transmissions, and, in some cases, satel ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • ...to administer justice within a defined area of responsibility. The term is also used to denote the geographical area or subject-matter to which such author The problem of forum shopping also applies as between federal and state courts. ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • Privacy can also have free speech ramifications. In some countries privacy has been used as ...arn to accept each other if they cannot know about each other. Issues have also been raised that privacy can encourage criminal activity as it makes it eas ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ...d. The court concluded that "fair use is a lawful use of a copyright." See also Association of American Medical Colleges v. Cuomo, 928 F.2d 519, 523 (2d Ci ...efendant. Campbell, 510 U.S. at 591, citing Harper & Row, 471 U.S. at 562. See American Geophysical Union v. Texaco Inc., 60 F.3d 913, 918 (2d Cir. 1995); ...
    31 KB (4,913 words) - 07:20, 11 April 2011
  • ...ntities of money or valuables is a common purpose of fraud, but there have also been fraudulent "discoveries", e.g., in scientific fraud, to gain prestige A hoax also involves deception, but without the intention of gain or of damaging or dep ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...replace bills of lading and even checks with appropriate EDI messages. It also refers specifically to a family of standards. ...s, the specifications are analogous to blue prints. (The specification may also be called a "mapping," but the term mapping is typically reserved for speci ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ...but rather while it was in electronic storage on the web server. The Court also held that defendant airline violated the Stored Communications Act because, ...ites gave no indication that use of the site meant such consent. The court also held that Pharmatrak intercepted the communications because its acquisition ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • ...ators much improved 'tools' over those available to them under Basel I. It also provides a framework for dealing with all the other risks a bank may face, ...ement objectives and policies which can be made annually. Institutions are also required to create a formal policy on what will be disclosed, controls arou ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ...ing, or to obtain unauthorized funds from an account. Credit card fraud is also an adjunct to [[identity theft]]. According to the Federal Trade Commission ...but signatures are relatively easy to forge. Some merchants will demand to see a picture ID, such as a driver's license, to verify the identity of the pur ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...er system management functions. ICANN has approved a number of registrars. See http://www.icann.org/registrars/accredited-list.html. ...ugmented by a supplemental set of rules for each arbitration organization. See http://www.icann.org/dndr/udrp/uniform-rules.htm. ...
    29 KB (4,582 words) - 10:16, 13 April 2011
  • ...l rights management]] or DRM) that control access to copyrighted works. It also criminalizes the act of circumventing an access control, whether or not the ...me. For further analysis of this portion of the Act and of cases under it, see [[WIPO Copyright and Performances and Phonograms Treaties Implementation Ac ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...ual property claims, but courts in other circuits have found the opposite. See Section 230 and Intellectual Property for details. Section 230 also protects against state criminal laws and civil claims based on federal crim ...
    38 KB (5,571 words) - 14:45, 10 April 2011
  • ...usal link between “virtual child pornography” and harm to actual children. Also, the Court reasoned that the CPPA would punish material that does not quali ...tional in United States v. American Library Ass’n, 123 S. Ct. 2297 (2003) (see subsection D(5), above). ...
    32 KB (4,920 words) - 19:22, 10 April 2011
  • Risk management also faces difficulties allocating resources. This is the idea of [[opportunity ...risk may have allowed. Not entering a business to avoid the risk of loss also avoids the possibility of earning profits. ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...ivacy policy transparency requirements that were agreed to under the plan. See http://europa.eu.int/comm/internal_ market/privacy/index_en.htm. (3) EU Sta ...as deemed the PIPED Act “adequate” under its EU Data Protection Directive. See http://www.parl.gc.ca/36/2/parlbus/ chambus/house/bills/government/C-6/C-6_ ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • ## See also Tasini v. New York Times Co., Inc., 184 F. Supp. 2d 350 (S.D.N.Y. 2002). Pl ...
    6 KB (1,026 words) - 06:44, 11 April 2011
  • ...eillance statutes apply to criminal investigations involving computers and also discusses how to obtain cell-site location information for cellular phones. ...result in civil and criminal liability, and in the case of Title III, may also result in suppression of evidence. ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...company) is directed, administered or controlled. Corporate [[governance]] also includes the relationships among the many Stakeholder (corporate) involved ...ible decision making is not only important for public relations, but it is also a necessary element in risk management and avoiding lawsuits. Organization ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ....gov.uk/ Office of Government Commerce] (OGC). The content of the books is also protected by Crown Copyright. ...enhanced glossary has been developed as a key deliverable of the ITIL v3. also known as the ITIL Refresh Project. ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...'S''olicited ''P''ornography ''A''nd ''M''arketing Act of 2003'''. This is also a play on the usual term for unsolicited email of this type, [[Spam|spam]]. ...equire e-mailers to get permission before they send marketing messages. It also prevents states from enacting stronger anti-spam protections, and prohibits ...
    26 KB (4,026 words) - 12:15, 5 May 2011
  • ...not only all of the legal issues covered in Chapters 1 through 4, but will also need to understand the precise nature of the information to be gathered in ...enticity, such as claims that computer records have been tampered with. It also discusses the best evidence rule and the use of summaries containing electr ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • The '''Sarbanes–Oxley Act of 2002''', also known as the 'Public Company Accounting Reform and Investor Protection Act' ...g accounting firms in their roles as auditors of public companies. The act also covers issues such as auditor independence, corporate governance, internal ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...site (e.g. they should not be near the same coastline). The ITSC Plan must also satisfy two measurements- the [[Recovery_Time_Objective|Recovery Time Objec ...increased by an amount of time equivalent to any such variability). It is also risky to assume that tapes will always be physically intact- the RPO should ...
    13 KB (2,264 words) - 11:10, 27 October 2012
  • ...th the elements that must be proven should the prosecution go to trial and also the sources of electronic evidence that are relevant to those elements. ...not just what a computer happens to contain at the time of the search, but also evidence of who has used a computer, when, and how. ...
    138 KB (21,660 words) - 13:18, 5 August 2011
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)