Search results

Jump to navigation Jump to search
View ( | next 100) (20 | 50 | 100 | 250 | 500)
  • ...(or company) is directed, administered or controlled. Corporate governance also includes the relationships among the many Stakeholders (corporate) involved ...han a mere paycheck and the prospect of a cozy retirement at stake."'' See also, "Revolt in the Boardroom," by Alan Murray. ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...oes not constitute a Fourth Amendment "search" and no warrant is required. See Illinois v. Andreas, 463 U.S. 765, 771 (1983). In addition, a warrantless s ...person has entered without the owner's consent in order to commit a theft, see Rakas v. Illinois, 439 U.S. 128, 143 n.12 (1978). ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ...ef can also suffer adverse consequences and losses, and to that extent are also victims. ...hes have not resulted in detected incidents of identity theft". The report also warned that "the full extent is unknown". A later unpublished study by Carn ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...arner.blogspot.com: Gary Warner who performs malware and phishing research also sends notification to phished entities when he finds them on the web. ...the domain name to obtain the IP address. You can also do an nslookup to see the other IP addresses related to the phish. With Rock Phish there will be ...
    14 KB (2,165 words) - 16:53, 22 September 2009
  • '''Network neutrality''' (also '''net neutrality''', '''Internet neutrality''') is a principle that advoca ...es excluding to other participants. Opponents of net neutrality regulation also argue that the best solution to discrimination by broadband providers is to ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...dit reports, personal information collected online from children under 13 (see below for the scope of this requirement), video viewing choices, and teleco ...ave a comprehensive, written information security program; the regulations also set forth the minimum components of such program. ...
    14 KB (2,027 words) - 15:57, 29 August 2014
  • The Law applies to personal data and sensitive personal data (see definitions below): ...ners’) exercising their rights under the Law. Data Protection Officers are also required to promote the protection of Personal Data within their organizati ...
    18 KB (2,869 words) - 17:46, 29 August 2014
  • ...claim that any search of the network violates his Fourth Amendment rights. See Rakas v. Illinois, 439 U.S. 128, 143 (1978). ...e.com from ISPCompany's computers. Pursuant to 18 U.S.C. § 2703(a), Part C also requests the contents of electronic communications that have been in electr ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...and threatening to damage a computer. Attempts to commit these crimes are also criminally punishable. ...relationship, including authorization to use the employer's computer, were also terminated. Thus, because defendant was not authorized to use Plaintiff's c ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...he United States|immigrants]] suspected of terrorism-related acts. The act also expanded the definition of terrorism to include [[domestic terrorism]], thu {{See also|History of the USA PATRIOT Act}} ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • The Administration Simplification provisions also address the security and privacy of health data. The standards are meant to Title I also limits restrictions that a group health plan can place on benefits for pree ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...logo, symbol, design, image, or a combination of these elements. There is also a range of non-conventional trademarks comprising marks which do not fall i ...ver, registration is not required. The owner of a common law trademark may also file suit, but an unregistered mark may be protectable only within the geog ...
    39 KB (6,281 words) - 14:29, 26 April 2011
  • Risk management also faces difficulties allocating resources. This is the idea of opportunity co ...rized software and hardware. A thorough environmental survey and inventory also serve as the foundation for managing and monitoring daily operations. The s ...
    43 KB (6,368 words) - 11:22, 4 July 2015
View ( | next 100) (20 | 50 | 100 | 250 | 500)