Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...e in criminal cases. The purpose of this publication is to provide Federal law enforcement agents and prosecutors with systematic guidance that can help t ...nual reflects that division: Chapters 1 and 2 address the Fourth Amendment law of search and seizure, and Chapters 3 and 4 focus on the statutory issues, ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • ...chnology for Economic and Clinical Health Act (HITECH Act) was signed into law on February 17, 2009 as part of the Title XIII of the American Recovery and ...sclosure of protected health information which compromises the security or privacy of such information, except where an unauthorized person to whom such infor ...
    9 KB (1,358 words) - 16:25, 6 September 2011
  • ==Privacy== ...ensitive information. In addition, industry regulations, such as [[HIPAA]] privacy and security requirements and payment card industry ([[PCI:|PCI]]) security ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ...ean Union. It is an important component of EU [[privacy]] and human rights law. The right to [[privacy]] is a highly developed area of law in Europe. All the member states of the European Union (EU) are also signat ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • ...courage [[identity theft]] as well as guarding and protecting individual [[privacy]]. ...ntity theft]]. The Act covers everything from rights to penalties. SESSION LAW 2005-414 and SENATE BILL 1048. ...
    3 KB (488 words) - 13:02, 12 November 2011
  • ...ay be privileged, confidential, or exempt from disclosure under applicable law. If you are not the intended recipient or authorized to receive this for th ...r's messages and activities involving Company Electronic Mail Resources to law enforcement officials or other third parties without any prior notice to th ...
    7 KB (974 words) - 19:34, 16 January 2014
  • ==Law in Canada== ...l, provincial and territorial privacy statutes (excluding statutory torts, privacy requirements under other legislation, federal anti-spam legislation, identi ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • ...rnance], [http://lazarusalliance.com/services/audit-compliance/ cyberspace law and compliance leadership], innovation and services provided to the global ...Alliance specializes in IT security, risk, privacy, governance, cyberspace law and compliance leadership solutions and is fully dedicated to global succes ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...and regulation. Some leading topics include [[intellectual property]], [[privacy]], freedom of expression, and [[jurisdiction]]. ...sdictional code, legal practitioners are generally left with a conflict of law issue. ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ==Common Law Rule== At common law, one who “repeats” the statements of another is just as responsible for the ...
    6 KB (919 words) - 14:33, 10 April 2011
  • ...ires a warrant. First, does the search violate a reasonable expectation of privacy? And if so, is the search nonetheless permissible because it falls within a ...First, § 2703 creates a code of criminal procedure that federal and state law enforcement officers must follow to compel disclosure of stored communicati ...
    10 KB (1,477 words) - 13:29, 5 August 2011
  • ...statement (Second) of Torts sec. 652A (1977); see also William L. Prosser, Privacy, 48 Cal. L. Rev. 383, 398-407 (1960). The right was first recognized in 195 ...nees of deceased persons. Civil Code Section 3344.1. New York Civil Rights Law sections 50 and 51 create a private right of action against the nonconsensu ...
    11 KB (1,744 words) - 16:53, 13 April 2011
  • #[[5 Ways to Make Your Law Office More Profitable | 5 Ways to Make Your Law Office More Profitable]] ...lied Discovery Data Security & Privacy | Applied Discovery Data Security & Privacy]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...Jones & Co. v. Gutnick (2002) HCA 56. The Court also noted that Australian law does not espouse the “single publication” rule adopted in much of the U.S. ...idnapped his daughters and was raising them in Genoa in defiance of Jewish law. ...
    6 KB (895 words) - 14:52, 10 April 2011
  • === Electronic Communications Privacy Act of 1986=== The Electronic Communications Privacy Act of 1986 (“ECPA”), Pub. L. No. 99-508, 100 Stat. 1848 (1986), comprised ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ==Federal Privacy Cases== ...e district court had incorrectly interpreted the Electronic Communications Privacy Act (ECPA) consent exception, finding that the users had not consented to c ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • The '''Fair Credit Reporting Act''' ('''FCRA''') is a United States federal law (codified at usc|15|1681 et seq.) that regulates the collection, disseminat Although the major CRAs Experian, Equifax, and TransUnion are required by law to provide a central source website for consumers to request their reports, ...
    12 KB (1,814 words) - 12:01, 19 July 2012
  • ...COMPUTER & HIGH TECH. L.J. 757, 764-766 (2006); Susan Freiwald, Uncertain Privacy: Communication Attributes After the Digital Telephony Act, 69 S. CAL. L. RE ===Electronic Communications Privacy Act of 1986=== ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • The '''Computer Fraud and Abuse Act''' is a law passed by the United States Congress in 1984 intended to reduce cracking of * Including state law offenses as priors for sentencing; and ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...ny policies are first accepted and subsequent Company supporting security, privacy and risk technology and processes are fully implemented. ...content of any User's activities involving Company Technology Resources to law enforcement officials or other third parties without any prior notice to th ...
    10 KB (1,433 words) - 18:15, 14 January 2014
View ( | ) (20 | 50 | 100 | 250 | 500)