Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)
  • ...d by the United States Congress. It was passed to improve the security and privacy of sensitive information in Federal computer systems and to establish a min * [http://www.epic.org/crypto/csa/ Electronic Privacy Information Center] ...
    1 KB (168 words) - 11:37, 23 May 2010
  • ...er the seal programs have been strongly criticized in the wake of numerous privacy lawsuits alleging deceptive data collection practices, notwithstanding the ...ons, legal review of the code-based policies is recommended. Without a P3P Privacy Policy in place, a site’s cookies could be blocked or impaired by Internet ...
    2 KB (251 words) - 09:52, 16 September 2011
  • ==Law in Costa Rica== ...ded among two laws. The first law is Law No. 7975, Undisclosed Information Law, which makes it a crime to disclose confidential/personal information witho ...
    4 KB (561 words) - 16:45, 29 August 2014
  • ==Law in Honduras== ...ontains information which may produce damage to personal honour and family privacy. It is also a method to prevent the transmission or disclosure of such data ...
    6 KB (879 words) - 16:59, 29 August 2014
  • ==Preface to 2003 eMedia and Privacy Law Handbook== ...his Handbook, however, is not intended to be a comprehensive update on the law. Instead, it is an easy-to-use reference for the legal practitioner, schola ...
    3 KB (510 words) - 14:56, 10 April 2011
  • ==Law in British Virgin Islands== ...ll recognise and subscribe to the Common law duties of confidentiality and privacy. In essence, a person's details will need to be kept confidential provided ...
    5 KB (762 words) - 16:03, 29 August 2014
  • ==Family Educational Rights and Privacy Act (FERPA)== ...a Federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of th ...
    3 KB (470 words) - 19:08, 19 April 2010
  • ==Law in Cayman Islands== ...tiality obligations, in parallel to the civil remedies available at common law. ...
    5 KB (747 words) - 16:25, 29 August 2014
  • ...is reason to believe that the records sought are relevant to a legitimate law enforcement inquiry;<br> ...ing notice which shall state with reasonable specificity the nature of the law enforcement inquiry:<br> ...
    3 KB (452 words) - 12:29, 16 October 2014
  • # [[Copyright Non-Preemptable Common Law Claims]] === Chapter 7 - [[Privacy And Data Collection]]=== ...
    2 KB (209 words) - 09:53, 13 April 2011
  • ...ent of Justice Approval Required When There Is A Reasonable Expectation of Privacy== ...rcement purposes when there is a constitutionally protected expectation of privacy requiring judicial authorization. This authority was delegated to the Assis ...
    2 KB (227 words) - 15:30, 21 May 2010
  • ==Effect on existing law== ...losure of information, including with regard to the protection of personal privacy under section 552a of title 5, the disclosure of information under section ...
    851 bytes (128 words) - 21:01, 3 June 2010
  • ...' is a California law regulating the privacy of personal information. The law was introduced by California State Senator Peace on February 12, 2002, and [[Category:Computer law]] ...
    3 KB (522 words) - 13:52, 26 October 2011
  • ==Effect on existing law== ...losure of information, including with regard to the protection of personal privacy under section 552a of title 5, the disclosure of information under section ...
    940 bytes (143 words) - 21:44, 1 June 2010
  • ==Reasonable Expectation of Privacy== ...*21 (E.D. Wis. Dec. 4, 1990) ("[A]n individual has the same expectation of privacy in a pager, computer, or other electronic data storage and retrieval device ...
    5 KB (848 words) - 13:21, 26 April 2011
  • ==Law in Panama== ...tration process and the supervision of providers of data storage services. Law 51 and Decree 40 provide for enforcement through the General Directorate of ...
    8 KB (1,135 words) - 17:53, 29 August 2014
  • ==Law in United States== ...of such laws among its 50 states. (California alone has more than 25 state privacy and data security laws). These laws address particular problems or industri ...
    14 KB (2,027 words) - 15:57, 29 August 2014
  • ==Law in Mexico== ...deral de Protección de Datos Personales en Posesión de Particulares) (the ‘Law’) was enacted and entered into force on 6 July 2010. ...
    18 KB (2,869 words) - 17:46, 29 August 2014
  • ...robbery, among other crimes. As a response to these threats, many website privacy policies specifically address the collection of PII, and lawmakers have ena ==In privacy law== ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • ...cy laws in several countries, to give a picture of different approaches to privacy laws across the globe. ...s,” in order to provide “an equal level of protection of personal data and privacy for users of publicly available electronic communications services, regardl ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • ...e in criminal cases. The purpose of this publication is to provide Federal law enforcement agents and prosecutors with systematic guidance that can help t ...nual reflects that division: Chapters 1 and 2 address the Fourth Amendment law of search and seizure, and Chapters 3 and 4 focus on the statutory issues, ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • ...chnology for Economic and Clinical Health Act (HITECH Act) was signed into law on February 17, 2009 as part of the Title XIII of the American Recovery and ...sclosure of protected health information which compromises the security or privacy of such information, except where an unauthorized person to whom such infor ...
    9 KB (1,358 words) - 16:25, 6 September 2011
  • ==Privacy== ...ensitive information. In addition, industry regulations, such as [[HIPAA]] privacy and security requirements and payment card industry ([[PCI:|PCI]]) security ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ...ean Union. It is an important component of EU [[privacy]] and human rights law. The right to [[privacy]] is a highly developed area of law in Europe. All the member states of the European Union (EU) are also signat ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • ...courage [[identity theft]] as well as guarding and protecting individual [[privacy]]. ...ntity theft]]. The Act covers everything from rights to penalties. SESSION LAW 2005-414 and SENATE BILL 1048. ...
    3 KB (488 words) - 13:02, 12 November 2011
  • ...ay be privileged, confidential, or exempt from disclosure under applicable law. If you are not the intended recipient or authorized to receive this for th ...r's messages and activities involving Company Electronic Mail Resources to law enforcement officials or other third parties without any prior notice to th ...
    7 KB (974 words) - 19:34, 16 January 2014
  • ==Law in Canada== ...l, provincial and territorial privacy statutes (excluding statutory torts, privacy requirements under other legislation, federal anti-spam legislation, identi ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • ...rnance], [http://lazarusalliance.com/services/audit-compliance/ cyberspace law and compliance leadership], innovation and services provided to the global ...Alliance specializes in IT security, risk, privacy, governance, cyberspace law and compliance leadership solutions and is fully dedicated to global succes ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...and regulation. Some leading topics include [[intellectual property]], [[privacy]], freedom of expression, and [[jurisdiction]]. ...sdictional code, legal practitioners are generally left with a conflict of law issue. ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ==Common Law Rule== At common law, one who “repeats” the statements of another is just as responsible for the ...
    6 KB (919 words) - 14:33, 10 April 2011
  • ...ires a warrant. First, does the search violate a reasonable expectation of privacy? And if so, is the search nonetheless permissible because it falls within a ...First, § 2703 creates a code of criminal procedure that federal and state law enforcement officers must follow to compel disclosure of stored communicati ...
    10 KB (1,477 words) - 13:29, 5 August 2011
  • ...statement (Second) of Torts sec. 652A (1977); see also William L. Prosser, Privacy, 48 Cal. L. Rev. 383, 398-407 (1960). The right was first recognized in 195 ...nees of deceased persons. Civil Code Section 3344.1. New York Civil Rights Law sections 50 and 51 create a private right of action against the nonconsensu ...
    11 KB (1,744 words) - 16:53, 13 April 2011
  • #[[5 Ways to Make Your Law Office More Profitable | 5 Ways to Make Your Law Office More Profitable]] ...lied Discovery Data Security & Privacy | Applied Discovery Data Security & Privacy]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...Jones & Co. v. Gutnick (2002) HCA 56. The Court also noted that Australian law does not espouse the “single publication” rule adopted in much of the U.S. ...idnapped his daughters and was raising them in Genoa in defiance of Jewish law. ...
    6 KB (895 words) - 14:52, 10 April 2011
  • === Electronic Communications Privacy Act of 1986=== The Electronic Communications Privacy Act of 1986 (“ECPA”), Pub. L. No. 99-508, 100 Stat. 1848 (1986), comprised ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ==Federal Privacy Cases== ...e district court had incorrectly interpreted the Electronic Communications Privacy Act (ECPA) consent exception, finding that the users had not consented to c ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • The '''Fair Credit Reporting Act''' ('''FCRA''') is a United States federal law (codified at usc|15|1681 et seq.) that regulates the collection, disseminat Although the major CRAs Experian, Equifax, and TransUnion are required by law to provide a central source website for consumers to request their reports, ...
    12 KB (1,814 words) - 12:01, 19 July 2012
  • ...COMPUTER & HIGH TECH. L.J. 757, 764-766 (2006); Susan Freiwald, Uncertain Privacy: Communication Attributes After the Digital Telephony Act, 69 S. CAL. L. RE ===Electronic Communications Privacy Act of 1986=== ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • The '''Computer Fraud and Abuse Act''' is a law passed by the United States Congress in 1984 intended to reduce cracking of * Including state law offenses as priors for sentencing; and ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...ny policies are first accepted and subsequent Company supporting security, privacy and risk technology and processes are fully implemented. ...content of any User's activities involving Company Technology Resources to law enforcement officials or other third parties without any prior notice to th ...
    10 KB (1,433 words) - 18:15, 14 January 2014
  • ===Federal Law=== ...Prompt Delivery Rules,”; (iiii) “How to Comply with the Children’s Online Privacy Protection Rule,” http://www.ftc.gov/bcp/conline/pubs/buspubs/coppa.htm. ...
    16 KB (2,394 words) - 13:40, 26 April 2011
  • ...d content of any User's activities involving Company Internet Resources to law enforcement officials or other third parties without any prior notice to th :'''F. Privacy Expectations''' ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ...Trade Commission has actively asserted its authority to challenge Internet privacy policies and practices that may be “unfair and deceptive” and thus violate In 1998, the FTC announced four elements necessary to protecting consumer privacy: ...
    31 KB (4,666 words) - 13:19, 26 April 2011
  • ...mulgate standards and guidance pertaining to the efficiency, security, and privacy of Federal computer systems. Authorizes the President to disapprove or modi ...e pilot program four years after its establishment, unless reauthorized by law.<br> ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • The Administration Simplification provisions also address the security and privacy of health data. The standards are meant to improve the efficiency and effec ...S has promulgated five rules regarding Administrative Simplification: the Privacy Rule, the Transactions and Code Sets Rule, the Security Rule, the Unique Id ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...of any User's activities involving Company Telecommunications Resources to law enforcement officials or other third parties without any prior notice to th :'''I. Privacy Expectations'''<br> ...
    10 KB (1,473 words) - 14:13, 1 May 2010
  • ...m's subpoena may not be enforced consistent with the plain language of the Privacy Act because the exceptions enumerated in § 2702(b) do not include civil dis ...are revealed. However, the case was mooted on appeal by changes to the NSL law. ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • ...d States District Court or Court of Appeals judge, a wiretap order permits law enforcement to intercept communications for up to thirty days. 18 U.S.C. §§ ...eeds to protect their rights and property with their subscribers' right to privacy in their communications. See United States v. Harvey, 540 F.2d 1345, 1351 ( ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • # It must be prepared by an applicant identified as a law enforcement or investigative officer. The application must be in writing, s ...er under circumstances where the parties enjoy a reasonable expectation of privacy. 18 U.S.C. § 2510(2). An "electronic communication" most commonly involves ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • * Low security/privacy protection on photos that are easily clickable and downloaded on social net ...ion of personal identifiers is made possible through serious breaches of [[privacy]]. For consumers, this is usually a result of them naively providing their ...
    37 KB (5,577 words) - 14:50, 12 November 2011
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)