Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)
  • ...ent's effort to avoid a transaction. See Baum, supra note 16, at 6 (1994). See Guideline 1.20 (nonrepudiation), particularly Comment 1.20.1. ...
    236 bytes (29 words) - 12:33, 16 October 2014
  • ==See Also== ...
    510 bytes (66 words) - 22:59, 1 November 2012
  • ...ic examination of the advantages and disadvantages of formal requirements, see Jhering, supra note 5, at 470-504. ...
    787 bytes (112 words) - 12:40, 16 October 2014
  • 2
    See, e.g., U. C. C. § 1-201(39) (1992). ...
    55 bytes (8 words) - 12:37, 16 October 2014
  • It also provides guidance to those advising, informing, or assisting directors. ==See also== ...
    1 KB (147 words) - 12:21, 2 May 2010
  • ...which provides assurance that the information signed has not been altered. See Guideline 35 (authentication). ...
    205 bytes (26 words) - 12:28, 16 October 2014
  • == See also == ...
    2 KB (237 words) - 11:16, 27 October 2012
  • See generally Ford, supra note 16, at 71-75; Charlie Kaufman, Radia Perlman & M ...
    230 bytes (29 words) - 12:38, 16 October 2014
  • == See also == ...
    2 KB (272 words) - 11:15, 27 October 2012
  • ...saction is a license of intellectual property rather than a sale of goods. See Softman Products Co., LLC v. Adobe Sys., Inc., 171 F. Supp. 2d 1075 (C.D. C ...dify [[Uniform Commercial Code]], by introducing new article (Article 2B), also known as UCC2B. ...
    2 KB (317 words) - 11:12, 30 October 2011
  • ...izations or even deny them access for not meeting network operating rules. Also, if fraud occurs and your organization has not completed the audit requirem ==See Also== ...
    2 KB (235 words) - 09:48, 23 October 2012
  • ...have demonstrated a purpose to thwart interception by changing facilities. See United States v. Gaytan, 74 F.3d 545 (5th Cir. 1996); United States v. Pett ...l, an Assistant Attorney General, or an Acting Assistant Attorney General. See 18 U.S.C. § 2518(11)(a)(i) and (b)(i). ...
    2 KB (239 words) - 14:57, 21 May 2010
  • ==See also== ...
    2 KB (249 words) - 10:56, 27 October 2012
  • ...more thorough examination of properties desirable in a digital signature, see generally Bruce Schneier, Applied Cryptography: Protocols, Algorithms and S ...
    394 bytes (48 words) - 12:36, 16 October 2014
  • See generally Ford, supra note 16, at 75-84. Computer Communications Security 7 ...
    363 bytes (43 words) - 12:40, 16 October 2014
  • 1
    ...g assurance that the message has not been modified or replaced in transit. See Guideline 28 (authentication). ...
    394 bytes (57 words) - 12:40, 16 October 2014
  • == See also == ...
    2 KB (298 words) - 14:25, 23 April 2010
  • *'''XML E-Billing version 2''', ratified in 2006 but yet to see adoption, is intended to improve upon LEDES 2000. == See also == ...
    3 KB (412 words) - 11:45, 27 August 2011
  • ...assessed both currently and in the light of future technological advance. See generally, Schneier, supra note 18, at § 7.5, 166-67. ...
    402 bytes (62 words) - 12:39, 16 October 2014
  • :Section 101(c)(1)(C) states that the consumer also ''"consent electronically, in a manner that reasonably demonstrates that th ==See also== ...
    3 KB (456 words) - 11:26, 30 October 2011
  • == See also == ...
    4 KB (523 words) - 10:24, 23 April 2010
  • ...isk management]], [[Change_control | change management]], and controls. It also provides guidance relating to accountability and role types. == See also == ...
    3 KB (461 words) - 14:19, 23 April 2010
  • ...anisms are not enough to prevent difficult factual questions from arising. See, e.g., Citizens Nat'l Bank of Downers Grove v. Morman, 78 Ill. App. 3d 1037 ...
    661 bytes (98 words) - 12:28, 16 October 2014
  • ==See Also== ...
    5 KB (705 words) - 11:39, 30 May 2015
  • ...tion and the other has an incentive to prove that it was made or received. See Charles R. Merrill, A Cryptographic Primer, The Internet and Business: A La ...
    1 KB (144 words) - 12:26, 16 October 2014
  • == See also == ...
    5 KB (785 words) - 11:34, 27 October 2012
  • ...ctronic data storage and retrieval device as in a closed container."). See also United States v. Long, 64 M.J. 57 (CAAF 2006) (finding REOP in emails defen ...omputer." United States v. Walser, 275 F.3d 981, 986 (10th Cir. 2001). But see United States v. Gorshkov, 2001 WL 1024026, at *2 (W.D. Wash. May 23, 2001) ...
    5 KB (848 words) - 13:21, 26 April 2011
  • ...n electronic or other medium and is retrievable in perceivable form.." See also, Model Law on Electronic Commerce, United Nations Commission on Internation ...
    1 KB (161 words) - 12:29, 16 October 2014
  • ...phreakers" (i.e., hackers who penetrate telecommunications computers). It also specifically includes those computers used in "foreign" communications. Wit ==See also== ...
    5 KB (773 words) - 11:40, 27 August 2011
  • ...dustry-initiated rules. Laws have been passed by nearly all the US states (see partial list below). The first state to pass a credit freeze law was Califo ...dit report before issuing a loan in the borrower's name. If lenders cannot see the borrower's credit report, it is unlikely the lender will issue a loan i ...
    4 KB (663 words) - 12:59, 12 November 2011
  • ...f wire and electronic communications unless a statutory exception applies. See 18 U.S.C. § 2511(1). In general, these prohibitions bars third parties (inc ...property with their subscribers' right to privacy in their communications. See United States v. Harvey, 540 F.2d 1345, 1351 (8th Cir. 1976) ("The federal ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • ...ntire categories of control may not be deemed necessary. The standards are also open ended in the sense that the information security controls are 'suggest ...izations in the telecomms industry (see [[ISO/IEC 27011]]) and healthcare (see [[ISO 27799]]), with additional guidelines for the financial services and o ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...a spoken defamation. State laws often define defamation in specific ways. See, e.g., California Civ. Code §§ 44, 45, 45a, 46. ...statement whose “gist” or “sting” is substantially true is not actionable. See, e.g., Masson v. New Yorker Magazine, 501 U.S. 496, 516 (1991) ("[A] statem ...
    9 KB (1,422 words) - 14:29, 10 April 2011
  • Note: See subpart F of part 597 for the relationship between this section and part 59 ...
    1 KB (204 words) - 23:05, 1 November 2012
  • ...y with certain provisions of the Federal electronic surveillance statutes. See the Criminal Resource Manual at 32 for additional discussion of video surve ...
    2 KB (227 words) - 15:30, 21 May 2010
  • ...Press, Inc., No. 93 Civ. 2515, 1994 WL 419847 (S.D.N.Y. May 4, 1994); see also Telnikoff v. Matusevitch, 25 Media L. Rep. 2473 (Md. Ct. App. 1997), aff’d, ...a warning that the allegations might be untrue was not only defamation but also irresponsible journalism. ...
    6 KB (895 words) - 14:52, 10 April 2011
  • ...e schemes, but providing adequate security for many types of applications. See generally Schneier, supra note 18, at § 2.7, 41-44. ...
    2 KB (244 words) - 12:37, 16 October 2014
  • ...tional rule against liability without fault.” Lewis, 83 F.R.D. at 463; see also Gertz v. Robert Welch, Inc., 418 U.S. 323, 347 (1974). Consequently, those ...ebate about who is or is not a “distributor” or “publisher” in cyberspace. See, e.g., Stratton Oakmont, 23 Media L. Rep. at 1794 (holding that online serv ...
    6 KB (919 words) - 14:33, 10 April 2011
  • ...ns, in breach of a confidential relationship, to acquire the trade secret. See, e.g., Data Gen. Corp. v. Grumman Sys. Support Corp., 36 F.3d 1147, 1165 (1 ...ormation to its licensees, vendors, or third parties for limited purposes. See, e.g., Rockwell Graphic Sys., Inc. v. DEV Industries, Inc., 925 F.2d 174 (7 ...
    7 KB (1,065 words) - 16:48, 13 April 2011
  • ...ion in digital form, the full range of IA encompasses not only digital but also analog or physical form. == See also == ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ==See also== ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...9 U.S. 340, 349 (1991). Only expression, but not ideas, are copyrightable. See 17 U.S.C. § 102(b); Eldred v. Ashcroft, U.S. 537, 219 (2003); Baker v. Seld ....S. 769 (2003) (rejecting constitutional challenge to term extension); see also Dastar Corp. v. Twentieth Century Fox Film Corp., 539 U.S. 23, 31 (2003) (a ...
    14 KB (2,130 words) - 06:38, 11 April 2011
  • ...tutional protection in one community may enjoy full protection in another. See Miller v California, 413 U.S. 15, 32-33 (1973). Federal venue rules permit See main article on 2257 Reporting Requirements. ...
    6 KB (925 words) - 18:53, 10 April 2011
  • ...hat] is readily accessible to the general public." 18 U.S.C. § 2511(2)(g). See, e.g. Orin S. Kerr, A User’s Guide to the Stored Communications Act, and a ...exception for a civil discovery order on behalf of a private party."); see also Federal Trade Comm’n v. Netscape Communications Corp., 196 F.R.D. 559, 561 ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • ...ss took a new approach with the Children’s Internet Protection Act (CIPA). See, e.g. Reno v. ACLU, 521 U.S. 844 (1997) (overturning the Communications Dec ...and allows local determinations as to what content is suitable for minors. See 47 U.S.C. § 254(h)(7)(D), (l)(2). CIPA was challenged in American Library A ...
    5 KB (707 words) - 19:01, 10 April 2011
  • ...oes not apply to those employees and other parties with a specific need to see full credit card numbers. ...
    2 KB (346 words) - 12:22, 31 January 2014
  • ...'s] name or likeness." Restatement (Second) of Torts sec. 652A (1977); see also William L. Prosser, Privacy, 48 Cal. L. Rev. 383, 398-407 (1960). The right ...connection between the use and the commercial purpose. Id. at 417-18; see also Michaels v. Internet Entmt. Group, Inc., 5 F. Supp.2d 823, 837 (C.D. Cal. 1 ...
    11 KB (1,744 words) - 16:53, 13 April 2011
  • ...ated electronic records and signatures which are not part of a transaction also are not covered by this Act.'' ==See Also== ...
    9 KB (1,499 words) - 11:31, 30 October 2011
  • ...e type of works protected by the Copyright Act under Sections 102 and 103. See 17 U.S.C. § 301. ...ional Basketball Ass’n v. Motorola, Inc., 105 F.3d 841 (2d Cir. 1997); see also International News Serv. v. Associated Press, 248 U.S. 215 (1918). The elem ...
    10 KB (1,594 words) - 10:19, 12 April 2011
  • ...“Back” button or by generating repeated pop-up windows (“mousetrapping”). See http://www.ftc. gov/opa/2001/10/cupcake.htm (FTC charges company that pract ...arch engine results without clear disclosure that they are advertisements. See ategory_id=24&article_id=33; “FTC Staff Recommendations to Search Engines: ...
    16 KB (2,394 words) - 13:40, 26 April 2011
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)