Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • == See also == ...
    4 KB (523 words) - 10:24, 23 April 2010
  • ...isk management]], [[Change_control | change management]], and controls. It also provides guidance relating to accountability and role types. == See also == ...
    3 KB (461 words) - 14:19, 23 April 2010
  • ...anisms are not enough to prevent difficult factual questions from arising. See, e.g., Citizens Nat'l Bank of Downers Grove v. Morman, 78 Ill. App. 3d 1037 ...
    661 bytes (98 words) - 12:28, 16 October 2014
  • ==See Also== ...
    5 KB (705 words) - 11:39, 30 May 2015
  • ...tion and the other has an incentive to prove that it was made or received. See Charles R. Merrill, A Cryptographic Primer, The Internet and Business: A La ...
    1 KB (144 words) - 12:26, 16 October 2014
  • == See also == ...
    5 KB (785 words) - 11:34, 27 October 2012
  • ...ctronic data storage and retrieval device as in a closed container."). See also United States v. Long, 64 M.J. 57 (CAAF 2006) (finding REOP in emails defen ...omputer." United States v. Walser, 275 F.3d 981, 986 (10th Cir. 2001). But see United States v. Gorshkov, 2001 WL 1024026, at *2 (W.D. Wash. May 23, 2001) ...
    5 KB (848 words) - 13:21, 26 April 2011
  • ...n electronic or other medium and is retrievable in perceivable form.." See also, Model Law on Electronic Commerce, United Nations Commission on Internation ...
    1 KB (161 words) - 12:29, 16 October 2014
  • ...phreakers" (i.e., hackers who penetrate telecommunications computers). It also specifically includes those computers used in "foreign" communications. Wit ==See also== ...
    5 KB (773 words) - 11:40, 27 August 2011
  • ...dustry-initiated rules. Laws have been passed by nearly all the US states (see partial list below). The first state to pass a credit freeze law was Califo ...dit report before issuing a loan in the borrower's name. If lenders cannot see the borrower's credit report, it is unlikely the lender will issue a loan i ...
    4 KB (663 words) - 12:59, 12 November 2011
  • ...f wire and electronic communications unless a statutory exception applies. See 18 U.S.C. § 2511(1). In general, these prohibitions bars third parties (inc ...property with their subscribers' right to privacy in their communications. See United States v. Harvey, 540 F.2d 1345, 1351 (8th Cir. 1976) ("The federal ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • ...ntire categories of control may not be deemed necessary. The standards are also open ended in the sense that the information security controls are 'suggest ...izations in the telecomms industry (see [[ISO/IEC 27011]]) and healthcare (see [[ISO 27799]]), with additional guidelines for the financial services and o ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...a spoken defamation. State laws often define defamation in specific ways. See, e.g., California Civ. Code §§ 44, 45, 45a, 46. ...statement whose “gist” or “sting” is substantially true is not actionable. See, e.g., Masson v. New Yorker Magazine, 501 U.S. 496, 516 (1991) ("[A] statem ...
    9 KB (1,422 words) - 14:29, 10 April 2011
  • Note: See subpart F of part 597 for the relationship between this section and part 59 ...
    1 KB (204 words) - 23:05, 1 November 2012
  • ...y with certain provisions of the Federal electronic surveillance statutes. See the Criminal Resource Manual at 32 for additional discussion of video surve ...
    2 KB (227 words) - 15:30, 21 May 2010
  • ...Press, Inc., No. 93 Civ. 2515, 1994 WL 419847 (S.D.N.Y. May 4, 1994); see also Telnikoff v. Matusevitch, 25 Media L. Rep. 2473 (Md. Ct. App. 1997), aff’d, ...a warning that the allegations might be untrue was not only defamation but also irresponsible journalism. ...
    6 KB (895 words) - 14:52, 10 April 2011
  • ...e schemes, but providing adequate security for many types of applications. See generally Schneier, supra note 18, at § 2.7, 41-44. ...
    2 KB (244 words) - 12:37, 16 October 2014
  • ...tional rule against liability without fault.” Lewis, 83 F.R.D. at 463; see also Gertz v. Robert Welch, Inc., 418 U.S. 323, 347 (1974). Consequently, those ...ebate about who is or is not a “distributor” or “publisher” in cyberspace. See, e.g., Stratton Oakmont, 23 Media L. Rep. at 1794 (holding that online serv ...
    6 KB (919 words) - 14:33, 10 April 2011
  • ...ns, in breach of a confidential relationship, to acquire the trade secret. See, e.g., Data Gen. Corp. v. Grumman Sys. Support Corp., 36 F.3d 1147, 1165 (1 ...ormation to its licensees, vendors, or third parties for limited purposes. See, e.g., Rockwell Graphic Sys., Inc. v. DEV Industries, Inc., 925 F.2d 174 (7 ...
    7 KB (1,065 words) - 16:48, 13 April 2011
  • ...ion in digital form, the full range of IA encompasses not only digital but also analog or physical form. == See also == ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ==See also== ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...9 U.S. 340, 349 (1991). Only expression, but not ideas, are copyrightable. See 17 U.S.C. § 102(b); Eldred v. Ashcroft, U.S. 537, 219 (2003); Baker v. Seld ....S. 769 (2003) (rejecting constitutional challenge to term extension); see also Dastar Corp. v. Twentieth Century Fox Film Corp., 539 U.S. 23, 31 (2003) (a ...
    14 KB (2,130 words) - 06:38, 11 April 2011
  • ...tutional protection in one community may enjoy full protection in another. See Miller v California, 413 U.S. 15, 32-33 (1973). Federal venue rules permit See main article on 2257 Reporting Requirements. ...
    6 KB (925 words) - 18:53, 10 April 2011
  • ...hat] is readily accessible to the general public." 18 U.S.C. § 2511(2)(g). See, e.g. Orin S. Kerr, A User’s Guide to the Stored Communications Act, and a ...exception for a civil discovery order on behalf of a private party."); see also Federal Trade Comm’n v. Netscape Communications Corp., 196 F.R.D. 559, 561 ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • ...ss took a new approach with the Children’s Internet Protection Act (CIPA). See, e.g. Reno v. ACLU, 521 U.S. 844 (1997) (overturning the Communications Dec ...and allows local determinations as to what content is suitable for minors. See 47 U.S.C. § 254(h)(7)(D), (l)(2). CIPA was challenged in American Library A ...
    5 KB (707 words) - 19:01, 10 April 2011
  • ...oes not apply to those employees and other parties with a specific need to see full credit card numbers. ...
    2 KB (346 words) - 12:22, 31 January 2014
  • ...'s] name or likeness." Restatement (Second) of Torts sec. 652A (1977); see also William L. Prosser, Privacy, 48 Cal. L. Rev. 383, 398-407 (1960). The right ...connection between the use and the commercial purpose. Id. at 417-18; see also Michaels v. Internet Entmt. Group, Inc., 5 F. Supp.2d 823, 837 (C.D. Cal. 1 ...
    11 KB (1,744 words) - 16:53, 13 April 2011
  • ...ated electronic records and signatures which are not part of a transaction also are not covered by this Act.'' ==See Also== ...
    9 KB (1,499 words) - 11:31, 30 October 2011
  • ...e type of works protected by the Copyright Act under Sections 102 and 103. See 17 U.S.C. § 301. ...ional Basketball Ass’n v. Motorola, Inc., 105 F.3d 841 (2d Cir. 1997); see also International News Serv. v. Associated Press, 248 U.S. 215 (1918). The elem ...
    10 KB (1,594 words) - 10:19, 12 April 2011
  • ...“Back” button or by generating repeated pop-up windows (“mousetrapping”). See http://www.ftc. gov/opa/2001/10/cupcake.htm (FTC charges company that pract ...arch engine results without clear disclosure that they are advertisements. See ategory_id=24&article_id=33; “FTC Staff Recommendations to Search Engines: ...
    16 KB (2,394 words) - 13:40, 26 April 2011
  • In addition to direct requests for information, most online services also use some form of tracking technology to collect information while a user “s ...its. Important to website operators and their advertisers, such technology also allows Web sites to develop profiles of page views (“hits”) to the site or ...
    14 KB (2,207 words) - 17:22, 13 April 2011
  • ...I, leading to a profitable market in collecting and reselling PII. PII can also be exploited by criminals to Stalking or [[identity theft|steal the identit The combination of a name with a context may also be considered PII; for example, if a persons' name is on a list of patients ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • ...t to Orin S. Kerr, principal author of the 2001 edition. The editors would also like to thank the members of the CHIP working group.<br> ...does not have the force of law or a U.S. Department of Justice directive. See United States v. Caceres, 440 U.S. 741 (1979).<br> ...
    3 KB (438 words) - 12:32, 5 August 2011
  • ...tute begins to run at the earliest distribution of any copy of that issue. See Strick v. Superior Court, 143 Cal. App. 3d 916, 922 (1983). Hebrew Academy ...he Internet–is foreclosed by Traditional Cat Ass’n, 118 Cal.App.4th 392"). Also, posting links on a website to allegedly defamatory statements, or sending ...
    17 KB (2,553 words) - 14:51, 10 April 2011
  • ...mark is inherently distinctive or that it has acquired secondary meaning. See, e.g., A.J. Canfield Co. v. Honickman, 808 F.2d 291 (3d Cir. 1986). ...confusion in the marketplace as to source or origin of a good or service. See Accuride Int’l, Inc. v. Accuride Corp., 871 F.2d 1531 (9th Cir. 1989). Like ...
    17 KB (2,794 words) - 10:00, 13 April 2011
  • ...e. Thus, in the U.S., Jake Baker faced criminal charges for his e-conduct (see Free Speech), and numerous users of peer-to-peer file-sharing software were ...or by whom the law of the Internet will be enforced. Instead, the authors see market mechanisms, like those that Medieval merchants used, guiding Interne ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...are development, and these examples include many ''Shrinkwrap'' companies (also called ''commercial-off-the-shelf'' or "COTS" firms or ''software package'' ==See also== ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...ole focused on the governance and control of IT at an enterprise level. It also requires passing a 4-hour test, designed to evaluate an applicant's underst == See also == ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...-settled that the First Amendment shelters the right to speak anonymously. See Buckley v. Am. Constitutional Law Foundation, 525 U.S. 182, 200 (1999) (inv ...y before enforcement of subpoenas to identify anonymous Internet speakers. See, e.g., Dendrite, 775 A.2d at 771 (strict procedural safeguards must be impo ...
    15 KB (2,359 words) - 19:34, 10 April 2011
  • ...e injury." Thrifty-Tel, Inc. v. Bezenek, 46 Cal. App. 4th 1559 (1996); see also America Online, Inc. v. IMS, 24 F.Supp.2d 548, 550 (E.D.Va.1998) ("A trespa ...defendant's unauthorized use proximately resulted in damage to plaintiff. See e.g. Thrifty-Tel, Inc. v. Bezenek, 46 Cal. App. 4th 1559 (1996) (holding th ...
    13 KB (1,987 words) - 10:22, 12 April 2011
  • In addition to the three big CRAs, the FCRA also classifies dozens of other information technology companies as "nationwide ...ta deleted because it was in error. The accuracy of credit report data was also mentioned in written testimony by Allstate Insurance before the Michigan in ...
    12 KB (1,814 words) - 12:01, 19 July 2012
  • ...e duty to screen registrants for potential trademark violations. The court also held that defendant did not commit contributory infringement merely by allo ...orrective action. The court also held that the Communications Decency Act (see Chapter 1 (B)(3) above) would not shield ISPs from secondary liability for ...
    8 KB (1,249 words) - 10:18, 13 April 2011
  • ...ates real-time electronic surveillance in federal criminal investigations. See [[Privacy: Wiretap Act | main article on Wiretap Act]]. 18 U.S.C. §§ 2510-2 ...es not prohibit disclosure of user information to non-government entities. See [[Privacy: Stored Communications Act | main article on Stored Communication ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...oes not constitute a Fourth Amendment "search" and no warrant is required. See Illinois v. Andreas, 463 U.S. 765, 771 (1983). In addition, a warrantless s ...eillance statutes apply to criminal investigations involving computers and also discusses how to obtain cell-site location information for cellular phones. ...
    10 KB (1,477 words) - 13:29, 5 August 2011
  • ...erms before responding to Netscape's invitation to download free software. See id. at 32. Further, the court concluded, "where consumers are urged to down ...es alleged that FareChase was accessing and “scraping” the AA.com site and also selling to travel agents and online travel systems “Web Automation” softwar ...
    18 KB (2,884 words) - 17:00, 13 April 2011
  • N/A (see National Data Protection Authority section). ...
    5 KB (747 words) - 16:25, 29 August 2014
  • Directive 95/46/EC, also known as the '''Data Protection Directive''' on the protection of individua ...rea of law in Europe. All the member states of the European Union (EU) are also signatories of the European Convention on Human Rights (ECHR). Article 8 of ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • ...is obtaining computer records in criminal investigations, prosecutors must also bear in mind the admissibility of that evidence in court proceedings. Compu ...s have held that "the term has the connotation of a positive declaration." See, e.g., United States v. Lewis, 902 F.2d 1176, 1179 (5th Cir. 1990); Lexingt ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...eted). Smith v. Maryland has been repeatedly criticized by legal scholars. See, e.g., Daniel J. Solove, Digital Dossiers and the Dissipation of Fourth Ame ...ates real-time electronic surveillance in federal criminal investigations. See main article on Wiretap Act. 18 U.S.C. §§ 2510-2522 was first passed as Tit ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...must show ownership of the copyright and copying by the defendant.”); see also LGS Architects, Inc. v. Concordia Homes of Nev., 434 F.3d 1150, 1156 (9th C ...laintiff must also show that the copying was a result of a volitional act. See Religious Tech. Ctr v. Netcom On-Line Commc’n Servs., Inc., 907 F. Supp. 13 ...
    27 KB (4,215 words) - 07:04, 11 April 2011
View ( | ) (20 | 50 | 100 | 250 | 500)