Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • In addition to direct requests for information, most online services also use some form of tracking technology to collect information while a user “s ...its. Important to website operators and their advertisers, such technology also allows Web sites to develop profiles of page views (“hits”) to the site or ...
    14 KB (2,207 words) - 17:22, 13 April 2011
  • ...I, leading to a profitable market in collecting and reselling PII. PII can also be exploited by criminals to Stalking or [[identity theft|steal the identit The combination of a name with a context may also be considered PII; for example, if a persons' name is on a list of patients ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • ...t to Orin S. Kerr, principal author of the 2001 edition. The editors would also like to thank the members of the CHIP working group.<br> ...does not have the force of law or a U.S. Department of Justice directive. See United States v. Caceres, 440 U.S. 741 (1979).<br> ...
    3 KB (438 words) - 12:32, 5 August 2011
  • ...tute begins to run at the earliest distribution of any copy of that issue. See Strick v. Superior Court, 143 Cal. App. 3d 916, 922 (1983). Hebrew Academy ...he Internet–is foreclosed by Traditional Cat Ass’n, 118 Cal.App.4th 392"). Also, posting links on a website to allegedly defamatory statements, or sending ...
    17 KB (2,553 words) - 14:51, 10 April 2011
  • ...mark is inherently distinctive or that it has acquired secondary meaning. See, e.g., A.J. Canfield Co. v. Honickman, 808 F.2d 291 (3d Cir. 1986). ...confusion in the marketplace as to source or origin of a good or service. See Accuride Int’l, Inc. v. Accuride Corp., 871 F.2d 1531 (9th Cir. 1989). Like ...
    17 KB (2,794 words) - 10:00, 13 April 2011
  • ...e. Thus, in the U.S., Jake Baker faced criminal charges for his e-conduct (see Free Speech), and numerous users of peer-to-peer file-sharing software were ...or by whom the law of the Internet will be enforced. Instead, the authors see market mechanisms, like those that Medieval merchants used, guiding Interne ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...are development, and these examples include many ''Shrinkwrap'' companies (also called ''commercial-off-the-shelf'' or "COTS" firms or ''software package'' ==See also== ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...ole focused on the governance and control of IT at an enterprise level. It also requires passing a 4-hour test, designed to evaluate an applicant's underst == See also == ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...-settled that the First Amendment shelters the right to speak anonymously. See Buckley v. Am. Constitutional Law Foundation, 525 U.S. 182, 200 (1999) (inv ...y before enforcement of subpoenas to identify anonymous Internet speakers. See, e.g., Dendrite, 775 A.2d at 771 (strict procedural safeguards must be impo ...
    15 KB (2,359 words) - 19:34, 10 April 2011
  • ...e injury." Thrifty-Tel, Inc. v. Bezenek, 46 Cal. App. 4th 1559 (1996); see also America Online, Inc. v. IMS, 24 F.Supp.2d 548, 550 (E.D.Va.1998) ("A trespa ...defendant's unauthorized use proximately resulted in damage to plaintiff. See e.g. Thrifty-Tel, Inc. v. Bezenek, 46 Cal. App. 4th 1559 (1996) (holding th ...
    13 KB (1,987 words) - 10:22, 12 April 2011
  • In addition to the three big CRAs, the FCRA also classifies dozens of other information technology companies as "nationwide ...ta deleted because it was in error. The accuracy of credit report data was also mentioned in written testimony by Allstate Insurance before the Michigan in ...
    12 KB (1,814 words) - 12:01, 19 July 2012
  • ...e duty to screen registrants for potential trademark violations. The court also held that defendant did not commit contributory infringement merely by allo ...orrective action. The court also held that the Communications Decency Act (see Chapter 1 (B)(3) above) would not shield ISPs from secondary liability for ...
    8 KB (1,249 words) - 10:18, 13 April 2011
  • ...ates real-time electronic surveillance in federal criminal investigations. See [[Privacy: Wiretap Act | main article on Wiretap Act]]. 18 U.S.C. §§ 2510-2 ...es not prohibit disclosure of user information to non-government entities. See [[Privacy: Stored Communications Act | main article on Stored Communication ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...oes not constitute a Fourth Amendment "search" and no warrant is required. See Illinois v. Andreas, 463 U.S. 765, 771 (1983). In addition, a warrantless s ...eillance statutes apply to criminal investigations involving computers and also discusses how to obtain cell-site location information for cellular phones. ...
    10 KB (1,477 words) - 13:29, 5 August 2011
  • ...erms before responding to Netscape's invitation to download free software. See id. at 32. Further, the court concluded, "where consumers are urged to down ...es alleged that FareChase was accessing and “scraping” the AA.com site and also selling to travel agents and online travel systems “Web Automation” softwar ...
    18 KB (2,884 words) - 17:00, 13 April 2011
  • N/A (see National Data Protection Authority section). ...
    5 KB (747 words) - 16:25, 29 August 2014
  • Directive 95/46/EC, also known as the '''Data Protection Directive''' on the protection of individua ...rea of law in Europe. All the member states of the European Union (EU) are also signatories of the European Convention on Human Rights (ECHR). Article 8 of ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • ...is obtaining computer records in criminal investigations, prosecutors must also bear in mind the admissibility of that evidence in court proceedings. Compu ...s have held that "the term has the connotation of a positive declaration." See, e.g., United States v. Lewis, 902 F.2d 1176, 1179 (5th Cir. 1990); Lexingt ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...eted). Smith v. Maryland has been repeatedly criticized by legal scholars. See, e.g., Daniel J. Solove, Digital Dossiers and the Dissipation of Fourth Ame ...ates real-time electronic surveillance in federal criminal investigations. See main article on Wiretap Act. 18 U.S.C. §§ 2510-2522 was first passed as Tit ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...must show ownership of the copyright and copying by the defendant.”); see also LGS Architects, Inc. v. Concordia Homes of Nev., 434 F.3d 1150, 1156 (9th C ...laintiff must also show that the copying was a result of a volitional act. See Religious Tech. Ctr v. Netcom On-Line Commc’n Servs., Inc., 907 F. Supp. 13 ...
    27 KB (4,215 words) - 07:04, 11 April 2011
  • ...e integrity of information can be evaluated at any given point of time, it also means that the information is able to be verified constantly for errors, fr ...as metrics, analytics, and alarms pertaining to financial information were also introduced. ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • Numerous state legislatures also have attempted to regulate material distributed to minors over the Internet ...ng sexual material over the Internet with the intent to seduce minors. But see Hatch v. Superior Court, 80 Cal. App. 4th 170 (2000) (upholding constitutio ...
    4 KB (639 words) - 19:02, 10 April 2011
  • See also copyright issues with linking. ...puter Corp., 2002 U.S. Dist. LEXIS 6365 (C.D. Cal. 2002) on other grounds. See subsection C(5)(c) below). ...
    27 KB (4,223 words) - 10:08, 13 April 2011
  • ...data or personally identifiable information regarding children. Muris has also held out the possibility that federal regulators will seed lists with names ...y, security, advertising, and other consumer protection issues they raise. See http://www.ftc.gov/bcp/reports/wirelesssummary.pdf. ...
    31 KB (4,666 words) - 13:19, 26 April 2011
  • ...while maintaining competitive advantage and value system integrity”. It is also called ''business continuity and resiliency planning'' (BCRP). A business c ...ceptability are affected by the cost of recovery solutions. A function may also be considered critical if dictated by law. ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ...r attempts to commit an offense under the Computer Fraud and Abuse Act but also those who conspire to do so.<br> ...o criminalize not only explicit threats to cause damage to a computer, but also threats (1) to steal data on a victim’s computer, (2) to publicly disclose ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...t be presented to a magistrate. See 18 U.S.C. §§ 2510(9) and 2516(1); see also In re United States of America, 10 F.3d 931 (2d Cir. 1993), cert. denied, 1 ...most commonly involves digital-display paging devices or fax machines, but also includes electronic mail, computer transmissions, and, in some cases, satel ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • ...to administer justice within a defined area of responsibility. The term is also used to denote the geographical area or subject-matter to which such author The problem of forum shopping also applies as between federal and state courts. ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • Privacy can also have free speech ramifications. In some countries privacy has been used as ...arn to accept each other if they cannot know about each other. Issues have also been raised that privacy can encourage criminal activity as it makes it eas ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ...d. The court concluded that "fair use is a lawful use of a copyright." See also Association of American Medical Colleges v. Cuomo, 928 F.2d 519, 523 (2d Ci ...efendant. Campbell, 510 U.S. at 591, citing Harper & Row, 471 U.S. at 562. See American Geophysical Union v. Texaco Inc., 60 F.3d 913, 918 (2d Cir. 1995); ...
    31 KB (4,913 words) - 07:20, 11 April 2011
  • ...ntities of money or valuables is a common purpose of fraud, but there have also been fraudulent "discoveries", e.g., in scientific fraud, to gain prestige A hoax also involves deception, but without the intention of gain or of damaging or dep ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...replace bills of lading and even checks with appropriate EDI messages. It also refers specifically to a family of standards. ...s, the specifications are analogous to blue prints. (The specification may also be called a "mapping," but the term mapping is typically reserved for speci ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ...but rather while it was in electronic storage on the web server. The Court also held that defendant airline violated the Stored Communications Act because, ...ites gave no indication that use of the site meant such consent. The court also held that Pharmatrak intercepted the communications because its acquisition ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • ...ators much improved 'tools' over those available to them under Basel I. It also provides a framework for dealing with all the other risks a bank may face, ...ement objectives and policies which can be made annually. Institutions are also required to create a formal policy on what will be disclosed, controls arou ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ...ing, or to obtain unauthorized funds from an account. Credit card fraud is also an adjunct to [[identity theft]]. According to the Federal Trade Commission ...but signatures are relatively easy to forge. Some merchants will demand to see a picture ID, such as a driver's license, to verify the identity of the pur ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...er system management functions. ICANN has approved a number of registrars. See http://www.icann.org/registrars/accredited-list.html. ...ugmented by a supplemental set of rules for each arbitration organization. See http://www.icann.org/dndr/udrp/uniform-rules.htm. ...
    29 KB (4,582 words) - 10:16, 13 April 2011
  • ...l rights management]] or DRM) that control access to copyrighted works. It also criminalizes the act of circumventing an access control, whether or not the ...me. For further analysis of this portion of the Act and of cases under it, see [[WIPO Copyright and Performances and Phonograms Treaties Implementation Ac ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...ual property claims, but courts in other circuits have found the opposite. See Section 230 and Intellectual Property for details. Section 230 also protects against state criminal laws and civil claims based on federal crim ...
    38 KB (5,571 words) - 14:45, 10 April 2011
  • ...usal link between “virtual child pornography” and harm to actual children. Also, the Court reasoned that the CPPA would punish material that does not quali ...tional in United States v. American Library Ass’n, 123 S. Ct. 2297 (2003) (see subsection D(5), above). ...
    32 KB (4,920 words) - 19:22, 10 April 2011
  • Risk management also faces difficulties allocating resources. This is the idea of [[opportunity ...risk may have allowed. Not entering a business to avoid the risk of loss also avoids the possibility of earning profits. ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...ivacy policy transparency requirements that were agreed to under the plan. See http://europa.eu.int/comm/internal_ market/privacy/index_en.htm. (3) EU Sta ...as deemed the PIPED Act “adequate” under its EU Data Protection Directive. See http://www.parl.gc.ca/36/2/parlbus/ chambus/house/bills/government/C-6/C-6_ ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • ## See also Tasini v. New York Times Co., Inc., 184 F. Supp. 2d 350 (S.D.N.Y. 2002). Pl ...
    6 KB (1,026 words) - 06:44, 11 April 2011
  • ...eillance statutes apply to criminal investigations involving computers and also discusses how to obtain cell-site location information for cellular phones. ...result in civil and criminal liability, and in the case of Title III, may also result in suppression of evidence. ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...company) is directed, administered or controlled. Corporate [[governance]] also includes the relationships among the many Stakeholder (corporate) involved ...ible decision making is not only important for public relations, but it is also a necessary element in risk management and avoiding lawsuits. Organization ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ....gov.uk/ Office of Government Commerce] (OGC). The content of the books is also protected by Crown Copyright. ...enhanced glossary has been developed as a key deliverable of the ITIL v3. also known as the ITIL Refresh Project. ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...'S''olicited ''P''ornography ''A''nd ''M''arketing Act of 2003'''. This is also a play on the usual term for unsolicited email of this type, [[Spam|spam]]. ...equire e-mailers to get permission before they send marketing messages. It also prevents states from enacting stronger anti-spam protections, and prohibits ...
    26 KB (4,026 words) - 12:15, 5 May 2011
  • ...not only all of the legal issues covered in Chapters 1 through 4, but will also need to understand the precise nature of the information to be gathered in ...enticity, such as claims that computer records have been tampered with. It also discusses the best evidence rule and the use of summaries containing electr ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • The '''Sarbanes–Oxley Act of 2002''', also known as the 'Public Company Accounting Reform and Investor Protection Act' ...g accounting firms in their roles as auditors of public companies. The act also covers issues such as auditor independence, corporate governance, internal ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...site (e.g. they should not be near the same coastline). The ITSC Plan must also satisfy two measurements- the [[Recovery_Time_Objective|Recovery Time Objec ...increased by an amount of time equivalent to any such variability). It is also risky to assume that tapes will always be physically intact- the RPO should ...
    13 KB (2,264 words) - 11:10, 27 October 2012
  • ...th the elements that must be proven should the prosecution go to trial and also the sources of electronic evidence that are relevant to those elements. ...not just what a computer happens to contain at the time of the search, but also evidence of who has used a computer, when, and how. ...
    138 KB (21,660 words) - 13:18, 5 August 2011
View ( | ) (20 | 50 | 100 | 250 | 500)