Search for: "20' Container and Its Contents of Used Office and Electronic Parts" Results 61 - 80 of 308
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
9 Jun 2014, 5:56 am
The judge found that Zhu’s expectation of privacy in the laptop was “reasonable”:Zhu took many steps to restrict third-party use and access to the computer, which weighs in favor of finding a reasonable expectation of privacy in its contents. [read post]
21 Jun 2019, 3:00 am by Jim Sedor
The conspiracy charge to which she pleaded includes all the allegations contained in the 60-count indictment. [read post]
1 Nov 2013, 7:03 am
Tosti turned over to Casteneda on October 20, 2009. [read post]
9 Oct 2020, 3:00 am by Jim Sedor
But the content morphed almost instantaneously, prompting the more sweeping action. [read post]
22 Feb 2018, 3:30 am by Graham Smith
Examples include the meaning of ‘external’ communications under RIPA, the legal basis for thematic interception warrants under RIPA, and the use of S.94 Telecommunications Act 1984 powers to acquire bulk communications data from telecommunications companies.In the field of surveillance, hidden legal interpretations influencing how powers are wielded are in substance as much part of the law as the statute that grants the powers. [read post]
22 Feb 2018, 3:30 am by Graham Smith
Examples include the meaning of ‘external’ communications under RIPA, the legal basis for thematic interception warrants under RIPA, and the use of S.94 Telecommunications Act 1984 powers to acquire bulk communications data from telecommunications companies.In the field of surveillance, hidden legal interpretations influencing how powers are wielded are in substance as much part of the law as the statute that grants the powers. [read post]
26 Jul 2023, 8:53 am by INFORRM
In 2008 the newspaper placed on its website an electronic version of its archives dating back to 1989 (including the Article). [read post]
26 Jun 2020, 3:00 am by Jim Sedor
Democrats say the hearing is part of a broader investigation into Barr’s leadership of the department. [read post]
26 Aug 2016, 6:21 am
At the same time, the prosecution team concluded that Valle's conversations with the three alleged co-conspirators contained what they termed `elements of real crime’ because they `described dates, names, and activities that you would use to conduct a real crime. [read post]
18 Oct 2008, 7:30 pm
In its November 2001 report, the National Committee on Vital & Health Statistics (NCVHS) mentions PHRs and the growing consumer use of Internet-based health information services.[3] Early on, PHRs were used in a rudimentary fashion as a way for individuals to track their own specific health care information. [read post]
12 Dec 2021, 1:09 pm by Dennis Crouch
Patent and Trademark Office interprets this to mean no, never, no matter what. 15 U.S.C. [read post]
8 Jun 2015, 9:30 pm by Jane Chong
NSA would have the opportunity to review and respond to any proposed use of FISA-derived information from the collections before the Attorney General authorizes its use in criminal proceedings. [read post]
20 Mar 2015, 2:10 pm by Douglas Dahl
  Six of the seven cases below arose from the unauthorized use or disclosure of electronic PHI. [read post]
18 Feb 2020, 9:20 am by Chris Wesner
The majority of the Debtor’s pleadings have been transmitted using the CM/ECF Filer or User login credentials and electronic signature of attorney H. [read post]
30 Jul 2023, 1:27 pm by Thomas James
ROSS also argues that its use of content in the Westlaw database is fair use. [read post]
4 Oct 2011, 5:43 am by Joel R. Brandes
According to NYU's Chief Information Security Officer, NYU had installed the Internet portal at Bellevue for the convenience of its residents who trainedd there. [read post]
30 Mar 2007, 6:38 am
Content Repository Analysis - What data repositories contain potentially responsive electronically stored information (ESI)? [read post]