Search for: "Advanced Computer Technology Act, Inc. " Results 181 - 200 of 433
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
9 Mar 2017, 6:02 am by Dennis Crouch
Equally important, it would cut off many economically and socially useful IP-goods transactions, especially in the modern globalized value/supply chain production of technology-based goods such as computers, smartphones, and televisions.[11] = = = = = [1] Bloomer v. [read post]
29 Dec 2016, 2:18 pm by Michael S. Levine
BancInsure, Inc., when it rebuffed a common insurer argument – that employee negligence breaks the causal chain between third-party criminal acts and otherwise covered losses. [read post]
26 Dec 2016, 4:30 am by Ben
Well Marie-Andree cited that 1879 case  Feist Publications, Inc. v. [read post]
10 Dec 2016, 5:02 am by Florian Mueller
As the Portuguese Republic states in its observations, the act which constitutes the actual 'making available' was the action by the person who effected the initial communication. [read post]
10 Nov 2016, 4:00 am by Administrator
This duty extends to all use of technology, including computers, portable devices, networks, technology outsourcing and cloud computing. [read post]
4 Nov 2016, 6:33 am
§ 948.075, entitled, `[u]se of a computer to facilitate a child sex crime,’ provid [read post]
27 Oct 2016, 8:48 am by Cynthia Marcotte Stamer
Compliance with the Privacy and Security Rules of the Health Insurance Portability & Accountability Act (HIPAA) is a living process that requires employer and other health plans, health insurers, health care providers and healthcare clearinghouses to recurrently reevaluate their HIPAA enterprise risk and timely act to mitigate security threats to electronic (ePHI) and other  protected health information and other HIPAA compliance concerns on an ongoing basis. [read post]
2 Oct 2016, 12:11 pm by Dennis Crouch
Dollar Park & Fly, Inc., 469 U.S. 189, 201 (1985) (noting that the Lanham Act contains safeguards to prevent trademark protection from “tak[ing] from the public domain language that is merely descriptive”). [read post]
26 Sep 2016, 8:19 am by Rebecca Tushnet
Accusearch Inc., 570 F.3d 1187 (10th Cir. 2009). [read post]
16 Jun 2016, 2:48 pm by Kevin LaCroix
At the time, Morgan Stanley’s Internet filtering software did not prevent employees from accessing such ‘uncategorized’ websites from Morgan computers. [read post]
12 Jun 2016, 2:43 pm by Florian Mueller
In other words, an identical act of infringement would yield two different damages awards simply because the infringers packaged their products in different units. [read post]
9 Jun 2016, 5:51 am by Eugene Volokh
Arete Assocs., Inc., 1 F.3d 225 (4th Cir. 1993) (holding that the Virginia Computer Crimes Act, which outlawed certain kinds of copying of computer programs, was preempted because “the core of both causes of action, in the context of [plaintiff’s] claim, is the unauthorized copying of a [Copyright-Act-protected] computer program. [read post]
1 Jun 2016, 10:55 am by Jeffrey Neuburger
Such lack of “authorization” could form the basis of a viable claim under the federal Computer Fraud and Abuse Act and state law counterpart. [read post]
19 May 2016, 2:33 pm by Kevin LaCroix
More recently, on March 31, 2016, the SEC charged Navistar International Corp. with misleading investors about its development of an advanced technology truck engine and its potential certification by the Environmental Protection Agency (“EPA”). [read post]