Search for: "INTERN. TELECOMMUNICATIONS SYSTEMS v. State" Results 181 - 200 of 338
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
4 Jun 2017, 7:51 pm
The asymmetries run beyond the usual problem of state subsidies to that of states being tempted to tilt markets in favor of SOEs (producing a sort of systemic corruption in markets driven systems) to issues of interference with sovereignty when SOEs serve as the apex enterprise in global production chains.[18] The legal status of SOEs varies from being a part of government to stock companies with a state as a regular stockholder.[19] But its purpose has… [read post]
7 Apr 2017, 3:46 pm
Cress, 112 Ohio St.3d 72, 2006-Ohio-6501, ¶ 36, quoting Webster's Third New International Dictionary 2382 (1986) citing State v. [read post]
4 Mar 2017, 4:34 pm by Chuck Cosson
  Julian Assange reportedly stated that this strategy was at the root of his efforts with WikiLeaks which, ironically, he aimed at “authoritarian” political parties.[3] Such publication can also undermine rule of law by reinforcing an ends-justify-the means value system. [read post]
30 Dec 2016, 4:23 pm by Graham Smith
That happened with S.94 of the Telecommunications Act 1984 and, arguably, with bulk interception under RIPA. [read post]
30 Dec 2016, 4:23 pm by Graham Smith
Will the Act foster trust in the system that it sets up? [read post]
21 Dec 2016, 5:46 am by INFORRM
A system of internal review governed by an internal “Single Point of Contact” separate from an active investigation, trained in surveillance but part of the same force or agency was considered broadly adequate. [read post]
29 Nov 2016, 12:56 pm by Zachary Burdette, Quinta Jurecic
The warning follows yesterday’s cyberattack on a German telecommunications company as well as German accusations that Russians attacked the computer systems of two of the country’s political parties. [read post]
26 Jun 2016, 4:05 pm by INFORRM
The trial in TLT and others v Secretary of State for the Home Department began on Monday 20 June 2016 and was completed on 23 June, with judgment being given on 24 June 2016. [read post]
21 Feb 2016, 4:28 pm by INFORRM
Privacy International points out that if the Investigatory Powers was to become a law, a telecommunications company receiving a similar order would be under gagging order and unable to release a letter like the one Apple has. [read post]
13 Jan 2016, 5:05 pm by Kevin LaCroix
  Indeed, when compared to the risks associated with internal accounting fraud schemes, individual financial malfeasance and other instances of financial reporting deceit or neglect, suffering a cyber-attack can be far more severe in scope, far more cosmic in breadth and far more unpredictable in latitude. [read post]
7 Jan 2016, 9:21 am
In its replies, the company did not comment on any of the specific corruption allegations, discussing only its internal compliance and anti-corruption systems. [read post]
23 Dec 2015, 5:29 am by INFORRM
More recently, the Grand Chamber of the ECtHR in Zakharov v Russia stated that “the interception authorisation, … must clearly identify a specific person …or single set of premises”. [read post]