Search for: "Long v. Hacker" Results 181 - 200 of 287
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
5 Jun 2022, 4:26 pm by INFORRM
Users’ “voiceprints” could be used for targeted advertising or the location where they are stored could be used by hackers to impersonate the user. [read post]
19 Sep 2014, 5:43 am by SHG
  As the Supremes held in Branzberg v. [read post]
20 Jan 2012, 6:44 am by admin
They base their conclusion on the landmark 1922 Supreme Court decision in U.S. v. [read post]
24 Jun 2010, 4:00 am by John Gregory
ACLU v Mukasey 534 F.3d.181  (3d Circ. 2008). [read post]
24 Jul 2007, 12:00 am
Just for "fun", take a look at the very long Privacy Rights Clearinghouse list of data breaches since 2005. [read post]
24 Jul 2007, 12:00 am
Just for "fun", take a look at the very long Privacy Rights Clearinghouse list of data breaches since 2005. [read post]
26 Sep 2014, 12:00 am by Cindy Cohn
  Apple has done (and Google has long announced they will do) basic encryption on mobile devices. [read post]
30 Dec 2013, 9:01 pm by Anita Ramasastry
With this data, the hackers could use this magnetic stripe data to create counterfeit cards. [read post]
24 Apr 2018, 7:56 am by Anthony Gaughan
Wuerth notes that in the 2015 case of Sachs v. [read post]
11 Sep 2012, 1:36 am by Kevin LaCroix
While loss of goodwill is notoriously hard to quantify, its financial impact can be both long-term and substantial. [read post]