Search for: "United States v. Container Corp." Results 2301 - 2320 of 2,322
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
4 Jan 2016, 4:08 pm by Kevin LaCroix
Other states may choose to take a different approach. [read post]
3 Nov 2022, 11:00 pm by Daniel Jin
There are 26 federative states (and the federal district) in Brazil, each of which have the powers to adopt their own Constitutions and laws, subject to the rules and principles provided for under the Federal Constitution. [read post]
30 Dec 2013, 9:01 pm by Anita Ramasastry
Background: The Breach of Target’s Security Target is based in Minneapolis and has almost 1,800 stores in the United States. [read post]
8 Sep 2015, 5:08 pm by Kevin LaCroix
  First, in a July 8, 2015 decision in Acevedo v. [read post]
30 Jul 2021, 8:21 am by Editor Charlie
  Established in 1931, SGA has for 90 years successfully operated with a two-word mission statement: “Protect Songwriters,” and continues to do so throughout the United States and the world. [read post]
14 Feb 2023, 12:29 pm
</span> </p> <p> <span style="display: initial;"> <br/> </span> </p> <h2> <span style="font-weight: bold; display: initial;"> Patent Law </span> </h2> <p> <span style="display: initial;"> <br/> </span> </p> <p> <span style="display: initial;"> … [read post]
9 Oct 2008, 4:28 am
Take a look at the illustrations in the draft itself for what it's intended to do….Actually, you can't - unless you buy the thing from the ALI publications unit. [read post]
State of the Current Regulations The current regulations regarding the impact of recertification are contained in different places for size (13 C.F.R. 121.104), HUBZone (13 C.F.R. 126.619), WOSB (at 13 CFR 127.504(h)), and VetCert (at 13 C.F.R. 128.401(e)) Programs. [read post]
2 Jul 2019, 12:39 pm by Patricia Hughes
(OCA, para.8-9) The OCA relied on the 2014 Supreme Court of Canada decision in Bhasin v. [read post]
31 Jan 2019, 2:03 pm by Kevin LaCroix
Most ransomware infections come from phishing attacks, in which unwitting users are enticed to open a file or click on a link containing the ransomware malware; The ransomware attackers demand payment in cryptocurrency, typically bitcoin, for the encryption key to enable the victim corporation to unlock the now inaccessible data; The ransomware victim pays the cryptocurrency ransom to the attacker; and The ransomware attackers move on to their next victim. [read post]
2 Mar 2016, 4:26 pm by Kevin LaCroix
  Though encrypted communication platforms have been available since the early 1990s, the encryption debate began to involve Apple when, in 2014 Apple released its new iOS, which contained a feature that generates random security “keys” that are unknown to Apple and in combination with the user’s passcode to decrypt the device’s data. [read post]
3 Sep 2014, 4:14 am by Kevin LaCroix
Supreme Court’s 1974 decision in American Pipe & Construction Co. v. [read post]
18 Aug 2019, 8:18 pm by Omar Ha-Redeye
It was also submitted for judicial review to the Federal Court in Chrétien v. [read post]
4 Sep 2018, 3:35 pm by Kevin LaCroix
Supreme Court issued its unanimous decision in Cyan, Inc. v. [read post]
30 Nov 2011, 2:15 pm by Mandelman
Lastly, robo-signing is not a solution that exists on a list that contains other solutions. [read post]
1 Nov 2022, 10:23 am by David Kopel
Although Dupuy is deceased, his website contains a bibliography of his prolific writing. [read post]