Search for: "Long v. Hacker" Results 221 - 240 of 287
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
26 Sep 2014, 2:40 pm by Cindy Cohn
Update 9/26/14: Recently Apple has announced that it is providing basic encryption on mobile devices that they cannot bypass, even in response to a request from law enforcement. [read post]
3 May 2016, 5:08 pm by Kevin LaCroix
  A plaintiff whose PII, PFI, or PPI was stolen by hackers typically brings suit against the hacked company on his or her own behalf and on behalf of a class of similarly situated people, hoping the presiding court will certify the proposed class and allow the case to proceed as a class action.[3]  Causes of action in customer cases run a wide gamut of legal theories, from traditional tort claims (negligence and fraud) to allegations of state and federal statutory violations (for… [read post]
21 Apr 2012, 12:42 pm
To answer that question, the appeals court looked back almost 50-years – long before the computer, much less complex HFT systems – to its decision in United States v. [read post]
9 Dec 2014, 10:38 am by Kevin LaCroix
”  – Remarks by Kevin Mandia, “Sony Investigator Says Cyber Attack ‘Unparalleled’ Crime,” Reuters, December 7, 2014[i]   “The days of the IT guy sitting alone in a dark corner are long gone. [read post]
15 Feb 2023, 8:33 am by Alexandra L. Arko
Hackers began accessing the private devices of others, stealing intimate photos, threatening victims, and publishing the photos on the internet. [read post]
15 Feb 2023, 8:33 am by Alexandra L. Arko
Hackers began accessing the private devices of others, stealing intimate photos, threatening victims, and publishing the photos on the internet. [read post]
25 Nov 2022, 12:30 pm by John Ross
In response, Treasury says most tax cuts are OK as long as the total amount of spending doesn't decrease. [read post]
19 Oct 2016, 10:25 am by Michael Lowe
For more, read: The Police And Your Phone: Invasion Of Privacy By Police; Texas Police Can Get Your Phone Records From Phone Company Without A Warrant: Ford v. [read post]
7 May 2025, 6:05 am by Hilary J. Allen
Individual software program developers affiliated with Tornado Cash and backed by the Coinbase crypto exchange challenged OFAC’s determination, arguing in Van Loon v. [read post]
8 Jun 2022, 7:00 am by Guest Blogger
This post was prepared for a roundtable on Constitutional Faith and Veneration, convened as part of LevinsonFest 2022—a year-long series gathering scholars from diverse disciplines and viewpoints to reflect on Sandy Levinson’s influential work in constitutional law. [read post]
19 May 2016, 1:37 pm by Rebecca Tushnet
 Harley Geiger, Rapid7: we hire lots of white hat hackers, without legal assistance/knowledge; they get threat letters with vague DMCA threats. [read post]
18 Sep 2014, 4:46 am by Rebecca Tushnet
  Protecting content v. potential impediments to future innovations. [read post]
31 Jul 2019, 7:02 am by Kristian Soltes
Customer data accessed by the hacker includes full names, physical addresses with full ZIP and postal codes, phone numbers, email addresses, dates of birth and self-reported income—information that is typically requested on credit card applications. [read post]
20 Jul 2022, 4:52 am by Emma Snell
The Marquette Law School poll, which was conducted just days after the court overturned Roe v. [read post]
16 Dec 2006, 2:06 pm
  But my curmudgeonly fears were laid to rest earlier this week when the Supreme Court decided Carey v. [read post]