Search for: "Identification Devices v. United States" Results 241 - 260 of 314
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
9 Oct 2018, 5:00 am by Hilary Hurd
” The policy provides for a five to fifteen-day detention of anyone who destroys Chinese banknotes or identification cards. [read post]
9 Apr 2018, 6:00 am by Hayley Evans
Five protocols—Protocol I (Non-detectable fragments); Amended Protocol II (Mines, booby-traps, other devices); Protocol III (Incendiary weapons); Protocol IV (Blinding laser weapons); and Protocol V (Explosive remnants of war)—are currently annexed to the CCW. [read post]
In Section 2202, the PRA provides that the United States owns “Presidential records. [read post]
18 May 2009, 5:24 am
’ (China Law Blog)   Europe ECJ finds similar marks on wine and glasses not likely to cause confusion: Waterford Wedgewood plc v Assembled Investments (Proprietary) Ltd, OHIM (Class 46) (IPKat) AG Colomer opines in Maple leaf trade mark battle: joined cases American Clothing Associates SA v OHIM and OHIM v American Clothing Associates SA (IPKat) (Excess Copyright) CFI: Restitutio and time limits: how does the law stand now for CTMs? [read post]
27 Feb 2009, 7:00 am
(The IP Factor)   Uganda Anti-counterfeits conference held in Kampala (Afro-IP)   United Kingdom IP rights in the Court of Appeal, but not as we know them...: Office of Communications v Information Commissioner (IPKat) IPO review of practice before Patent Tribunal (PatLit) Employee inventor compensation: an expensive pastime? [read post]
28 Jun 2024, 5:59 pm
Their comments are premised on the presumption that AHIs are caused by a malign state based capability being deliberately applied against American human targets in various overseas and domestic locations. [read post]
29 Aug 2008, 1:25 pm
– Discussion of IPFrontline.com article ‘Understanding Intellectual Property Value’: (IP finance), How to make sure your IP strategy plan is not doomed to failure: (IP Asset Maximizer Blog) Improve venture capital returns with IP portfolio management: (Ezine @rticles)   Global - Trade Marks / Domain Names / Brands Trade mark strategy – counterintuitive names: (IP Thinktank), ICANN Intellectual Property Constituency paper on sunrise mechanisms for… [read post]
7 Jun 2024, 10:12 am by Katitza Rodriguez
Core cybercrimes include unauthorized access to ICT systems, illegal interception, damaging, deleting, deteriorating, altering, or suppressing electronic data, hindering the functioning of ICT systems, and misuse of devices. [read post]
2 Aug 2021, 6:12 am by Casey Lide
An initial proposal must, among other things, “identif[y], and outline[] steps to support, local and regional broadband planning processes or ongoing efforts to deploy broadband or close the digital divide” and “describe[] coordination with local governments, along with local and regional broadband planning processes. [read post]
7 Sep 2020, 10:04 am by Paul Rosenzweig, Vishnu Kannan
More pointedly, it provides (in §606(c)) that: Upon proclamation by the President that there exists war or a threat of war, or a state of public peril or disaster or other national emergency, or in order to preserve the neutrality of the United States, the President, if he deems it necessary in the interest of national security or defense, may suspend or amend, for such time as he may see fit, the rules and regulations applicable to any or all stations or… [read post]
9 Jan 2015, 4:31 am by Kevin LaCroix
It has now been confirmed that two companies in the United States have potentially been the subject of cyber-terrorism. [read post]
3 Aug 2016, 9:30 pm by Dan Ernst
”  desan@law.harvard.eduChris gave us a deeply theorized account of the rise of currency that began with the identification of a binary that separates the Market (marked by transactions, money, profit) from the State (politics, law, and judgment). [read post]
1 Aug 2022, 4:58 am by Emma Snell
After a meeting with the U.S. ambassador, Kosovo’s government announced it would delay the implementation of both the license plate and identification decisions by one month. [read post]
29 Dec 2011, 4:54 pm by INFORRM
Mr Justice Tugendhat handed down judgment in the case of Goodwin v News Group Newspapers (No.3) ([2011] EWHC 1437 (QB)), refusing an application to permit the identification of the interested party – but allowing the identification of her job description. [read post]
28 Jan 2007, 11:42 pm
Criminal Sanction Impact.01/23/07 referred to transportationLAW / CORRECTNSA3294 Gunther (MS) -- Authorizes the employment of state and local work release inmates by not-for-profit organizations and public service projectsSUMM : Amd SS851 & 870, Cor L Authorizes the employment of state and local work release inmates by not-for-profit organizations and public service projects. 01/24/07 referred to correctionLAW / CORRECTNSA3450 Koon (MS) -- Requires electronic… [read post]
7 May 2018, 1:51 pm by Rebecca Tushnet
Sometimes we only have IP address; sometimes we negotiate to narrow requests to avoid revealing unnecessary info.Pablo Peláez, Europol Representative to the United States: Cybercrime unit is interested in hate speech & propaganda. [read post]
16 Aug 2008, 2:43 am
– discussion of Washington Post article on Ismed’s efforts to promote follow-on biologics approval pathway: (Patent Baristas), (Patent Docs), US: Congressional fact-finding on follow-on biologics: (Patent Docs), US: David v Monsanto: Biotechnology patent ‘exhaustion’ after Quanta, Supreme Court petition: (Hal Wegner), US: Ulysses Pharmaceuticals announces issuance of patent for novel class of ant [read post]
14 Jan 2023, 6:30 am by Guest Blogger
The Court had held in 1909 that people who were employed by or received pensions from the United States couldn’t serve as jurors in federal criminal cases. [read post]