Search for: "Identification Devices v. United States"
Results 241 - 260
of 314
Sorted by Relevance
|
Sort by Date
9 Oct 2018, 5:00 am
” The policy provides for a five to fifteen-day detention of anyone who destroys Chinese banknotes or identification cards. [read post]
9 Apr 2018, 6:00 am
Five protocols—Protocol I (Non-detectable fragments); Amended Protocol II (Mines, booby-traps, other devices); Protocol III (Incendiary weapons); Protocol IV (Blinding laser weapons); and Protocol V (Explosive remnants of war)—are currently annexed to the CCW. [read post]
18 Feb 2022, 7:54 am
In Section 2202, the PRA provides that the United States owns “Presidential records. [read post]
18 May 2009, 5:24 am
’ (China Law Blog) Europe ECJ finds similar marks on wine and glasses not likely to cause confusion: Waterford Wedgewood plc v Assembled Investments (Proprietary) Ltd, OHIM (Class 46) (IPKat) AG Colomer opines in Maple leaf trade mark battle: joined cases American Clothing Associates SA v OHIM and OHIM v American Clothing Associates SA (IPKat) (Excess Copyright) CFI: Restitutio and time limits: how does the law stand now for CTMs? [read post]
27 Feb 2009, 7:00 am
(The IP Factor) Uganda Anti-counterfeits conference held in Kampala (Afro-IP) United Kingdom IP rights in the Court of Appeal, but not as we know them...: Office of Communications v Information Commissioner (IPKat) IPO review of practice before Patent Tribunal (PatLit) Employee inventor compensation: an expensive pastime? [read post]
28 Jun 2024, 5:59 pm
Their comments are premised on the presumption that AHIs are caused by a malign state based capability being deliberately applied against American human targets in various overseas and domestic locations. [read post]
5 Dec 2010, 4:27 pm
Southwest v. [read post]
29 Aug 2008, 1:25 pm
– Discussion of IPFrontline.com article ‘Understanding Intellectual Property Value’: (IP finance), How to make sure your IP strategy plan is not doomed to failure: (IP Asset Maximizer Blog) Improve venture capital returns with IP portfolio management: (Ezine @rticles) Global - Trade Marks / Domain Names / Brands Trade mark strategy – counterintuitive names: (IP Thinktank), ICANN Intellectual Property Constituency paper on sunrise mechanisms for… [read post]
7 Jun 2024, 10:12 am
Core cybercrimes include unauthorized access to ICT systems, illegal interception, damaging, deleting, deteriorating, altering, or suppressing electronic data, hindering the functioning of ICT systems, and misuse of devices. [read post]
2 Aug 2021, 6:12 am
An initial proposal must, among other things, “identif[y], and outline[] steps to support, local and regional broadband planning processes or ongoing efforts to deploy broadband or close the digital divide” and “describe[] coordination with local governments, along with local and regional broadband planning processes. [read post]
7 Sep 2020, 10:04 am
More pointedly, it provides (in §606(c)) that: Upon proclamation by the President that there exists war or a threat of war, or a state of public peril or disaster or other national emergency, or in order to preserve the neutrality of the United States, the President, if he deems it necessary in the interest of national security or defense, may suspend or amend, for such time as he may see fit, the rules and regulations applicable to any or all stations or… [read post]
9 Jan 2015, 4:31 am
It has now been confirmed that two companies in the United States have potentially been the subject of cyber-terrorism. [read post]
3 Aug 2016, 9:30 pm
” desan@law.harvard.eduChris gave us a deeply theorized account of the rise of currency that began with the identification of a binary that separates the Market (marked by transactions, money, profit) from the State (politics, law, and judgment). [read post]
1 Aug 2022, 4:58 am
After a meeting with the U.S. ambassador, Kosovo’s government announced it would delay the implementation of both the license plate and identification decisions by one month. [read post]
Media Law Review of the Year 2011: Defamation, Contempt, Privacy and a Public Inquiry – Jude Townend
29 Dec 2011, 4:54 pm
Mr Justice Tugendhat handed down judgment in the case of Goodwin v News Group Newspapers (No.3) ([2011] EWHC 1437 (QB)), refusing an application to permit the identification of the interested party – but allowing the identification of her job description. [read post]
28 Jan 2007, 11:42 pm
Criminal Sanction Impact.01/23/07 referred to transportationLAW / CORRECTNSA3294
Gunther (MS) -- Authorizes the employment of state and local work release inmates by not-for-profit organizations and public service projectsSUMM : Amd SS851 & 870, Cor L Authorizes the employment of state and local work release inmates by not-for-profit organizations and public service projects. 01/24/07 referred to correctionLAW / CORRECTNSA3450
Koon (MS) -- Requires electronic… [read post]
7 May 2018, 1:51 pm
Sometimes we only have IP address; sometimes we negotiate to narrow requests to avoid revealing unnecessary info.Pablo Peláez, Europol Representative to the United States: Cybercrime unit is interested in hate speech & propaganda. [read post]
16 Aug 2008, 2:43 am
– discussion of Washington Post article on Ismed’s efforts to promote follow-on biologics approval pathway: (Patent Baristas), (Patent Docs), US: Congressional fact-finding on follow-on biologics: (Patent Docs), US: David v Monsanto: Biotechnology patent ‘exhaustion’ after Quanta, Supreme Court petition: (Hal Wegner), US: Ulysses Pharmaceuticals announces issuance of patent for novel class of ant [read post]
17 Jan 2012, 5:50 pm
On the federal front, the Ninth Circuit in United States v. [read post]
14 Jan 2023, 6:30 am
The Court had held in 1909 that people who were employed by or received pensions from the United States couldn’t serve as jurors in federal criminal cases. [read post]