Search for: "Intercept Corporation" Results 241 - 260 of 562
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
3 Nov 2015, 2:24 am by Steve Sheinberg
As the FBI notes “[i]f information might be valuable to another government, company or group, you should assume that it will be intercepted and retained. [read post]
2 Nov 2015, 1:51 am by INFORRM
A Toowoomba family is suing the broadcaster Alan Jones and News Corporation columnist Nick Cater for defamation. [read post]
19 Oct 2015, 2:24 am by INFORRM
  The Tribunal held that the doctrine applies only to targeted interception but has no legal effect. [read post]
12 Oct 2015, 3:25 pm by Barry Sookman
This includes the standard contractual clauses, business corporate rules, and the European Commission’s decision that Canada’s federal data protection laws, PIPEDA, adequately protect EU personal data. [read post]
30 Sep 2015, 3:00 pm by Rick St. Hilaire
 In place of grand jury indictments, ICE held a photo-op ceremony in Washington, DC in September 2013, returning the evidentiary fruits of its investigative work to Afghanistan.The carefully redacted and cherry-picked documents released on July 31, 2015 show that authorities intercepted a small shipment passing through New Jersey's international airport during March 2011. [read post]
28 Sep 2015, 6:00 am by David Kris
Wiretap Act (also known as Title III) prohibits the interception of a live communication (e.g., a telephone call) only if the interception occurs in the United States; it does not prohibit or regulate wiretaps (interception) conducted abroad.[8]  Similarly, the U.S. [read post]
Can any government force a U.S. corporation to fork over user data stored outside the U.S.? [read post]
2 Sep 2015, 4:09 pm by INFORRM
Interception and Surveillance We begin with an important series of posts about the forthcoming Investigatory Powers Bill by Graham Smith on his Cyberleagle blog. [read post]
17 Aug 2015, 3:34 am by Peter Mahler
  Shawe instructs company employees to intercept and bring to him Elting’s mail, including mail from her lawyers and their retained financial advisor, and to monitor her phone calls. [read post]
They consume a huge amount of corporate resources, damage a company’s goodwill and can cost a lot of money. [read post]
30 Jul 2015, 5:55 pm by Joy Waltemath
When the chairman and his wife later sued, claiming the executive assistant had intentionally intercepted their oral communications in violation of Title III of the Omnibus Crime Control and Safe Street Act of 1968, the district court granted summary judgment for the executive assistant, reasoning that because he had placed the pocket-dialed call, the chairman and his wife lacked a reasonable expectation that their conversations would not be intercepted, which is a prerequisite for… [read post]
17 Jul 2015, 11:10 am by Cyrus Farivar
Officially, Hacking Team sold its wares to a company called "Advanced Monitoring," whose corporate parent has a license to work with the FSB, as recently as August 28, 2014. [read post]
12 Jul 2015, 11:00 am by Benjamin Wittes
Who's going to conduct the sustained investment in trying to imagine a system that secures communications except from government when and only government has a warrant to intercept those communications? [read post]
10 Jul 2015, 8:25 am by Peter S. Lubin and Vincent L. DiTommaso
Class actions are a necessary tool for plaintiffs with small claims, especially when facing large corporate defendants, such as Yahoo. [read post]
19 Jun 2015, 7:40 am by Richard Lutkus and Matthew Christoff
Further, additional software may be used to impersonate another person through intercepting and hijacking those transmissions. [read post]
19 Jun 2015, 5:51 am
When Arthur Liston, the City's business administrator, and Mark Tabakin, the City's corporation counsel, reviewed the emails, they noted that the archived emails had been sent to unauthorized third parties. [read post]
30 Apr 2015, 11:25 am by David Bogado
The use of cryptography is a technical action which also has a major political impact in times of mass surveillance, human rights violation, and data interception. [read post]