Search for: "Instructional Systems v. Computer" Results 281 - 300 of 1,093
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
14 Nov 2018, 10:54 am by Samuel Cohen
The Guidance also notes that organisations should introduce a specific policy and instruct their staff on whether and how to use encryption when handling personal data (e.g. when storing and/or transferring material). [read post]
13 Nov 2018, 11:58 am by Anushka Limaye
A selected Federal Government candidate will be assigned to the equivalent of Executive Schedule Level V. [read post]
7 Nov 2018, 10:43 am by Daniel Hemel
Kavanaugh pointed to a 1946 case, Social Security Board v. [read post]
7 Nov 2018, 4:00 am by Martin Kratz
ATC has an elaborate payment system where 4 payments are made based on the progress of the work. [read post]
5 Nov 2018, 9:25 am by Anushka Limaye
A selected Federal Government candidate will be assigned to the equivalent of Executive Schedule Level V. [read post]
29 Oct 2018, 2:04 pm by Alexander Berengaut and Tarek Austin
In critics’ view, however, the bill will promote cyber-vigilantism by victims who are overeager to aggressively strike back at cyber intruders and thieves — thereby creating tit-for-tat patterns of retribution and a significant risk of collateral damage to innocent third-party computer systems. [read post]
” To “defraud the United States” has a specific meaning under U.S. case law: According to Hammerschmidt v. [read post]
10 Oct 2018, 12:40 pm by Kevin LaCroix
John Reed Stark Earlier this week, media reports circulated that this past spring Google had exposed the private data of thousands of the Google+ social network users and then opted not to disclose the issue, in part because of concerns that doing so would draw regulatory scrutiny and cause reputational damage. [read post]
16 Sep 2018, 6:57 am by John Gregory
So it is all still a matter of responding to instructions. [read post]
3 Sep 2018, 4:49 pm by Kevin LaCroix
The insurers take the position that these kinds of scams, often called social engineering fraud or payment instruction fraud, are not covered under their policies’ Computer Fraud section because the funds transfer involves a voluntary action or because the loss does not result directly from the fraud. [read post]
30 Aug 2018, 4:49 pm by Kevin LaCroix
The insurers take the position that these kinds of scams, often called social engineering fraud or payment instruction fraud, are not covered under their policies’ Computer Fraud section because the funds transfer involves a voluntary action or because the loss does not result directly from the fraud. [read post]
15 Aug 2018, 4:00 am by Public Employment Law Press
The Court said that although the question of whether the Human Rights Law requires that awards for future damages be discounted to present value is an issue of first impression in the appellate courts of New York, citing Matter of Aurecchione v New York State Div. of Human Rights, 98 NY2d 21, it noted that the Court of Appeals had observed that federal case law is instructive in the employment discrimination context. [read post]
2 Aug 2018, 5:38 pm by Kit Walsh
They have also asked the federal government to reinstate the system that gave it total discretion over Internet publication of technical information about 3D printed guns, which it enforced against Defense Distributed but not against other publishers. [read post]
30 Jul 2018, 10:44 am by Lisa Ouellette
(This is copyright, not patent, so I'll note it again tomorrow, but the rest of the panel is more patent-focused.)Lucas Osborn – 3D printing raises IP issues.Randy Picker – Reviews computer competition and innovation over last 100 years, including how WWII government contracting decisions shaped the computer patent environment.Michael Risch – 19th century apple-parer patents are instructive, including in showing how patent enforcement… [read post]
15 Jul 2018, 10:47 am by Eugene Volokh
Finally, note that the matter might well be different if the newspaper had been complicit in the original release of the information, for instance if it hacked in to the computer system, or bribed a court employee to reveal the information, or perhaps even if it had just persuaded the employee to reveal the information. [read post]