Search for: "Instructional Systems v. Computer" Results 341 - 360 of 1,093
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
4 Sep 2017, 5:28 am by Eric Goldman
” The court held that, by instructing Jacqueline to act as his proxy, Nosal disregarded the former employer’s revocation of his access rights—even though Jacqueline (as a current employee) still had authorized access to the system. [read post]
29 Aug 2017, 2:25 pm by Evan Schwartz
  This case involved manipulation of the computer system as part of a fraudulent scheme to steal. [read post]
23 Aug 2017, 4:00 am by Martin Kratz
Many intrusion threats are social engineering attacks, which seek to gain entry to an organization’s computer systems via its personnel and not a hack to the computer systems. [read post]
22 Aug 2017, 8:14 pm by Wolfgang Demino
AND A-1 SYSTEMS, INC., D/B/A LON SMITH ROOFING AND CONSTRUCTION, Appellants,v.JOE KEY AND STACCI KEY, Appellees. [read post]
22 Aug 2017, 8:14 pm by Wolfgang Demino
AND A-1 SYSTEMS, INC., D/B/A LON SMITH ROOFING AND CONSTRUCTION, Appellants,v.JOE KEY AND STACCI KEY, Appellees. [read post]
31 Jul 2017, 1:23 pm by daniel
Claim 1 of the patent states (comments in brackets): A non-transitory computer-readable storage medium containing instructions, the instructions when executed by a processor causing the processor to [use a computer to]: receive at a first computer system, via a network, event data descriptive of an event to occur at an event time [get event and time information]; receive via the network, reminder data descriptive of a reminder time to occur on or… [read post]
24 Jul 2017, 5:10 pm by Kevin LaCroix
”  The policy defines a “Computer Violation as both “the fraudulent (a) entry of Data into … a Computer System; [and] (b)change to Data elements or program logic of a Computer System, which is kept in machine readable format … directed against an Organization. [read post]
4 Jul 2017, 4:38 am by Romano Beitsma
Claim 1 of the Third Auxiliary request reads as follows:A dispenser for dispensing restricted goods by an authorized vendor to an approved purchaser which includes:a) a cabinet containing an inventory storage system(20), a purchaser transaction module (40), a reject system (62, 63, 65 to 68 and 70) and a control system;b) said inventory storage system (20) includes product storage (23) in rows and columns;c) said purchaser transaction module (40) including an… [read post]
23 Jun 2017, 10:16 am by Staley Smith
Writing for the majority in Maslenjak v. [read post]