Search for: "INFORMED CONSENT ACTION NETWORK" Results 361 - 380 of 1,596
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
14 Jun 2012, 10:59 am by CDT
The notice-and-action procedure for the proposed law has yet to be released. [read post]
18 Nov 2020, 7:16 am by Michael Geist
At issue are provisions that provides an express right to use personal information without an individual’s knowledge or consent to de-identify the information. [read post]
3 Aug 2014, 9:01 pm by Ronald D. Rotunda
The Opinion claimed that the lawyer’s action was improper even when the agent or lawyer used his or her real name, because the purpose for contacting the target was not “friendship,” but for gaining access to personal information. [read post]
18 Nov 2020, 7:09 am by Eric Goldman
” Second, the extension collected information from non-consenting users on shared computers. [read post]
The Retail Cyber Intelligence Sharing Center will further enhance DHS’s collaboration with this important sector of the American economy and will provide information and resources that can help companies keep their networks and the consumer information stored on them safe and secure. [read post]
10 Oct 2017, 6:34 am by Lindsay Burke and Moriah Daugherty
HR should work with IT to audit the employee’s most recent network access and email activity to ensure the employee has not harvested any confidential information. [read post]
7 Feb 2011, 4:30 pm
As a result, hackers accessed more than 1,800 credit reports without authorization via the clients’ computer networks, according to the FTC. [read post]
23 May 2008, 11:41 am
  "DPI is not just reading the bits, It is capable of taking action -- it can modify them or block them. [read post]
Affirmative actions: Pre-ticked boxes or relying on the continued use of a service (g., a website) do not constitute a valid consent, as they do not entail an affirmative action on the part of the individual to demonstrate agreement to the processing. [read post]
1 Aug 2023, 6:01 am
While some of these offenses will be prosecuted as theft or fraud, other types of charges may apply if a person is accused of illegally accessing computers or networks or taking actions that caused damage to computer systems or data. [read post]
22 Feb 2012, 9:10 pm by Michael Froomkin
Companies should offer consumers means to withdraw or limit consent that are as accessible and easily used as the methods for granting consent in the first place. 2. [read post]
16 Dec 2013, 6:27 am by Barry Sookman
Further, there are also questions as to whether it would apply in the circumstances of a prosecution by the CRTC as well as to a civil claim under the private right of action. [read post]
4 May 2011, 12:00 pm by Lucas A. Ferrara, Esq.
When the Commission issues a consent order on a final basis, it carries the force of law with respect to future actions. [read post]
18 Nov 2020, 9:00 am by Geoff Schweller
Leader Hoyer notes that this rule is inspired by the actions of House Members who threatened to expose the identities of whistleblowers alleging misconduct by the Trump Administration. [read post]
14 Sep 2020, 11:56 am by Geoff Schweller
On August 31, the SEC posted a Notice of Covered Action in reference to the case. [read post]