Search for: "Doe Defendants I through V" Results 3921 - 3940 of 12,262
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
26 Jan 2024, 9:01 am by Just Security
Israel must report back in a month, and it will likely have to defend itself against the merits of the genocide charge. [read post]
19 Jan 2015, 4:52 am
The statute does, however, provide three ways through which the offense may be enhanced to a felony: (1) committing the offense for `commercial advantage or private financial gain’; (2) committing the offense `in furtherance of any criminal or tortious act in violation of’ state or federal law; or (3) if `the value of the information obtained exceeds $5,000. [read post]
16 Apr 2009, 12:51 pm
  Accordingly, I hold that pursuant to Rule 37B(5) the court cannot award costs to the defendant but is limited to depriving a party of costs or awarding double costs [53]                        The defendant does not seek double costs in this case. [read post]
29 Jul 2020, 5:24 pm by Eugene Volokh
I couldn't find any Supreme Court case or appellate case dealing specifically with speech-restrictive pretrial release conditions, but U.S. v. [read post]
29 Jul 2020, 10:31 am by Rebecca Tushnet
Marketing, Dartmouth: Hearing the Voice of Consumer through Archival Evidence. [read post]
10 Dec 2008, 2:42 pm
Of course, in his defense, the Article 15.22 part of the opinion does seem like an afterthought.]Stephen Ruffin v. [read post]
9 Dec 2016, 6:14 am
Special software on the user's computer chooses a `circuit’ through the network of Tor servers, known as `onion routers. [read post]
29 Dec 2020, 4:05 pm by INFORRM
But, my Lords, I protest against the whole exercise of comparing the facts of one case with those of another. [read post]
14 Mar 2010, 4:27 am by Andres
I would be surprised if SGAE does not appeal the ruling. [read post]
18 Feb 2013, 7:08 am by Lisa Stam
PRIVACY: Employers must recognize that they can lower but not fully eliminate expectations of privacy on a workplace computer through effective policies (see my blog post on R v Cole, "Privacy & Porn on Workplace Computers"). [read post]