Search for: "Automation Systems v. Standard Automation" Results 421 - 440 of 570
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
2 Jun 2014, 12:48 pm by David Robinson
A recent essay from law professor John McGinnis, titled “Machines v. [read post]
17 Apr 2014, 4:00 am by Simon Fodden
The Sedona text, The Sedona Canada Principles—Addressing Electronic Discovery (January 2008), approves of searching by “automated methods,” stating (p. 4): Counterbalancing the dispersed nature of electronically stored information is the fact that some forms and media can be searched quickly and fairly accurately by automated methods. [read post]
15 Apr 2014, 7:40 am by Corynne McSherry and Parker Higgins
Unfortunately, a new front may have opened up in a case called Gardner v. [read post]
4 Apr 2014, 3:04 pm by Rebecca Tushnet
Registry to connect rightsholders and info and will digitally manage automated licensing. [read post]
13 Mar 2014, 11:48 am by Rebecca Tushnet
Siemenski: we don’t really know because there are too few cases, because of the great imbalance of power between those sending the notices and those receiving them—big corporations v. individual users.Coble for Bridy: should Congress create incentives for voluntary systems to address infringement, and if so what? [read post]
6 Mar 2014, 10:54 am by Tom Webley
The CFTC’s Division of Swap Dealer and Intermediary Oversight, which issued Staff Advisory 14-21, will “enhance its audit and review standards as it continues to focus more resources on GLBA Title V compliance. [read post]
1 Mar 2014, 3:37 pm by Barry Sookman
McIntyre Machinery, Ltd v Nicastro131 S.Ct. 2780 (2011), Football Dataco Ltd. v Sportradar GmbH, Case C‑173/11, 18 October, 2012. [read post]
19 Feb 2014, 2:11 pm
Finally, the Roadmap identifies nine cybersecurity disciplines marked for further development and discussion including: (i) authentication; (ii) automated indicator sharing; (iii) conforming cybersecurity assessments; (iv) preparation of a skilled cybersecurity workforce; (v) use of data analytics in cybersecurity; (vi) Federal agency cybersecurity alignment; (vii) international coordination; (viii) supply chain risk management; and (ix) technical privacy standards. [read post]
19 Feb 2014, 2:07 pm
Finally, the Roadmap identifies nine cybersecurity disciplines marked for further development and discussion including: (i) authentication; (ii) automated indicator sharing; (iii) conforming cybersecurity assessments; (iv) preparation of a skilled cybersecurity workforce; (v) use of data analytics in cybersecurity; (vi) Federal agency cybersecurity alignment; (vii) international coordination; (viii) supply chain risk management; and (ix) technical privacy standards. [read post]
14 Jan 2014, 9:48 am by Jay Yurkiw
Mar. 15, 2013) (noting that predictive coding is “an automated method that credible sources say has been demonstrated to result in more accurate searches at a fraction of the cost of human reviewers” and relying in part on its availability to reject a law firm’s undue burden objection to a subpoena served on it); Harris v. [read post]
17 Dec 2013, 5:11 am by Terry Hart
This may include takedowns that are a result of either overzealous or inexperienced/mistaken creators, or automated processes. [read post]
4 Nov 2013, 9:46 am by Jane Chong
” A more reasonable and balanced system should be possible. [read post]