Search for: "DATA ENCRYPTION V MICROSOFT" Results 41 - 60 of 132
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
27 Feb 2018, 11:35 am by Andrew Keane Woods
The Supreme Court heard oral argument Tuesday morning in United States v. [read post]
24 Feb 2018, 5:57 am by William Ford
Andrew Keane Woods contended that the indictment’s apparent reliance on cross-border data underscores the significance of the Microsoft-Ireland case. [read post]
22 Feb 2018, 5:00 am by Sharon Bradford Franklin
As OTI has noted in the context of encryption technology, robust safeguards for data security are therefore necessary for our economic security as well. [read post]
7 Feb 2018, 8:00 am by Andrew Keane Woods
The issue of law enforcement access to data held abroad is in the news again with the Supreme Court set to hear oral argument in United States v. [read post]
2 Jan 2018, 5:00 am by Paul Rosenzweig
Microsoft overseas data storage case. [read post]
21 Oct 2017, 4:27 am by Garrett Hinck
On Monday, the Supreme Court granted cert. in Microsoft v. [read post]
12 Jul 2017, 3:50 am by Kevin LaCroix
Then the hacker offers to sell the encryption key to the victim, typically payable in an anonymizing online crypto-currency such as Bitcoin. [read post]
15 May 2017, 9:00 am by Jeffrey Rosen
  At the same time, hackers threaten our personal data through cyberattacks, and sophisticated users shield the contents of their data from law enforcement through the use of cutting-edge encryption tools. [read post]
16 Jul 2016, 5:07 am by David Kris
At the same time, encryption has made European governments more dependent on companies for access to readable data, such as email. [read post]
15 Jul 2016, 4:21 am by Andrew Keane Woods
  The court relies on the Supreme Court’s recent extraterritoriality decision, RJR Nabisco v. [read post]
21 Apr 2016, 12:58 pm by Alex R. McQuade
Air Force data for 2015 show, underlining how reliant the military has become on unmanned aircraft. [read post]
17 Apr 2016, 8:27 am by Barry Sookman
I recently had the privilege of speaking about the Trans-Pacific Partnership (TPP) at the Fordham 24th Annual Intellectual Property Law and Policy Conference, a stellar international IP conference. [read post]
13 Mar 2016, 4:00 am by Barry Sookman
Netseer https://t.co/SHL9p6WBxb -> Using Scraper to Harvest Records Isn’t Fraudulent Access Under CFAA–Fidlar v. [read post]
24 Feb 2016, 5:26 am by Orin Kerr
Cellphones can encrypt data so that a password known only to the user is needed to decrypt it. [read post]