Search for: "Hacker v State" Results 601 - 620 of 729
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
14 May 2015, 12:57 am by INFORRM
  For example, in Quinton v Peirce & Cooper ([2009] EWHC 912 (QB)), where a DPA claim was added to libel and malicious falsehood claims, Eady J said: “I must now turn to the Data Protection Act. [read post]
24 May 2017, 3:16 am by Michael Lowe
  The Supreme Court of the United States defined what is considered illegal obscenity in what has become known as “the Miller test” from Miller v. [read post]
3 May 2016, 5:08 pm by Kevin LaCroix
  A plaintiff whose PII, PFI, or PPI was stolen by hackers typically brings suit against the hacked company on his or her own behalf and on behalf of a class of similarly situated people, hoping the presiding court will certify the proposed class and allow the case to proceed as a class action.[3]  Causes of action in customer cases run a wide gamut of legal theories, from traditional tort claims (negligence and fraud) to allegations of state and federal statutory… [read post]
20 Apr 2016, 5:34 pm by Kevin LaCroix
  Non-Assignment Clauses are Enforceable   In Western Alliance Bank v. [read post]
30 Mar 2025, 8:00 am by Gene Takagi
See Memorial Hermann Accountable Care Organization v. [read post]
10 Feb 2020, 8:57 am by Rebecca Tushnet
These sound like business decisions: promotional value v. backlash. [read post]
24 Nov 2019, 9:58 am by Kevin LaCroix
(For example, here’s one headline: “Mondelez v. [read post]
7 Nov 2012, 3:54 am by Rob Robinson
Compiled from online public domain resources, provided for your review/use is this week's update of key industry news, views, and events highlighting key electronic discovery related stories, developments, and announcements.For a live daily view of industry news, click here for the Vendor Clips Live News Feed.Follow @InfoGovernanceeDiscovery News Content and ConsiderationsCourt Orders Retention of Outside Vendor to Collect Responsive Documents, Investigate Possible Spoliation –… [read post]
25 Nov 2022, 12:30 pm by John Ross
The actual effect of the rule will be to require law-abiding small business owners to file millions of unnecessary reports, creating a honeypot of sensitive information that hackers can exploit. [read post]