Search for: "US v. Weekes" Results 6681 - 6700 of 39,089
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
18 Mar 2012, 6:43 pm by Orin Kerr
In the meantime, here are three cases just from the last week or so on the implications of Jones. 1) United States v. [read post]
3 Mar 2012, 11:32 am by John McFarland
This week, the Texas Supreme Court denied Denbury Green Pipeline's motion for rehearing in Texas Rice Land Partners v. [read post]
13 Sep 2009, 1:34 am
Selected microblog posts from the past week: RT @VogeleLaw: Found: Mary Beth Peter’s testimony (via @cathygellis – thanks!) [read post]
21 Jun 2007, 2:03 am
As I have argued this week, the structure of the reform process determines what kind of reform gets passed. [read post]
19 Sep 2010, 7:40 pm by cdw
In the scrum that is capital litigation, for the next edition we’ve spotted: US Joshua Wayne Andrews v. [read post]
24 May 2019, 2:13 pm by Anthony Zaller
If there is a turning point for the esports industry, if it has not already occurred, it occurred this week. [read post]
24 Jun 2020, 3:48 am by Edith Roberts
At NBC News (via How Appealing), Julie Moreau reports that last week’s decision in Bostock v. [read post]
30 Jan 2018, 9:21 am by J. Scott Humphrey
According to the government, in the last few weeks of his Rockwell employment, and in anticipation of leaving Rockwell for a new employer, Liu downloaded 2,500 files that contained the proprietary software and source code Rockwell uses to operate various systems and controllers. [read post]
16 Oct 2010, 4:42 am by INFORRM
In relation to “reasonable expectation of privacy” the Judge observed “the home address of an individual is information the disclosure and use of which that individual has a right to control in accordance with Article 8 of the Convention (see Green Corns Ltd v Claverley Group Ltd [2005] EWHC 958 (QB) at paragraphs 53 and 56). [read post]
17 Dec 2008, 9:49 am
Last week, I did a post on the European Union's proposal to let police officers conduct remote searches of computers, presumably by using Trojan horse programs. [read post]