Search for: "2-Way Computing, Inc." Results 701 - 720 of 1,822
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
16 Dec 2015, 9:26 am by Robert B. Milligan
The draft EU Directive for trade secret protection is currently making its way through the legislative process with no firm timeline for adoption. [read post]
8 Dec 2015, 9:03 am by Ted Brooks
I was a computer junkie who was able to leverage that exposure and experience and apply it in (what was then) a unique way in my new profession.5. [read post]
7 Dec 2015, 6:30 am by Kenneth J. Vanko
Some suspicious computer activity, such as mass downloads or improper use of a personal storage device.2. [read post]
27 Nov 2015, 10:46 am
 The way the system does this is by using two signals - an identification signal and an information signal. [read post]
27 Nov 2015, 6:07 am
  The court begins its opinion by explaining that[f]ive years ago we concluded that the Public Records Act (PRA), chapter 42.56 [Revised Code of Washington], applied to a record stored on a personal computer, recognizing that `[i]f government employees could circumvent the PRA by using their home computers for government business, the PRA could be drastically undermined. [read post]
23 Nov 2015, 9:27 am by Ruth Levush
Computer programmers, manufacturers and military commanders, therefore, could all escape liability for unlawful harm caused by LAWS. [read post]
22 Nov 2015, 4:00 am by Barry Sookman
Computer and Internet Weekly Updates for 2015-11-14: Computer and Internet Weekly Updates for 2015-11-07: Comp… https://t.co/PYZfrGKN8M -> Computer and Internet Weekly Updates for 2015-11-14 https://t.co/LScl1xYP35 -> Why Microsoft’s ‘Data Trustee’ Model is a Potential Game-changer in the Privacy War https://t.co/RRlgyU5kmq -> Privacy groups warn a new Safe Harbor will be struck down https://t.co/r5cs0ZWbaK -> Implementation of… [read post]
16 Nov 2015, 3:49 am by INFORRM
 The decision of the US Court of Appeals for the Third Circuit, In Re Google Inc, Cookie Placement Consumer Privacy Litigation [pdf] was handed down on 10 November 2015. [read post]
21 Oct 2015, 11:08 am
Commercialisation of a product in this way would expose the company to risks and limitations in the use of the name of its product. [read post]
21 Oct 2015, 4:11 am
On April 9, 2013, the State filed charges of Blackmail and Violation of the Computer Crimes Act against [Gerhart].Gerhart v. [read post]
The Rules In addition to the preparatory legislative material, there are now three new sources in which rules are set out: 1. the CRA15, 2. the Competition Appeal Tribunal Rules 2015 and 3. the CAT Guide to proceedings 2015. [read post]
28 Sep 2015, 1:41 pm by Ken White
Nintendo of America, Inc.: Manufactures Pokémon, Game-Boys, and equipment for satanic video games. 2. [read post]
28 Sep 2015, 6:00 am by David Kris
Today, for reasons both technological and political, there is an increasing divergence and growing conflict between U.S. and foreign laws that compel, and prohibit, production of data in response to governmental surveillance directives.[1][2]  Major U.S. telecommunications and Internet providers[3] face escalating pressure from foreign governments, asserting foreign law, to require production of data stored by the providers in the United States, in ways that violate U.S.… [read post]