Search for: "Steve Harms" Results 701 - 720 of 1,598
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
As the number of highly publicized data breaches continues to skyrocket and proposals for a federal data breach notification law stagnate, state legislatures around the country have been busy amending their own breach notification statutes. [read post]
27 Jul 2015, 3:30 am by Steve Gold
Steve Gold In a four-decade scholarly career, my former colleague Howard Latin has never shied away from speaking truth to power. [read post]
19 Jul 2015, 4:28 pm by INFORRM
On 14 July 2015 judgment was handed down in another non-media libel case Steve Paris and Angel Garden v Andrew Lewis and Melanie Byng [pdf]. [read post]
18 Jul 2015, 1:09 am by Andres
It is hinted that the order will allow an appeal, and it will also allow the parties to take the question of harm to the CJEU. [read post]
16 Jul 2015, 11:48 am by Staley Smith, Quinta Jurecic
” Following the Vice President’s address, Congressman Steve Israel (D-NY) said, “The vice president made as convincing an argument as he can make, but I think there’s still a lot of questions to be answered. [read post]
12 Jul 2015, 4:10 pm by INFORRM
  The First Tier Tribunal ordered the ICO to disclose the names of journalists who instructed Steve Whittamore and whose details were found in the course of Operation Motorman. [read post]
10 Jul 2015, 4:06 pm by INFORRM
For example, as Finlay CJ put it in Conway v INTO [1991] 2 IR 305, 317 “in respect of damages in tort … ordinary compensatory damages … [are] sums calculated to recompense a wronged plaintiff for physical injury, mental distress,anxiety, deprivation of convenience, or other harmful effects of a wrongful act and/or for monies lost or to be lost and/or expenses incurred or to be incurred by reason of the commission of the wrongful act” (emphasis added; see also… [read post]
28 Jun 2015, 6:40 am by Kelly Phillips Erb
Conference of Catholic Bishops (USCCB), called the ruling “a tragic error that harms the common good and most vulnerable among us, especially children. [read post]
26 Jun 2015, 5:58 pm by Steve Sanders
Steve Sanders teaches constitutional law, constitutional litigation, and family law at the Indiana University Maurer School of Law. [read post]
20 Jun 2015, 9:30 am by Staley Smith
On the other hand, Steve Vladeck maintained that the majority opinion was correct to rely on a formalist approach rather than the functionalist one. [read post]
18 Jun 2015, 10:29 pm
  (Steve Ceci and I asserted this position in our amicus brief and in the law review article on which we based it.) [read post]
18 Jun 2015, 10:29 pm
  (Steve Ceci and I asserted this position in our amicus brief and in the law review article on which we based it.) [read post]
15 Jun 2015, 1:49 pm by Quinta Jurecic
Partially in response to Peter’s post, Steve Vladeck provided another perspective on al Bahlul. [read post]
8 Jun 2015, 5:00 am by Randi Morrison
., tendency to drive executive behaviors that will boost TSR, but harm the company over the long-term. [read post]
28 May 2015, 8:23 am by Rebecca Tushnet
Copyright Office: Jacqueline CharlesworthMichelle ChoeRegan SmithCy DonnellySteve RuheJohn RileyStacy Cheney (NTIA) Proposed Class 5: Audiovisual works – derivative uses – multimedia e-books This proposed class would allow circumvention of access controls on lawfully made and acquired motion pictures used in connection with multimedia e-book authorship. [read post]
27 May 2015, 12:56 am by Andres
As the law requires that surveillance powers must be employed proportionate to any harm to privacy caused (as required by Article 8 of the European Convention on Human Rights and Article 12 of the Universal Declaration of Human Rights) we believe that any expansion or change to the UK’s surveillance powers should be proposed in primary legislation and clearly and accurately described in the explanatory notes of any Bill. [read post]
26 May 2015, 8:19 am by Rebecca Tushnet
Library of Congress DMCA exemption hearings Proposed Class 25: Software – security researchThis proposed class would allow researchers to circumvent access controls in relation to computer programs, databases, and devices for purposes of good-faith testing, identifying, disclosing, and fixing of malfunctions, security flaws, or vulnerabilities. [read post]
26 May 2015, 7:42 am
  On that same day, co-blogger Steve Boranian alerted Bexis to a new defense argument in asbestos/mesothelioma cases that also utilizes genomics – certain mutations in a gene called “BAP1” – to identify persons at greater risk of idiopathic (that is, not related to asbestos) mesothelioma. [read post]