Search for: "Learning Network v. Discovery Communications" Results 61 - 80 of 176
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
19 May 2011, 9:09 am by Employment Lawyers
  If plaintiff merely did personal, inoffensive networking/communicating while at work, it should be pretty easy to prove she was singled out for termination. [read post]
19 Jan 2012, 8:55 am by Paul Levy
Kremer forbidding trademark claims against Internet communications that do not sell or advertise goods or services. [read post]
27 May 2023, 11:05 am by Russell Knight
R. 201(a) While the language of discovery uses words such as “documents,” emails and other electronic communication will be treated as a document for the purposes of discovery. [read post]
3 Dec 2014, 4:13 am
   The instructions she gave included this one:  Do not talk or read about the facts or circumstances of this case on social networking sites such as Facebook or MySpace. [read post]
19 Jul 2016, 1:58 pm by James D. McNairy
Upon learning of Power’s activities, Facebook sent Power a cease and desist letter and used IP blocks in an attempt to prevent Power from obtaining Facebook data (IP blocking is a process by which a computer or network is directed to ignore all communications from a particular IP address). [read post]
16 Jun 2020, 2:18 pm by Kevin LaCroix
John Reed StarkIs a company’s post-breach forensic report subject to discovery in subsequent breach related litigation? [read post]
9 Mar 2009, 10:11 am by Glenn R. Reiser
It was not until discovery in the ensuing hostile-workplace, constructive-discharge case that she learned company lawyers had a copy of the message, which was automatically saved on the laptop's hard drive as a temporary file. [read post]
29 Nov 2010, 11:33 pm by Mike
 After learning about the sale, Goodman sued and the case settled. [read post]
26 Dec 2016, 12:14 pm by Cindy Cohn and Karen Gullo
But he had real documents and direct testimony demonstrating that, at the behest of the NSA, AT&T was (and still is) making illegal copies of Internet traffic through key network junctures. [read post]
27 Dec 2010, 5:27 pm by John Borland
The team got word from the Kaspersky Lab security company that there was strange “remote procedure call” traffic being sent over a network — a kind of communication that allows one computer to trigger activity on another, such as printing from a remote device. [read post]
15 Jul 2014, 9:00 am by Benjamin Wittes
Sanchez Ferro’s remarks pose a curious and under-examined challenge to Anne Marie Slaughter’s global networks theory, which is now widely embraced. [read post]
15 Oct 2016, 12:38 pm
A key step in the investigation was learning that Caira was the person behind the gslabs @hotmail.com address. [read post]
8 Jun 2021, 3:32 pm by Nathan Sheard
Revealing Police Surveillance of Protesters As we learned after Occupy Wall Street, the #NoDAPL movement, and the 2014-2015 Movement for Black Lives uprisings, sometimes it takes years to learn about all the police surveillance measures used against protest movements. [read post]
10 Mar 2015, 4:28 am by Kevin LaCroix
The time-lag before discovery on the network gives hackers a huge head start. [read post]