Search for: "Case name not available" Results 8101 - 8120 of 30,130
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
24 Sep 2019, 1:35 am
However, said search engine is required to carry out that de-referencing on the versions corresponding to all the Member States and to put in place measures discouraging internet users from gaining access, from one of the Member States, to the links in question which appear on versions of that search engine outside the EU.The judgment is not yet available on the Curia website, but here's what the press release has to say:In today’s judgment, the Court begins by recalling that it… [read post]
23 Sep 2019, 3:32 am by Peter Mahler
In this post, we look at a South Dakota Supreme Court decision issued earlier this month in another LLC dissolution case also involving a single-asset realty holding company with the fanciful name, Dragpipe Saloon, LLC, in which the court reversed the lower court’s order granting a dissolution petition alleging deadlock. [read post]
22 Sep 2019, 8:21 pm by Omar Ha-Redeye
The issue in this case is not about exclusion from an electoral platform. [read post]
22 Sep 2019, 12:32 pm by John Floyd
  Is Impeachment Available for Pre-Confirmation Misconduct   The basic question in the Kavanaugh case is whether pre-confirmation misconduct can be used to impeach a federal judge? [read post]
In the case above, the plaintiff had a discover card in their name and a Visa and Mastercard in the name of the defendant. [read post]
20 Sep 2019, 11:10 am by Adams & Luka
While check fraud cases may not initially seem as complex as other types of fraud cases, anyone charged with a check fraud offense should consult with an experienced attorney to review all defenses available to them as well as the burden the prosecution will have in proving their case to determine their best course of action. [read post]
20 Sep 2019, 9:12 am by Brian Cordery
Ms Marie also added the following to the discussion of how Brexit will impact on IP: – “.eu” domain names will be taken back from UK registrants and will be available for sale. [read post]
20 Sep 2019, 3:00 am by Jim Sedor
Instead, it will provide to campaigns the donors’ name, email address, and physical address. [read post]
19 Sep 2019, 1:37 pm by Amy Starnes
Additional disaster recovery resources are available at texasbar.com/disaster, texaslawhelp.org, and lonestarlegal.blog/services/disaster-relief. [read post]
19 Sep 2019, 9:56 am by Eugene Volokh
But "hate speech" writ large doesn't fall within any such exceptions, as cases such as Matal and Christian Legal Society make clear. [read post]
19 Sep 2019, 9:25 am by James Kachmar
One such company, HiQ Labs is a data analytics company that uses automated bots to harvest or “scrape” information from LinkedIn’s publicly available profiles, including data like names, job titles, work history and skills. [read post]
The result of downstream participants transitioning to limited service providers is that such participants can only supplement bid requests and engage in programmatic transactions using PI that was available before the consumer clicked the Do Not Sell button on the applicable publisher property or has been sold to the participant from other publisher properties where the consumer has not opted out. [read post]
19 Sep 2019, 5:19 am by Jared Staver
The organization’s process begins with gathering and analyzing publicly available data. [read post]
19 Sep 2019, 5:19 am by Jared Staver
The organization’s process begins with gathering and analyzing publicly available data. [read post]
19 Sep 2019, 12:22 am by Tessa Shepperson
In which case s21 will not be available and you will need to use the ‘Notice to Quit’ procedure to recover possession. [read post]
18 Sep 2019, 9:52 pm by Kevin LaCroix
Indeed, digital forensic evidence of a data security incident is rarely in plain view; it can rest among disparate logs (if they even exist), volatile memory captures, server images, system registry entries, spoofed IP addresses, snarled network traffic, haphazard and uncorrelated timestamps, Internet addresses, computer tags, malicious file names, system registry data, user account names, network protocols and a range of other suspicious activity. [read post]