Search for: "Computer Share" Results 101 - 120 of 17,183
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
23 Nov 2011, 9:06 am by David
As David mentioned in last years video post about Limewire closing down, more people are finding themselves on the wrong end of the law because of various file sharing programs. [read post]
6 Jul 2014, 7:32 pm by Sabrina I. Pacifici
In this paper, we describe and discuss each of these roles in detail using examples from our review of cloud strategies, and share high-level observations about the roles as well as the contexts in which they arise. [read post]
5 Jul 2013, 7:35 am
ABC then sought to extract a modest royalty from all sales of the mouse, which were growing at an exponential rate, splitting the royalty with SRI, which in turn shared some of its newly found income with the inventor. [read post]
15 Feb 2011, 3:37 am by Administrator
  Special thanks to computer forensics and security expert Sharon Nelson for sharing the link. ========== To return to the main page of the blog, click here. [read post]
17 Feb 2015, 4:30 am by Barry Sookman
Computer and Internet Law Updates for 2015-02-15: Machines are getting smarter, raising big ethical questions … http://t.co/BHYPbb3z1K -> Cyber threats, information sharing and The Digital Privacy Act http://t.co/CIXSJt0L3c -> blogged: Computer and Internet Law Updates for 2015-02-15 http://t.co/w6K05ss1XO -> blogged: Cyber threats, information sharing and The Digital Privacy Act http://t.co/ZdLGNZ4bVI -> Cyber threats, information… [read post]
2 Feb 2018, 12:27 pm by Dave Maass
As EFF wrote in its letter opposing the bill, this legislation would hand immense power to prosecutors to go after anyone for “checking baseball scores on a work computer, lying about your age or height in your user profile contrary to a website’s policy, or sharing passwords with family members in violation of the service provider’s rules. [read post]
Computational creativity—a subdomain of artificial intelligence concerned with systems that replicate or assist human creative endeavors—has been the  subject of academic inquiry for decades. [read post]
30 Jan 2020, 8:16 pm by Jerry Salcido
Thus, if a computer is password protected by one resident of a home and in that resident’s bedroom, another resident who does not have that password and does not share that bedroom may not have the right to retrieve the computer from the bedroom and deliver it to law enforcement because the computer itself may be akin to a closed container that has been “locked” by deliberate use of a password. [read post]
30 Jan 2020, 8:16 pm by Jerry Salcido
Thus, if a computer is password protected by one resident of a home and in that resident’s bedroom, another resident who does not have that password and does not share that bedroom may not have the right to retrieve the computer from the bedroom and deliver it to law enforcement because the computer itself may be akin to a closed container that has been “locked” by deliberate use of a password. [read post]
8 Oct 2014, 1:12 pm by Steve Brachmann
We share a trio of patents protecting computer languages and networking technologies. [read post]
12 Sep 2023, 6:33 am by NBlack
Lawyers, however, may overcome confidentiality concerns with shared telephone and computer systems with appropriate security measures, staff training, and client disclosures. [read post]
22 Nov 2019, 12:17 pm by NBlack
And last but not least, 34% shared that they used cloud computing software because it offers better security than they can provide in-house.The results of the survey also showed that the majority of lawyers (55%) now telecommute on a regular basis. [read post]
6 Mar 2012, 11:42 am by Richard Bortnick
Cloud computing is the storage of data on remote computer servers and the sharing and transmittal of such information by way of the internet. [read post]
18 Dec 2011, 5:04 pm by Jeffrey Brown
The three shared two computers, and the defendant's father often used them late at night. [read post]
4 Dec 2015, 10:51 am
If you are on your computer and sharing files on a peer to peer network with other people, such as Gnutella, you open yourself up to allowing the state to see what you are doing. [read post]
27 Sep 2011, 3:34 pm by The LBN Team
Walker is charged with a five-year felony after accessing his wife’s email on a shared computer and using some of the information in their divorce proceedings. [read post]
9 Apr 2021, 9:42 am by Legal Talk Network
It’s time for the fourth and final pillar of the Second Brain project – sharing. [read post]