Search for: "Identification Devices v. United States" Results 101 - 120 of 350
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
20 Dec 2018, 8:55 am by Laurence H. Tribe
In other words, the impeachment process doesn’t serve as a crime-laundering device. [read post]
23 Nov 2018, 3:28 am by Diane Tweedlie
Claim 1 reads as follows:"A data communication device configured to communicate with a storage device via a network and to store image data in the storage device, the data communication device comprising: a scanner (240) configured to read an image and to input image data; an input unit (230) configured to input user identification information to allow access to the storage device; a log-in processing unit (201) configured… [read post]
16 Oct 2018, 3:55 pm by Cynthia Marcotte Stamer
OCR’s investigation revealed that between December 2, 2014 and January 27, 2015, the cyber-attackers stole the ePHI of almost 79 million individuals, including names, social security numbers, medical identification numbers, addresses, dates of birth, email addresses, and employment information. [read post]
9 Oct 2018, 5:00 am by Hilary Hurd
” The policy provides for a five to fifteen-day detention of anyone who destroys Chinese banknotes or identification cards. [read post]
26 Jul 2018, 4:00 am by Administrator
This article’s thesis is that to whatever degree digital media poses a threat of disruption to a common law legal system, this disruptive effect will be more acute in Canada than in the United States or England. [read post]
21 Jul 2018, 8:07 am by Orin Kerr
The first case is United States v. [read post]
20 Jul 2018, 3:16 pm by Orin Kerr
The first case is United States v. [read post]
27 Jun 2018, 7:10 am by Hayley Evans
Pillar I: Risk Identification Goal 1: Assess Evolving Cybersecurity Risks Central to Homeland Security’s strategy is a better understanding of global cyberthreats and how they affect the United States. [read post]
7 May 2018, 1:51 pm by Rebecca Tushnet
Sometimes we only have IP address; sometimes we negotiate to narrow requests to avoid revealing unnecessary info.Pablo Peláez, Europol Representative to the United States: Cybercrime unit is interested in hate speech & propaganda. [read post]
9 Apr 2018, 6:00 am by Hayley Evans
Five protocols—Protocol I (Non-detectable fragments); Amended Protocol II (Mines, booby-traps, other devices); Protocol III (Incendiary weapons); Protocol IV (Blinding laser weapons); and Protocol V (Explosive remnants of war)—are currently annexed to the CCW. [read post]
2 Mar 2018, 9:11 am by Guest Blogger
The subtitle of the paper might be rewritten to read, Why Intention-Free Identification of Something as a Text Isn’t Possible; for in this and other essays, Alexander, along with other intentionalists, argues not simply that you can’t interpret the text without recourse to a governing intention, but there is no text until a specification of an intention is in place.In a subsection entitled, Texts Cannot Declare that they are Texts, Alexander and his co-author, Emily Sherwin,… [read post]
2 Mar 2018, 9:11 am by Guest Blogger
The subtitle of the paper might be rewritten to read, Why Intention-Free Identification of Something as a Text Isn’t Possible; for in this and other essays, Alexander, along with other intentionalists, argues not simply that you can’t interpret the text without recourse to a governing intention, but there is no text until a specification of an intention is in place.In a subsection entitled, Texts Cannot Declare that they are Texts, Alexander and his co-author, Emily Sherwin,… [read post]
8 Feb 2018, 4:50 am by James Yang
This article focuses on the patent marking requirements for the United States. [read post]