Search for: "Consumers for Computing Choice"
Results 121 - 140
of 1,541
Sorted by Relevance
|
Sort by Date
7 Nov 2023, 4:08 am
In other words, it must give the consumer a choice about how to meet any maintenance requirements. [read post]
3 Mar 2015, 7:03 pm
The Act does not explicitly distinguish between first and third party data collectors, which could result in consumers being inundated with privacy notices and choice mechanisms. [read post]
12 Apr 2017, 10:15 am
This is terrible for consumer choice because it forces people to purchase a software product they don’t necessarily want. [read post]
1 Jul 2013, 5:30 am
Hulu) http://t.co/FcBypcfwL1 -> US 1st Circuit affirms statutory damage award in Sony BMG v Tenenbaum http://t.co/ssyPB54Q82 -> Search of computer reasonable R. v. [read post]
29 Jun 2015, 9:28 am
We’re not asking testable questions; we assume in the law a kind of decisionmaking that cognitive scientists don’t agree w/ in their model of consumer decisionmaking: conscious and unconscious elements of choice that vary across circumstances. [read post]
27 Jul 2020, 7:15 am
Schatz and Thune introduced S. 4066, “Platform Accountability and Consumer Transparency Act” (the “PACT Act”). [read post]
22 Jan 2017, 8:49 am
The House Financial Services Committee’s previous passage of the Creating Hope and Opportunity for Investors, Consumers, and Entrepreneurs” Act (“CHOICE Act”) provides a roadmap to potential financial regulatory reform early during the Trump administration, including reform of the Dodd-Frank Act’s and BASEL III’s bank capital requirements. [read post]
27 Mar 2012, 6:37 am
Encourage data brokers to create a centralized website that identifies data brokers and describes the access rights and other choices they offer consumers. [read post]
10 Jun 2022, 2:53 am
Hacking into the Supreme Court’s computers would clearly be illegal. [read post]
13 Sep 2013, 4:53 am
Google Inc. also has several CTM’s registered for ANDROID for goods and services in Classes 9, 11, 16, 28, 35, 38, 41, 42 including “computer software, computer hardware, mobile phones, mobile peripherals, computers, tablet computers; Telecommunications services, etc. [read post]
14 Sep 2013, 11:38 pm
Google Inc. also has several CTM’s registered for ANDROID for goods and services in Classes 9, 11, 16, 28, 35, 38, 41, 42 including “computer software, computer hardware, mobile phones, mobile peripherals, computers, tablet computers; Telecommunications services, etc. [read post]
2 Jul 2013, 1:01 pm
The Commissioner’s third point involves notice and choice. [read post]
21 Oct 2015, 5:28 pm
John Kenneth Galbraith about the Myth of Consumer Sovereignty in The Affluent Society, rational decision making often gets irrational because consumers make decisions based on their perceived necessary choices -- not their actual available choices. [read post]
6 Jul 2009, 7:04 am
Consumers are often left with no choice in the matter, as mandatory arbitration clauses are often adopted across industries. [read post]
20 Jul 2006, 3:13 pm
If I were to guess, I would say that is more of a stylistic choice than a choice because of trademark law.This is for a few reasons. [read post]
28 Dec 2017, 3:10 pm
Another way to protect consumer privacy is for companies to switch to cloud computing security, rather than traditional IT systems. [read post]
28 Dec 2017, 3:10 pm
Another way to protect consumer privacy is for companies to switch to cloud computing security, rather than traditional IT systems. [read post]
23 Feb 2012, 9:01 am
Respect for Context: providing that companies should only collect, use, and disclose personal data in ways that are consistent with the context in which the consumers provided the personal data, unless the law requires otherwise or additional transparency and choice are provided. [read post]
28 Mar 2012, 10:58 am
The concept of personal information is expanded to include that which is reasonably linkable to a specific consumer, computer or device. [read post]
8 Apr 2013, 1:12 pm
In their Complaint, the plaintiffs alleged that “comScore has developed highly intrusive and robust data collection software ... to surreptitiously siphon exorbitant amounts of sensitive and personal data from consumers’ computers [and] uses deceitful tactics to disseminate its software and thereby gain constant monitoring access to millions of hapless consumers’ computers and networks. [read post]