Search for: "Hacker v. Price" Results 121 - 140 of 153
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
18 Sep 2014, 4:46 am by Rebecca Tushnet
  Protecting content v. potential impediments to future innovations. [read post]
8 Aug 2012, 5:29 am by Rob Robinson
Samsung: Lack of Custodian Follow-Up+Failure to Suspend Auto-Deletion of Email=Adverse Inference - http://bit.ly/MaaYhA (@LegalHoldPro) Who's Tweeting live from the Apple v Samsung trial? [read post]
2 Dec 2014, 11:01 am by Benjamin Bissell
The Guardian reports that the country’s already-flagging economy has been buffeted recently by Western sanctions and low oil prices. [read post]
15 Feb 2012, 8:48 am by Rob Robinson
 bit.ly/zfBOsG (Douglas Wood) Why eDiscovery Costs Too Much - bit.ly/AlwcAJ (Jason Krause) What Sun Tzu Can Teach Us About eDiscovery - bit.ly/y4RXps (Dave Walton) Reports and Resources A Delicate Balance | Organizational Barriers to Evidence-Based Management - bit.ly/xnjND8 (James Guszcza, Anthony Freda) A Methodology for Internal Web Ethics - bit.ly/wfROUP (Michalis Vafopoulos, Petros Stefaneas, Ioannis Anagnostopoulos, Kieron… [read post]
11 Jan 2018, 4:18 pm by Kevin LaCroix
And, to avoid the trap of price over quality of provider and suitability of coverage for the company. [read post]
6 Sep 2023, 9:01 pm by renholding
All three girls insisted they would pay ticket prices of $3000 to go to the concert. [read post]
2 Jan 2018, 5:08 pm by Kevin LaCroix
The world of directors’ and officers’ liability is always dynamic, but 2017 was a particularly eventful year in the D&O liability arena. [read post]
9 Dec 2014, 10:38 am by Kevin LaCroix
Instead, the best approach is a holistic approach:  basic blocking and tackling such as password protection, encryption, employee training, and strong, multi-faceted intrusion detection systems[v] really trump reliance on a “50 foot high firewall” alone. [read post]
29 Jul 2014, 3:37 am by Kevin LaCroix
 2013 and 2014 have been the years of “the big data breach,” with millions of personal data and information records stolen by hackers. [read post]
24 Oct 2022, 2:31 pm by Kevin LaCroix
In that case, hackers accessed confidential information of the company’s customers. [read post]
8 Feb 2012, 7:39 am by Rob Robinson
” | Williams Mullen – bit.ly/yVP7EM (Monica McCarroll, Stephen Anthony) Ooops, They Did it Again – Jurors Continue to Improperly Use Internet, and Courts Struggle with Solutions – bit.ly/wmffPX (Gibbons) Pippins Court Affirms Need for Cooperation and Proportionality in eDiscovery – bit.ly/AuGsUO (Philip Favro) Planning is Key in Corporate Fraud Risk Management – bit.ly/x02ZBG (Catherine Dunn) SOPA and PIPA Have Been Shelved | eDiscovery Law Alert –… [read post]
28 Sep 2021, 11:47 am by Eric Goldman
Overturning Tiffany v. eBay In 2010, the Second Circuit issued a watershed decision about secondary trademark infringement. [read post]
2 Jan 2024, 12:56 pm by Kevin LaCroix
” The “doom loop” scenario involves the following stages: “losses on the loans trigger banks to cut lending, which leads to further drops in property prices and yet more losses. [read post]
26 May 2015, 9:51 am by Rebecca Tushnet
Security research continued, opponents Copyright Office: Jacqueline CharlesworthMichelle ChoeRegan Smith Cy DonnellySteve RuheJohn RileyStacy Cheney (NTIA) Opponents:Christian Troncoso, BSA | The Software Alliance: we support good faith security testing. [read post]
4 Nov 2013, 9:46 am by Jane Chong
Over the last month, on our New Republic: Security States newsfeed, we rolled out a series designed to explain why fairly allocating the costs of software deficiencies between software makers and users is so critical to addressing the growing problem of vulnerability-ridden code—and how such a regime will require questioning some of our deep-seated beliefs about the very nature of software security. [read post]
6 Oct 2021, 6:41 pm by Shannon O'Hare
The NFT market remains in its infancy, and we are still exploring its myriad applications, but it is clear that blockchain technology is uniquely useful for proving ownership: the immutability of the ledger means that there is a permanent record of every action and transaction; and the information is highly secure, as any hacker would need to access over 50% of the relevant network in order to make any changes. [read post]
26 Jul 2007, 10:01 am
Hypothetically, refusing a customer any sort of service would be a no-no in the world of customer service, but given that an average BB computer looks like some sort of hacker workstation to the average citizen (blue screens, no mice, keys that make a satisfyingly loud noise when they are punched) , the Blockbuster employee is easily able to blame everything he can’t or won’t do on the computer system. [read post]