Search for: "People v James Wells" Results 1461 - 1480 of 2,228
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
26 Nov 2013, 1:19 pm
In the words of the Fifth District Appellate Court in Schofield v. [read post]
25 Nov 2013, 11:30 am by Terry Hart
” Among the metrics the PRA looks at is the strength of IP law and how well it is enforced. [read post]
20 Nov 2013, 7:41 pm
With respect to this second objective, constitutional theory can be understood as engaging in a normative project—a project that speaks to fundamental values in the relationship of the entity to its members and to others,[27] and to constrain politics.[28] This is a project that is meant to help distinguish among incarnations of institutional actors,[29] as well as among those societal aggregations from which such constructions might arise. [read post]
5 Nov 2013, 8:40 am by Matthew Crow
In Freedom Bound, it is law that provides the means for instituting empire and its circumscriptions of legal and civic personality, from the beginnings of Spanish and English colonization of the Americas to Dred Scott v. [read post]
4 Nov 2013, 2:45 pm by Eugene Volokh
James Hertz was charged with several violent felonies involving the use of a firearm, as well as a felony involving the unlawful possession of a firearm. [read post]
4 Nov 2013, 9:46 am by Jane Chong
Over the last month, on our New Republic: Security States newsfeed, we rolled out a series designed to explain why fairly allocating the costs of software deficiencies between software makers and users is so critical to addressing the growing problem of vulnerability-ridden code—and how such a regime will require questioning some of our deep-seated beliefs about the very nature of software security. [read post]
29 Oct 2013, 5:44 am by familoo
That was a battle fought out in the nineteenth century between John Stuart Mill and Sir James Fitzjames Stephen (Stephen J) and in the middle of the last century between Professor Herbert Hart and Sir Patrick Devlin (Devlin J). [read post]
24 Oct 2013, 10:26 am by Paul Rosenzweig
Pure privacy—that is, the privacy of activities in your own home—remains reasonably well-protected.[8] What has been lost, and will become even more so increasingly, is the anonymity of being able to act in public (whether physically or in cyberspace) without anyone having the technological capacity to permanently record and retain data about your activity for later analysis. [read post]