Search for: "Case name not available" Results 1 - 20 of 22,565
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
19 Sep 2019, 1:37 pm by Amy Starnes
Additional disaster recovery resources are available at texasbar.com/disaster, texaslawhelp.org, and lonestarlegal.blog/services/disaster-relief. [read post]
19 Sep 2019, 9:56 am by Eugene Volokh
But "hate speech" writ large doesn't fall within any such exceptions, as cases such as Matal and Christian Legal Society make clear. [read post]
19 Sep 2019, 9:25 am by James Kachmar
One such company, HiQ Labs is a data analytics company that uses automated bots to harvest or “scrape” information from LinkedIn’s publicly available profiles, including data like names, job titles, work history and skills. [read post]
The result of downstream participants transitioning to limited service providers is that such participants can only supplement bid requests and engage in programmatic transactions using PI that was available before the consumer clicked the Do Not Sell button on the applicable publisher property or has been sold to the participant from other publisher properties where the consumer has not opted out. [read post]
19 Sep 2019, 7:32 am by Shelley Zhang
Detailed provisions on law enforcement procedures: The procedural regulations for each of the main stages of case handling, including whistleblowing, case-filing, investigation, case disposition, publicity, etc. are provided; the IPP-MA and the IPP-AD also clarify procedures regarding commitment proposal and handling. [read post]
19 Sep 2019, 5:19 am by Jared Staver
The organization’s process begins with gathering and analyzing publicly available data. [read post]
19 Sep 2019, 4:00 am by Lawrence Husick
The problem was so pervasive that it had a name: orphan works. [read post]
19 Sep 2019, 12:22 am by Tessa Shepperson
In which case s21 will not be available and you will need to use the ‘Notice to Quit’ procedure to recover possession. [read post]
18 Sep 2019, 9:52 pm by Kevin LaCroix
Indeed, digital forensic evidence of a data security incident is rarely in plain view; it can rest among disparate logs (if they even exist), volatile memory captures, server images, system registry entries, spoofed IP addresses, snarled network traffic, haphazard and uncorrelated timestamps, Internet addresses, computer tags, malicious file names, system registry data, user account names, network protocols and a range of other suspicious activity. [read post]
18 Sep 2019, 8:03 am by Rick Garnett
Article X, Section 6, is Montana’s “baby Blaine” amendment – named for the proposal introduced in 1875 by Senator James G. [read post]
17 Sep 2019, 11:22 am by Brian E. Barreira
The legal obligation (i.e., the obligation to pay for the car) would run to the issue, not the Applicant, and yet the Trust principal would still be made available for the benefit of the Applicant – namely the benefit of the use of the car at the Applicant’s whim. [read post]
16 Sep 2019, 3:33 pm by Dennis Crouch
This case also raises a deeper and more important question—namely, what does it mean for something to be a “design for an article of manufacture”? [read post]
16 Sep 2019, 9:06 am by Matthew Davie
  In this blog post we consider several key aspects of the case. [read post]
15 Sep 2019, 8:48 am by Steve Kalar
Judge Paez drives the point home, in a case of first impression.United States v. [read post]
14 Sep 2019, 6:00 am by Guest Blogger
At any given time, judicial resources may be fixed, but decisions within those constraints may affect the shape and level of resources available to the judiciary in the future. [read post]