Search for: "and all known and Undiscovered defendants" Results 1 - 20 of 37
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
8 Oct 2014, 8:49 am by Rebecca Tushnet
”  Section 43(a)(1)(B) doesn’t cover all commercial speech, only organized attempts to penetrate the relevant market. [read post]
2 Dec 2012, 4:37 am
 In  all these instances the defendants had permission to air the show, by virtue of a licence agreement with Screentime and Five Divas. [read post]
21 Feb 2019, 9:05 am by Friedman, Rodman & Frank, P.A.
For example, a landowner must “refrain from intentional misconduct that proximately causes injury to the undiscovered trespasser. [read post]
9 Nov 2009, 7:09 am
”  Your question squarely explores the issue of the legal theory known as “negligent credentialing. [read post]
15 Nov 2017, 7:48 am by Vanessa Sauter
  The interests of all stakeholders must be fairly represented. [read post]
12 May 2023, 5:42 am by Richard Forno
In some cases, these compromised or malicious individuals can remain undiscovered for years. [read post]
23 Jan 2014, 6:53 am
  Id. at 28.(2) There is “greater flexibility” in negligence as a cause of action, id. at 31, so it can embrace a claim for “a lack of due care” by a defendant who “knew, or should have known, that [its] product was too dangerous to be used by anyone. [read post]
22 Apr 2014, 2:01 pm by MBettman
They knew or should have known that doing so would not give the expert enough time to conduct a complete investigation. [read post]
19 Oct 2017, 2:25 pm by gennie
We already have protocols to defend against these attackers, and thanks to the success of projects like EFF’s Encrypt The Web initiative more than half of all Internet traffic is already protected by HTTPS. [read post]
18 Jan 2022, 6:10 am by Cinthia Macie
  All defendants, except MIT, entered a consent decree at the time of the complaint’s filing. [read post]
18 Jan 2022, 6:10 am by Cinthia Macie
  All defendants, except MIT, entered a consent decree at the time of the complaint’s filing. [read post]
The compromised software, known as Orion, is enterprise network management software that helps organizations manage their networks, servers and networked devices. [read post]
The compromised software, known as Orion, is enterprise network management software that helps organizations manage their networks, servers and networked devices. [read post]
28 Jul 2016, 7:17 am by Susan Hennessey, Nicholas Weaver
A few, though not all, defendants have prevailed on motions to suppress all evidence resulting from the NIT, and the defense working group now seeks to convince courts nationwide to follow suit. [read post]
7 Apr 2021, 4:15 am by SHG
” The natural response to such a question by anyone who isn’t completely nuts is to deny being an as yet undiscovered criminal. [read post]
21 Jul 2011, 4:30 am by Frances Zacher
It is Plaintiff’s burden to establish that “(1) both claims [arise] out of the same conduct, transaction or occurrence, (2) the new defendant is united in interest with the original defendant, and (3) the new defendant knew or should have known that, but for a mistake by the plaintiff as to the identity of the proper parties, the action would have been brought against him or it as well. [read post]