Computer law

Results: 22619



#Item
811Ethics / English languages / Internet ethics / Law / Privacy / Computer security / Institute of Electrical and Electronics Engineers / Internet privacy / Information security / Security / Crime prevention / National security

CENTENNIAL SECTION PROLOG Prolog to the Section on Privacy and Cybersecurity BY C ARL L ANDWEHR , Senior Member IEEE The ancient word Bsecurity[ originated from the Latin securitas, meaning freedom from anxiety or care,

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-19 07:15:29
812United States antitrust law / Competition law / Law / Federal Trade Commission / Criminal law / Electronics / Network neutrality in the United States / Data discrimination / Computer law / Internet access / Network neutrality

Federal Trade Commission PREPARED STATEMENT OF COMMISSIONER JOSHUA D. WRIGHT FEDERAL TRADE COMMISSION ON

Add to Reading List

Source URL: www.ftc.gov

Language: English
813Contract / Software licenses / Computer law / Contract law / Law / Adobe Systems

All Entities ordering on this contract will be required to complete an Adobe Enterprise Term License Agreement. The completion of an Adobe Enterprise Term License Agreement is a mandatory requirement. The contract Vendor

Add to Reading List

Source URL: www.its.state.nc.us

Language: English - Date: 2015-03-10 13:45:33
814Computer law / Strategic management / Private law / Licensing / Contract law / Know-how / License / Royalties / Trademark / Law / Intellectual property law / Software licenses

AWESOMIUM COMMERCIAL LICENSE AGREEMENT This LICENSE AGREEMENT (“Agreement”), effective as of Effective Date, by and between Awesomium Technologies LLC, having an address atJamie Lee Drive, Houston, Texas 77095

Add to Reading List

Source URL: www.awesomium.com

Language: English - Date: 2013-09-15 21:28:19
815Computing / Internet / Human rights / Anonymity / Internet ethics / Pseudonymity / Privacy / Tor / Crypto-anarchism / Ethics / Internet privacy / Computer law

1    Anonymity and Encryption   Comments submitted to the United Nations Special Rapporteur on  the Promotion and Protection of the Right to Freedom of Opinion 

Add to Reading List

Source URL: www.ohchr.org

Language: English - Date: 2015-06-02 08:49:14
816Social psychology / War / Terrorism / Electronic warfare / Military technology / Cyberterrorism / Federal Bureau of Investigation / Computer insecurity / Malware / Computer crimes / Cyberwarfare / Crime

Attribution in Cyberspace: Challenges for U.S. Law Enforcement

Add to Reading List

Source URL: fas.org

Language: English - Date: 2015-04-24 12:07:52
817Electronics / Technology / Computer law / Network neutrality / Video on demand / EarthLink / Verizon Communications / Comcast / Internet service provider / Internet / Internet access / Broadband

http://www.slate.com/articles/technology/future_tensenetwork_neutrality_the_fcc_and_the_internet_of_things_.ht The Next Big Battle in Internet Policy By Marvin Ammori | Posted Tuesday, Oct. 2, 2012, at 11:26 AM

Add to Reading List

Source URL: www.naltblackchurch.com

Language: English - Date: 2013-02-01 14:28:07
818Data privacy / Social issues / Data Protection Act / Internet privacy / Information privacy / Personally identifiable information / Government procurement in the United States / Ethics / Privacy / Computer law

Personal Data Protection Policy for ACE EdVenture Group ACE EdVenture Group respects and is committed to the protection of your personal information and your privacy. This Personal Data Protection Policy provides a frame

Add to Reading List

Source URL: aceedventure.com

Language: English - Date: 2014-12-22 19:43:49
819Free software licenses / Open content / Free content / Copyleft / GNU General Public License / Proprietary software / End-user license agreement / Free software / Credit / Software licenses / Computer law / Law

Microsoft Word - LCNS-met_SDK-2014_05_28.docx

Add to Reading List

Source URL: www.metaio.com

Language: English - Date: 2015-05-07 04:37:49
820Notary / Electronic signature / Computer law / Digital signature / Fax / Signature / Uniform Electronic Transactions Act / MERS / Filing / Cryptography / Law / Security

Topic: Original Signatures on Documents Question by: Judy Jobman Jurisdiction:

Add to Reading List

Source URL: www.iaca.org

Language: English - Date: 2013-02-07 21:37:40
UPDATE