- Articles
85,579 results
-
Information environment
The information environment is The actors include leaders, decision makers, individuals, and organizations. Resources include the materials and systems employed to collect, analyze, apply, or disseminate information. The information environment is where humans and automated -
The IT Law Wiki
Welcome to The IT Law Wiki. We are currently editing over 34,501 articles, and you can help About this wiki| New pages| New files| Active users| Categories| Wiki tutorial| Help pages The IT Law -
DMCA Safe Harbors
Title II of the Digital Millennium Copyright Act (DMCA) of 1998, Pub. L. 105-304, 112 Stat. 2860 (1998). Online service providers (OSPs) and Internet service providers (ISPs) provide critical infrastructure support to the Internet -
Cyber threat
Cyber threat(s) Threats to the U.S. cyber and telecommunications infrastructure are constantly increasing and evolving as are the entities that show interest in using a cyber-based capability to harm the nation’s -
Cybersecurity
Cybersecurity (also called cyberspace security and cyber security) is Cybersecurity is the security of cyberspace. -
Fair Information Practice Principles
The Fair Information Practice Principles (FIPPs) are a widely accepted framework that is at the core of the Privacy Act of 1974 and is mirrored in the laws of many U.S. states, as well -
Cybercrime
The term cybercrime describes both: The term cyber crime -
1976 Copyright Act
Copyright Act of 1976, Pub. L. No. 94-553, 90 Stat. 2541 (Oct. 19, 1976), codified at various parts of Title 17 U.S. Code. The Copyright Act of 1976 is the primary basis of -
RFID tag
An RFID tag (also referred to as a transponder) is an electronic device that communicates with RFID readers. An RFID tag can function as a beacon or it can be used to convey information such -
Perfect 10 v. Google
Perfect 10, Inc. v. Google, Inc., 416 F.Supp.2d 828 (C.D. Cal. 2006) (full-text), aff’d in part, rev’d in part sub nom. Perfect 10, Inc. v. Amazon.com, Inc., 487 -
Child pornography
Child pornography is material that visually depicts sexual conduct by children. U.S. federal law defines "child pornography" as: Child pornography is not protected by the First Amendment even when it is not obscene; i -
Personally identifiable information
There are numerous, albeit similar, definitions for PII: Personally identifiable information is: -
Last mile
The last mile Usually referred to by the telecommunications and cable television industries, it is typically seen as an expensive challenge because "fanning out" wires and cables is a considerable physical undertaking. In countries employing -
Information
Information is Information is -
Radio frequency spectrum
The radio frequency spectrum (also radiofrequency spectrum or RF spectrum) is The radio frequency spectrum is a portion of the electromagnetic spectrum in which electromagnetic waves can be generated by alternating current fed to an -
Social Security Number
The Social Security Number (SSN) was created in 1936 as a means of tracking workers’ earnings and eligibility for Social Security benefits. SSNs are issued to most U.S. citizens, and to some non-citizens -
Data
Data is Data is "[i]nert symbols, signs, descriptions, or measures; elements of information." -
Intrusion upon seclusion
Restatement (Second) of Torts §652B provides: Intrusion upon seclusion best captures the common understanding of an invasion of privacy as an affront to individual dignity. -
Section 5 of the FTC Act
Section 5 of the Federal Trade Commission Act (FTC Act), Ch. 311, §5, 38 Stat. 719, codified at 15 U.S.C. §45(a). Section 5 prohibits entities from engaging in unfair or deceptive acts -
Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
Organization for Economic Cooperation and Development, ICCP Subcommittee, Guidelines on the Protection of Privacy and Transborder Flow of Personal Data (C(80)58/FINAL) (Sept. 23, 1980) (full-text). In 1980, the Organization for Economic -
Cloud consumer
A cloud consumer (also called a cloud service consumer) is A cloud consumer browses the service catalog from a cloud provider, requests the appropriate service, sets up service contracts with the cloud provider, and uses -
Content-based restrictions
Content-based restrictions regulate speech based on its subject matter or viewpoint. These restrictions seek to “suppress, disadvantage, or impose differential burdens upon speech because of its content.” Justice Holmes, in one of his most -
Sensitive PII
Sensitive personally identifiable information (PII) is Not all PII is sensitive. For example, information on a business card or in a public phone directory is PII, but in most cases not Sensitive PII, because it -
OMB Memorandum M-07-16
Office of Management and Budget, Safeguarding Against and Responding to the Breach of Personally Identifiable Information (OMB Memorandum M-07-16) (May 22, 2007) (full-text). In response to recommendations from the President's Identity -
Kabushiki Kaisha Sony Computer Entertainment v. Stevens
Kabushiki Kaisha Sony Computer Entertainment v. Stevens, [2005] HCA 58, (2005) 221 ALR 448; (2005) 79 ALJR 1850 (Oct. 6, 2005) (full-text). Eddy Stevens sold computer chips that enabled his customers to play imported
Related Community

Marvel Database
comics
200K
Pages200K
Images1K
Videos
With more than 200,000 articles, the Marvel Database is the largest Marvel Comics encyclopedia ever written, as well as being the 5th largest FANDOM wiki. The database covers comics, characters, teams, games, TV shows and movies. Browse one of over…