enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Privacy laws of the United States - Wikipedia

    en.wikipedia.org/wiki/Privacy_laws_of_the_United...

    Hacking into someone else's computer is a type of intrusion upon privacy, [13] as is secretly viewing or recording private information by still or video camera. [14] In determining whether intrusion has occurred, one of three main considerations may be involved: expectation of privacy ; whether there was an intrusion, invitation, or exceedance ...

  3. Digital Millennium Copyright Act - Wikipedia

    en.wikipedia.org/wiki/Digital_Millennium...

    Computer programs that are contained in and control the functioning of a motorized land vehicle such as a personal automobile, commercial motor vehicle, or mechanized agricultural vehicle, except for computer programs primarily designed for the control of telematics or entertainment systems for such vehicle, when circumvention is a necessary ...

  4. Online Copyright Infringement Liability Limitation Act

    en.wikipedia.org/wiki/Online_Copyright...

    See 512(a) and (h) below if the information is not stored on the system of the OSP but is instead on a system connected to the Internet through it, like a home or business computer connected to the Internet. Legal liability may result if access to material is disabled or identity disclosed in this case.

  5. Reasonable expectation of privacy (United States) - Wikipedia

    en.wikipedia.org/wiki/Reasonable_expectation_of...

    The reasonable expectation of privacy has been extended to include the totality of a person's movements captured by tracking their cellphone. [24] Generally, a person loses the expectation of privacy when they disclose information to a third party, [25] including circumstances involving telecommunications. [26]

  6. Software copyright - Wikipedia

    en.wikipedia.org/wiki/Software_copyright

    The graphics, sounds, and appearance of a computer program also may be protected as an audiovisual work; as a result, a program can infringe even if no code was copied. [11] The set of operations available through the interface is not copyrightable in the United States under Lotus v. Borland, but it can be protected with a utility patent.

  7. Legal aspects of file sharing - Wikipedia

    en.wikipedia.org/wiki/Legal_aspects_of_file_sharing

    The judgement of the court states: "Article 5 of Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society must be interpreted as meaning that the copies on the user’s computer screen and the copies in the internet 'cache ...

  8. Criminal copyright law in the United States - Wikipedia

    en.wikipedia.org/wiki/Criminal_copyright_law_in...

    An individual may be liable if the infringement was committed: (B) by the reproduction or distribution, including by electronic means, during any 180-day period, of 1 or more copies or phonorecords of 1 or more copyrighted works, which have a total retail value of more than $1,000; or (C) by the distribution of a work being prepared for ...

  9. List of copyright case law - Wikipedia

    en.wikipedia.org/wiki/List_of_copyright_case_law

    MAI Systems Corp. v. Peak Computer, Inc. 991 F.2d 511: 9th Cir. 1993 RAM ("working memory") copies of computer programs are governed by copyright. Apple Computer, Inc. v. Microsoft Corp. 35 F.3d 1435: 9th Cir. 1994 Certain components of computer programs' graphical user interfaces are not copyrightable. Campbell v. Acuff-Rose Music, Inc. 510 U ...