Civil lawsuits - News, Features, and Slideshows
Storing someone's private information in a crime database for 20 years when charges against that person have been dropped violates privacy rights, the European Court of Human Rights (ECHR) ruled Thursday.
By Loek Essers | 18 September, 2014 20:54
Swedish law requiring network operators to retain communications metadata continues to breach European Union rules, according to Swedish ISP Bahnhof, which has asked the European Commission to intervene.
By Loek Essers | 12 September, 2014 22:38
The Frankfurt Regional Court has denied Uber Technologies' request to suspend a nationwide ban in Germany on its ride-sharing UberPop service, a court spokesman said Thursday.
By Loek Essers | 12 September, 2014 02:05
A German court has required Google to stop ignoring customer emails and start offering a way to communicate with the company.
By Loek Essers | 11 September, 2014 22:46
The U.S. Federal Communications Commission and its allies have several options, with most of them difficult, after a U.S. appeals court struck down most of the agency's 2010 net neutrality rules.
By Grant Gross | 14 January, 2014 20:48
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
By Grant Gross | 20 December, 2013 16:11
After almost a decade of litigation, Google scored a victory last week over the Authors Guild, which had sued the company for copyright infringement over its Google Books search engine. But a few important chapters in the legal saga have yet to be written.
By Juan Carlos Perez | 19 November, 2013 00:07
A U.S. judge's ruling Wednesday that Apple violated antitrust laws in its dealings with book publishers may limit the ways in which the company strikes deals in other industries going forward.
By Joab Jackson | 10 July, 2013 21:17
Some of the most memorable IT-related quotes were uttered in courtrooms this year, which involved a steady stream of legal challenges about intellectual property. In no particular order, these are some of the comments that stuck with us as 2012 winds to a close.
By Nancy Weil | 12 December, 2012 13:45
BIG-IQ Security makes it easy to manage the entire firewall policy life cycle. Read about the key benefits and download the policy auditing and security compliance report today
- FTMedia Planner Buyer - Media Trader OpportunitiesNSW
- FTSearch Account ManagerNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
- FTSenior Media TraderNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
This whitepaper discusses the challenge of BYOD and how best-practice deployments help deliver on the business promise of mobility with integrated protection throughout the workplace. • Flexible, end-to-end security enables enterprises to speed adoption of transformative technologies for a competitive edge • If employees feel that security policies impede productivity or encroach on personal data, they look for work-arounds • Integrated solutions that avoid overlapping functionality and streamline management can help organizations maintain tight security and ensure compliance
- Red Hat acquires FeedHenry to get mobile app chops
- BitTorrent opens Bleep peer-to-peer encrypted chat program to public testing
- Orange offers 'smart app' dev tool and global M2M location service
- Once your car's connected to the Internet, who guards your privacy?
- Beyond FLOPS: The co-evolving world of computer benchmarking
- Microsoft heads back to the desktop
- French crime database breaches privacy rights, EU court rules
- Ericsson dumps LTE modem business
- Toshiba slashes struggling consumer PC business
- Geeks' favorite DeNA interactive streaming platform looks beyond Japan
- Local govt association boosts customer focus, knowledge management
- Amazon's new Fire tablets have more features at lower prices
- IPv6, IANA transition headline APNIC meeting
- Encryption goof fixed in TorrentLocker file-locking malware