ⓘ Free online encyclopedia. Did you know? page 991

Device neutrality

Device neutrality law states that the users have the right of non-discrimination of the services and apps they use, based on platform control by hardware companies. The term device neutrality is closely connected to net neutrality, and shares a c ...

Digital commons (economics)

The digital commons are a form of commons involving the distribution and communal ownership of informational resources and technology. Resources are typically designed to be used by the community by which they are created. Examples of the digital ...

Digital evidence

Digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. Before accepting digital evidence a court will determine if the evidence is relevant, whethe ...

Digital inheritance

Digital inheritance is the process of handing over digital media in the form of digital assets and rights to beneficiaries. The process includes understanding what digital assets and rights exist and dealing with them after a person has died. Dig ...

EIDAS

eIDAS is an EU regulation on electronic identification and trust services for electronic transactions in the European Single Market. It was established in EU Regulation 910/2014 of 23 July 2014 on electronic identification and repeals directive 1 ...

Tor Ekeland

Tor Bernhard Ekeland is a New York City based computer, trial and appellate lawyer. He is the Managing Partner of Tor Ekeland Law, PLLC. He is best known for representing hackers prosecuted under the notorious Computer Fraud and Abuse Act, as wel ...

ElcomSoft

ElcomSoft Co.Ltd. is a privately owned software company headquartered in Moscow, Russia. Since its establishment in 1990, the company has been working on computer security programs, with the main focus on password and system recovery software.

Electronic Commerce Protection Act

The Electronic Commerce Protection Act is anti-spam legislation introduced in 2009 by the Government of Canada at the House of Commons.

Electronic evidence

Electronic evidence consists of these two sub-forms: analog no longer so prevalent, but still existent in some sound recordings e.g, and digital evidence see longer article This rather complex relationship can be depicted graphically as shown in ...

Electronic signature

An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign. This type of signature provides the same legal standing as a ...

Electronic signatures and law

Worldwide, legislation concerning the effect and validity of electronic signatures, including, but not limited to, cryptographic digital signatures, includes:

Electronic Signatures in Global and National Commerce Act

The Electronic Signatures in Global and National Commerce Act is a United States federal law passed by the U.S. Congress to facilitate the use of electronic records and electronic signatures in interstate and foreign commerce by ensuring the vali ...

Email spam legislation by country

The following table represents laws in respective countries which restrict the use of Email spam. Note: Countries marked with red are listed in the Spamhaus Worst Spam Origin Countries March 2020.

Eolas

Eolas is a United States technology company accused of mainly acting as a patent troll and described as "The Web’s longest nightmare". It was founded in 1994 by Michael David Doyle. His University of California, San Francisco team claimed to have ...

ESign (India)

Aadhaar eSign is an online electronic signature service in India to facilitate an Aadhaar holder to digitally sign a document. The signature service is facilitated by authenticating the Aadhar holder via the Aadhar-based e-KYC service. To eSign a ...

European Union Public Licence

The European Union Public Licence is a free software licence that has been created and approved by the European Commission. The licence is available in 23 official languages of the European Union. All linguistic versions have the same validity. I ...

Export of cryptography

The export of cryptography is the transfer from one country to another of devices and technology related to cryptography. In the early days of the Cold War, the United States and its allies developed an elaborate series of export control regulati ...

Export of cryptography from the United States

Export of cryptographic technology and devices from the United States was severely restricted by U.S. law until 1992. The law gradually became eased until around 2000, but some restrictions still remain today. Since World War II, many governments ...

GikII

GikII is a series of European conferences on the intersections between law, technology and popular culture. It is hosted at a different institution every year. The first conference was in 2006 and was held in Edinburgh, and was organised by Lilia ...

GNU Lesser General Public License

The GNU Lesser General Public License is a free-software license published by the Free Software Foundation. The license allows developers and companies to use and integrate a software component released under the LGPL into their own software with ...

Gpl-violations.org

The gpl-violations.org is a not-for-profit project founded and led by Harald Welte in 2004. It worked to make sure software licensed under the GNU General Public License was not used in ways prohibited by the license.

Illegal prime

An illegal prime is a prime number that represents information whose possession or distribution is forbidden in some legal jurisdictions. One of the first illegal primes was found in 2001. When interpreted in a particular way, it describes a comp ...

Information privacy law

Information privacy law or data protection laws prohibit the disclosure or misuse of information about private individuals. Over 80 countries and independent territories, including nearly every country in Europe and many in Latin America and the ...

Legal issues with BitTorrent

The use of the BitTorrent protocol for sharing of copyrighted content generated a variety of novel legal issues. While the technology and related platforms are legal in many jurisdictions, law enforcement and prosecutorial agencies are attempting ...

Internet as a source of prior art

In the context of patent law, using the Internet as a source of prior art when assessing whether an invention is novel and inventive, may be problematic if it is difficult to ascertain precisely when information on websites became available to th ...

Internet tax

Internet tax is a tax on Internet-based services. A number of jurisdictions have introduced an Internet tax and others are considering doing so mainly as a result of successful tax avoidance by multinational corporations that operate within the d ...

Law of the Horse

Law of the Horse was a term used in the mid-1990s to define the state of cyberlaw during the nascent years of the Internet. The term first gained prominence in a 1996 cyberlaw conference presentation by Judge Frank H. Easterbrook of the United St ...

Legal aspects of file sharing

File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia, documents or electronic books. It involves various legal aspects as it is often used to exchange intellectual property that ...

Limitations on exclusive rights: Computer programs

Limitations on exclusive rights: Computer programs is the title of the current form of section 117 of the U.S. Copyright Act. In United States copyright law, it provides users with certain adaptation rights for computer software that they own.

Lauri Love

Lauri Love is a British activist previously wanted by the United States for his alleged activities with the hacker collective Anonymous.

Magic Lantern (software)

Magic Lantern is keystroke logging software developed by the United States Federal Bureau of Investigation. Magic Lantern was first reported in a column by Bob Sullivan of MSNBC on 20 November 2001 and by Ted Bridis of the Associated Press.

Motion Picture Association of America

The Motion Picture Association is an American trade association representing the five major film studios of the United States, as well as the video streaming service Netflix. Founded in 1922 as the Motion Picture Producers and Distributors of Ame ...

Net neutrality in the European Union

The basic framework of net neutrality in the European Union is laid down by Article 3 of EU Regulation 2015/2120. However, the regulations text has been criticized as offering loopholes that can undermine the regulations effectiveness. Some EU me ...

Net neutrality in the Netherlands

On June 4, 2012, the Netherlands became the first country in Europe and the second in the world, after Chile, to enact a network neutrality law. The main net neutrality provision of this law requires that "Providers of public electronic communica ...

Net neutrality law

Net neutrality law refers to laws and regulations which enforce the principle of net neutrality. Opponents of net neutrality enforcement claim regulation is unnecessary, because broadband service providers have no plans to block content or degrad ...

Newzbin

Newzbin was a British Usenet indexing website, intended to facilitate access to content on Usenet. The site caused controversy over its stance on copyrighted material. Access to the Newzbin.com website was blocked by BT and Sky in late 2011, foll ...

Barbara Nitke

Barbara Nitke is a New York City art photographer who specializes in the subject of human sexual relations. She has worked extensively in the porn and BDSM communities. Nitke was born in Lynchburg, Virginia in 1950 and grew up in Virginia and Ala ...

Notice and take down

Notice and take down is a process operated by online hosts in response to court orders or allegations that content is illegal. Content is removed by the host following notice. Notice and take down is widely operated in relation to copyright infri ...

Open Source Observatory and Repository

The Open Source Observatory and Repository is an online project launched by the European Commission under the IDABC programme, to support the distribution and re-use of software developed by for public sector administrations across Europe, connec ...

Payment Card Industry Data Security Standard

The Payment Card Industry Data Security Standard is an information security standard for organizations that handle branded credit cards from the major card schemes. The PCI Standard is mandated by the card brands but administered by the Payment C ...

Personal jurisdiction over international defendants in the United States

Questions over personal jurisdiction over foreign defendants in the United States arise when foreign nationals commit crimes against Americans, or when a person from or in a different country is sued in U.S. courts, or when events took place in a ...

Magna Carta for Philippine Internet Freedom

The Magna Carta for Philippine Internet Freedom is an internet law bill filed in the Philippine legislature. The bill contains provisions promoting civil and political rights and Constitutional guarantees for Philippine internet users, such as fr ...

Legality of piggybacking

Laws regarding "unauthorized access of a computer network" exist in many legal codes, though the wording and meaning differ from one to the next. However, the interpretation of terms like "access" and "authorization" is not clear, and there is no ...

Platform for Internet Content Selection

The Platform for Internet Content Selection was a specification created by W3C that used metadata to label webpages to help parents and teachers control what children and students could access on the Internet. The W3C Protocol for Web Description ...

Policies promoting wireless broadband in the United States

Policies promoting wireless broadband are policies, rules, and regulations supporting the "National Wireless Initiative", a plan to bring wireless broadband Internet access to 98% of Americans. Spectrum is limited and much of it already in use. T ...

Protected computer

Protected computers is a term used in Title 18, Section 1030 of the United States Code, which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to the data stored on, "protected computers". Th ...

Qualified digital certificate

Under the context of Regulation No 910/2014, a qualified digital certificate is a public key certificate issued by a qualified trust service provider that ensures the authenticity and data integrity of an electronic signature and its accompanying ...

Qualified electronic signature

A qualified electronic signature is an electronic signature that is compliant to EU Regulation No 910/2014 for electronic transactions within the internal European market. It enables to verify the authorship of a declaration in electronic data ex ...

Scientology and the Internet

There are a number of disputes concerning the Church of Scientologys attempts to suppress material critical of Scientology on the Internet, utilizing various methods – primarily lawsuits and legal threats, as well as front organizations. In late ...

Principality of Sealand

The Principality of Sealand, commonly known as Sealand, is a micronation that claims Roughs Tower, an offshore platform in the North Sea approximately 12 kilometres off the coast of Suffolk, as its territory. Roughs Tower is a disused Maunsell Se ...