But AOL does not in writing guarantee they'll provide notice. |
But they can notify the user so he can question the legitimacy of the subpoena. |
Everyone involved really needs to look at the proposal and debate what makes sense, ... We need to look closely at all of these issues and understand what the impact would be on these servers. |
I suspect that it is one of the best solutions that we've seen, |
If you attempt to impose ... a credit card and registration model ... there will be a substantial loss of readership. |
It is appropriate for the federal court to independently decide which documents should be withheld and which should be disclosed. |
It's not clear that a Hotmail user whose privacy has been compromised really has any recourse against Microsoft for what might be found to be negligent engineering of this feature, |
It's not clear that a Hotmail user whose privacy has been compromised really has any recourse against Microsoft for what might be found to be negligent engineering of this feature. |
The Administration has confirmed the existence of the program, but released very little information that sheds light on the key question (of) whether the government is acting illegally. |
The big question is whether the formal parties to a lawsuit can reach an agreement that has the effect of silencing other individuals from speaking and communicating on the Internet. |
The FOIA already contains an exemption, as it has for the last 25 years, that protects confidential business information if the release of the information could create some harm or damage to the submitting company, ... The courts have interpreted that the exemption is adequate. |
The general sense is that with Gerald Solomon's retirement, a significant obstacle has been removed. |
The number of these lawsuits is exploding. |
The plaintiff asked for a permanent injunction to affect individuals other than the two defendants who have agreed to this. |
There are some very legitimate community concerns that a lot of companies would like to conceal in the name of fighting cyber-terrorism, ... It will become too easy to hide behind the shield of critical infrastructure protection in the same way that organizations in the past hid behind 'national security' to protect information that they didn't want to have disclosed. |