The news media are allowed to use laptop computers and
other electronic communication devices inside courtrooms if they are not disruptive to the proceedings.
Not exact matches
Cyber-bullying (cyberbullying, online bullying) is the use of
electronic information and
communication devices such as e-mail, instant messaging, text messages, mobile phones, pagers and defamatory websites to bully or otherwise harass an individual or group through personal attacks or
other means, and it may constitute a computer crime.
The company has already supplied the U.S. military and outdoor enthusiasts with portable field chargers, largely for
communication and
other small
electronic devices powered by such cells.
Out of respect for the privacy of
other guests and to maintain a serene atmosphere, please leave your phone and
electronic communication devices in your guest room safe as they are not permitted in KurSpa facilities.
ABA Formal Opinion 1 - 459 tells us that A lawyer sending or receiving substantive
communications with a client via e-mail or
other electronic means ordinarily must warn the client about the risk of sending or receiving
electronic communications using a computer or
other device, or e-mail account, where there is a significant risk that a third party may gain access.
The Committee then offered the following very broadly - worded proposition, which was not limited to employment matters: «A lawyer sending or receiving substantive
communications with a client via e-mail or
other electronic means ordinarily must warn the client about the risk of sending or receiving
electronic communications using a computer or
other device, or e-mail account, to which a third party may gain access.
Amongst
other things and in addition to the indiscriminate interception of
communications, the Investigatory Powers Act allows the security agencies to hack computers and
other electronic devices on a large scale, harvesting potentially huge amounts of personal data from individuals who are not suspected of any criminal behaviour.
«cyberbullying» means any
electronic communication through the use of technology including, without limiting the generality of the foregoing, computers,
other electronic devices, social networks, text messaging, instant messaging, websites and
electronic mail, typically repeated or with continuing effect, that is intended or ought reasonably be expected to cause fear, intimidation, humiliation, distress or
other damage or harm to another person's health, emotional well - being, self - esteem or reputation, and includes assisting or encouraging such
communication in any way.
Before using a particular technology in the course of representing a client, an attorney must take appropriate steps to evaluate: 1) the level of security attendant to the use of that technology, including whether reasonable precautions may be taken when using the technology to increase the level of security; 2) the legal ramifications to a third party who intercepts, accesses or exceeds authorized use of the
electronic information; 3) the degree of sensitivity of the information; 4) the possible impact on the client of an inadvertent disclosure of privileged or confidential information or work product; 5) the urgency of the of the situation; and 6) the client's instructions and circumstances, such as access by
others to the client's
devices and
communications.
According to Chapter 99 of the Sunset Valley municipal code, a person commits an offense if, while operating a vehicle on a public roadway, the person uses a hand - held mobile
communication device to either engage in a call; send, read, or write a text message; view pictures or written text whether transmitted by internet or
other electronic means; engage in gaming; or engage in any
other use of the
device.
A lawyer sending or receiving substantive
communications with a client via e-mail or
other electronic means ordinarily must warn the client about the risk of sending or receiving
electronic communications using a computer or
other device, or e-mail account, to which a third party may gain access.
After reaching the narrow conclusion that, in employment cases, lawyers have an obligation to warn clients of the risk of discussing the case using employer - owned
devices or accounts, the Committee explained that regardless of the type of case, lawyers must assess whether client consent is required when communicating via email: «A lawyer sending or receiving substantive
communications with a client via e-mail or
other electronic means ordinarily must warn the client about the risk of sending or receiving
electronic communications using a computer or
other device, or e-mail account, to which a third party may gain access.
78.1 (1) No person shall drive a motor vehicle on a highway while holding or using a hand - held wireless
communication device or
other prescribed
device that is capable of receiving or transmitting telephone
communications,
electronic data, mail or text messages.
Before using a particular technology in the course of representing a client, an attorney must take appropriate steps to evaluate: 1) the level of security attendant to the use of that technology, including whether reasonable precautions may be taken when using the technology to increase the level of security; 2) the legal ramifications to a third party who intercepts, accesses or exceeds authorized use of the
electronic information; 3) the degree of sensitivity of the information; 4) the possible impact on the client of an inadvertent disclosure of privileged or confidential information or work product; 5) the urgency of the situation; and 6) the client ‟ s instructions and circumstances, such as access by
others to the client ‟ s
devices and
communications.
Accordingly, the former application also pointed out that the company was earlier planning to make Samsung Gear as a complimentary
device with
other smartphones and tablets, as stated in the filing, the
device «that communicate data to personal digital assistants, smart phones, table PCs, PDA, and personal computers through internet websites and
other computer and
electronic communication networks.»
We may employ automated monitoring
devices or techniques to protect our users from mass unsolicited
communications (also known as «spam») and / or
other types of
electronic communications that we deem inconsistent with our business purposes.