Sentences with phrase «other electronic communication device»

The news media are allowed to use laptop computers and other electronic communication devices inside courtrooms if they are not disruptive to the proceedings.

Not exact matches

Cyber-bullying (cyberbullying, online bullying) is the use of electronic information and communication devices such as e-mail, instant messaging, text messages, mobile phones, pagers and defamatory websites to bully or otherwise harass an individual or group through personal attacks or other means, and it may constitute a computer crime.
The company has already supplied the U.S. military and outdoor enthusiasts with portable field chargers, largely for communication and other small electronic devices powered by such cells.
Out of respect for the privacy of other guests and to maintain a serene atmosphere, please leave your phone and electronic communication devices in your guest room safe as they are not permitted in KurSpa facilities.
ABA Formal Opinion 1 - 459 tells us that A lawyer sending or receiving substantive communications with a client via e-mail or other electronic means ordinarily must warn the client about the risk of sending or receiving electronic communications using a computer or other device, or e-mail account, where there is a significant risk that a third party may gain access.
The Committee then offered the following very broadly - worded proposition, which was not limited to employment matters: «A lawyer sending or receiving substantive communications with a client via e-mail or other electronic means ordinarily must warn the client about the risk of sending or receiving electronic communications using a computer or other device, or e-mail account, to which a third party may gain access.
Amongst other things and in addition to the indiscriminate interception of communications, the Investigatory Powers Act allows the security agencies to hack computers and other electronic devices on a large scale, harvesting potentially huge amounts of personal data from individuals who are not suspected of any criminal behaviour.
«cyberbullying» means any electronic communication through the use of technology including, without limiting the generality of the foregoing, computers, other electronic devices, social networks, text messaging, instant messaging, websites and electronic mail, typically repeated or with continuing effect, that is intended or ought reasonably be expected to cause fear, intimidation, humiliation, distress or other damage or harm to another person's health, emotional well - being, self - esteem or reputation, and includes assisting or encouraging such communication in any way.
Before using a particular technology in the course of representing a client, an attorney must take appropriate steps to evaluate: 1) the level of security attendant to the use of that technology, including whether reasonable precautions may be taken when using the technology to increase the level of security; 2) the legal ramifications to a third party who intercepts, accesses or exceeds authorized use of the electronic information; 3) the degree of sensitivity of the information; 4) the possible impact on the client of an inadvertent disclosure of privileged or confidential information or work product; 5) the urgency of the of the situation; and 6) the client's instructions and circumstances, such as access by others to the client's devices and communications.
According to Chapter 99 of the Sunset Valley municipal code, a person commits an offense if, while operating a vehicle on a public roadway, the person uses a hand - held mobile communication device to either engage in a call; send, read, or write a text message; view pictures or written text whether transmitted by internet or other electronic means; engage in gaming; or engage in any other use of the device.
A lawyer sending or receiving substantive communications with a client via e-mail or other electronic means ordinarily must warn the client about the risk of sending or receiving electronic communications using a computer or other device, or e-mail account, to which a third party may gain access.
After reaching the narrow conclusion that, in employment cases, lawyers have an obligation to warn clients of the risk of discussing the case using employer - owned devices or accounts, the Committee explained that regardless of the type of case, lawyers must assess whether client consent is required when communicating via email: «A lawyer sending or receiving substantive communications with a client via e-mail or other electronic means ordinarily must warn the client about the risk of sending or receiving electronic communications using a computer or other device, or e-mail account, to which a third party may gain access.
78.1 (1) No person shall drive a motor vehicle on a highway while holding or using a hand - held wireless communication device or other prescribed device that is capable of receiving or transmitting telephone communications, electronic data, mail or text messages.
Before using a particular technology in the course of representing a client, an attorney must take appropriate steps to evaluate: 1) the level of security attendant to the use of that technology, including whether reasonable precautions may be taken when using the technology to increase the level of security; 2) the legal ramifications to a third party who intercepts, accesses or exceeds authorized use of the electronic information; 3) the degree of sensitivity of the information; 4) the possible impact on the client of an inadvertent disclosure of privileged or confidential information or work product; 5) the urgency of the situation; and 6) the client ‟ s instructions and circumstances, such as access by others to the client ‟ s devices and communications.
Accordingly, the former application also pointed out that the company was earlier planning to make Samsung Gear as a complimentary device with other smartphones and tablets, as stated in the filing, the device «that communicate data to personal digital assistants, smart phones, table PCs, PDA, and personal computers through internet websites and other computer and electronic communication networks.»
We may employ automated monitoring devices or techniques to protect our users from mass unsolicited communications (also known as «spam») and / or other types of electronic communications that we deem inconsistent with our business purposes.
a b c d e f g h i j k l m n o p q r s t u v w x y z