He sued the Chinese sportswear and footwear manufacturer Qiaodan Sports Company last year for unauthorized use of his name.
Furthermore, You must take appropriate steps to protect such data from unauthorized use, disclosure or access by third parties.
FORBES: Congress Has More Questions over Apple iPhone Privacy
This is one of the latest in a number of cases brought by Nokia to end HTC's unauthorized use of Nokia's inventions.
Bowman is one of more than a hundred farmers sued by Monsanto in recent years over unauthorized use of its seed technology.
MSN: Food safety group calls for court to limit GMO seed patents
If it did, the unauthorized use of Russian ballistic missiles could be prevented by some means other than a preemptive U.S. nuclear strike.
First, and most obviously, it promises the possibility of protection if deterrence fails, or if there is a limited and unauthorized use of nuclear missiles.
CENTERFORSECURITYPOLICY: The Torch Passes: Margaret Thatcher (1925-2013)
While horsemeat itself is not considered a food safety risk, its unauthorized use in certain products has raised concerns it could contain the veterinary drug phenylbutazone, or "bute, " commonly used to treat horses.
Seeking alternatives to continued unauthorized use of its site by kids, Facebook over the past year has been developing ways to enable them to become legitimate users monitored by their parents, people who have spoken to Facebook executives said.
Trademark protection of a fictional character provides the owner with the exclusive right to use the character in connection with goods and services, as well as the right to prevent the unauthorized use of the character in connection with goods and services of infringing third parties.
FORBES: Protecting Fictional Characters: Could You Legally Write A New Harry Potter Novel?
General Motors corrupted the relationship between itself and General Motors Institue (now Kettering) when it violated the trust between the University and myself by the unauthorized use of drawings that were part of an art portifolio I submitted to the school and the persons of Dr. David H.
FORBES: General Motors Mulls Ad Agency Shifts for Cadillac, Chevrolet
Others, including Kerry's unauthorized wartime use of Navy assets and personnel to film "reenactments" of his exploits - presumably to advance his political ambitions, have already been reported in the Boston Globe, National Review and Washington Times.
The Rule also requires operators to retain children's personal information for only as long as is reasonably necessary, and to protect against unauthorized access or use while the information is being disposed of.
The two face lawsuits from Sony under the Digital Millenium Copyright Act for publishing methods that break the digital protections on the PlayStation 3 to allow the use of unauthorized programs.
Consumer advocates and regulators worry "cramming, " mysterious, unauthorized fees for cell phone use, is emerging as a significant problem.
The report outlines the use of multiple unauthorized detainee interrogation methods.
CNN: Top prosecutor orders probe into interrogations; Obama shifts onus
Cisco's software allows IT departments to monitor wireless use and ensure that unauthorized access points are not added to the network.
Although users typically do not read these warnings and will undoubtably use the service to store unauthorized copyright material, they cannot be said to have not been warned.
FORBES: Kim Dotcom's New MEGA Encrypted Cloud Storage: See No Evil, Store No Evil
Dolan knew that Oprea later attempted to use the stolen data to make unauthorized charges on, or transfers of funds from, the accounts.
Alleviating fears that authorities might "search" the sample for unauthorized purposes, Ferrara said state law limits the use of the sample to law enforcement purposes.
Thereafter, Butu admitted to attempting to use the stolen data for the purpose of making unauthorized charges on, or transfers of funds from, the accounts.
It's a sad day for Spanish content pirates, as formerly lax laws allowing P2P file sharing for personal use have just been overturned in favor of strict new rules that make file swappers financially liable for any unauthorized downloading they partake in.
We might also have received evidence that previous threats made by senior military officers to use China's modernizing offensive ballistic missile force to attack Los Angeles or other American targets were not unauthorized statements by "rogue" officers, but reflect official policy for dealing with what the Communists call "the main enemy, " namely the United States.
CENTERFORSECURITYPOLICY: Who Pulled the Plug on the Chinese ��Bugs'?
应用推荐