Search Results for: TEC

steganography

steganography (steg-[schwa]-nog-r[schwa]-fee), n. A cryptographic method that digitally embeds or encodes one item of information within another. • Because a digitized audio or visual file usu. has unused data areas, indelible (and nearly undetectable) information can be added without altering the file’s quality. Copyright or trademark tags can be hidden in every fragment of a […]

steganography Read More »

conflict preemptionsee obstacle preemption

Garmon preemption. Labor law. A doctrine prohibiting state and local regulation of activities that are actually or arguably (1) protected by the National Labor Relations Act’s rules relating to the right of employees to organize and bargain collectively, or (2) prohibited by the National Labor Relations Act’s provision that governs unfair labor practices. San Diego

conflict preemptionsee obstacle preemption Read More »

design review

design review. A process by which a building permit is not issued until the proposed building meets the architectural standards established by land-use regulations. — Also termed architectural review. [Cases: Zoning and Planning 431–446. C.J.S. Zoning and Land Planning §§ 198, 204–211, 213–216.]

design review Read More »

notice pleading

notice pleading 告知诉答 只需作简洁、清楚的陈述,足以使对方当事人知晓自己的诉讼请求或答辩理由,而非对与诉讼请求或答辩理由相关的任何事实都作专门性描述〔technical account〕的诉答。美国《联邦民事诉讼规则》〔Federal Rules of Civil Procedure〕及在绝大多数州的民事诉讼中都采用此种诉答程序,但在一些复杂案件中也经常会要求当事人在诉答中对某些实质性的细节加以陈述。

notice pleading Read More »

chance medley

chance-medley. [fr. Anglo-Norman chance medlee “chance scuffle”] A spontaneous fight during which one participant kills another in self-defense. — Also termed chaud-medley; casual affray. Cf. MEDLEY. “But the self-defence, which we are now speaking of, is that whereby a man may protect himself from an assault, or the like, in the course of a sudden

chance medley Read More »

key encryption

key encryption. A software-cryptography system that generates and employs a secure key pair, one public key and one private key, to verify a digital signature and decipher a secure, coded document. • The public key is known to all possible receivers of a message. The private key is known only to the message’s sender. Key

key encryption Read More »

incentive to disclose theory

incentive-to-disclose theory. Patents. The economic theory justifying the grant of patent rights based on the social benefit of having the information enter the public domain. • Without the incentive, the argument goes, the technical advancements would remain trade secrets and the duplication of research efforts would be a waste to society. Cf. INCENTIVE-TO-COMMERCIALIZE THEORY; INCENTIVE-TO-DESIGN-AROUND

incentive to disclose theory Read More »

Scroll to Top