Yahoo provides a compliance guide for law enforcement that outlines Yahoo's legal contact information, properties and services, procedures for preservation requests, service of process, NCMEC reporting, cost reimbursement, and emergency disclosures. The guide summarizes what types of user information and account contents Yahoo can provide for properties like Mail, Chat, Groups, Flickr, GeoCities, and Profiles in response to legal process. It also covers data retention periods, sample request language, and Yahoo's partnerships with other companies.
This document provides tips and strategies for using technology in litigation, including:
1) Recommendations for affordable scanning and video equipment for use in the office.
2) Free and low-cost options for transcription services.
3) The importance of reviewing a client's social media presence and making posts private or removing incriminating information.
4) Strategies for gathering information from an opposing party's website using archive.org before content is changed or deleted.
5) Considerations for properly authenticating electronic evidence for admission in court.
This document provides tips and strategies for using technology in litigation, including:
1) Recommendations for affordable technology tools for scanning documents, recording video, and transcribing audio in the office.
2) Guidance on extracting text from files and reviewing a client's social media presence and electronically stored information.
3) Suggestions for researching defendants' websites using archive.org and ensuring electronically stored evidence is properly authenticated for admission in court.
This document discusses the implications of social networking and e-discovery in litigation. It notes that social networking is growing rapidly and will likely become as widespread as email. This means that social media activity and online posts will be considered electronically stored information subject to e-discovery rules. Lawyers should advise clients and witnesses to avoid posting about ongoing litigation and should consider social media as a source of information about witnesses or parties. The document also discusses authentication of social media evidence and considerations around privacy and ethics.
This is a Policy Primer for online photo sharing service, Flickr. Examines some of the terms of services and privacy policies that we so easily overlook when signing up. A Net303 assignment for BA(Internet Communications) @ Curtin.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Yahoo's Lawsuit Against Former Employee for Leaking Information to PressTric Park
Yahoo filed a lawsuit against Cecile Lal, who it identified as a former chief of staff to a senior vice president at the company, in Santa Clara County superior court. The claim alleges breach of contract and breach of a fiduciary duty of loyalty by Lal, who it says leaks confidential information to author and journalist Nicholas Carlson.
Verizon acquired Yahoo for $4.83 billion in July 2016. Yahoo, founded in 1994, was struggling with its transition to mobile and social media while Verizon wanted to expand in digital media and advertising. The acquisition combined Yahoo's popular websites and 600 million monthly users with Verizon's 100 million wireless customers. It created one of the largest online media companies and aimed to boost Verizon's mobile and video businesses to compete with companies like Facebook and Netflix. However, some saw risks in integrating the companies and doubted whether the value of Yahoo's assets justified the purchase price.
Dear Reader, this book is designed to provide you the necessary insights to move beyond simply storing data and into creating a framework under which data can be intelligently governed for the length of time it has value to your business or regulations require it to be kept (whichever is greater).
We hope you find this book insightful — allowing you and your
organization to accelerate your ability to enact intelligent data
governance.
This document provides tips and strategies for using technology in litigation, including:
1) Recommendations for affordable scanning and video equipment for use in the office.
2) Free and low-cost options for transcription services.
3) The importance of reviewing a client's social media presence and making posts private or removing incriminating information.
4) Strategies for gathering information from an opposing party's website using archive.org before content is changed or deleted.
5) Considerations for properly authenticating electronic evidence for admission in court.
This document provides tips and strategies for using technology in litigation, including:
1) Recommendations for affordable technology tools for scanning documents, recording video, and transcribing audio in the office.
2) Guidance on extracting text from files and reviewing a client's social media presence and electronically stored information.
3) Suggestions for researching defendants' websites using archive.org and ensuring electronically stored evidence is properly authenticated for admission in court.
This document discusses the implications of social networking and e-discovery in litigation. It notes that social networking is growing rapidly and will likely become as widespread as email. This means that social media activity and online posts will be considered electronically stored information subject to e-discovery rules. Lawyers should advise clients and witnesses to avoid posting about ongoing litigation and should consider social media as a source of information about witnesses or parties. The document also discusses authentication of social media evidence and considerations around privacy and ethics.
This is a Policy Primer for online photo sharing service, Flickr. Examines some of the terms of services and privacy policies that we so easily overlook when signing up. A Net303 assignment for BA(Internet Communications) @ Curtin.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Yahoo's Lawsuit Against Former Employee for Leaking Information to PressTric Park
Yahoo filed a lawsuit against Cecile Lal, who it identified as a former chief of staff to a senior vice president at the company, in Santa Clara County superior court. The claim alleges breach of contract and breach of a fiduciary duty of loyalty by Lal, who it says leaks confidential information to author and journalist Nicholas Carlson.
Verizon acquired Yahoo for $4.83 billion in July 2016. Yahoo, founded in 1994, was struggling with its transition to mobile and social media while Verizon wanted to expand in digital media and advertising. The acquisition combined Yahoo's popular websites and 600 million monthly users with Verizon's 100 million wireless customers. It created one of the largest online media companies and aimed to boost Verizon's mobile and video businesses to compete with companies like Facebook and Netflix. However, some saw risks in integrating the companies and doubted whether the value of Yahoo's assets justified the purchase price.
Dear Reader, this book is designed to provide you the necessary insights to move beyond simply storing data and into creating a framework under which data can be intelligently governed for the length of time it has value to your business or regulations require it to be kept (whichever is greater).
We hope you find this book insightful — allowing you and your
organization to accelerate your ability to enact intelligent data
governance.
there are 6 questions. Answer in question format not a paper.Examp.docxsusannr
there are 6 questions. Answer in question format not a paper.
Example Question 1 answer
Question 2 answer....
And so on
1. Describe the intricacies of planning for a Windows Media Services deployment and how the process would differ between a highly secure installation versus an enterprise without highly sensitive data to protect, but a need for quick collaboration with widely varying clients
2. Discuss SharePoint services and various SharePoint options as well as Windows Media Rights Management to handle the requirements of different enterprise scenarios, such as one that requires the use of quick collaboration and the use of video resource-sharing vs. the needs of collaboration between a geographically diverse workgroup needing to share sensitive files and monitor file access and changes.
3. take a position on whether the Windows Media Right Management (DRM) is similar to the Public Key Infrastructure (PKI) in server 2008.
4. In January 2012, the U.S. court put the Megaupload site offline after an operation led by the FBI authorities accused Megaupload, a site that lets you store files online, of violating copyright laws and facilitating piracy. At the same time, YouTube, a similar site, is protected from shutdown and lawsuits by the "Safe Harbor" provision of the Digital Millenium Copyright Act. It states that a host is not responsible for copyrighted materials uploaded by users as long as they can be taken down when requested by the copyright holders. Take a stance on the U.S. authorities’ decision and discuss the ethical concerns of copyrighted materials online. State if this shutdown will help deter piracy and why YouTube should or should not be shut down.
5. Imagine you are an administrator for a large corporation that has just purchased a new company. To access some of the HR resources, a Website was created. Discuss the manner in which you can use the purchased company’s usernames and passwords to provide authentication and authorization to the parent Website. The goal is to allow employees from the new company to use their own user account and password to access the new Website.
6. Using the scenario from question (5) of this discussion, suppose an additional Website was created that will be used to input confidential information by users. Your task is to ensure that when data is entered by the user and sent to the Web server, the data that is sent over the network is encrypted. Recommend the approach you would use to secure this information. Additionally, provide specifics on the manner in which digital certificates are used in encrypting the data.
.
This document discusses improving information management through SharePoint 2007 and SharePoint 2010. It provides an overview of several chapters that will be covered, including recapping SharePoint 2007, discussing ISO 15489 and how it relates to records management and SharePoint, using document sets, taxonomies, versioning and metadata navigation in SharePoint, and configuring content hubs and managed metadata services. The presentation aims to explain how SharePoint can support information and records management according to international standards.
The document discusses data breaches, including common causes such as human error, malware attacks, overly permissive access controls, and insider misuse. Major consequences are financial losses from responding to the breach, reputational damage to the company, potential legal actions, and loss of sensitive customer data. A case study describes a 2021 breach of LinkedIn where a hacker scraped and leaked data for 700 million users. Recommendations to prevent breaches include identifying sensitive data, limiting access, strong passwords, encryption, staff training, and regularly assessing risks.
Yahoo! Groups is a communication tool provided by Yahoo that allows users to participate in online forums and mailing lists. It is important for users to read the Yahoo! Groups terms of service (TOS) which outlines important policies regarding content ownership, privacy, and data sharing. The TOS explains that Yahoo! may share user information with partners and uses cookies for advertising. It also covers Yahoo's monitoring of content for inappropriate language, protections for children's accounts, and banning of pornography.
nThis is a discussion on Protection of Private Information in SharePoint and also PII information and the South African Law impact. Also applicable to privacy, security and governance in general in SharePoint 2010
Incident handling and Response - YAHOO UNAUTHORIZED ACCESS (DATA BREACH).pdfSathishKumar960827
Yahoo was the victim of a significant cybersecurity attack in 2013, it was the greatest known attack on their computer network. All three billion user accounts' sensitive information, including names, birth dates, phone numbers, and passwords, were accessed by cybercriminals. In addition, the hackers acquired backup email addresses and security questions, which were useful details for breaking into other accounts belonging to the same user.
The cyberattack seriously hurt Yahoo's reputation and business operations. The disclosure of the vulnerabilities almost averted the company's $4.48 billion (about $14 per person in the US) sale to Verizon. Due to the security breaches, Verizon dropped its original offer by $350 million. After the breaches were made public, Yahoo was subject to several shareholder lawsuits, which might have increased Verizon's financial obligations.
In addition, the attack had a serious negative effect on the impacted users. There was a higher danger of account takeovers and email phishing because many of the three billion Yahoo accounts belonged to customers who shared their login information across numerous websites, products, and services. The hackers might be able to access the victims' bank accounts thanks to the information they obtained.
The incident additionally impacted cybersecurity to a greater extent. The cybersecurity experts team advised that the breach highlighted the risks of using the same passwords frequently and underlined the significance of using stronger passwords from now on. It raised concerns regarding nation-state hacking and cyber warfare that the attackers were thought to be Russian and potentially connected to the Russian government.
In summary, both Yahoo and its customers suffered significantly because of the 2013 cyberattack on the Yahoo business. It highlighted the importance of security and the risks of password reuse. It brought up concerns alongside nation-state cyber monitoring and cyber warfare. To protect their business's operations and reputation, organizations must take proactive measures to protect their networks and stop cyberattacks.
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
This document discusses social media as a new format for records and issues around managing records in social media. It notes that social media content may be considered government records but capturing authentic copies can be challenging given the dynamic nature of social media. It also discusses jurisdiction issues and privacy concerns around data collection by corporations and governments from social media and online activities.
This document discusses social media and recordkeeping obligations for government agencies. It defines social media as web-based platforms that allow users to create and share content. When used for government business, social media interactions like comments and replies are considered government records. The document provides guidance on capturing, storing, and managing these social media records in accordance with privacy, copyright, and records management laws. Agencies are advised to review their social media use, identify risks, and provide staff training and standard methods for properly capturing social media records.
This document discusses Megan Hargroder's background as a TV news reporter and social media workshop host. It then outlines strategies for using social media and video for law firms and solo practitioners, including the importance of video content, types of lawyer videos, video production tips, and recommended social media platforms. It also provides tips for listing optimization, automation of social media posts, using social media for listening, and thinking creatively about business development outside traditional methods.
Facilitated this workshop for Political Science 152 students of UP Manila last March 3, 2012 for their "Laws in Persuasion: An Alternative Classroom Learning Experience on Lobbying Law and strategies in the Philippines".
This document is Yahoo!'s annual report (Form 10-K) filed with the SEC, providing an overview of Yahoo!'s business for the fiscal year ending December 31, 2001. It discusses Yahoo!'s properties and services across six vertical areas including listings, media/finance/information, commerce, communications, enterprise solutions, and access/distribution. It describes Yahoo!'s financial reporting structure and provides details on the key properties and services within each vertical area.
This document is Yahoo!'s annual report (Form 10-K) filed with the SEC for the fiscal year ending December 31, 2001. It provides an overview of Yahoo's business including its operations, properties, services, and financial reporting structure. The report discusses Yahoo's listings, media, finance, information, commerce, and communications properties. It also describes Yahoo's sources of revenue and organizational structure.
This document is Yahoo!'s annual report (Form 10-K) filed with the SEC for the fiscal year ending December 31, 2001. It provides an overview of Yahoo's business including its operations, properties, services, and financial reporting structure. The report discusses Yahoo's listings, media, finance, information, commerce, and communications properties. It also describes Yahoo's sources of revenue and organizational structure.
The document discusses how video rights can become separated from content over time as it passes through many hands and systems. This can lead to issues like not knowing what content a company has rights to use, distribute, or monetize. The document provides warning signs that rights have been mishandled, such as internal complaints about the time it takes to get rights information or not being sure royalty checks are accurate. It argues that understanding how rights are managed across a company's workflows and systems is important for protecting assets and maximizing their value now and in the future.
Pre -Trial Discovery: 5 Essentials for Lawyers Supplementing Interrogatories ...James Cortopassi
When conducting pre-trial discovery, lawyers should inquire about electronically stored information including email accounts, social media accounts, cloud-based applications, text messages, loose files, and data retention policies. The document provides guidance on questions to ask about these topics when drafting interrogatories or requesting documents. It also notes that most corporate documents are now electronic and outlines resources for more information on discovery in the digital age.
This chapter discusses how information technology supports organizational performance in turbulent business environments. It defines key terms like information systems, information technology, and the digital economy. It also explains how business pressures, organizational responses, and IT are related and how IT can provide competitive advantage through strategies like supply chain management, data analytics, and social computing. The chapter outlines concepts that will be covered in more detail later like Porter's value chain, social networks, and managerial issues related to IT.
Salesforce - Implicit Sharing, Record Locks & SkewsNora Nicklis
This is the slide deck of our Kickoff Saima - Session (Salesforce Architects in the Making)
The recording can be found on YouTube, through the following link:
https://youtu.be/bp3xFNRk7mM
The content is aimed towards Salesforce professionals, preparing for their technical architect journey.
It covers two topics:
- Implicit Sharing
- Record Locks & Skews
The document discusses the effects of inflation and interest rates on exchange rates between currencies. It notes that if a country's inflation rate rises relative to another's, it will increase demand for the other country's currency, decrease supply, and strengthen its value. It also states that if a country's interest rates fall relative to another's, it will increase demand for the other's currency, decrease its supply, and increase its equilibrium value. The document provides examples of how these macroeconomic factors impact currency exchange rates and international trade.
Cover Story - China's Investment Leader - Dr. Alyce SUmsthrill
In World Expo 2010 Shanghai – the most visited Expo in the World History
https://www.britannica.com/event/Expo-Shanghai-2010
China’s official organizer of the Expo, CCPIT (China Council for the Promotion of International Trade https://en.ccpit.org/) has chosen Dr. Alyce Su as the Cover Person with Cover Story, in the Expo’s official magazine distributed throughout the Expo, showcasing China’s New Generation of Leaders to the World.
there are 6 questions. Answer in question format not a paper.Examp.docxsusannr
there are 6 questions. Answer in question format not a paper.
Example Question 1 answer
Question 2 answer....
And so on
1. Describe the intricacies of planning for a Windows Media Services deployment and how the process would differ between a highly secure installation versus an enterprise without highly sensitive data to protect, but a need for quick collaboration with widely varying clients
2. Discuss SharePoint services and various SharePoint options as well as Windows Media Rights Management to handle the requirements of different enterprise scenarios, such as one that requires the use of quick collaboration and the use of video resource-sharing vs. the needs of collaboration between a geographically diverse workgroup needing to share sensitive files and monitor file access and changes.
3. take a position on whether the Windows Media Right Management (DRM) is similar to the Public Key Infrastructure (PKI) in server 2008.
4. In January 2012, the U.S. court put the Megaupload site offline after an operation led by the FBI authorities accused Megaupload, a site that lets you store files online, of violating copyright laws and facilitating piracy. At the same time, YouTube, a similar site, is protected from shutdown and lawsuits by the "Safe Harbor" provision of the Digital Millenium Copyright Act. It states that a host is not responsible for copyrighted materials uploaded by users as long as they can be taken down when requested by the copyright holders. Take a stance on the U.S. authorities’ decision and discuss the ethical concerns of copyrighted materials online. State if this shutdown will help deter piracy and why YouTube should or should not be shut down.
5. Imagine you are an administrator for a large corporation that has just purchased a new company. To access some of the HR resources, a Website was created. Discuss the manner in which you can use the purchased company’s usernames and passwords to provide authentication and authorization to the parent Website. The goal is to allow employees from the new company to use their own user account and password to access the new Website.
6. Using the scenario from question (5) of this discussion, suppose an additional Website was created that will be used to input confidential information by users. Your task is to ensure that when data is entered by the user and sent to the Web server, the data that is sent over the network is encrypted. Recommend the approach you would use to secure this information. Additionally, provide specifics on the manner in which digital certificates are used in encrypting the data.
.
This document discusses improving information management through SharePoint 2007 and SharePoint 2010. It provides an overview of several chapters that will be covered, including recapping SharePoint 2007, discussing ISO 15489 and how it relates to records management and SharePoint, using document sets, taxonomies, versioning and metadata navigation in SharePoint, and configuring content hubs and managed metadata services. The presentation aims to explain how SharePoint can support information and records management according to international standards.
The document discusses data breaches, including common causes such as human error, malware attacks, overly permissive access controls, and insider misuse. Major consequences are financial losses from responding to the breach, reputational damage to the company, potential legal actions, and loss of sensitive customer data. A case study describes a 2021 breach of LinkedIn where a hacker scraped and leaked data for 700 million users. Recommendations to prevent breaches include identifying sensitive data, limiting access, strong passwords, encryption, staff training, and regularly assessing risks.
Yahoo! Groups is a communication tool provided by Yahoo that allows users to participate in online forums and mailing lists. It is important for users to read the Yahoo! Groups terms of service (TOS) which outlines important policies regarding content ownership, privacy, and data sharing. The TOS explains that Yahoo! may share user information with partners and uses cookies for advertising. It also covers Yahoo's monitoring of content for inappropriate language, protections for children's accounts, and banning of pornography.
nThis is a discussion on Protection of Private Information in SharePoint and also PII information and the South African Law impact. Also applicable to privacy, security and governance in general in SharePoint 2010
Incident handling and Response - YAHOO UNAUTHORIZED ACCESS (DATA BREACH).pdfSathishKumar960827
Yahoo was the victim of a significant cybersecurity attack in 2013, it was the greatest known attack on their computer network. All three billion user accounts' sensitive information, including names, birth dates, phone numbers, and passwords, were accessed by cybercriminals. In addition, the hackers acquired backup email addresses and security questions, which were useful details for breaking into other accounts belonging to the same user.
The cyberattack seriously hurt Yahoo's reputation and business operations. The disclosure of the vulnerabilities almost averted the company's $4.48 billion (about $14 per person in the US) sale to Verizon. Due to the security breaches, Verizon dropped its original offer by $350 million. After the breaches were made public, Yahoo was subject to several shareholder lawsuits, which might have increased Verizon's financial obligations.
In addition, the attack had a serious negative effect on the impacted users. There was a higher danger of account takeovers and email phishing because many of the three billion Yahoo accounts belonged to customers who shared their login information across numerous websites, products, and services. The hackers might be able to access the victims' bank accounts thanks to the information they obtained.
The incident additionally impacted cybersecurity to a greater extent. The cybersecurity experts team advised that the breach highlighted the risks of using the same passwords frequently and underlined the significance of using stronger passwords from now on. It raised concerns regarding nation-state hacking and cyber warfare that the attackers were thought to be Russian and potentially connected to the Russian government.
In summary, both Yahoo and its customers suffered significantly because of the 2013 cyberattack on the Yahoo business. It highlighted the importance of security and the risks of password reuse. It brought up concerns alongside nation-state cyber monitoring and cyber warfare. To protect their business's operations and reputation, organizations must take proactive measures to protect their networks and stop cyberattacks.
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
This document discusses social media as a new format for records and issues around managing records in social media. It notes that social media content may be considered government records but capturing authentic copies can be challenging given the dynamic nature of social media. It also discusses jurisdiction issues and privacy concerns around data collection by corporations and governments from social media and online activities.
This document discusses social media and recordkeeping obligations for government agencies. It defines social media as web-based platforms that allow users to create and share content. When used for government business, social media interactions like comments and replies are considered government records. The document provides guidance on capturing, storing, and managing these social media records in accordance with privacy, copyright, and records management laws. Agencies are advised to review their social media use, identify risks, and provide staff training and standard methods for properly capturing social media records.
This document discusses Megan Hargroder's background as a TV news reporter and social media workshop host. It then outlines strategies for using social media and video for law firms and solo practitioners, including the importance of video content, types of lawyer videos, video production tips, and recommended social media platforms. It also provides tips for listing optimization, automation of social media posts, using social media for listening, and thinking creatively about business development outside traditional methods.
Facilitated this workshop for Political Science 152 students of UP Manila last March 3, 2012 for their "Laws in Persuasion: An Alternative Classroom Learning Experience on Lobbying Law and strategies in the Philippines".
This document is Yahoo!'s annual report (Form 10-K) filed with the SEC, providing an overview of Yahoo!'s business for the fiscal year ending December 31, 2001. It discusses Yahoo!'s properties and services across six vertical areas including listings, media/finance/information, commerce, communications, enterprise solutions, and access/distribution. It describes Yahoo!'s financial reporting structure and provides details on the key properties and services within each vertical area.
This document is Yahoo!'s annual report (Form 10-K) filed with the SEC for the fiscal year ending December 31, 2001. It provides an overview of Yahoo's business including its operations, properties, services, and financial reporting structure. The report discusses Yahoo's listings, media, finance, information, commerce, and communications properties. It also describes Yahoo's sources of revenue and organizational structure.
This document is Yahoo!'s annual report (Form 10-K) filed with the SEC for the fiscal year ending December 31, 2001. It provides an overview of Yahoo's business including its operations, properties, services, and financial reporting structure. The report discusses Yahoo's listings, media, finance, information, commerce, and communications properties. It also describes Yahoo's sources of revenue and organizational structure.
The document discusses how video rights can become separated from content over time as it passes through many hands and systems. This can lead to issues like not knowing what content a company has rights to use, distribute, or monetize. The document provides warning signs that rights have been mishandled, such as internal complaints about the time it takes to get rights information or not being sure royalty checks are accurate. It argues that understanding how rights are managed across a company's workflows and systems is important for protecting assets and maximizing their value now and in the future.
Pre -Trial Discovery: 5 Essentials for Lawyers Supplementing Interrogatories ...James Cortopassi
When conducting pre-trial discovery, lawyers should inquire about electronically stored information including email accounts, social media accounts, cloud-based applications, text messages, loose files, and data retention policies. The document provides guidance on questions to ask about these topics when drafting interrogatories or requesting documents. It also notes that most corporate documents are now electronic and outlines resources for more information on discovery in the digital age.
This chapter discusses how information technology supports organizational performance in turbulent business environments. It defines key terms like information systems, information technology, and the digital economy. It also explains how business pressures, organizational responses, and IT are related and how IT can provide competitive advantage through strategies like supply chain management, data analytics, and social computing. The chapter outlines concepts that will be covered in more detail later like Porter's value chain, social networks, and managerial issues related to IT.
Salesforce - Implicit Sharing, Record Locks & SkewsNora Nicklis
This is the slide deck of our Kickoff Saima - Session (Salesforce Architects in the Making)
The recording can be found on YouTube, through the following link:
https://youtu.be/bp3xFNRk7mM
The content is aimed towards Salesforce professionals, preparing for their technical architect journey.
It covers two topics:
- Implicit Sharing
- Record Locks & Skews
The document discusses the effects of inflation and interest rates on exchange rates between currencies. It notes that if a country's inflation rate rises relative to another's, it will increase demand for the other country's currency, decrease supply, and strengthen its value. It also states that if a country's interest rates fall relative to another's, it will increase demand for the other's currency, decrease its supply, and increase its equilibrium value. The document provides examples of how these macroeconomic factors impact currency exchange rates and international trade.
Cover Story - China's Investment Leader - Dr. Alyce SUmsthrill
In World Expo 2010 Shanghai – the most visited Expo in the World History
https://www.britannica.com/event/Expo-Shanghai-2010
China’s official organizer of the Expo, CCPIT (China Council for the Promotion of International Trade https://en.ccpit.org/) has chosen Dr. Alyce Su as the Cover Person with Cover Story, in the Expo’s official magazine distributed throughout the Expo, showcasing China’s New Generation of Leaders to the World.
Satta matka fixx jodi panna all market dpboss matka guessing fixx panna jodi kalyan and all market game liss cover now 420 matka office mumbai maharashtra india fixx jodi panna
Call me 9040963354
WhatsApp 9040963354
DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KALYAN FIX JO...essorprof62
DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KALYAN FIX JODI ANK LEAK FIX GAME BY DP BOSS MATKA SATTA NUMBER TODAY LUCKY NUMBER FREE TIPS ...
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART KALYAN CHART
Discover the Beauty and Functionality of The Expert Remodeling Serviceobriengroupinc04
Unlock your kitchen's true potential with expert remodeling services from O'Brien Group Inc. Transform your space into a functional, modern, and luxurious haven with their experienced professionals. From layout reconfiguration to high-end upgrades, they deliver stunning results tailored to your style and needs. Visit obriengroupinc.com to elevate your kitchen's beauty and functionality today.
Enhancing Adoption of AI in Agri-food: IntroductionCor Verdouw
Introduction to the Panel on: Pathways and Challenges: AI-Driven Technology in Agri-Food, AI4Food, University of Guelph
“Enhancing Adoption of AI in Agri-food: a Path Forward”, 18 June 2024
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
The Most Inspiring Entrepreneurs to Follow in 2024.pdfthesiliconleaders
In a world where the potential of youth innovation remains vastly untouched, there emerges a guiding light in the form of Norm Goldstein, the Founder and CEO of EduNetwork Partners. His dedication to this cause has earned him recognition as a Congressional Leadership Award recipient.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART INDIA MATKA KALYAN SATTA MATKA 420 INDIAN MATKA SATTA KING MATKA FIX JODI FIX FIX FIX SATTA NAMBAR MATKA INDIA SATTA BATTA
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
Prescriptive analytics BA4206 Anna University PPTFreelance
Business analysis - Prescriptive analytics Introduction to Prescriptive analytics
Prescriptive Modeling
Non Linear Optimization
Demonstrating Business Performance Improvement
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women MagazineCIOWomenMagazine
In this article, we will dive into the extraordinary life of Ellen Burstyn, where the curtains rise on a story that's far more attractive than any script.
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
Yahoo Compliance Guide for Law Enforcement
1. COMPLIANCE GUIDE FOR
LAW ENFORCEMENT
Yahoo! Inc. Compliance Team
Phone: 408-349-3687
Fax: 408-349-7941
2. TABLE OF CONTENTS
Page
I. YAHOO! LEGAL CONTACT INFORMATION.......................................................................6
II. GENERAL INFORMATION ...................................................................................................6
III. YAHOO! PROPERTIES AND SERVICES ............................................................................6
General Information about Yahoo! and Yahoo! IDs................................................................................................................. 7
Yahoo! Mail .................................................................................................................................................................................. 7
Yahoo! Chat/Messenger............................................................................................................................................................... 8
Flickr ............................................................................................................................................................................................. 8
Yahoo! Groups ............................................................................................................................................................................. 9
Yahoo! GeoCities, Domains, Web-Hosting, and Stores .......................................................................................................... 10
Yahoo! Answers.......................................................................................................................................................................... 10
Yahoo! Profiles ........................................................................................................................................................................... 10
Yahoo! Partnerships .................................................................................................................................................................. 10
IV. PRESERVATIONS ..............................................................................................................11
V. SERVICE OF PROCESS ....................................................................................................11
VI. NCMEC REPORTING PROCEDURES...............................................................................12
VII. COST REIMBURSEMENT POLICY....................................................................................12
VIII. EMERGENCY DISCLOSURES...........................................................................................12
IX. CONSENT ...........................................................................................................................13
APPENDIX A ............................................................................................................................................................................. 14
Sample Preservation Request Letter ........................................................................................................................................ 14
APPENDIX B ............................................................................................................................................................................. 15
Sample Language for Subpoenas, Court Orders, and Search Warrants .............................................................................. 15
Sample Subpoena Wording for Identification of a Yahoo! User ............................................................................................ 15
Sample Subpoena Wording for Information About a Yahoo! Group and its Moderators....................................................... 15
Sample Search Warrant Wording for Information Related to a Yahoo ID ............................................................................. 15
Sample Search Warrant Wording for Information about a Group and its contents................................................................. 15
-2-
4. COMPLIANCE GUIDE AT A GLANCE
How do I contact Yahoo! Legal?
Questions: Compliance Team
Yahoo! Inc.
701 First Avenue
Sunnyvale, California 94089
408-349-3687 (tel.)
Subpoenas/Other
Service of Process: Fax requests for documents to Custodian of Records at 408-349-7941.
Subpoenas for in-person testimony must be personally served.
After-hours
emergencies: Yahoo! Security at 408-349-5400
General Tips:
o Include a Yahoo! ID or Yahoo! email address in your request.
o Before making a request, check to see if the information sought is publicly available. See
http://help.yahoo.com to find publicly available information.
o Make requests as specific and narrowly tailored as possible.
What Information Can Yahoo! Provide?
o Subscriber Information
Subscriber information supplied by the user at the time of registration, including name,
location, date account created, and services used.
IP addresses associated with log-ins to a user account are available for up to one year.
Registration IP address data available for IDs registered since 1999.
o Yahoo! Mail (including email associated with specific properties such as Personals, Small
Business, Domains, and Flickr)
Any email available in the user’s mail account, including IP address of computer used to
send email.
Yahoo! is not able to search for or produce deleted emails.
Note that Yahoo! now hosts two new email domains: ymail.com and rocketmail.com.
o Yahoo! Chat/Messenger
Friends List for Yahoo! Messenger.
Time, date, and IP address logs for Chat and Messenger use within the prior 45-60 days.
Archives of Messenger communications may be available on the user’s computer if the
user has chosen to archive communications.
Archives of Web Messenger communications may be stored on Yahoo! servers if at least
one party to the communication chose to archive communications.
o Yahoo! Groups
Member list, email addresses of members, and date when members joined the Group.
Information about Group moderators.
Contents of the Files, Photos, and Messages sections.
Group activity log describing when members subscribe and unsubscribe, post or delete
files, and similar events.
Note: Message Archive does not contain attachments to messages.
o Yahoo! GeoCities, Domains, Web-hosting, and Stores
Active files user has uploaded to the website and date of file upload.
For stores, may have store transactional data.
-4-
5. o Yahoo! Flickr
Contents in Flickr account and comments on other users’ photos.
IP address and timestamp of content uploaded to account.
Flickr Groups to which a user belongs and Group content.
o Yahoo! Profiles
Contents of a user’s profile.
Time, date, and IP address logs of content added.
Does Yahoo! partner with other companies?
o Yahoo! has a co-branded service with AT&T. For customers with email addresses that have an
SBC or AT&T suffix, AT&T has the primary customer relationship. In such cases, it is most
appropriate to direct legal process first to AT&T.
o Yahoo! also has partnerships with Verizon, Rogers (Canada), and BT (UK).
Will Yahoo! preserve information?
o Yahoo! will preserve subscriber/customer information for 90 days. Yahoo! will preserve information
for an additional 90-day period upon receipt of a request to extend the preservation.
o If Yahoo! does not receive formal legal process for the preserved information before the end of the
preservation period, the preserved information may be deleted when the preservation period
expires.
DATA AVAILABILITY AT A GLANCE
Record Type Accessible for? Purged After?
Subscriber Information As long as account is active 18 months of inactivity or 90 days
if subscriber self-deletes account
Account Log-in IP addresses Up to one year N/A
Email (free or premium) As long as user chooses to keep it 4 or more months of inactivity
depending on how long user’s
account was open
Flickr Account Contents, including As long a account is active Upon deactivation of account
Flickr Email (Email stored as long as user chooses
to keep it)
Groups – Activity Logs Life of the Group Minimum of 30 days after
termination of Group
Groups – Content Life of the Group (only current version Minimum of 30 days after
of Group stored; not past versions) termination of Group
Chat/Instant Messenger Logs 45-60 days N/A
Web Messenger Contents As long as user chooses to keep it N/A
(Yahoo! does not store contents of
communications sent via the
downloadable Messenger client)
GeoCities, Domains, Web-hosting – As long as website or domain is active Minimum of 30 days after
Activity Logs and Content termination of website or domain
Profiles As long as the Profile is active Minimum of 90 days after
deactivation
-5-
6. I. YAHOO! LEGAL CONTACT INFORMATION
Compliance Team
Yahoo! Inc.
701 First Avenue
Sunnyvale, California 94089
Phone: 408-349-3687
Fax: 408-349-7941
Please address all subpoenas and other legal process to the Custodian of Records at the above address.
If you need to speak to someone at Yahoo!, the phone number listed above will allow you to leave a message in the
voicemail for the Compliance Team. Yahoo! will use its best efforts to return all calls during the same business day,
or within 24 hours, depending on call volume.
II. GENERAL INFORMATION
This compliance guide is designed to assist law enforcement in understanding Yahoo!’s policies and practices with
regard to retention and disclosure of electronic information and to provide answers to frequently asked questions
related to subpoenas and other legal process. The policies and procedures in this guide are subject to change
without notice, and this document is not meant to be distributed to individuals or organizations that are not
law enforcement entities, including Yahoo! customers, consumers, or civil litigants. Nothing in this guide is
intended to create any enforceable rights against Yahoo!. Yahoo! will make reasonable efforts to advise law
enforcement of significant changes in policies or procedures through updates to this guide.
Law enforcement should be aware that Yahoo! provides its users with a variety of different products and services,
many of which are free and some of which require separate log-ins or subscriptions and generate separate
electronic records. In Yahoo!’s experience, the majority of law enforcement requests seek general information
about a Yahoo! user or information specific to a particular Yahoo! service. Accordingly, in crafting a subpoena,
court order, or search warrant for such information, law enforcement should be as specific as possible. Narrowly
tailored requests yield significantly faster results, create fewer opportunities for misinterpretation, and generate
lower reimbursable costs under the Electronic Communications Privacy Act, 18 U.S.C. § 2701, et seq. (“ECPA”) and
other federal statutes.
Law enforcement also should be aware that a great deal of the information that is subpoenaed from Yahoo! each
year is publicly available information that can be viewed without any assistance from Yahoo!. For example, many
Yahoo! Groups can be found through a search at groups.yahoo.com. Similarly, websites hosted on Yahoo!’s
servers can be accessed by members of the public.
Yahoo! recommends that you visit Yahoo!’s help pages before you seek to obtain information from Yahoo!. Help
pages also provide valuable information on how services work, their features and options, and what information may
be available publicly or through legal process.
A menu to all of Yahoo!’s help pages can be found at
http://help.yahoo.com.
III. YAHOO! PROPERTIES AND SERVICES
Yahoo! Inc. is a global Internet business and consumer services company that offers a comprehensive branded
network of properties and services, many of which are free, to more than 500 million unique users worldwide.
Currently, Yahoo! has about 230 million registered users.
Due to the differences among the many properties and services offered by Yahoo!, the amount of information, if
any, maintained by Yahoo! about its customers and subscribers varies. Moreover, as a public provider of electronic
communications services and remote computing services, the disclosure of information maintained by Yahoo! is
governed in large part by the ECPA, among other federal and state statutes. A detailed application of these laws to
-6-
7. all of the types of information held or maintained by Yahoo! is beyond the scope of this guide. This guide provides
basic guidance as to the information most frequently requested by law enforcement from Yahoo! regarding its key
consumer properties, including Yahoo!’s normal retention periods, and the legal process that will allow for
production of the requested information.
General Information about Yahoo! and Yahoo! IDs
Signing up for a Yahoo! ID is free. To obtain a Yahoo! ID, Yahoo! requests certain information during the
registration process. This information is not verified by Yahoo! but is used to help confirm the user’s identity for
1
password changes and other customer service requests. For each Yahoo! ID, Yahoo! may have the following
information: name, home address, business address, phone, time zone, birthday, gender, occupation, alternate
email address, registration IP address, date account was created, and current account status. Not all of the fields of
information requested at registration are required.
Please always provide a Yahoo! ID when requesting subscriber information. Requests based on proper
names or IP addresses, for example, render inaccurate results and often no results.
For a specified Yahoo! ID, Yahoo! can determine which services the subscriber uses, whether the subscriber has
2
configured the “My Yahoo” service, whether the subscriber has a public profile, and whether the subscriber has
paid for any Yahoo! premium services. If the user has subscribed to a premium service, Yahoo! will have a credit
card number on file for that subscriber.
Yahoo! will be unable to search for and produce deleted material, including email and Group posts, unless such
request is received within 24 hours of the deletion and is specifically requested by proper legal process. In most
cases where deleted content is requested, Yahoo! will seek reimbursement for any engineer time incurred in
connection with the request.
Yahoo! IDs remain active so long as the subscriber has logged into the account in the prior eighteen (18) months.
After 18 months of inactivity, the ID may be deactivated and the account data deleted. If a subscriber self-deletes
an account, then after 90 days the ID may be deactivated and the account data deleted.
To the extent available, basic subscriber information provided in response to criminal or administrative subpoenas
will include information the user provided to Yahoo! during the registration process, except for information not
specifically enumerated in 18 U.S.C. 2703(c)(2), such as date of birth, gender, and occupation. Other subscriber
records, including full registration data and transactional records (e.g., email headers, Groups activity logs,
messenger logs, chat logs), may be obtained through a court order issued under 18 U.S.C. § 2703(d).
Yahoo! maintains logs of IP addresses associated with account log-in in an accessible format for up to one year. In
addition, since 1999, Yahoo! has collected the IP address used to register a Yahoo! ID. Such information is
retained as part of our basic subscriber information and is available to the extent the user’s account is stored in our
system, as described above.
Yahoo! Mail
Yahoo! has both free and premium mail services. Yahoo!’s free services are web-based only, while premium
members can get POP and SMTP access to Yahoo!’s mail servers using any email client. Yahoo! now offers
unlimited storage for its free mail services. Users who purchase Yahoo!’s premium mail services get email with no
graphical ads, the ability to have offline access (with POP) and mail forwarding, and Spamguard Plus. Current
information about premium mail services is available at http://mailplus.mail.yahoo.com.
Yahoo! now hosts two new email domains: rocketmail.com and ymail.com. The Yahoo! ID for a ymail or rocketmail
user is the full email account name (e.g., “accountholder@ymail.com,” whereas the Yahoo! ID for a @yahoo email
address is merely the name before the “@” sign (e.g., “accountholder” where the email address is
“accountholder@yahoo.com”). This means that Yahoo! may have three subscribers with these three similar IDs:
1
Yahoo! does not maintain passwords in an accessible format.
2
A user’s Yahoo! profile may available to the public depending on a user’s profile privacy setting. Please visit profiles.yahoo.com.
-7-
8. “johndoe@yahoo.com,” johndoe@ymail.com,” and johndoe@rocketmail.com,” where the three Yahoo! IDs are,
respectively, “johndoe,” “johndoe@ymail.com,” and “johndoe@rocketmail.com”.
Every message sent by a Yahoo! mail user contains the originating IP address in the header. That is, Yahoo!
records the IP address of the computer that was used to send the email, and Yahoo! inserts that IP address in the
header of the message. Accordingly, if law enforcement is seeking to determine the IP address from which a
Yahoo! email was sent, Yahoo! will have no additional information other than what is visible in the message itself.
The relevant line from the header will generally look like this:
Received: from [65.207.97.120] by web41705.mail.yahoo.com via HTTP; Fri, 05 Sep 2003 07:30:05 PDT
In this example, the IP address in brackets corresponds to the computer from which the message was sent.
For more information on email headers and IP addresses, please see:
http://help.yahoo.com/help/us/mail/spam/spam-05.html.
Yahoo! retains a user’s incoming mail as long as the user chooses to store such messages in their mail folders and
the user’s email account remains active. Yahoo! retains a user’s sent mail only if the user sets their email account
options to save sent mail and has not subsequently deleted specific messages. Once the trash folder has been
emptied, which usually occurs automatically within 24 hours of when the user has placed messages in the trash
folder, Yahoo! will be unable to search for and produce deleted emails. Yahoo! may set an email account to inactive
status and delete all account contents after at least four (4) months of inactivity.
Yahoo! Chat/Messenger
Yahoo! Chat and Messenger are two distinct Yahoo! products, although users may only access Chat rooms via
Yahoo! Messenger. Yahoo! also offers users two forms of Messenger – a downloadable client or a version that is
accessible on the web. Web-based Messenger may be accessed at messenger.yahoo.com or it may be accessed
by users of Yahoo!’s new mail interface.
For Yahoo! Chat and all forms of Messenger, Yahoo! has log information regarding the use of the services. Yahoo!
maintains a “Friends List” for users of Yahoo! Messenger and can determine from its logs the time and date that a
user logged into Messenger or Chat (in the prior 45-60 days) and the IP address used. Yahoo! also can retrieve
from its Chat and Messenger logs the names of the chat rooms that the user accessed and the Yahoo! IDs of the
other people with whom a user communicated through Messenger during the prior 45-60 days. In order to search
these logs, a Yahoo! ID and a specific time frame, preferably no more than three days, must be provided.
Yahoo! does not stored content for the downloadable Messenger client. Yahoo! Messenger client users can archive
Messenger communications, however, by storing the archives locally on their PC or on whatever media they
designate. If a user has archived Messenger communications, the archives can be viewed locally through the
Messenger client resident on the user’s computer.
For web-based Messenger, Yahoo! may be able to access the content of communications if at least one party to the
communication elected to archive the conversation on Yahoo!’s servers. Again, this is for web-based Messenger
only. Yahoo! does not archive the content of communications for the downloadable Messenger client.
Yahoo! does not store the content for Yahoo! Chat. Yahoo! Chat made several product changes in 2005. In July
2005, Yahoo! suspended users’ ability to create their own chat rooms. In October 2005, Yahoo! restricted access to
the Chat product to only those users who are registered as being 18 years of age or older. The “teen” category and
any associated chat rooms were removed. Finally, when users log in to Chat, Yahoo! now displays users’ IP
addresses to them and gives them notice that their IP addresses are being recorded.
Flickr
Flickr is Yahoo!’s free online photo management and sharing application. Free users are able to upload 100MB
worth of photos each calendar month. Users may upgrade to FlickrPro – a premium service that allows users to
-8-
9. pay for unlimited photo uploads (up to 20MB per photo). Pro users also are able to upload videos (90 seconds
maximum length per video).
All Flickr accounts are identified uniquely in the URL for the account. The URL either will reflect a user’s NSID (a
unique alphanumeric code assigned to a user) or a user-created personalized URL (e.g.,
http://flickr.com/photos/username). In addition, each Flickr user has a unique email account that is separate from
their Yahoo! Mail. Flickr also offers users the ability to create and join Flickr Groups and to comment on their own
and others’ photos.
Flickr users may keep their photos private, share them with friends and/or family, or make their photos public.
Users also may classify photos as “safe” (suitable for a global, public audience); “moderate” (some photo content
may be considered as offensive by some people); or “restricted” (photo content is unsuitable for minors and may be
considered offensive by some people).
If provided with a Yahoo! ID, Flickr URL, or Flickr NSID, Yahoo! has the ability to produce subscriber information for
the account-holder. As long as the Flickr account is active, Yahoo! has the ability to produce content in the account
– with associated upload IP addresses and date and time – as well as the email and Groups information for the
account.
Yahoo! no longer offers the Yahoo! Photos service.
Yahoo! Groups
Yahoo! Groups is a free service that allows Yahoo! users to communicate with other people with similar interests.
Each Yahoo! Group has at least one owner or moderator who sets the topic and rules for the Group, including
whether membership is open to the public, restricted so that moderators must approve all requests for membership,
or closed so that only invited members can join. The Group owner or moderator also determines whether or not the
Group is listed in the Groups directory. A Group owner may name additional moderators. Each member of a Group
can select a delivery option – whether they want to receive every email message sent to the Group, a digest of
messages, or no email. Users are not required to have a Yahoo! ID to participate in Groups and may choose to
subscribe using email addresses. However, Group members with Yahoo! IDs also may (or in the alternative) read
messages through the Group website instead of electing to receive email.
Each Yahoo! Group has several sections for user-generated content available on the Group website. These
sections include Messages, Files, Photos, Links, Polls, Calendar, and Database. In addition to the materials from
these sections, a member list, including a list of all current members of the Group, their partial email addresses (the
name before the “@” symbol), and when they joined the Group, also is available to members of the Group for
restricted Groups, or may be available to the general public for public Groups.
For Groups that are publicly accessible to other Yahoo! users, all of the Groups’ content, including the Yahoo! ID
and email address of the moderator(s) may be available through the Group’s website. Yahoo! maintains no
additional files, photos, or messages that cannot be obtained through the Group’s website. In addition, the Yahoo!
ID or email address of members who posted files or photos is also apparent from a public Group’s website. For
Groups that are not publicly accessible, Yahoo! can produce the Group’s contents as they would be seen by one of
the Group’s private members.
Yahoo! maintains information about Group moderators, as well as an activity log for each Group. The Group activity
log is a transactional log that indicates when members have subscribed or unsubscribed from the Group, posted or
deleted files or polls, or other similar events. Not all Group activities are logged, however. For example, the reading
of messages or downloading of files or photos is not logged.
Although the Group Message archive maintains messages sent to Group members, the message archive does not
contain any attachments to the messages. Yahoo! does not maintain those attachments in any form.
For current Groups, Yahoo! retains information relating to the moderator, members, and the active contents of the
Files, Photos, and Messages sections. If a Group has been deactivated or deleted, information about the Group
may be preserved for approximately 30 days, after which the information may be deleted.
-9-
10. Yahoo! GeoCities, Domains, Web-Hosting, and Stores
Yahoo! operates GeoCities, a web-hosting service that provides both free and premium hosting options. All Yahoo!
IDs come with a “www.geocities.com/your-Yahoo!-ID” web address that users may choose whether or not to use.
Premium GeoCities members can register (or transfer) their own domain name and host their website with
GeoCities. For GeoCities websites, Yahoo! will have basic Yahoo! registration information about the user who
posted the page. Yahoo! also will have the active files that the user has uploaded to the website, including the date
on which the file was uploaded.
Yahoo! also operates premium small business web-hosting services and free and premium domain services. Users
may register unique domain names and host their websites on Yahoo!. Web-hosting and Domains service
packages also provide users with domain-based email accounts. The storage capacity for the websites and the
number of email addresses per domain are determined by the package for which a user registers. For web-hosting
and domains, Yahoo! will have basic Yahoo! registration information about the user who posted the page. Yahoo!
also will have the active files that the user has uploaded to the website, including the date on which the files were
uploaded, and the domain-based email that is available to the user. Deleted email is not available.
Yahoo! offers a merchant hosting solution as well. If a user pays for and uses this add-on package to Yahoo!’s
web-hosting service in order to operate an online store, Yahoo! will have transactional information for the online
merchant’s customers, including items purchased and customer billing and shipping information.
Yahoo! Answers
Answers is a site that allows users to post questions and solicit answers. The user who asks the question can vote
which answer is the best one to the question asked. Each question and answer has a unique URL with a “QID“
code. Answers is a text-only site. The only images that appear are those associated with a user’s nickname.
For Answers, Yahoo! has available the subscriber information associated with a posted question or answer,
including the IP address and date and time of posting. Law enforcement seeking information about a specific
posting should, where possible, provide Yahoo! with the unique URL of that posting when requesting information.
Yahoo! Profiles
Yahoo! Profiles is a central control panel for online activity, making it easy for people to manage their identity,
activities, interest, and connections and giving users the opportunity to share this information on the web.
Each Yahoo! Profile includes a basic user card that includes a user’s photo (or avatar), nickname, name, age, sex,
and location. The Profile also gives users the ability to post basic information about their school, work, interests,
relationship status, etc. Users will be able to see the other users they are connected to as friends, and there is a
section on the profile where a user can see updates from his or her connections. Each profile also includes a
“guestbook” where visitors to a profile page can add comments.
Users have the ability to make their profiles searchable by nickname, by first and last name, and by email address.
Alternatively, users can hide their profiles from appearing in public search results. Users also have the ability to
make their entire profile hidden from the world, or to only share their profile with their friends or “connections,” or to
make their profile publicly available. The URL of a profile contains unique identifying information for a user’s profile,
so law enforcement should provide that URL to Yahoo! when requesting information about a user’s profile.
Yahoo! stores the content of the current version of a user’s profiles. Yahoo! also logs the IP addresses and dates
and times of new content added to a profile (e.g., guestbook comment, newly uploaded photos).
Yahoo! Partnerships
Yahoo! has a co-branded service with AT&T (formerly SBC). For AT&T Yahoo! DSL and Dial-up customers, AT&T
provides users with Internet access, and Yahoo! provides content and communications services available through
the Yahoo! network. Many users who have an AT&T/SBC or AT&T/SBC-affiliated company email address may be
-10-
11. AT&T Yahoo! customers (for example, users with email addresses ending with @sbcglobal.net may be AT&T
Yahoo! customers). AT&T has a billing relationship with all AT&T Yahoo! customers. Legal process should be
directed to AT&T first. In circumstances where Yahoo! may have additional information regarding a user’s account,
AT&T may direct law enforcement to Yahoo! for more information. In these instances, Yahoo! may have
information regarding the use of Yahoo! services, as well as email account contents.
Yahoo! has partner relationships with other companies, including Verizon Online, British Telecom, and Rogers.
Depending on the specific arrangements of each partnership, Yahoo!’s partner may have the primary customer
relationship, and it may be more appropriate to direct legal process first to the partner rather than Yahoo!.
Depending on the particular partnership, Yahoo! may or may not have information about the user.
IV. PRESERVATIONS
Pursuant to 18 U.S.C. 2703(f), Yahoo! will preserve information related to a subscriber or customer for 90 days,
which may be extended for an additional 90 days by a request to extend the preservation. For best handling, we
request that preservation requests be sent by fax to 408-349-7941. Please be as specific as possible in describing
the information you would like Yahoo! to preserve and only request preservation for those materials that you intend
to obtain legal process to receive. Please reference the initial preservation request (by date and case name or
number) when sending legal process to obtain the preserved information. Also, please indicate whether the
preserved information will satisfy the request or whether the request seeks the preserved information as well as
other information that may have been added to the account between the preservation date and the date of the
3
request that may be available. If Yahoo! does not receive a request for extension or formal legal process by the
end of the 90 day preservation period, the preserved information may be deleted.
V. SERVICE OF PROCESS
Yahoo! generally will accept service of court orders, search warrants, and criminal grand jury or administrative
subpoenas for the production of documents by fax from government entities.
Yahoo! will not accept service by fax of any subpoena purporting to call for the in-person testimony of
Yahoo! witnesses.
Yahoo! will provide a certification of authenticity along with the production of records.
In general, law enforcement can expect Yahoo!’s responses to legal process to conform with the Electronic
Communications Privacy Act as described below. Yahoo! is both an Electronic Communications Service Provider
(ECS) and a Remote Computing Service Provider (RCS). Yahoo! is an ECS for communications including but not
limited to email and Messenger, and Yahoo! is an RCS for purposes including but not limited to storage of photos
and files.
Subpoena 2703(d) Order Search Warrant
• Basic subscriber information • Transactional records (e.g., • Contents in electronic storage
• Contents of communications on Messenger or Chat logs, IP for 180 days or less
RCS* address information associated
with any activity other than log-
• Contents in electronic storage • Anything obtainable with
in)
for over 180 days* subpoena or 2703(d) order
• Anything obtainable with a
subpoena*
* Yahoo! will ask law enforcement to certify that the prior or delayed notice provisions have been satisfied if contents
are sought with legal process other than a Search Warrant.
3
Please note that requests to collect information regarding a user’s account on a forward-going basis require the appropriate
surveillance orders (such as a Title III Order).
-11-
12. VI. NCMEC REPORTING PROCEDURES
Yahoo! has worked with law enforcement and the National Center for Missing and Exploited Children (NCMEC) to
develop practices for reporting instances of apparent child pornography (CP) as required by 18 U.S.C. § 2258A.
Yahoo! may learn about possible CP on its network from a variety of sources, including abuse reports from users,
tips from NCMEC and law enforcement, and internal proactive efforts using a combination of technological and
human resources.
Upon becoming aware of CP, Yahoo! Customer Care disables public access to material and escalates the material
to Yahoo!’s legal department, which will review the material and determine whether it is required to be reported to
NCMEC. Users reported to NCMEC for child pornography-related incidents are terminated from Yahoo!’s service at
the time of reporting.
In keeping with recent changes in Federal law, the information Yahoo! reports to NCMEC includes, when available:
• A user’s Yahoo! ID and/or unique NSID for Flickr and/or website domain for hosted sites;
• The user’s registration IP address and registration date and time and/or the IP address and date and
time of upload of a photo image or other content;
• The images themselves; and
• Information about whether the subject account is already under investigation by law enforcement.
VII. COST REIMBURSEMENT POLICY
Federal law (See 18 U.S.C. § 2706) requires law enforcement to reimburse providers like Yahoo! for costs incurred
responding to subpoena requests, court orders, or search warrants. Yahoo! generally requests reimbursement
when responding to legal process, except that Yahoo! maintains an exception to this policy for cases involving the
abduction or exploitation of children. Yahoo! may waive reimbursement in specific cases or recognize additional
exceptions to this policy in the future.
Yahoo! will seek reimbursement based on the actual time expended by Yahoo!’s compliance staff in complying with
the request. The average costs related to compliance matters are listed below for your convenience. These
estimates are neither a ceiling nor a floor but represent the average costs of typical searches. Time spent may vary
considerably based on the wording of the request and the information available about the user. These time
estimates are also based on narrowly tailored requests that do not require extensive searches in multiple
databases. These estimates are not price quotes, budgets, or guarantees and should not be used for budgeting
purposes. Yahoo! reserves the right to adjust its estimates and reimbursement charges as necessary.
• Basic subscriber records: approx. $20 for the first ID, $10 per ID thereafter
• Basic Group Information (including information about moderators): approx. $20 for a group with a
single moderator
• Contents of subscriber accounts, including email: approx. $30-$40 per user
• Contents of Groups: approx. $40 - $80 per group
VIII. EMERGENCY DISCLOSURES
Under 18 U.S.C. §§ 2702(b)(7) and 2702(c)(4) Yahoo! is permitted, but not required, to voluntarily disclose
information, including contents of communications and customer records, to a federal, state, or local governmental
entity if Yahoo! believes in good faith that an emergency involving imminent danger of death or serious physical
injury to any person requires such disclosure without delay. In order to assist Yahoo! in exercising its discretion,
Yahoo! requests that, where possible, Yahoo!’s Emergency Disclosure Request Form be completed, or the
-12-
13. information requested by this form be conveyed to Yahoo! by some other means. (See Appendix C) Without such
information, it will be difficult, if not impossible, for Yahoo! to determine the nature of the emergency and the need
for an immediate response. The Emergency Disclosure Request must be submitted by a law enforcement officer.
If you need to get in touch with Yahoo! after hours for an emergency request, the most reliable way is to contact
Yahoo! Security at 408-349-5400, who will in turn page a member of Yahoo!’s compliance team. Alternatively, you
may contact the San Jose FBI Office, who will contact Yahoo! personnel. Please note that contacting Yahoo!
compliance via the San Jose FBI Office may not necessarily be as efficient for an emergency response.
IX. CONSENT
In order for Yahoo! to turn over any information to law enforcement based on a user’s consent to search, the user’s
signed consent must be accompanied by a subpoena, and Yahoo! must be able to successfully verify the account of
the user whose information is being sought. Along with the user’s signed consent and a detailed description of the
information the user is requesting from Yahoo!, the user must provide the information requested in the Sample
Consent to Search Form to Yahoo! in writing. (See Appendix D) If the user is unable to verify ownership of the
account by providing registration information that matches what is in Yahoo!’s records, Yahoo! will be unable to
produce records pursuant to the user consent.
-13-
14. APPENDIX A
Sample Preservation Request Letter
Compliance Team
Yahoo! Inc.
701 First Avenue
Sunnyvale, California 94089
Fax: 408-349-7941
Dear Custodian of Records:
This letter serves as a formal request for the preservation of records and other evidence pursuant to 18
U.S.C. § 2703(f) pending further legal process. For the Yahoo! subscriber ID [INSERT ID, email address, Group
name, Flickr NSID, Flickr URL, or Profile URL], you are hereby requested to preserve, for a period of 90 days, the
records described below currently in your possession.
This request applies only retrospectively. It does not in any way obligate Yahoo! to capture and preserve
new information that arises after the date of this request. This preservation request specifically applies to all records
and other evidence relating to the subscriber(s), customer(s), account holder(s), or other entity(ies) associated with
the subscriber(s) identified above, including, without limitation, [include as may be relevant]:
• Subscriber names, user names, screen names, or other identities;
• Mailing addresses, residential addresses, business addresses, email addresses, telephone numbers,
and other contact information;
• Billing records;
• Information about length of service and the types of services the subscriber(s) or customer(s) used;
• Any other identifying information, whether such records are in electronic or other form;
• Connection logs and records of user activity for the subscriber(s) identified above, including log-in
history and records identifying sent and received communications;
• All communications stored in the account(s) of the subscriber(s) identified above; and
• All files that are controlled by user accounts associated with the subscriber(s) identified above.
At this time we are expecting to obtain formal legal process within 90 days. We acknowledge that if we do not serve
legal process upon you in the next 90 days and do not request a 90-day extension, the preserved information may
no longer be available.
-14-
15. APPENDIX B
Sample Language for Subpoenas, Court Orders, and Search Warrants
Sample Subpoena Wording for Identification of a Yahoo! User
Any and all records regarding the identification of a user with the Yahoo! ID “___________” or Yahoo! email account
“____________________________,” to include name and address; Yahoo! email address; alternate email address;
IP address and date and time of registration; account status; and log-in IP addresses associated with session times
and dates.
Note: If Credit card numbers are sought, please identify any Yahoo! premium service used by the subscriber, if
known, and insert: “credit card numbers used by the Yahoo! user to pay for Yahoo! premium services [or the name
of the specific Yahoo! premium service used].”
Sample Subpoena Wording for Information About a Yahoo! Group and its Moderators
For the Yahoo! Group known as __________, email addresses for all moderators and members of the Group, the
date the Group was created, the Group/List ID, and Group description.
Any and all records regarding the identification of the owners and/or moderators of the Yahoo! Group listed above,
to include name and address; Yahoo! email address; alternate email address; IP address and date and time of
registration; account status; and log-in IP addresses associated with session times and dates.
Sample Search Warrant Wording for Information Related to a Yahoo ID
Any and all information for Yahoo! ID “_______” or Yahoo! email account “_____________________,” to include
name and address; Yahoo! email address; alternate email address; IP address and date and time of registration;
account status; and log-in IP addresses associated with session times and dates.
(If information related to email content is sought, add)
For the subscriber identified in Paragraph A above, the contents of any and all emails stored in the subscriber’s
Yahoo! account. [NOTE: Email content stored in domain-based email accounts hosted on Yahoo! or Flickr email
must be requested explicitly.]
(If information is sought related to stored Yahoo! Briefcase files or Flickr photos, add)
Any and all contents of electronic files that the subscriber has stored in the subscriber’s Briefcase and/or Flickr
account.
(If Friends List information is sought, add)
Any and all Yahoo! IDs listed on the subscriber’s Friends list.
(If information related to payments is sought, add)
Any and all methods of payment provided by the subscriber to Yahoo! for any premium services.
Sample Search Warrant Wording for Information about a Group and its contents
A. The identity of the moderators and members of the Yahoo! Group known as ___________, including the
date the Group was created, the Group ID, the dates that members joined the group, and the delivery options for the
current members.
B. The current contents of the Files, Photos, Links, and Polls section of the Yahoo! Group known as
_____________ and the archived message posts, and all records relating to the activities of the Group members,
as reflected in the Group Activity Log.
-15-
16. APPENDIX C
Yahoo! Emergency Disclosure Request
Please respond to the questions on this form to assist Yahoo! in determining whether to exercise its discretion to
disclose information to you pursuant to 18 U.S.C. § 2702(b)(8) and § 2702(c)(4). Please fax this completed form to
us at 408-349-7941. For an after-hours emergency, please send it by email to page-legalpoc@yahoo-inc.com.
During business hours, please call 408-349-3687 with any questions about this form. If Yahoo! does not receive
sufficient information in writing or verbally, Yahoo! may not be able to make an emergency disclosure under federal
law. Please make sure you specify the Yahoo! ID for which the information is being requested.
1. What is the nature of the emergency involving death or serious physical injury?
2. Whose death or serious physical injury is threatened?
3. What is the imminent nature of the threat? Please provide information that suggests that there is a specific
deadline before which it is necessary to receive the requested information and/or that suggests that there is a
specific deadline on which the act indicated in response to Question 1 will occur (e.g., tonight, tomorrow at
noon)).
4. Please explain why the normal disclosure process (including any statutory emergency procedures) would be
insufficient or untimely in light of the deadline set forth in Question 3.
5. What specific information in Yahoo!’s possession related to the emergency are you seeking to receive on an
emergency basis? SPECIFY THE YAHOO! ID FOR WHICH THE INFORMATION IS BEING REQUESTED.
(Note: Please do not respond by asking for everything Yahoo! has in its possession as such response will likely
result in delaying or denying this request.)
6. Please explain/describe how the information you request will assist in averting the threatened death or serious
physical injury.
7. If email sent from a Yahoo! account is the basis for the belief that there is a risk of imminent harm, please
attach a copy of the email message(s) to this form.
I declare under penalty of perjury that the foregoing is true and correct.
_________________________________________ ____________________________
Signature of Law Enforcement Officer Date
_____________________________________________________________________________________
Printed Name of Law Enforcement Officer, Title, and Agency
-16-
17. APPENDIX D
Sample Consent to Search Form
(This request must be accompanied by a subpoena and a cover letter or fax
bearing the official seal of the requesting agency)
I, __________________________ the account holder of the Yahoo! account with Yahoo! ID ___________________
understand that my account is being sought in connection with an official law enforcement investigation. As part of
that investigation, I hereby grant my consent to authorize the following agency:
______________________________________________, to receive, review, copy, and otherwise obtain access to
all information of any kind held by Yahoo! relating to my accounts and any and all accounts that I have linked to the
following Yahoo! ID ______________________, including but not limited to information about my identity, my online
activities, and the contents of all electronic files or communications maintained by Yahoo! related to me or my ID.
Pursuant to the consent I hereby request that the following specific information be provided:
____________________________________________________________________________________________
____________________________________________________________________________________________
In connection with this authority to release information, I do hereby agree to hold harmless and do forever hold
harmless Yahoo! for the disclosure of such information and do forever waive on my behalf, and on behalf of my
heirs and assigns, any and all claims resulting from Yahoo!’s disclosure of any information related to my account
pursuant to this authorization.
The following information should be used by Yahoo! to verify my identity:
Login name/Yahoo! ID ______________________________________________
Yahoo! email address ______________________________________________
Alternate email address ______________________________________________
Birthday (as indicated on this account) ______________________________________________
Answer to secret question ______________________________________________
(Contact Yahoo! Compliance for secret question)
City, state, and zip ______________________________________________
Gender ______________________________________________
________________________________ _____________________________
Yahoo! user’s signature Date
-17-