Search for: "Technical Security Integration, Inc." Results 41 - 60 of 311
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
8 Jan 2020, 2:27 pm by Rob Robinson
” KLDiscovery has a long history of successfully integrating companies it acquires into its global network. [read post]
  This potentially dangerous precedent  could disincentivize companies from taking data security steps if companies cannot get universal application (which is often technically and administratively difficult). [read post]
5 Apr 2009, 1:26 pm
The SEC also launched an investigation of credit rating agencies, and, on February 2, 2009, adopted amendments to the rules governing nationally recognized statistical rating organizations to address concerns about the integrity of the process by which rating agencies rate structured finance products.[12] The SEC has filed civil charges against a number of market participants. [read post]
30 Apr 2018, 2:00 am
The Board compared the claims to the dynamic-display electronic securities trading claims in Trading Technologies International, Inc. v. [read post]
1 May 2018, 1:09 pm
The Board compared the claims to the dynamic-display electronic securities trading claims in Trading Technologies International, Inc. v. [read post]
22 Apr 2011, 9:14 am by Hunton & Williams LLP
uses commercially reasonable physical, managerial, and technical safeguards to preserve the integrity and security of your personal information,” the company failed to use any form of encryption to protect the PII, which was stored in “clear” or “plain text” format, and did not use “hashing, salting, or any other common and reasonable method of data protection and therefore drastically exacerbated the consequences of a hacker bypassing… [read post]
31 Jan 2008, 2:34 am
--(BUSINESS WIRE)--Cataphora, Inc., an industry-leading provider of software for review and analysis of electronic data, today announced the immediate availability of the Cataphora Collection Engine, which has been built from the ground up for both technically sound and legally defensible collection of electronic data from IT systems. [read post]
9 Sep 2015, 2:21 pm by Cynthia Marcotte Stamer
Solutions Law Press, Inc. is happy to share information about this upcoming free health industry study group meeting on 9/15/2015 in Irving, Texas. [read post]
27 Sep 2023, 12:45 pm by The White Law Group
FINRA arbitration can be a complex and technical process, and having an experienced attorney who is knowledgeable about securities law can greatly increase your chances of success. [read post]
3 Jun 2015, 7:55 am by Andrew Reich
These written policies and procedures must be reasonably designed to (1) insure the security and confidentiality of customer records and information; (2) protect against any anticipated threats or hazards to the security or integrity of customer records and information; and (3) protect against unauthorized access to or use of customer records or information that could result in substantial harm or inconvenience to any customer. [read post]
23 Jul 2019, 9:30 am by Rob Robinson
Despite its failure to implement basic security measures, Equifax’s privacy policy at the time stated that it limited access to consumers’ personal information and implemented “reasonable physical, technical and procedural safeguards” to protect consumer data. [read post]
In Article 2 of its 2015 National Security Law, China defined national security to mean “the relative absence of international or domestic threats to the state’s power to govern, sovereignty, unity and territorial integrity, the welfare of the people, sustainable economic and social development, and other major national interests, and the ability to ensure a continued state of security. [read post]
10 Apr 2017, 12:22 pm by Dave Aitel
In this piece, I first critique elements of their proposal, and then recommend a different direction for setting cyber policy efforts—one rooted in a technical background—along with a new proposal for limiting our systemic risk in the financial arena based on existing practice among technical practitioners of offensive information security. [read post]