Search for: "Transit System Security"
Results 101 - 120
of 4,611
Sorted by Relevance
|
Sort by Date
18 Sep 2015, 7:14 pm
Food System” in the Federal Register. [read post]
4 Nov 2014, 6:58 am
Many companies offer "secure messaging" products - but how can users know if these systems actually secure? [read post]
31 Mar 2015, 11:31 am
From my perspective, the transitional aspects of a merger, acquisition, spin-off or divestiture must help achieve the following:Ensuring a Competitive Edge & Risk Avoidance - In the new economy (characterized by rapid change, innovation being seen more like "table stakes" than a differentiator, technology-driven efficiency gains, increasing cyber/security risks and globalized competition), the transition services must position the post-closing enterprise to… [read post]
9 Apr 2014, 9:12 am
The law shall include ways to ensure its correct implementation and a transition path from the existing unencrypted systems In short, they propose the EU require fairly stringent confidentiality structures from digital communications “appliances”, typically smart phones, but also tablets and computers which have a microphone or earphone included and can install voice-over-IP software. [read post]
22 May 2012, 10:00 am
The system also includes tools to combat fraud and identify national security concerns. [read post]
27 Apr 2023, 5:31 am
This can be accomplished via veteran-transition programs, offering certification and an entry-level career pathway to individuals with a proven track record of service in high-stakes capacities. [read post]
16 Sep 2008, 8:41 pm
Community Security is the eighth Best Practices report developed by the Foundation.The new report addresses association security obligations; security services; video surveillance and alarm systems; access control systems for vehicles and pedestrians; automated gate systems, and more. [read post]
8 Jan 2020, 2:50 pm
The report also notes that there has been progress in the derivatives and securities market, but lending markets have been slower in the transition, stating that the “[t]ransition away from LIBOR in particular requires significant commitment and sustained effort from both financial and non-financial firms across many jurisdictions to reduce risks to financial stability ahead of the end of 2021. [read post]
4 Dec 2018, 8:47 pm
Learn about the transition. govinfo is more than just a website – In addition to providing an advanced, metadata-powered search experience, govinfo also includes a content management system and a standards-compliant preservation repository. [read post]
28 Nov 2017, 12:55 pm
Access and Authentication Require credentials to authenticate users and securely store credentials on systems. [read post]
7 May 2019, 11:36 am
This is a guest post from Ben Heath, Acting Assistant Professor of Lawyering at NYU Law This series reconstructs the idea that the Russia — Transit panel report on the GATT security exception was a “constitutional moment” for the WTO. [read post]
7 May 2019, 11:36 am
This is a guest post from Ben Heath, Acting Assistant Professor of Lawyering at NYU Law This series reconstructs the idea that the Russia — Transit panel report on the GATT security exception was a “constitutional moment” for the WTO. [read post]
24 Jan 2010, 11:09 am
On the one-year anniversary of implementing the Electronic System for Travel Authorization, the Department of Homeland Security’s U.S. [read post]
4 Jan 2019, 5:10 am
National Security Risks from Business-to-Business Relationships with Foreign Companies Three examples illustrate national security risks from vendor relationships in ways that are not addressed by the current CFIUS system. [read post]
5 Nov 2018, 11:56 am
For many years, registered patent attorneys, patent agents, and some pro se inventors have been able to log into a secure portal at the Patent Office website to file and monitor patent applications. [read post]
31 Aug 2012, 10:25 am
All communication is encrypted with 256-bit SSL encryption in transit and all Personal Identifiable Information (i.e., Social Security number and date of birth) is encrypted “at rest” at 128-bit AES, so data is always secure. [read post]
3 Feb 2023, 2:00 am
And though it’s always been important, the accelerated transition to remote work worldwide has made cybersecurity more important for businesses to prioritize than ever before. [read post]
13 Jul 2022, 7:00 am
The Roosevelt administration addressed the newfound systemic risks by asking Congress to enact bold legislation, including the 1935 Social Security Act, the Fair Labor Standards Act, and the National Labor Relations Act. [read post]
3 Apr 2017, 11:00 am
It now appears that he needed to view computer systems within the National Security Council that would include the logs of Rice's requests to unmask U.S. persons.... [read post]
11 Nov 2020, 8:50 pm
This statement complements the statement on the use of UK data in ESMA’s databases and performance of MiFID II calculations after the end of the transition period on 31 December 2020, and provides further details related to the operational use of ESMA’s IT systems during the period following the end of the transition period on 31 December 2020. [read post]