Search for: "Technical Security Integration, Inc." Results 161 - 180 of 311
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
17 Mar 2016, 12:30 pm by John Chierichella and Keith Szeliga
This rule is applied with equal force by the Court of Federal Claims, L-3 Communications Integrated Systems, L.P. v. [read post]
13 Jan 2016, 5:05 pm by Kevin LaCroix
  Cyber-attacks involving the theft of intellectual property can result in a company’s immediate or even permanent loss of revenue and reputation; cyber-attacks involving denial of services (such as a website being shut down by nefarious hackers) can disrupt or forever diminish consumer or customer confidence; cyber-attacks involving exfiltration of private company emails can have a tumultuous impact upon senior management and create an international uproar; cyber-attacks involving… [read post]
8 Dec 2015, 2:22 pm by Ben Vernia
  The government depends on contractors to feed, clothe, and equip our troops for combat; for the military aircraft, ships, and weapons systems that keep our nation secure; as well as to provide everything that is needed to fund myriad programs at home. [read post]
23 Nov 2015, 9:27 am by Ruth Levush
Such rules require states to refrain from threatening or using force against the territorial integrity of other states (article 2(4) of the UN Charter), except with authorization by the UN Security Council to maintain or restore international peace and security (under Chapter VII of the UN Charter); or for self-defense (under article 51 of the Charter). [read post]
14 Oct 2015, 12:07 pm by Jennifer Granick
Attorney’s office in Brooklyn sought to compel Apple, Inc. to disable the security on a locked Apple device the government had authority to search pursuant to an earlier warrant. [read post]
1 Oct 2015, 1:42 pm by WOLFGANG DEMINO
Contract terms will be given their plain, ordinary, and generally accepted meanings, unless the contract indicates a technical or different sense. [read post]
1 Oct 2015, 1:42 pm by MOTP
Contract terms will be given their plain, ordinary, and generally accepted meanings, unless the contract indicates a technical or different sense. [read post]
9 Sep 2015, 2:21 pm by Cynthia Marcotte Stamer
Solutions Law Press, Inc. is happy to share information about this upcoming free health industry study group meeting on 9/15/2015 in Irving, Texas. [read post]
21 Aug 2015, 6:07 pm by Cynthia Marcotte Stamer
Employers sponsoring health plans and members of their management named as plan fiduciaries or otherwise having input or oversight over the health plan should verify their company’s group health plan meets the out-of-pocket maximum rules of the Patient Protection and Affordable Care Act (ACA) § 1302(c)(1) as well as a long list of other federal health benefit rules to minimize the risk that violations will obligate the sponsoring employer to self-assess, self-report on IRS Form 8928, and… [read post]
21 Aug 2015, 11:24 am by Cynthia Marcotte Stamer
Employers sponsoring health plans and members of their management named as plan fiduciaries or otherwise having input or oversight over the health plan should verify their company’s group health plan meets the out-of-pocket maximum rules of the Patient Protection and Affordable Care Act (ACA) § 1302(c)(1) as well as a long list of other federal health benefit rules to minimize the risk that violations will compel the sponsoring employer to self-assess, self-report on IRS Form 8928, and… [read post]
6 Aug 2015, 6:21 pm by Kevin LaCroix
Cybersecurity is a business imperative, yet too often cybersecurity is too far down on a C-Suite priority list—or because it is so complex, simply delegated to lower level technical personnel. [read post]
1 Jul 2015, 7:34 am by Schachtman
Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579 (1993), and related cases.[6]” The court in Ladd Furniture v. [read post]
3 Jun 2015, 7:55 am by Andrew Reich
These written policies and procedures must be reasonably designed to (1) insure the security and confidentiality of customer records and information; (2) protect against any anticipated threats or hazards to the security or integrity of customer records and information; and (3) protect against unauthorized access to or use of customer records or information that could result in substantial harm or inconvenience to any customer. [read post]
28 May 2015, 4:00 am by Ken Chasse
They constantly move among systems; transmission creating a “weak link” as to proving integrity. [read post]
11 May 2015, 2:18 pm by Chuck Cosson
  “Privacy” issues generally concerned security in private correspondence through the mails, privacy in one’s home, effects, and telephone calls, rights of the press to publish gossip (and photographs) about named individuals, and access to records a government  held about a named individual.[6]  Whether data was “personal” – linked to a named individual – was rarely at issue in the case of addressed correspondence, private homes,… [read post]
18 Mar 2015, 8:51 am by WIMS
<> Natural Resources Commission to meet Thursday in Roscommon – MDNR Director Creagh is scheduled to announce his decisions on several land transactions, including a revised land transaction application submitted by Graymont, Inc. -- links to more information about the Natural Resources Commission, including full agendas and meeting minutes <> Permit to Install Alpine Power Plant (Wolverine… [read post]
6 Jan 2015, 4:14 am by Kevin LaCroix
Even though the case raised technical issues involving seemingly arcane legal doctrines, it had potentially significant practical implications. [read post]
29 Dec 2014, 11:26 am by Venkat Balasubramani
This case is vaguely reminiscent of the Hulu Facebook ID implementation case where Facebook’s technical implementation (perhaps unwittingly) causes a possible privacy problem. [read post]