Search for: "Compliance Software, Inc., doing business as Compliance Information Systems" Results 81 - 100 of 234
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
16 Jun 2020, 2:18 pm by Kevin LaCroix
  July 26, 2019: An addendum to the letter agreement was prepared whereby the engagement of services would also include penetration testing of systems and endpoints. [read post]
1 May 2020, 2:11 am by Shannon O'Hare
Non-compliance with such regulations may constitute a criminal offence, leading to a fine or imprisonment. [read post]
19 Mar 2020, 5:37 pm by Sarah Andropoulos
As pointed out in this ethics checklist, ensuring that your calendar and conflict check systems are not only updated but also able to function in a remote work setting are critical to ensuring compliance with your professional responsibilities. [read post]
28 Jan 2020, 8:39 am by Dennis Crouch
Here, the Federal Circuit found sufficient intertwining with shared VOIP system, employee recognition program, computer network, human resources information system, payroll, and office space. [read post]
27 Jan 2020, 5:26 pm by Ben Vernia
  Pathology laboratory company Inform Diagnostics, formerly known as Miraca Life Sciences Inc., paid $63.5 million to resolve allegations that it paid kickbacks to referring physicians in the form of subsidies for electronic health records (EHR) systems and free or discounted technology consulting services. [read post]
31 Dec 2019, 8:13 am by CFM Admin
Given the above, what should managers do if they are potentially subject to the CCPA? [read post]
29 Dec 2019, 7:23 pm
Global divisions, more acute in 2018, finally reached moved toward climax in virtually all states, and with respect to all systems--law, compliance, religious, societal, cultural, and economic. [read post]
23 Dec 2019, 2:26 pm by Martin H. Orlick
But when they ask: “What should we do to achieve website compliance under the ADA? [read post]
16 Dec 2019, 3:13 pm by Cynthia Marcotte Stamer
§ 164.312(b) requires a covered entity to implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ePHI. [read post]
12 Dec 2019, 5:45 am by Kevin Kaufman
Supreme Court overturned the physical presence standard established in two earlier cases, National Bellas Hess, Inc. v. [read post]
18 Sep 2019, 9:52 pm by Kevin LaCroix
 “Malware” is oft defined as software designed to interfere with a computer’s normal functioning, such as viruses (which can wreak havoc on a system by deleting files or directory information); spyware (which can secretly gather data from a user’s system); worms (which can replicate themselves and spread to other computers); or Trojan horses (which upon execution, can cause loss or theft of data and system harm). [read post]
6 Sep 2019, 3:00 am by Jim Sedor
A similar scheme happened at Axor Experts-Conseils Inc. [read post]
28 Feb 2019, 5:53 pm by Joe Mullin
An API provides personal information from a software application; then the user is asked for a “required permission” for the use of that information. [read post]