Search for: "Cyber Imaging Systems, Inc."
Results 1 - 20
of 60
Sorted by Relevance
|
Sort by Date
16 Apr 2013, 10:53 am
Apple Seeks Patent for Parental Controls on Pre-Paid Debit CardsApple Inc. is always applying for protections on different device designs and computer systems. [read post]
14 Apr 2013, 5:30 am
Related posts:Apple Seeks Patent for Parental Controls on Pre-Paid Debit CardsApple Inc. is always applying for protections on different device designs and computer systems. [read post]
30 May 2013, 4:35 am
Related posts:Apple Awarded Processing Simulcast Data PatentYet again, it was another busy week for Apple Inc. at the U.S. [read post]
22 May 2013, 7:00 am
Apple Seeks Patent for Parental Controls on Pre-Paid Debit CardsApple Inc. is always applying for protections on different device designs and computer systems. [read post]
31 Mar 2017, 9:00 am
Those applications often depend on the operating system, too, drawing on the operating system’s code to read and write files on the hard drive, draw images and text on the screen, or transmit information. [read post]
25 Sep 2012, 11:51 am
In Freedom Banc Mortgage Services, Inc. v. [read post]
2 Jul 2014, 7:29 am
., Inc. v. [read post]
6 Aug 2015, 6:21 pm
Is there an accurate and current network topology diagram that is adequately documented, and if so, is it periodically re-assessed and revised as internal systems and external factors change? [read post]
13 Aug 2014, 3:59 am
(To see full-sized versions of the graphical images embedded in this post, please click on the images.) [read post]
6 Jan 2013, 10:37 am
Nobel Assembly Sued for Libel and Unfair Competition (Swaraj Paul Barooah)Image from hereDr. [read post]
4 Dec 2014, 7:21 am
This requires, among other things, a good data classification system. [read post]
3 May 2007, 3:13 pm
Tickets.com, Inc. [read post]
27 Dec 2015, 4:00 am
LTD. v. uCOOL, INC. https://t.co/DyoGX8FYr2 -> Use of photo in blog post is fair use says US CA Katz v. [read post]
8 Aug 2013, 8:30 am
This case appears to push the envelope, in terms of the EEOC’s level of aggressiveness in attempting to find as large a class as possible to include in a systemic lawsuit. [read post]
13 Apr 2016, 4:55 pm
But cyber-attacks can be extraordinarily complicated and, once identified, demand a host of costly responses. [read post]
7 Mar 2023, 2:57 pm
To submit recommendations for consideration and inclusion in ComplexDiscovery’s cyber, data, and legal discovery-centric service, product, or research announcements, contact us today. [read post]
26 May 2017, 9:30 am
Image Source [read post]
2 Oct 2017, 4:50 pm
The SEC’s disclosure that its EDGAR system had been had hacked was big news last week, as was the accompanying disclosure that the information accessed may have been used for improper trading. [read post]
15 Jan 2008, 12:36 am
Source: New York State Legislative Retrieval System (LRS), January 15, 2007
For your information we are posting the entire New York Legislature 2007 Chapter Law List as retrieved from the New York Legislative Retrieval System on January 15, 2008. [read post]
30 Mar 2017, 4:17 pm
For instance, after a cybersecurity incident, law enforcement, regulators, vendors, partners, insurers, customers and others may: Request forensic images of impacted systems; Demand copies of indicators of compromise; Mandate that their own auditors or examiners visit sites of infiltration and conduct their own audit and investigation; Want to participate in remediation planning; Seek interviews and interactions with IT personnel; Require briefings from a victim… [read post]