Search for: "C&D Logging" Results 181 - 200 of 752
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
7 Jun 2024, 2:17 pm by Anthony Zaller
(C) How to report workplace violence incidents or concerns to the employer or law enforcement without fear of reprisal. [read post]
19 Jan 2022, 10:09 am by Alvaro Marañon
               (C)  Within 90 days of the date of this memorandum, CNSS shall identify and prioritize for update all cryptographic-related policies, directives, and issuances, and CNSS shall provide to the Secretary of Defense, the Director of National Intelligence, and the National Manager a timeline, not to exceed 6 months, for the re-issuance of these policies, as appropriate. [read post]
19 Jan 2022, 10:09 am by Alvaro Marañon
               (C)  Within 90 days of the date of this memorandum, CNSS shall identify and prioritize for update all cryptographic-related policies, directives, and issuances, and CNSS shall provide to the Secretary of Defense, the Director of National Intelligence, and the National Manager a timeline, not to exceed 6 months, for the re-issuance of these policies, as appropriate. [read post]
10 Sep 2011, 7:36 am by David B. Stratton
Murray intentionally omitted from the Privilege Log and the Enhanced Privilege Log the March 26,2009,9.54 a.m. email from Smith to Lester and willfully failed to deliver it to the Court for in camera inspection. [read post]
12 Jul 2022, 1:00 am by David Kessler (US) and Susan Ross (US)
The asset inventory as well as applicable configuration and change management systems shall, at a minimum, collectively identify: (a) the name of the asset; (b) the version of the asset; (c) the owner of the asset; (d) the asset’s location within the Network; (e) the asset’s criticality rating; (f) whether the asset collects, processes, or stores Personal Information; and (g) each security update and security patch applied or installed during the preceding period. [read post]
8 Dec 2009, 8:00 am by Ray Dowd
Truman Building, located on 23rd Street between C Street and D Street, NW., Washington, DC.Written comments on the above subjects may also be provided to the same e-mail address for Ms. [read post]
6 Apr 2012, 12:11 pm by Jenna Greene
But the statute, Section 9(c) of the OSH Act, 29 U.S.C. 658(c), states: "No citation may be issued...after the expiration of six months following the occurrence of any violation. [read post]
24 Apr 2020, 12:21 pm by Eva Rosenberg
c) Try to use other ways to get your info into the hands of the IRS. [read post]
24 Mar 2014, 7:26 am
Code § 2511(1)(c), or `intentionally uses,’ 18 U.S. [read post]
22 Mar 2021, 7:45 am by Edward J. Loya, Jr.
During these visits, Shi observed Trelleborg’s measures to keep its proprietary information confidential, including 24-hour security guards and video surveillance, visitor logs, keypad entry on restricted areas (e.g., research and development labs), escorts for visitors, and strict rules against taking pictures. [read post]
27 Jul 2011, 7:27 am by Elie Mystal
lots of people didn’t have that happen…[L]ots of people who paid to take on a laptop who ended up having to handwrite… we started 40ish min late b/c of the tech issues.You’d think that with all of the technology available on a freaking phone, we could find a way to take an exam on a computer. [read post]
19 Aug 2020, 4:00 am by Administrator
(Check for commentary on CanLII Connects) The most-consulted French-language decision was Pharmaciens (Ordre professionnel des) c. [read post]
3 Nov 2009, 4:55 pm
Also, existing regulatory mechanisms, as implemented, are inadequate to mitigate the current threats to the salmon-crested cockatoo (Factor D). [read post]
26 Dec 2012, 6:58 am by Susan Brenner
After a jury convicted him of “two counts of class C felony stalking” in violation of Indiana Code § 35-45-10-5, Michael D. [read post]