Search for: "Authentic Designs" Results 1981 - 2000 of 2,918
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
26 May 2015, 4:30 am by Rebecca Tushnet
”  Proponents, reasonably, countered that while all of those things were indeed scary and bad, they weren’t the sorts of ills copyright law was designed to prevent. [read post]
31 Dec 2018, 4:07 pm by Wolfgang Demino
KEY WORDS: authentication of bank records, Bank-of-America, business records-exception-to-hearsay, suit-on-credit-card-debt. [read post]
3 Nov 2014, 4:00 am by Ray Dowd
  He produced a mess of obviously forged documents that handwriting experts expressed "massive doubts" as to their authenticity. [read post]
3 May 2015, 10:53 pm
Walter was an impassioned and persuasive advocate of his company's ethos, its concept of "conscious capitalism", the notion that companies can have purposes just as individuals can, and that the two key tenets of a brand that grows to embrace the needs of a growing company are those of authenticity and transparency. [read post]
13 Apr 2016, 11:32 am
  Good faith is defined in this context as an honest belief, the absence of malice, or the absence of a design to defraud or to seek an unconscionable advantage. [read post]
12 Jun 2020, 12:49 pm by Linda McClain
” Officially recognized in several states (including Virginia) and some cities, the holiday “Loving Day” grew out of a graduate school project undertaken by designer Ken Tanabe, whose own interracial heritage spurred his interest in the case. [read post]
1 Sep 2014, 10:33 am by Ray Dowd
Copyright Office attesting to the authenticity of a record or report based on a search of the Office’s records; a type of copyright service available for a fee. [read post]
    Even if the request is received in a manner that is not one of the designated methods of submission, e.g., online chats, businesses must still treat the request as if it had been submitted in accordance with the business’s designated manner or provide the consumer with specific directions on how to submit the request or remedy any deficiencies with the request. [read post]
8 Jul 2024, 1:03 am by Mayela Celis
User access is required, as provided by the General Secretariat of IberRed, previously designated by the institutions that make up the Network. [read post]
24 Jul 2019, 12:21 pm by Odia Kagan
Information Security Program – Facebook must implement and maintain a comprehensive information security program that is designed to protect the security of personal information, containing safeguards appropriate to Facebook’s size and complexity, the nature and scope of Facebook’s activities, and the sensitivity of the personal information. [read post]
18 Apr 2014, 4:16 pm by Alexander Major
On April 10, 2014, the FTC and the Department of Justice issued a joint policy statement clarifying that the sharing of properly designed cyber threat information will likely not raise antitrust concerns. [read post]
21 Jul 2007, 9:25 am
  An actor clothed as the High Priest, with infinite care taken to make his costume as authentic to the Biblical description as possible, goes through the motions of the ritual sacrifice and the sacred fire in the Holy of Holies while a narration is given by another costumed actor. [read post]
15 Jun 2009, 5:00 am
Yolanda Jones, and Judith Lihosit ), and the functioning or design of legal information systems such as computer assisted legal research (CALR) services (as in recent studies by Julie Jones, John Doyle, and Dean Mason) — rather infrequently refers to legal informatics scholarship. [read post]
2 Mar 2024, 5:01 am by Rob Robinson
The Current Communication Metrics for ComplexDiscovery OÜ To further emphasize our commitment to authenticity and transparency, ComplexDiscovery regularly publishes detailed communications metrics. [read post]
29 Sep 2022, 1:36 pm by Marina Wilson
Through social media, you can promote authenticity in your brand by giving insights into your law firm’s daily activities. [read post]
2 May 2024, 8:03 am by Rob Robinson
Embodying these four pillars, ComplexDiscovery OÜ offers distinct programs designed to leverage them effectively. [read post]
2 Oct 2017, 9:46 am by Steve Baird
Contractual efforts are probably the most effective way of controlling how the Velcro trademark is used by those who purchase authentic product from Velcro and incorporate Velcro fasteners into their own consumer products. [read post]
20 Sep 2016, 6:00 am by Andrew Appel
Voting machines designed in the 1990s and 2000s took advantage of a new nonvolatile storage technology that we now take for granted:  flash memory. [read post]
24 May 2021, 10:03 am by Lisa Peets, Marty Hansen and Vicky Ling
In particular, providers must design their high-risk AI systems to enable record-keeping; allow for human oversight; and achieve an appropriate level of accuracy, robustness and cybersecurity. [read post]