Search for: "Authentic Designs "
Results 1981 - 2000
of 2,913
Sorted by Relevance
|
Sort by Date
26 May 2015, 4:30 am
” Proponents, reasonably, countered that while all of those things were indeed scary and bad, they weren’t the sorts of ills copyright law was designed to prevent. [read post]
31 Dec 2018, 4:07 pm
KEY WORDS: authentication of bank records, Bank-of-America, business records-exception-to-hearsay, suit-on-credit-card-debt. [read post]
3 Nov 2014, 4:00 am
He produced a mess of obviously forged documents that handwriting experts expressed "massive doubts" as to their authenticity. [read post]
3 May 2015, 10:53 pm
Walter was an impassioned and persuasive advocate of his company's ethos, its concept of "conscious capitalism", the notion that companies can have purposes just as individuals can, and that the two key tenets of a brand that grows to embrace the needs of a growing company are those of authenticity and transparency. [read post]
13 Apr 2016, 11:32 am
Good faith is defined in this context as an honest belief, the absence of malice, or the absence of a design to defraud or to seek an unconscionable advantage. [read post]
12 Jun 2020, 12:49 pm
” Officially recognized in several states (including Virginia) and some cities, the holiday “Loving Day” grew out of a graduate school project undertaken by designer Ken Tanabe, whose own interracial heritage spurred his interest in the case. [read post]
1 Sep 2014, 10:33 am
Copyright Office attesting to the authenticity of a record or report based on a search of the Office’s records; a type of copyright service available for a fee. [read post]
11 Oct 2019, 6:32 am
Even if the request is received in a manner that is not one of the designated methods of submission, e.g., online chats, businesses must still treat the request as if it had been submitted in accordance with the business’s designated manner or provide the consumer with specific directions on how to submit the request or remedy any deficiencies with the request. [read post]
14 Dec 2023, 9:01 pm
Multifactor Authentication. [read post]
8 Jul 2024, 1:03 am
User access is required, as provided by the General Secretariat of IberRed, previously designated by the institutions that make up the Network. [read post]
24 Jul 2019, 12:21 pm
Information Security Program – Facebook must implement and maintain a comprehensive information security program that is designed to protect the security of personal information, containing safeguards appropriate to Facebook’s size and complexity, the nature and scope of Facebook’s activities, and the sensitivity of the personal information. [read post]
18 Apr 2014, 4:16 pm
On April 10, 2014, the FTC and the Department of Justice issued a joint policy statement clarifying that the sharing of properly designed cyber threat information will likely not raise antitrust concerns. [read post]
21 Jul 2007, 9:25 am
An actor clothed as the High Priest, with infinite care taken to make his costume as authentic to the Biblical description as possible, goes through the motions of the ritual sacrifice and the sacred fire in the Holy of Holies while a narration is given by another costumed actor. [read post]
15 Jun 2009, 5:00 am
Yolanda Jones, and Judith Lihosit ), and the functioning or design of legal information systems such as computer assisted legal research (CALR) services (as in recent studies by Julie Jones, John Doyle, and Dean Mason) — rather infrequently refers to legal informatics scholarship. [read post]
2 Mar 2024, 5:01 am
The Current Communication Metrics for ComplexDiscovery OÜ To further emphasize our commitment to authenticity and transparency, ComplexDiscovery regularly publishes detailed communications metrics. [read post]
29 Sep 2022, 1:36 pm
Through social media, you can promote authenticity in your brand by giving insights into your law firm’s daily activities. [read post]
2 May 2024, 8:03 am
Embodying these four pillars, ComplexDiscovery OÜ offers distinct programs designed to leverage them effectively. [read post]
2 Oct 2017, 9:46 am
Contractual efforts are probably the most effective way of controlling how the Velcro trademark is used by those who purchase authentic product from Velcro and incorporate Velcro fasteners into their own consumer products. [read post]
20 Sep 2016, 6:00 am
Voting machines designed in the 1990s and 2000s took advantage of a new nonvolatile storage technology that we now take for granted: flash memory. [read post]
24 May 2021, 10:03 am
In particular, providers must design their high-risk AI systems to enable record-keeping; allow for human oversight; and achieve an appropriate level of accuracy, robustness and cybersecurity. [read post]