Search for: "Authentic Designs " Results 2441 - 2460 of 2,914
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
28 Feb 2018, 1:55 pm by Shea Denning
Skilling, 561 U.S. at 400 (explaining that the honest services theory was designed to target corruption that lacked the symmetry of a fraud in which the victim’s loss of money supplied the defendant’s gain, with one the mirror image of the other). [read post]
10 Feb 2011, 7:11 am by admin
  Arab culture emphasizes strict segregation of the sexes, and any design which flouts that cultural geas is asking for trouble. [read post]
19 Mar 2012, 8:27 am by Rebecca Anderson
Observing that the present generation boasts the largest relative population of young people in the history of the planet—with nearly half of the globe’s 7 billion occupants under 25—Kossen called for the inclusion of the “authentic voice [of youth] on Capitol Hill. [read post]
8 Jul 2019, 10:00 am by sydniemery
-The Case of Ambiguous Multiple Payee Designation is cited in the following practice series: Daniel R. [read post]
7 Jun 2017, 9:55 am by Trent Dykes
By design, blockchains are inherently resistant to modification of the data. [read post]
21 Mar 2024, 10:35 am by Edward T. Kang
Upon authentication, the Federal Rules of Evidence dictate the exclusion of hearsay evidence. [read post]
13 Jun 2017, 1:58 pm by Divya Taneja
”  It remains to be seen how broadly “security purpose” will be construed, and whether it would cover, for example, a mobile platform storing fingerprints to secure a phone, a payment card brand partnering with e-commerce retailers to authenticate transactions using emerging data security features that use biometrics in lieu of, or in addition to, passwords. [read post]
  To the extent passwords are employed as a method of authentication, the proposed changes would require the covered entity  to ensure strong, unique passwords are used. (500.7) Notifications to DFS Cybersecurity Event Notification Would Expand. [read post]
10 Dec 2009, 12:05 pm
Congress designated the original compendia, here §42 U.S.C.A. [read post]
30 Jun 2011, 5:34 am by McNabb Associates, P.C.
ATF, working together with APD, operated an authentic-looking fencing operation that succeeded in taking almost 400 firearms from the hands of criminals. [read post]
16 Mar 2021, 7:04 am by Elin Hofverberg
The Board’s criteria (the Overarching Criteria) for selecting cases is designed to focus on cases that i) would affect a large number of users, ii) are of critical importance to public discourse, and iii) raise important questions about Facebook’s policies. [read post]
13 Feb 2008, 12:16 pm
Employers would no longer have to gain the employee's consent to contact the health care provider to authenticate the medical certification. [read post]
17 Sep 2007, 12:56 am
Beerman examine how courts have addressed the production of such new information forms, and give their best discovery practice, from determining whether an opponent has maintained the relevant media to properly authenticating data in court. [read post]
6 Sep 2016, 2:42 pm by Larry Tolchinsky
And it referenced B of A as being the successor to LaSalle Bank, with the same name designation in the complaint. [read post]
9 Apr 2009, 6:51 am
After his capture, Noriega had been designated as a prisoner of war under the Third Geneva Convention. [read post]
24 Aug 2018, 8:02 am by Andres
Under this system, browsers and media players could be built to only play and/or display authentic works registered on the blockchain. [read post]
10 Apr 2012, 2:17 am
A simple Google search can yield important information, provided you’re certain of a site’s authenticity and authority. [read post]
11 Apr 2011, 10:40 am by Harley Geiger
Since smartphones are miniature computers, strong cryptography and authentication protocol can be built into their systems – but it is up to device manufacturers and service providers to ensure these protections are in place for NFC transactions. [read post]