Search for: "Corporate Action Network"
Results 2561 - 2580
of 5,068
Sorted by Relevance
|
Sort by Date
19 Sep 2023, 6:00 am
Drawing from his experience at the intersection of law and corporate strategy, he will outline actionable steps to gain a competitive edge. [read post]
5 Mar 2012, 7:45 am
Think about checking your records, for example, did anyone from their corporate network ever visit your website? [read post]
13 Apr 2010, 11:05 am
Last year, Davidson settled a class-action lawsuit that included $1 million set aside as reimbursement for customers who may suffer losses due to the breach. [read post]
15 Jun 2012, 6:09 pm
Susan began by providing us with three examples of for-profit corporations that either successfully transformed or failed to transform, setting the stage for an examination of nonprofit governance and the responsibility to address change. [read post]
8 Mar 2012, 9:05 am
Negative public opinion could result from our actual or alleged conduct in any number of activities, including mortgage lending practices, servicing and foreclosure activities, corporate governance, regulatory compliance, mergers and acquisitions, and disclosure, sharing or inadequate protection of customer information, and from actions taken by government regulators and community or other organizations in response to that conduct. [read post]
8 Nov 2016, 4:25 pm
As leaders in nursing home litigation, we have a trusted network of attorneys across the county whom we respect and trust. [read post]
27 May 2012, 5:13 pm
Did privacy groups come out and berate Twitter for its actions? [read post]
10 Jan 2024, 1:43 pm
NVIDIA Corporation is a large successful company headquartered in California that provides graphics, and compute and networking solutions in the United States, Taiwan, China, and internationally. [read post]
10 Nov 2009, 3:23 pm
After the scam occurred, authorities believe that the hackers attempted to cover their tracks by destroying data on the compromised network. [read post]
3 Jun 2019, 11:11 am
Earlier this year, a family filed an $18M broker fraud case against Securities America over the actions of a different former broker. [read post]
25 Feb 2010, 7:08 am
D. 1: SunCare, Inc. converted from a C corporation to a Delaware limited liability company and changed its name to SunCare, LLC. [read post]
17 Oct 2022, 9:01 pm
Discussions are also ongoing about reviving the Global Foodborne Infections Network (GFN), which was launched in 2000, to help strengthen laboratory-based foodborne disease surveillance. [read post]
3 May 2023, 6:00 am
Additionally, failure to comply could result in legal action by law enforcement agencies, potentially leading to criminal charges and hefty fines. [read post]
16 Aug 2018, 10:22 am
Interestingly, the Board also seeks comment on whether any standard should remain limited to email communications, or should be broadened to include the employer’s broader communication network. [read post]
18 Aug 2021, 4:41 pm
This Article shows that there is a chasm between discourse and action. [read post]
11 Oct 2017, 6:04 am
As the cybersecurity industry has matured, corporations have given the area more authority and scrutiny. [read post]
12 Jan 2012, 9:19 pm
Comment: The FTC’s action begs the question: what about the government’s damages? [read post]
4 Oct 2021, 6:51 am
Singapore In addition to transfer solutions that will be familiar to privacy professionals in Europe, such as contracts and binding corporate rules, data exporters in Singapore can rely on certification mechanisms to facilitate cross-border transfers: the Asia-Pacific Economic Cooperation (APEC) Cross-Border Privacy Rules System and the APEC Privacy Recognition for Processors. [read post]
3 Feb 2012, 8:17 am
ILN Social Media Roundtable: This isn't legal content, but it comes straight from the marketers at ILN member firms - if you're wondering what the mid-sized firms in our Network are doing with social media, some of their challenges and triumphs, this is worth a read. [read post]
4 Nov 2011, 2:41 am
The report also noted “[o]ther countries with closer ties to the United States have conducted [computer network exploitations] and other forms of intelligence collection to obtain US economic and technology data, often taking advantage of the access they enjoy as allies or partners to collect sensitive military data and information on programs. [read post]