Search for: "Center for Information Technology Policy" Results 2921 - 2940 of 5,254
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
30 Dec 2024, 7:53 am by Dave Maass
At its center is the Torre Centinela, a 20-story headquarters that was supposed to be completed in 2024. [read post]
22 Aug 2018, 7:31 pm
But technology continues to spill over more and more into Family Law matters with the result often being more ‘truthful’ information, but arguably at the cost of privacy (also for better or worse, depending on perspective). [read post]
30 Apr 2019, 10:23 am by Cynthia Marcotte Stamer
With respect to such apps, however, the FAQs also suggest that the covered entity may want to consider informing the individual of the potential risks involved the first time that the individual makes the request. [read post]
11 Sep 2012, 1:36 am by Kevin LaCroix
      Similarly troubling, in 2011 nearly 23 million confidential records were exposed in the US as a result of over 419 reported security breaches, according to the non-profit Identity Theft Resource Center (ITRC). [read post]
27 Jul 2018, 8:07 am by Thaddeus Hoffmeister
Your feedback would be highly appreciated and informative, both in instances where policies or guidelines were changed in response, as well as those which resulted in no change to existing practices after considering the issue. [read post]
27 Jul 2018, 8:07 am by Thaddeus Hoffmeister
Your feedback would be highly appreciated and informative, both in instances where policies or guidelines were changed in response, as well as those which resulted in no change to existing practices after considering the issue. [read post]
27 Sep 2022, 5:31 am by Bob Ambrogi
Rhode Center on the Legal Profession at Stanford, and Lucy Ricca, director, policy and programs at the Rhode Center and formerly executive director of the Utah Office of Legal Services Innovation — the office that oversees the so-called Utah sandbox. [read post]
13 Dec 2006, 1:47 am
Such policies are highly specialized, but definitely worth investigating. 3. [read post]
16 Jul 2019, 2:01 pm by Cynthia Marcotte Stamer
Past Chair of the ABA Managed Care & Insurance Interest Group and, a Fellow in the American College of Employee Benefit Counsel, the American Bar Foundation and the Texas Bar Foundation, heavily involved in health benefit, health care, health, financial and other information technology, data and related process and systems development, policy and operations throughout her career, and scribe of the ABA JCEB annual Office of Civil Rights agency meeting, Ms. [read post]
24 Jun 2012, 10:40 pm by Stu Ellis
Subscription information follows the weekly summary of news. [read post]
10 Dec 2021, 7:30 pm
  They seek to advance their own power, export and expand their influence around the world, and justify their repressive policies and practices as a more efficient way to address today’s challenges. [read post]
21 Oct 2015, 5:31 pm by Shahid Buttar
These visionary states are acting as laboratories for public policy, as envisioned by Justice Louis Brandeis. [read post]
5 May 2013, 5:47 pm by Angelo A. Paparelli
 The Migration Policy Institute, the National Immigration Law Center, and the American Immigration Lawyers Association (AILA) have each offered a helpful analysis of the bill. [read post]
4 Oct 2024, 6:45 am by INFORRM
The State also argued that in Belarus any information or ideas published on the site “vk.com/rdbelarus” were considered “extremist material. [read post]
21 Jul 2011, 6:30 pm by Jaclyn S. Millner & Gregory M. Duhl
homeNewMember=&gid=1922050/ SUBSCRIBE: Workers Comp Resource Center Newsletter   Do not use this information without independent verification. [read post]
23 Jun 2019, 4:25 pm by INFORRM
The legal team of the browser Brave have written to the UK’s Information Commissioner’s Office (ICO) with potential evidence that Google’s online ad-selling policies break the EU’s General Data Protection Regulation (GDPR) – namely Article 5(1)(f). [read post]
2 Jun 2022, 9:01 pm by Matthew G. Olsen
These include efforts: To steal technology, trade secrets and intellectual property, To amass personal information about U.S. citizens, To exert malign and covert influence over our democratic processes, and To hold our critical infrastructure at risk to destructive or disruptive attacks. [read post]