Search for: "PROTECT CONTROLS, INCORPORATED" Results 2921 - 2940 of 5,032
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
6 Nov 2015, 8:57 am by John Elwood
Sentencing Guideline § 4B1.2, which incorporates ACCA’s residual clause. [read post]
1 Nov 2015, 3:53 am by Omar Ha-Redeye
There are also various provincial statutes affording protection against discrimination and invasions of human rights. [read post]
30 Oct 2015, 5:04 pm by Anthony Zaller
The DLSE approved electronic wage statements as long as the employer incorporated the following features: An employee may elect to receive paper wage statements at any time; The wage statements will contain all information required under Labor Code section 226(a) and will be available on a secure website no later than pay day; Access to the website will be controlled by unique employee identification numbers and confidential personal identification numbers (PINs). [read post]
30 Oct 2015, 12:29 am by Andres
The latest case to try to determine the level at which a service provider will be liable for content it does not control is the Supreme Court of South Australia decision in Duffy v Google. [read post]
29 Oct 2015, 3:00 am by Daphne Keller
  GDPR drafters should incorporate procedures to protect expression and information access now, to ensure that processes designed to streamline removals for data subjects with genuine claims do not also become tools for targeting and deleting lawful information online. [read post]
28 Oct 2015, 6:28 pm by Steve Sady
The sequence of prior convictions is a fact subject to dispute and mistake in the absence of procedural protections. [read post]
28 Oct 2015, 2:00 pm by Jared Bomberg and Paul Otto
The bill defines a security control as the management, operational, and technical controls used to protect against unauthorized access to the system or information. [read post]
26 Oct 2015, 3:24 pm by Arthur F. Coon
On September 18 and October 5, 2015, I posted Parts I and II, respectively, of my comments on OPR’s August 11, 2015 Preliminary Discussion Draft of its “Proposed Updates to the CEQA Guidelines” (the “Discussion Draft”). [read post]
21 Oct 2015, 1:26 pm by Ingrid Wuerth
Mesa, a case about the extraterritorial application of the Fourth Amendment as applied to a cross-border shooting in an enclosed space under U.S. control. [read post]
17 Oct 2015, 2:03 pm by Rebecca Tushnet
  Court includes that as a class of protected works, but doesn’t explain how that works. [read post]
17 Oct 2015, 12:21 pm by John Floyd
  Texas has Not Adopted Post Conviction Rules   While the State of Texas has adopted part of ABA Rule 3.8, it has not incorporated Rule 3.8’s subsection (g) and (h) into its own Rule 3.09. [read post]
14 Oct 2015, 5:00 am by Randi Morrison
CBOK cites as one possible explanation of this the fact that technology is being incorporated into other areas of study, e.g., an information systems course as part of the IA curriculum, AIS as part of an accounting program. [read post]
12 Oct 2015, 5:06 pm by Tanya Forsheit and Melinda L. McLellan
Organizations must consider whether they should be using controller-controller or controller-processor SCCs, a determination which often depends on the circumstances of the transfer. [read post]
11 Oct 2015, 10:05 pm by Quinta Jurecic
  - Establishing or coordinating mechanisms to ensure NSA complies with appropriate DoD and IC standards to ensure protection of civil liberties and privacy is incorporated into NSA policies and procedures. - Managing or preparing, as appropriate, mandatory and ad hoc internal and external reports. [read post]
10 Oct 2015, 4:02 pm by Carolyn E. Wright
Kucy’s 2-minute film shown above is titled “Ground Control. [read post]
6 Oct 2015, 9:42 am by Alex Loomis
  That’s hard, because the EU Commission’s decision is no longer controlling and each individual country thus can now enforce EU law on its own. [read post]
5 Oct 2015, 12:23 pm by Peter Gourevitch
In Amidror’s view, the only protection is to hold territory. [read post]