Search for: "Electronic Data Systems Corporation" Results 281 - 300 of 2,103
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
30 Apr 2009, 9:07 am by Anthony P. Chan
 Unfortunately, you can't do that with your client's or your own corporate data. [read post]
24 Feb 2016, 7:08 am by Jordan M. Rand
  The policy defined “Computer Systems Fraud” as follows: “Loss resulting directly from a fraudulent (1) entry of Electronic Data or Computer Program into, or (2) change of Electronic Data or Computer Program within the Insured’s proprietary Computer System…provided that the entry of change causes (a) Property to be transferred, paid or delivered…”. [read post]
24 Feb 2016, 7:08 am by Jordan M. Rand
  The policy defined “Computer Systems Fraud” as follows: “Loss resulting directly from a fraudulent (1) entry of Electronic Data or Computer Program into, or (2) change of Electronic Data or Computer Program within the Insured’s proprietary Computer System…provided that the entry of change causes (a) Property to be transferred, paid or delivered…”. [read post]
24 Feb 2016, 7:08 am by Jordan M. Rand
  The policy defined “Computer Systems Fraud” as follows: “Loss resulting directly from a fraudulent (1) entry of Electronic Data or Computer Program into, or (2) change of Electronic Data or Computer Program within the Insured’s proprietary Computer System…provided that the entry of change causes (a) Property to be transferred, paid or delivered…”. [read post]
2 Jan 2020, 1:31 pm by Sabrina I. Pacifici
They got access to systems with prospecting secrets for mining company Rio Tinto PLC, and sensitive medical research for electronics and health-care giant Philips NV. [read post]
10 Oct 2013, 8:32 am by Dave Maass
Citing Concerns Over NSA’s Impact on Corporate Members, EFF Leaves Industry GroupSan Francisco - The Electronic Frontier Foundation (EFF) today withdrew from the Global Network Initiative (GNI), citing a fundamental breakdown in confidence that the group's corporate members are able to speak freely about their own internal privacy and security systems in the wake of the National Security Agency (NSA) surveillance revelations. [read post]
Covered persons and service providers should routinely update systems, software, and code, including those utilized by contractors, including when notified of a critical vulnerability, maintain asset inventories of system software dependencies to make sure software is up to date and identify needs for patches, and not use versions of software that are no longer actively maintained by their vendors. [read post]
16 Jul 2008, 11:05 pm
Kazeon's Information Access Platform will be used by Zeh's customers to intelligently Discover, Search, Classify and take Action upon all their electronically stored information (ESI). [read post]
18 Aug 2017, 8:42 am by Stephen R. Chuk
Practice Fusion, an electronic health record company, was alleged to have misled customers about the privacy of their online physician reviews. [read post]
5 Jul 2011, 6:36 am by Eric Schweibenz
  The ‘324 patent relates to a method and system for detecting the change in posture of a person in a video data stream. [read post]
18 Jul 2017, 7:36 am by Steven Cohen
Plaintiff filed a products liability lawsuit against the manufacturer and installer of an Advanced Electronic Vehicle Interface Technology driving system. [read post]
5 Oct 2012, 5:01 am
Claim 101 of the patent-in-suit provides: A method for making a financial analysis output having a system-determine purchase price for at least one component from property in consummating a sale, the financial analysis output being made by steps including: Converting input data, representing at lest one component from property, wherein the property is a fixed income asset, into input digital electrical signals representing the input data; Proving a digital electrical… [read post]
22 Jan 2007, 6:18 am
EnCase offers thorough identification, collection and processing of relevant data on servers, workstations and laptops anywhere on a corporate network, without disrupting business operations. [read post]
6 Dec 2006, 8:21 am
However, while these amendments portend a sea change in the way electronic discovery is conducted, many companies lack the systems and processes to demonstrate which of their data sources are accessible or inaccessible. [read post]
10 Feb 2015, 12:52 pm by Dave Maass
Marshals Service's (USMS) use of small aircraft mounted with controversial cell-phone tracking systems. [read post]
12 Oct 2017, 6:10 am
  Defendant is a North Carolina corporation that provides sub-prime auto loans to Maryland consumers. [read post]
3 Aug 2012, 8:48 am by Andrew B. Serwin
”  For many in the business community, CFAA has become a preferred method of seeking injunctive relief, damages, attorneys’ fees, and other remedies from disloyal employees, competitors, and others who have made improper use of proprietary information stored on the company’s computer system—or destroyed electronically stored information altogether. [read post]
16 Nov 2006, 11:53 am
Customers include Citigroup, Credit Suisse, Babcock & Brown, First Data Corporation and other business practice leaders. [read post]
3 Feb 2008, 12:06 am
According to the Enterprise Strategy Group, e-mail makes up at least 75% of electronic review data. [read post]