Search for: "PROTECT CONTROLS, INCORPORATED" Results 3281 - 3300 of 5,032
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
4 Jun 2014, 11:15 pm by Natalie Punchak
In other words, the blame for financial crises rests squarely on regulatory instruments such as insurance protections, not on behavior by private actors. [read post]
2 Jun 2014, 2:03 pm
His conclusion is upbeat but cautious: (1) SOEs have difficulty replicating their successful project management policies outside of China, (2) inadequate due diligence, hubris and a dysfunctional approval process are key reasons for high failure rate, and (3) while nominally objective, the evaluation process incorporates strong external subjective influences. [read post]
30 May 2014, 4:40 am by Ben
Streaming services just have to deal with Sony and UMG, who control well over 50% of the recorded music sector (and yes - EU and US regulators let that happen!). [read post]
29 May 2014, 8:11 am by Kate Barth
Second, the World Bank should amend Section 6.02 to incorporate an exception for project financings into the Negative Pledge Clause. [read post]
26 May 2014, 3:16 pm
The legislature expressly incorporated this term in the definition of "aggravated circumstances" and made it applicable to child protective proceedings. [read post]
25 May 2014, 7:00 am by Jennifer Williams
Increasingly, Hamas-controlled Gaza is awash with an array of radical Islamist contenders. [read post]
24 May 2014, 3:32 am by Tatiana Kruse
Reviewing the policies regularly Having a Data Breach Incident Management Policy to address security breaches and procedures to address data subject requests and complaints Designating an Data Protection Officer to manage compliance Training staff and ensuring awareness of the policies Incorporating “privacy by design“ into significant new projects and systems; carrying out privacy impact assessments Reviewing the provision and contents of privacy notices Using template… [read post]
23 May 2014, 9:22 am
After TPD spent months protecting the Islamic Society and the school next door from a terrorist threat, the Society decided to hold the “Law Enforcement Appreciation Day” event to thank TPD for its help. [read post]
22 May 2014, 10:18 pm by Steven Goldfeder
For corporate users, threshold signatures enable cryptographically secure access control. [read post]
On May 7, 2014, the FTC hosted the latest seminar in their Spring Privacy Series to address the status of Consumer Generated and Controlled Health Data and relate results of recent FTC studies on the topic. [read post]
20 May 2014, 6:29 pm
The Supreme Court’s recent rejection of a federal interest in denying recognition to same-sex marriages for federal law purposes reveals the thinness of any claimed interest by states in territorial control. [read post]
20 May 2014, 1:43 pm
Likewise, we can think of religious freedom as limiting government control over religious activity rather than as protecting only individual rights. [read post]
19 May 2014, 2:49 pm
  My recent focus has been on issues relating to the operationalization of the state duty to protect human rights (e.g., On the Problem of the State in the State Duty to Protect Human Rights--Fostering National Action Plans as a Means of Refocusing the State Duty on the Business of the State Itself). [read post]
19 May 2014, 3:19 am by Broc Romanek
However, SRA’s certificate of incorporation required the Class A and Class B common stock be treated equally in the event of a merger. [read post]
13 May 2014, 9:30 pm by Patricia Santiago
Moreover, captives can be incorporated independently of a parent in jurisdictions with minimal taxes and lenient regulatory requirements. [read post]
12 May 2014, 10:02 pm by Hugh Pennington
The probable explanation is that a slimming regime incorporating cold meats and salad was popular at the time. [read post]
12 May 2014, 5:15 pm by Kimberly M. Wong
§§ 164.308(a)(1)(i)(ii)(A) and (B), an organization must conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of EPHI and implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to: (i) ensure the confidentiality, integrity, and availability of ePHI created, received, maintained, and/or transmitted; (ii) protect against any reasonably… [read post]
12 May 2014, 2:04 pm by Florian Mueller
APIs have an abstract level, at which we're talking about broad ideas and concepts that can be protected only with patents, if at all. [read post]
1 May 2014, 6:00 am
While controlled access offers some of the best protection, the system must be kept current with permissions. [read post]
30 Apr 2014, 6:22 am by Natalie Nicol
In both respects, the statute was an unconstitutional interference with newspapers’ First Amendment right to exercise “editorial control and judgment. [read post]