Search for: "Authentic Designs " Results 321 - 340 of 2,895
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
7 Oct 2016, 8:38 am by D. Daxton White
It is often a first step in a series of tactics designed to culminate in the payment of money to the scammers. [read post]
2 Dec 2022, 4:28 am by Kluwer IP Reporter
Read the full story here Lisbon becomes Portugal’s first certified Authenticity On 26 October 2022, the municipality of Lisbon became the first certified Portuguese Authenticity to join the subproject called European Network of Authenticities of the European Cooperation Project ECP8. [read post]
3 Feb 2011, 1:19 pm by Eugene Volokh
The discovery provided enough detail for researchers to determine exactly what Madison’s chess set looked like, and led curators to purchase an identical, authentic 18th-century ivory chess set. [read post]
30 Jun 2020, 8:33 am
Boulle did not sign his work, and so it must be authenticated in other ways. [read post]
23 Mar 2016, 4:53 pm by Sabrina I. Pacifici
USLM is an XML information model designed to represent the legislation of United States Congress. [read post]
19 Nov 2017, 8:37 am by Richard K. Betts, Matthew Waxman
The nuclear command and control system has been carefully designed with redundant bulwarks against imaginable accidents, but when it comes to nuclear weapons, even small odds of malfunction need to be covered. [read post]
9 Oct 2023, 3:20 am
Initiating the probate process involves a court-supervised proceeding to verify the will's authenticity. [read post]
15 Sep 2023, 10:18 am by Unknown
“You know where that can lead,” he said ominously.The proposal also contemplates requiring firms to designate individuals with specific roles in the EDGAR filing process. [read post]
13 Sep 2013, 5:04 pm
 It didn’t help that Stretta Motta was advertising its products as made in the same factories as authentic Herve Leger dresses and were essentially stating that their bandage dresses were virtually the same as Herve Leger’s garments. [read post]
20 Sep 2016, 5:26 pm by Peter Stockburger
Multi-factor authentication for individuals accessing internal systems who have privileged access or to support functions including remote access. [read post]
24 Sep 2009, 3:00 am
An entire experience designed as an altered reality. [read post]
29 Dec 2017, 1:00 pm
I UK House of Commons committee progresses final stages of UPC ratification I INTA Brand Authenticity Conference (Report 1): Building brand value via ethical and sustainable credentials; INTA Brand Authenticity Conference (Report 2): Building brand value via ethical and sustainable credentials and INTA Brand Authenticity Conference (Report 3): Building brand value via ethical and sustainable credentials I Now available! [read post]
7 Jun 2017, 8:25 am by Nicholas Weaver
It is well understood in the security community that most two-factor authentication systems, including SMS or authenticator applications, do not actually protect against phishing. [read post]
9 Feb 2022, 12:35 pm by Rebecca Tushnet
We would never sacrifice the quality or authenticity of your collectibles for a lower price. [read post]
6 Apr 2017, 8:00 am by Michael Kohuth
Under the Proposed Rule, the Colorado Securities Commissioner could consider the following factors to determine whether an adviser’s or dealer’s written procedures had been “reasonably designed”: Size of the firm; Relationships with third parties; Policies, procedures, and training of employees; Authentication practices; Use of electronic communications; Automatic locking of devices used to conduct the firm’s electronic security; and Process for… [read post]
12 Mar 2023, 11:08 am by Cari Rincker
Creating a personal brand can be a way to establish an authentic image and stand out from the crowd. [read post]
4 Mar 2012, 8:18 pm by admin
 Nevertheless, Vuitton has been a consistent advocate for its own brand maintenance and for highlighting the need for IP protection better fit for the problems fashion designers face. [read post]
12 Jan 2009, 4:22 pm
Second, the designated employee must limit communications with the provider to “authentication” and “clarification” as defined in the revised regulations. [read post]
14 Jan 2013, 4:00 am by Judith Gaskell
Section 5 provides that the publisher of legal material designated as official must authenticate that material. [read post]
14 Nov 2014, 8:46 am by Michael Froomkin
The IAB urges protocol designers to design for confidential operation by default. [read post]