Search for: "In Matter of Copy-data Systems, Inc" Results 321 - 340 of 660
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
16 Jun 2020, 2:18 pm by Kevin LaCroix
  July 26, 2019: An addendum to the letter agreement was prepared whereby the engagement of services would also include penetration testing of systems and endpoints. [read post]
27 Jul 2010, 2:17 pm
It was not alleged that WordProg had access to SAS's source code or copied it, or even that it copied any of the structural design of the components' source code. [read post]
27 Oct 2016, 8:48 am by Cynthia Marcotte Stamer
  The requirements of the Corrective Action Plan both seek to address the specific weaknesses that lead to the breaches of unsecured ePHI reported by OHSU in its breach notifications as well as the broader deficiencies in OHSU’s overall HIPAA compliance practice by requiring among other things that OHSU: Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI at all OHSU facilities and on all… [read post]
14 Mar 2019, 5:08 pm by Cynthia Marcotte Stamer
The completed Form 8950 is uploaded automatically, so don’t include any copy of the Form 8950 as part of the uploaded PDF file containing the VCP submission documents. [read post]
13 Oct 2008, 12:12 pm
Patent landscape analytics may prove you wrong (IP Asset Maximizer Blog) Why sinking markets could mean real opportunities for patent acquirers and licensees (IAM)   Global - Copyright Copyright still viable, at least for top authors (IP finance) Understanding the backlash cost in copying someone else's work (Techdirt)   Africa Designers from all OAPI (Organisation Africaine de la Propriete Intellectuelle) countries to benefit from fee reductions (Afro-IP) (WIPO)… [read post]
9 Aug 2023, 11:25 am by GraceLegere
This includes having systems in place to detect and prevent unauthorized access to records, as well as procedures for the backup and recovery of data in the event of a disaster or other unforeseen event. [read post]
16 Apr 2018, 10:38 am by Cynthia Marcotte Stamer
administration about transactions, contract and plan interpretation and enforcement, risk management, compliance and operations matters. [read post]
22 May 2022, 8:33 am by Kevin LaCroix
 A copy of the May 20, 2022 complaint in the new lawsuit can be found here. [read post]
23 Feb 2013, 5:00 pm by Cynthia Marcotte Stamer
  FTC Charges Against HTC America This week, the FTC announced that mobile device giant HTC American, Inc. [read post]
20 Jun 2023, 11:41 am by Greg Lambert and Marlene Gebauer
When asked what metric in-house and outside counsel should focus on, Kristina recommends using available data, whether from the survey or a company’s own systems. [read post]
2 Mar 2011, 5:21 am by Rob Robinson
Mobile Access to eDiscovery Analytics, Processing and Review - http://tinyurl.com/22u89yz (Orange Legal Technologies) OpenText Brings Windows and UNIX Enterprise Bus Apps to Mac OS X with Exceed onDemand 8 – http://tinyurl.com/4am8h4j (PR Newswire) Precise, Inc. [read post]
13 Apr 2016, 4:55 pm by Kevin LaCroix
It is not a mere coincidence that law firms increasingly are targeted in data breach attacks. [read post]