Search for: "Authentic Designs " Results 361 - 380 of 2,895
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
21 Oct 2021, 12:06 am by Greg Lambert and Marlene Gebauer
We hired Josh to run our legal innovation and entrepreneurship program, which is now legal business design. [read post]
21 Oct 2021, 12:06 am by Greg Lambert and Marlene Gebauer
We hired Josh to run our legal innovation and entrepreneurship program, which is now legal business design. [read post]
6 Feb 2017, 6:26 am by Rebecca Tushnet
Jan. 30, 2017)Brighton sued Believe for infringing Brighton’s copyright in a jewelry design and also engaging in false designation of origin/unfair competition. [read post]
15 Jan 2015, 4:43 am
OHIM based its refusal on the descriptive character of the mark, in so far as the word ‘monaco’ designated the territory of the same name and could, therefore, be understood in any of the EU’s official languages as designating the origin or geographical destination of the goods and services concerned. [read post]
18 Sep 2007, 12:27 pm
Two little known companies in the Homeland Security Complex announced they have landed a contract with an unnamed major Asian country to design and install a country-wide data retention system capable of storing and searching trillions of internet and phone transactions. [read post]
3 Jun 2022, 6:51 pm by Russell Knight
“The general rule is that litigants may stipulate regarding matters involving the individual rights of the litigants themselves…Courts look with favor upon stipulations which are designed to simplify, shorten or settle litigation and save the costs of the parties. [read post]
10 Sep 2020, 10:42 am by Rebecca Tushnet
An accompanying sentence said: “By offering the world’s largest range of authentic designer eyewear, sourced directly from the world’s leading eywear [sic] suppliers, we are here to help you find what you love. [read post]
25 Jan 2023, 8:14 pm by Ruth Carter
Their website says, “We strive to provide judgement-free, affirming care that allows our patients to live healthy, authentic lives. [read post]
23 May 2024, 12:07 pm by Robert E. Braun
The decision is often made on the basis of past mistakes – failure to implement basic security (such as not implementing multi-factor authentication), failure to train personnel in recognizing phishing, or failure to establish and maintain an effective backup protocol. [read post]
25 Jan 2018, 5:34 pm by Susan Ross (US)
  That PIN is intended to be a form of authentication that the person using the card is the legitimate owner. [read post]
  Below is actionable guidance to kickstart your employee privacy by design program or update existing privacy programs: Data Mapping. [read post]
3 May 2023, 8:44 am by William C. Martinez
The Illinois Biometric Information Privacy Act (BIPA) is designed to protect and regulate the use of both “biometric identifiers” and “biometric information” of Illinois residents. [read post]
3 May 2023, 8:44 am by William C. Martinez
The Illinois Biometric Information Privacy Act (BIPA) is designed to protect and regulate the use of both “biometric identifiers” and “biometric information” of Illinois residents. [read post]
3 May 2023, 8:44 am by William C. Martinez
The Illinois Biometric Information Privacy Act (BIPA) is designed to protect and regulate the use of both “biometric identifiers” and “biometric information” of Illinois residents. [read post]
13 Jun 2010, 6:03 am by Brian Scott
If you obtain your registration before or within five years of your plush toy's creation, registration will provide prima facie (authentic) evidence in court. [read post]
24 Apr 2013, 5:52 am by Rebecca Tushnet
They come with a signed and numbered certificate of authenticity.... [read post]
29 Oct 2015, 2:42 pm by John Gregory
Here is an article that asks “should cyber-security vulnerabilities really be treated the same as design defects under traditional products liability law? [read post]
20 Jan 2012, 11:14 am by texastriallawyers
First, it’s nice to know that America is finally back on top when it comes to manufacturing, design and sales. [read post]
4 Mar 2015, 11:19 am by Bret Cohen
Access control and authentication, such as requiring proper user authentication before providing access to data, user credentialing procedures, and password requirements. [read post]
30 Mar 2021, 3:53 pm by Kevin
” I envisioned that blogs would become a vehicle for lawyers to connect with people in a real and authentic fashion. [read post]