Search for: "Computer Programs and Systems, Inc." Results 361 - 380 of 1,495
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
14 Nov 2017, 3:27 am by Kevin LaCroix
But unlike PayPal or credit cards which are based on actual legal tender such as dollars, euros, pounds or yen — cryptocurrencies are wholly unregulated and completely unmonitored, operating through intricate networks of decentralized computer systems. [read post]
6 Nov 2017, 3:08 pm by Wolfgang Demino
Since the CFPB’s announcement of the culmination of its investigation of Transworld System Inc and National Collegiate Student Loan Trusts with consent order and proposed consent judgment (respectively) on September 18, 2017, only five new lawsuits have been filed on behalf of NC Trusts in Harris County, Texas; -- all by a single law firm. [read post]
6 Nov 2017, 3:08 pm by Wolfgang Demino
Since the CFPB’s announcement of the culmination of its investigation of Transworld System Inc and National Collegiate Student Loan Trusts with consent order and proposed consent judgment (respectively) on September 18, 2017, only five new lawsuits have been filed on behalf of NC Trusts in Harris County, Texas; -- all by a single law firm. [read post]
6 Nov 2017, 10:40 am by NCC Staff
Electronic Arts then developed versions of Madden Football for other computer-based systems, including versions for Sega and Nintendo that didn’t employ Antonick as a programmer. [read post]
5 Nov 2017, 3:15 am by Barry Sookman
& Anor [2017] NIQB 74 https://t.co/tf1MoTOcL3 2017-11-01 Second right to be forgotten case in Ireland Townsend v Google Inc. [read post]
30 Oct 2017, 12:32 pm by Overhauser Law Offices, LLC
Patent No. 6,216,158, System and Method Using a Palm Sized Computer to Control Network Devices (the ‘158 patent). [read post]
23 Oct 2017, 4:22 pm by Kevin LaCroix
These new responsibilities suggest an evolving standard of care for a corporation’s board and/or C-Suite officers with respect to preventing, developing, implementing, and maintaining cybersecurity policies and programs to mitigate, detect, and respond to cyber risks. [read post]
23 Oct 2017, 4:22 pm by Kevin LaCroix
These new responsibilities suggest an evolving standard of care for a corporation’s board and/or C-Suite officers with respect to preventing, developing, implementing, and maintaining cybersecurity policies and programs to mitigate, detect, and respond to cyber risks. [read post]
21 Oct 2017, 7:30 am by The Public Employment Law Press
In addition, upcoming audits are planned that will examine the cybersecurity of computer-based systems used to monitor, modify, regulate or manage municipal water facilities. [read post]
6 Oct 2017, 11:39 pm by Wolfgang Demino
As part of the package of remedies imposed  by the Consumer Financial Protection Bureau upon the National Collegiate Student Loan Trusts and their debt collector, TransWorld Systems, Inc. [read post]
2 Oct 2017, 4:50 pm by Kevin LaCroix
The SEC’s disclosure that its EDGAR system had been had hacked was big news last week, as was the accompanying disclosure that the information accessed may have been used for improper trading. [read post]
29 Sep 2017, 4:36 am by Edith Roberts
” Briefly: At Bloomberg, Greg Stohr reports that “AT&T Inc. and other broadband providers asked the U.S. [read post]
7 Sep 2017, 9:43 am by Eric Caligiuri
 The ‘507 Patent relates generally to manipulating data in a computer network, and specifically to retrieving, presenting and manipulating embedded program objects in distributed hypermedia systems. [read post]
7 Sep 2017, 9:43 am by Eric Caligiuri
 The ‘507 Patent relates generally to manipulating data in a computer network, and specifically to retrieving, presenting and manipulating embedded program objects in distributed hypermedia systems. [read post]
29 Aug 2017, 1:24 pm by Inside Privacy
Though Medidata’s crime policy covered only “direct loss,” it defined “Computer Fraud” more broadly as “the unlawful taking or the fraudulently induced transfer” of money or other property “resulting from a Computer Violation,” including both fraudulent “entry of Data into . . . a Computer System” and “change to Data elements or program logic of a Computer… [read post]
10 Aug 2017, 4:00 pm by Kevin LaCroix
Like many such policies, the operative policy language required “the fraudulent (a) entry of Data into … a Computer System; [and] (b) change to Data elements or program logic of a Computer System. [read post]
MACRS consists of the General Depreciation System (GDS) and the Alternative Depreciation System (ADS). [read post]