Search for: "Electronic Security Systems, Incorporated" Results 21 - 40 of 810
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
29 Jun 2018, 10:10 am by Tim Sturm
Following certain guidelines when using electronic media to deliver information. [read post]
12 Jul 2013, 9:52 am by Cynthia Marcotte Stamer
(WellPoint) is learning a $1.7 million lesson about the importance of ensuring Web-based applications and portals that allow access to members or other consumers protected health information (PHI) incorporate the administrative, technical and other security safeguards required by the Health Insurance Portability & Accountability Act (HIPAA) Privacy and Security rules. [read post]
11 Mar 2015, 4:00 am by John Gregory
The working group adopted Chasse’s recommendation to move to a system integrity focus, which became the core principle of the Uniform Electronic Evidence Act, ultimately approved by the Conference in 1998. [read post]
4 Jun 2021, 4:43 pm by Anthony Zaller
California law does not require the use of any electronic type of timekeeping system or time clocks. [read post]
22 Jun 2018, 2:31 pm by Malecki Law Team
Bank of America’s Merrill Lynch, Pierce, Fenner and Smith Incorporated has agreed to pay a $42 million-dollar settlement Securities and Exchange Commission for federal securities laws violations according to an Order Instituting Administrative and Cease-and-Desist Proceedings. [read post]
30 Oct 2015, 5:04 pm by Anthony Zaller
The DLSE approved electronic wage statements as long as the employer incorporated the following features: An employee may elect to receive paper wage statements at any time; The wage statements will contain all information required under Labor Code section 226(a) and will be available on a secure website no later than pay day; Access to the website will be controlled by unique employee identification numbers and confidential personal identification numbers (PINs). [read post]
4 Jun 2023, 5:32 am by Rob Robinson
By incorporating the insights and recommendations from this report into their practices, professionals in these fields can enhance domain name security, mitigate risks, and contribute to maintaining a secure and trustworthy online environment. [read post]
21 Feb 2024, 1:04 pm by Hannah Zhao
Traditional EM technology consisted of wearable devices equipped with Global Positioning System (GPS), radio frequency (RF), or Secure Continuous Remote Alcohol Monitoring (SCRAM) capabilities. [read post]
27 Jun 2011, 9:13 am
A recent gathering of researchers at UMass Amherst focused on improving security and privacy of RFID and electronic payments. [read post]
7 Feb 2011, 1:15 pm by Hunton & Williams LLP
Architecture Understand the underlying technologies the cloud provider uses to provision services, including the implications of the technical controls involved on the security and privacy of the system with respect to the full lifecycle of the system and for all system components. [read post]
We expect that the New Guidance will continue to be relied upon by courts, and recommend that institutions review and incorporate the New Guidance into their operations, policies and procedures going forward. [read post]
16 Apr 2009, 8:45 am
The potential for future gains with software security will be lost in the short-term until such time that an adequate product improvement model is incorporated. [read post]
31 Jan 2007, 8:46 pm
The Stratify Legal Discovery service provides attorneys a single review application for native electronic documents, securely managing documents through the entire discovery lifecycle. [read post]
31 Jan 2007, 8:54 pm
Under FRCP Rule 26(b), parties in litigation must produce all electronically stored information that is relevant, not privileged and “reasonably accessible,” which includes information that resides online on a corporation’s desktops, laptops, servers, and networked storage systems. [read post]
2 Jan 2007, 9:04 am
The reader converts the radio waves reflected back from the tag into digital information that can then be passed on to computers that can make use of it. eMag will incorporate the RFID technology into its existing job management system (JMS). [read post]
17 Oct 2018, 4:19 pm by Cynthia Marcotte Stamer
  Examples of such obligations include the privacy and data security rules of the Fair and Accurate Credit Transaction Act (FACTA), the Internal Revenue Code and other tax laws, federal and state consumer debt and information, electronic crime, data security and identity theft statutes; federal and state trade secret and intellectual property laws; and others, for which violations often equal or substantially exceed the civil monetary penalty liability that commonly… [read post]
31 May 2014, 11:35 am
Disclosure, then, and through it securities pricing, then, might serve as a key mode of incorporating human rights sensibilities (and sustainability) more robustly into the operating calculus of enterprises. [read post]
12 Aug 2009, 6:57 am
A: Secure Flight will be phased-in and each airline will be incorporating the necessary changes into their systems over the coming months. [read post]