Search for: "Document Security Systems, Inc."
Results 421 - 440
of 2,112
Sorted by Relevance
|
Sort by Date
20 Feb 2023, 7:09 am
Google and Twitter Inc., v. [read post]
9 Sep 2013, 5:53 am
The Commission which enforces the computer program prohibitions has broad powers to require the production of documents. [read post]
5 Apr 2009, 1:26 pm
With the stock market in freefall, the Treasury Department proposed a $700 billion “Troubled Asset Relief Program” (”TARP”) to buy toxic assets from the nation’s banks in order to shore up their balance sheets and restore confidence to the financial system. [read post]
5 Oct 2021, 6:36 am
Read the deadline extension documents: https://www.federalregister.gov/documents/2021/09/03/2021-19112/patent-eligibility-jurisprudence-study. [read post]
15 Feb 2018, 4:41 pm
Furthermore, the Privacy Rule includes extensive documentation and keeping requirements require that Covered Entities and BAs maintain copies of these BAAs for a minimum of six years and to provide that documentation to OCR upon demand. [read post]
12 Dec 2016, 7:54 am
In June 2015, the Office of the Chief Scientist of the Air Force produced a vision document for the integration of autonomous systems into the Air Force over the next 30 years. [read post]
13 Mar 2011, 8:33 pm
Morgan Stanley & Co., Inc., C.A. [read post]
28 Aug 2016, 2:29 pm
Key elements ALM’s safeguards allegedly lacked included: a comprehensive information security program expected of an organization collecting and processing such sensitive personal information. documented information security policies and procedures for managing network permissions including critical gaps in security coverage indicative of the absence of documented policies and practices. an adequate intrusion detection system or prevention… [read post]
22 Aug 2013, 6:30 am
Stack, CPA, Director of Operations, Amaxx Risk Solutions, Inc. is an expert in employer communication systems and part of the Amaxx team helping companies reduce their workers compensation costs by 20% to 50%. [read post]
25 Jun 2008, 8:19 pm
Client/contact management: A contact management system that links to information on clients, matters and billings.Task scheduling: A calendaring and reminder system that allows tracking of appointments by day, week or month.Document management: Securely access documents online and track document versions.Trust management: Maintain and track trust transaction records.Practice performance metrics: Track current, expected and target billing figures daily,… [read post]
25 Jun 2008, 8:19 pm
Client/contact management: A contact management system that links to information on clients, matters and billings.Task scheduling: A calendaring and reminder system that allows tracking of appointments by day, week or month.Document management: Securely access documents online and track document versions.Trust management: Maintain and track trust transaction records.Practice performance metrics: Track current, expected and target billing figures daily,… [read post]
18 Feb 2022, 1:25 pm
Tesla, Inc.) [read post]
9 Oct 2017, 4:37 pm
Indiana Public Retirement System. [read post]
21 Feb 2017, 10:50 am
In June 2015, the Office of the Chief Scientist of the Air Force produced a vision document for the integration of autonomous systems into the Air Force over the next 30 years. [read post]
9 Mar 2011, 6:05 pm
Pattison served as the controller of Embarcadero Technologies, Inc. [read post]
29 Jul 2017, 5:32 pm
¶ 44.)All the actions taken on behalf of the NCT entities against the Plaintiffs were actually performed by a "servicing agent," either Defendant NCO Financial Systems, Inc. [read post]
18 Feb 2020, 11:49 am
“Information governance advisory services and software are crucial to data security and risk reduction in the entire information management lifecycle-from document management to secure record destruction. [read post]
6 Mar 2012, 9:19 am
Mich.) and Network-1 Security Solutions, Inc. v. [read post]
26 Sep 2016, 10:11 am
HP abused its security update mechanism to trick its customers HP printers, like most other networked computers, have suffered well-documented, catastrophic security vulnerabilities that exposed customers' whole networks to attacks. [read post]
24 Nov 2015, 9:57 am
OCR intends to conduct desk audits and on-site audits of covered entities (CEs) and business associates (BAs), and has contracted with FCi Federal, Inc., to conduct the data security audits. [read post]