Search for: "AUTOMATIC PROTECTION SYSTEMS" Results 4401 - 4420 of 5,986
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
22 Mar 2011, 12:33 pm by Christopher Brown, Matrix.
The Court did not accept her view that there can be direct discrimination even where some members of the disadvantaged group do fulfil the requirement which is satisfied automatically by members of the advantaged group. [read post]
14 Aug 2022, 9:18 am by Eric Goldman
Even if CNN made overreaching or tendentious arguments (which I don’t think they did), the legal system has several mechanisms to protect good-faith mistakes by media outlets. [read post]
8 Nov 2023, 7:56 am by Dan Pepper (US)
Covered entities must now conduct a penetration test at least annually from both inside and outside of the covered entity’s information systems’ boundaries (500.5). [read post]
25 May 2011, 4:06 am by Rob Robinson
James-Weir) Search Warrant Protocol - What Every Company Should Do to Prepare - http://tinyurl.com/3echfva (Hayes Hunt) Service Versus Surveillance: Has Computer Technology Outpaced the Legal System? [read post]
16 Apr 2009, 11:01 pm
"In these instances, the CIPAV did not deliver its payload because of system incompatibility. [read post]
20 Jul 2020, 3:12 am by Thorsten Bausch (Hoffmann Eitle)
The BMJV’s reasons attached to the current draft bill seem to take it as a given that when the UK withdraws, the jurisdiction of its Central Division will automatically cede on the two remaining Central Divisions in Paris and Munich. [read post]
30 Jun 2019, 2:25 pm by Katherine Gallo
Connect to a Virtual Private Network (VPN) which protects privacy by masking the physical location of the devices connected. [read post]
17 Apr 2019, 11:30 pm by Dáire McCormack-George
Access by service providers of one member state to the market of another member state is a fundamental part of the GATS but is not granted automatically. [read post]
25 Mar 2011, 1:23 pm
’s (“Apple”) APP STORE mark worthy of trademark protection or is the mark merely a generic term which deserves no protection? [read post]
23 Oct 2022, 2:48 pm by Lawrence Taylor
If you have an employment contract, it might protect you from being fired for certain criminal convictions. [read post]
2 Sep 2016, 11:45 am by Edward Smith
Pittsburg Firefighters Control Home Fire Pittsburg Firefighters Control Home Fire I’m Ed Smith, a Pittsburg Personal Injury Attorney. [read post]
15 Jan 2015, 9:57 am by Maureen Johnston
Camsoft Data Systems, Inc. 14-628Issue: (1) Whether a plaintiff waives its right to appeal under Caterpillar, Inc. v. [read post]
25 Nov 2019, 9:56 am by Brett Holubeck
Age is a protected characteristic and is protected under the ADEA (The Age Discrimination and Employment Act of 1967). [read post]
7 Sep 2019, 4:16 pm by INFORRM
Critics point out the risk of “dolphins in the net” – lawful expression and information that is misidentified, caught, and erased by automated systems. [read post]
1 Jul 2007, 1:21 pm
IV-E cases, where the child(ren) is being raised not by one of their own parents but in the foster care system by a person, family, or institution and the case is also automatically referred to the CSE to recoup or defray the costs of foster care. [read post]
21 Oct 2007, 5:08 am
Automated Voice Response System (AVR) Telephone system that makes frequently requested information available to clients over touch-tone telephones. [read post]
12 Mar 2024, 9:01 pm by renholding
”  The agencies seek public comment on transactions involving private-equity firms, health systems, private payers, and alternative asset managers. [read post]
11 Feb 2009, 6:30 am
"[T]he facts contained in these quality committee minutes, peer review minutes without deliberative content are not privileged. * * * The use of this factual information in some way in the peer review or quality care committee's process alone is insufficient to automatically cloak such information with the protection of nondisclosure. [read post]
11 Nov 2015, 3:46 am by SHG
They needed a champion within the system. [read post]
Do we have email security systems in place that will automatically open attachments and analyze whether they are dangerous before allowing the email to be sent along to the recipient employee? [read post]