Search for: "Educational Technologies Limited" Results 4521 - 4540 of 6,226
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
30 Nov 2021, 1:00 am by Joe Mullin
The podcast that explores some of the biggest problems we face online right now: problems whose source and solution is often buried in the obscure twists of technological development, societal change and the subtle details of internet law. [read post]
28 Jan 2020, 9:58 am by John Bolesta and Keahn Morris
These anticipated cases and rule changes include but certainly are not limited to the following. [read post]
7 Jun 2017, 10:14 am by Jeff Rasansky
The bill (which was approved by the Texas House panel) would have prohibited the use of portable wireless technology while operating a motor vehicle within the state, but was ultimately defeated in the Senate before becoming law. [read post]
21 Apr 2010, 3:55 pm by Guest Blogger
I admit to shallow knowledge in this field- but a cursory examination of US IP law highlights pretty significant limitations on the use of injunctions in IP cases (17 USC 512(j)). [read post]
8 Jan 2019, 12:38 pm by Cynthia Marcotte Stamer
The Report says these limitations create several problems, including: Patients should be able to easily and securely access their medical data through their smartphones. [read post]
For example, a contractor selling medical devices to the Department of Veterans Affairs may fall under different safeguarding and reporting requirements than a contractor providing cloud services for an educational agency or a state university. [read post]
17 Jun 2024, 6:06 am by Raquel Vázquez Llorente
  What might more widespread knowledge of these technological developments mean for user-generated evidence in accountability processes? [read post]
24 May 2023, 5:16 pm by Cynthia Marcotte Stamer
While MedEvolve’s customers generally were medical practices or other health care providers, self-insured health plans, health insurers and health plan service providers subject to HIPAA as covered entities and business associates often also rely upon third-party systems or services that involve sharing of health plan PHI with or rely upon third party provided servers, technology or other resources to collect and administer health plan data and administer health plan functions. [read post]
2 Sep 2022, 9:13 am by Cynthia Marcotte Stamer
He then served as the Charlotte District Office’s outreach and education coordinator and a program analyst in the Office of Field Programs before becoming Houston’s deputy director in 2017. [read post]
13 Aug 2009, 8:49 am
Other instructors respond that by signing a contract with the law school, our students have engaged us to be trustees for their education, and to use our trained judgment to do whatever we can, within the bounds of law and reasonableness, to maximize our beneficiaries' educations. [read post]
28 Nov 2022, 12:56 pm by Cynthia Marcotte Stamer
OSHA’s role is to ensure these conditions for America’s workers by setting and enforcing standards, and providing training, education and assistance. [read post]
The recent revelations from Silicon Valley giants Facebook, Google, and Microsoft—revelations that Russia likely spent hundreds of thousands of dollars on politically targeted advertising that spread disinformation—illustrate how Moscow is pursuing long-standing foreign policy goals while adapting to changing technology. [read post]
28 Nov 2018, 4:00 am by Ken Chasse
[See the full text article for this summary on the SSRN, using the same title] Law societies are not trying to solve the A2J problem, but instead provide “alternative legal services”[1] that merely help that majority of the population that cannot afford legal services learn to live with the problem. [read post]
16 Sep 2013, 6:33 am by Barry Sookman
[iii] The Australian law also has broader exemptions, such as for charities and educational institutions which CASL does not have. [read post]
As outlined below, many agencies have security requirements in place for protecting unclassified technology resources that may require contractors to produce an information technology “security plan,” provide security training, and maintain procedures for detecting and reporting security incidents. [read post]
5 Oct 2023, 6:37 pm
It provides a basis for re-thinking the fundamentals of the way in which one understands the interface between humanity and its increasingly autonomous technology, and between the idea of humanity as innate in itself against the reality that the human may now be more intensely manifested in its interfacing with increasingly self-generative machine intelligence and the hardware within which it resides. [read post]
24 Jun 2016, 10:18 am by John Elwood
The petitioner in Life Technologies Corporation v. [read post]
25 Jul 2023, 3:57 am by Rob Robinson
Russian forces conducted limited ground attacks in the western Donetsk-eastern Zaporizhia oblasts border area. [read post]
26 Jun 2013, 7:32 pm by Larry Catá Backer
To match strategy and meet the reality challenges of solving all historical problems once for all, Chinese laws under the social transformation, including civil law are exploring and testing the specific limits of nation and society, practicing the Chinese featured transformed civil law model with socialist factors with the historical duties of balanced development and stability, just and efficiency. [read post]
6 Dec 2006, 6:45 pm
That they are now being patented may be as much a function of changes in the innovation system as of the utilization of patents in new fields of technology. [read post]