Search for: "Social Security Commission" Results 5201 - 5220 of 8,029
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
22 Sep 2015, 6:04 am by Patrick H. Haggerty
” The definition of personal information is the common definition used in most state data breach laws—the individual’s first name or first initial and last name in combination with a Social Security number, driver’s license number or state identification number, or bank/credit/debit card or account number. [read post]
18 Sep 2015, 9:44 am by Robert B. Milligan and Michael Wexler
Milligan: The constant evolution of technology, particularly in mobile devices, data storage and security, and social media, has created legal challenges for companies and the playing field has changed tremendously. [read post]
15 Sep 2015, 5:53 am by Jack Goldsmith
  The breach, which exposed Social Security numbers and other sensitive details of 80 million customers, is one of the biggest thefts of medical-related customer data in U.S. history. [read post]
14 Sep 2015, 5:04 pm by Sophia Cope
While we believe the bill is ready for a vote, what will likely be discussed during the hearing is the proposed “civil agency” exemption, which would allow the Securities and Exchange Commission and other agencies to obtain without a warrant users’ private cloud content. [read post]
11 Sep 2015, 6:16 am by Jim Sedor
Now, the University of Chicago’s Data Science For Social Good created a tool that will launch later this year that can match legislation across state lines, offering journalists, researchers, and watchdogs an efficient way to track lobbyists’ influence. [read post]
9 Sep 2015, 11:34 am by Elina Saxena, Cody M. Poplin
However, Foreign Policy details a report by investigative journalist Ruslan Leviev who has followed the social media trail left by Russian troops supposedly journeying to Syria. [read post]
5 Sep 2015, 1:28 pm by Graham Smith
Retention of some IP address resolution data was implemented earlier this year by the Counter Terrorism and Security Act. [read post]
5 Sep 2015, 1:28 pm by Graham Smith
Retention of some IP address resolution data was implemented earlier this year by the Counter Terrorism and Security Act. [read post]
3 Sep 2015, 4:03 pm by Bill Otis
 And the recidivism rate for FSA beneficiaries is, according to the Sentencing Commission, over 40%. [read post]
1 Sep 2015, 6:07 am
Freedom to manifest one’s religion or beliefs shall be subject only to such limitations as are prescribed by law and are necessary in a democratic society in the interests of public safety, for the protection of public order, health or morals, or for the protection of the rights and freedoms of others.Article 14 provides: Prohibition of discriminationThe enjoyment of the rights and freedoms set forth in this Convention shall be secured without discrimination on any ground such as… [read post]
The case was highly anticipated by the data security community generally for its expected ruling on the authority of the Federal Trade Commission to regulate data security standards, but nowhere was the anticipation more keen than in the hospitality industry. [read post]
27 Aug 2015, 6:00 am by Administrator
” A loud chatter on social media, supported by articles in the print media and online, ask whether Duffy is guilty of any crime at all – at least insofar as the cheque is concerned – and why the cross-examination of Wright unfolded in the way that it did. [read post]
27 Aug 2015, 4:00 am by Ian Mackenzie
The Canadian Coalition for Good Governance, in submissions to the Ontario Securities Commission relating to women on boards, stated that it believed that a “robust evaluation process rather than term limits or retirement age is the best means of ensuring high quality board members, but perhaps boards will need to impose term limits or retirement ages in order to refresh themselves. [read post]
26 Aug 2015, 2:15 pm by Robert B. Milligan and Amy Abeloff
  Further, a report commissioned by IT security company Symantec revealed that half of the survey respondents, employees from various countries, including the United States, revealed that they have taken their former employer’s trade secret information, and 40 percent say they will use it in their new jobs. [read post]
26 Aug 2015, 1:53 pm by Rebecca Jeschke
Esterhuysen was inducted into the Internet Hall of Fame in 2013, and she currently serves on the Global Commission on Internet Governance. [read post]
24 Aug 2015, 11:17 am by Woodruff Family Law Group
An ex-spouse rather frequently finds out that the other spouse has used his/her social security number to obtain credit, such as a credit card. [read post]
24 Aug 2015, 5:53 am by Brian Nussbaum
  They've described high profile data breaches, as well as attack vectors and tactics from exploit kits to social engineering, and have even served as a platform for neighboring states to make cyber security related announcements. [read post]
19 Aug 2015, 5:52 am
At the time of the attack on GitHub, Baidu denied any involvement and said that its own internal security hadn’t been compromised: “After careful inspection by Baidu’s security engineers, we have ruled out the possibility of security problems or hacker attacks on our own products,” the company said. [read post]