Search for: "Social Security Agency" Results 5701 - 5720 of 12,062
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
13 Jun 2019, 5:31 pm by schlangerlaw
Inmate identity theft takes many forms, including opening of credit accounts in the prisoner’s name, taking out student loans using an inmate’s Social Security number, and tax fraud. [read post]
27 May 2016, 6:12 am
Creditor Rights, Claims Enforcement, and Bond Returns in Mergers and Acquisitions Posted by Luc Renneboog, Tilburg University, on Friday, May 20, 2016 Tags: Bankruptcy, Bondholders, Bonds, Credit exposure, Cross-border transactions, Debt, Debtor-creditor law, Europe,International governance, Legal systems, Merger announcements, Mergers & acquisitions, Risk arbitrage, Takeover premiums, Takeovers Prioritizing Cybersecurity: Five Questions for Portfolio Company Boards Posted by Glenn Davis,… [read post]
1 Mar 2013, 3:15 pm by Stephen Bilkis
A social service group was assigned as the foster care agency to manage the family. [read post]
4 Nov 2013, 9:46 am by Jane Chong
And there are legitimate parallels between the vehicle safety crisis of the 1960s and today’s software security conundrum. [read post]
11 Sep 2017, 11:39 am by Sarah M. Field
Yet the interdependence of those rights (civil, political, social, economic and cultural) is repeatedly understated. [read post]
1 Mar 2012, 6:14 pm by Al Saikali
Starting in November 2009, employees of targeted companies were subjected to social engineering, spear-phishing e-mails, and network exploitation. [read post]
11 May 2012, 11:52 am by Suzanne Ito
Senate would seek to stop employers from requesting passwords or access to an employee's account on Facebook and other social networks. [read post]
11 Jul 2015, 2:14 pm by Cynthia Marcotte Stamer
According to OCR, its investigation of the complaint revealed among other things that: SEMC improperly disclosed the PHI of at least 1,093 individuals; SEMC failed to implement sufficient security measures regarding the transmission of and storage of ePHI to reduce risks and vulnerabilities to a reasonable and appropriate level; and SEMC failed to timely identify and respond to a known security incident, mitigate the harmful effects of the security incident, and document… [read post]
2 May 2018, 11:16 am by Wenqing Zhao, David Stanton
It is difficult for those agencies to criticize similar actions by U.S. agencies without appearing hypocritical. [read post]
14 Jul 2015, 8:13 pm by Stephen Bilkis
If he chose to seek judicial review of the agency's determination, he would have to secure independent counsel. [read post]
20 Mar 2023, 10:00 pm by Guest Author
To achieve another “great compression,” we must put agency expertise to use to create a fairer economy and, to do that, we must restore faith in government. [read post]
16 Sep 2017, 4:38 pm by INFORRM
 Racists and terrorists, and many other extremists, have used the internet for decades and adapted as technology evolved, shifting from text-only discussion forums to elaborate and interactive websites, custom-built secure messaging systems and even entire social media platforms. [read post]
16 Sep 2017, 4:38 pm by INFORRM
 Racists and terrorists, and many other extremists, have used the internet for decades and adapted as technology evolved, shifting from text-only discussion forums to elaborate and interactive websites, custom-built secure messaging systems and even entire social media platforms. [read post]
16 Sep 2017, 4:38 pm by INFORRM
 Racists and terrorists, and many other extremists, have used the internet for decades and adapted as technology evolved, shifting from text-only discussion forums to elaborate and interactive websites, custom-built secure messaging systems and even entire social media platforms. [read post]
18 Nov 2022, 9:05 pm by Anilya Krishnan
Department of Homeland Security (DHS), Cuffari recommends that the agency create a unified strategy to counter disinformation on social media. [read post]
16 Feb 2020, 7:00 am by Karen Young
Agency for International Development. [read post]
14 Jul 2023, 2:13 pm by Yan Luo, Xuezi Dan and Jayne Ponder
Security Assessment and Filing: While the Measures do not specifically identify any high risk services, Generative AI Services “with the attributes of public opinion or the capacity for social mobilization” are subject to the requirement to carry out security assessment and conduct algorithm filing. [read post]
20 Sep 2021, 1:18 pm by Daniel Schlanger
Identity thieves can do this by accessing personal information such as bank PINs, Social Security numbers, birthdates, and addresses. [read post]