Search for: "Store" Results 5841 - 5860 of 96,271
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
22 Apr 2023, 5:11 am by Percipient Team
 Much of the costs were charges from an e-discovery vendor to collect and search electronically stored information (ESI), including e-mails relating to Cardinal. [read post]
22 Apr 2023, 5:11 am by Percipient Team
 Much of the costs were charges from an e-discovery vendor to collect and search electronically stored information (ESI), including e-mails relating to Cardinal. [read post]
21 Apr 2023, 2:51 pm by Sophia Cope
  It creates a new civil claim and corresponding Section 230 carveout to encourage private lawsuits against internet companies and app stores for the “promotion or facilitation” of child exploitation, the “hosting or storing of child pornography,” or for “making child pornography available to any person”—all based on the very low standard of negligence. [read post]
21 Apr 2023, 9:11 am by omnizant.support
From ill-maintained sidewalks to spills at the grocery store, poor conditions can quickly lead to injury. [read post]
21 Apr 2023, 7:53 am by Bob Ambrogi
” Hashing is a method of storing users’ passwords in an encrypted format so they are more secure. [read post]
21 Apr 2023, 6:11 am by Dan Bressler
Personal information is stored indefinitely with no insight on how that data is secured and protected. [read post]
21 Apr 2023, 6:00 am by William C. MacLeod and Darby Hobbs
On Tuesday April 18, FTC Chair Khan, and Commissioners Bedoya and Slaughter spent almost three hours responding to criticism and compliments before the Subcommittee on Innovation, Data, and Commerce of the House Energy and Commerce Committee. [read post]
21 Apr 2023, 4:21 am
"[A]ll Respondent had done was to display one tube of ULTRA SUN sunscreen to make the item available for sale on its website, and make that same tube available for sale at its retail store. [read post]
20 Apr 2023, 5:49 pm by Sabrina I. Pacifici
In addition to letting you store your usernames, passwords, and notes, you can also add any randomly generated email aliases that you can use as a replacement for your real address…” [read post]
20 Apr 2023, 2:03 pm by The Murray Law Firm
As reported by Click2Houston.com, “[t]wo teenagers were injured in a shooting Tuesday night outside of a store in the Houston Heights area…Officers were called to a strip center parking lot on Yale and Koehler Street at around 6 p.m. [read post]
20 Apr 2023, 12:36 pm by News Desk
  The products were distributed to retail stores throughout Alabama, Arkansas, Florida, Georgia, Illinois, Indiana, Kentucky, Michigan, Missouri, North Carolina, Ohio, Oklahoma, Pennsylvania, Texas, Virginia and Wisconsin. [read post]
20 Apr 2023, 10:18 am by Bruce Clark
The products were distributed to retail stores throughout Alabama, Arkansas, Florida, Georgia, Illinois, Indiana, Kentucky, Michigan, Missouri, North Carolina, Ohio, Oklahoma, Pennsylvania, Texas, Virginia, and Wisconsin. [read post]
20 Apr 2023, 10:17 am by Holly
”[1] Therefore, a specimen for goods must show the mark physically or directly affixed to the goods, such as on the goods itself, on a label/tag attached to the goods, on the product packaging or container of the product, a point-of-sale display where the trademark is on the website where your goods can be purchased, or a display in a store where the physical products are also displayed. [read post]
20 Apr 2023, 9:44 am by Dan Harris
It then notes how a “full decoupling probably isn’t in store for the United States and China, unless the two countries go to war. [read post]
20 Apr 2023, 7:04 am by Paul Willetts
      Papa-T was incorporated by the Plaintiff to contract with the Defendant and to keep this work separate from the Plaintiff’s shoe store company;2. [read post]
20 Apr 2023, 4:30 am by Eric B. Meyer
Hobby Lobby Stores, Inc. in 2014 and the Court’s 2020 decision in Bostock v. [read post]
The order broadly defines “commercial spyware” as “any end-to-end software suite that is furnished for commercial purposes, either directly or indirectly through a third party or subsidiary, that provides the user of the software suite the capability to gain remote access to a computer, without the consent of the user, administrator, or owner of the computer” in order to do any of the following: access, collect, exploit, extract, intercept, retrieve, or transmit content,… [read post]