Search for: "Data Processing Systems, LLC"
Results 601 - 620
of 1,321
Sorted by Relevance
|
Sort by Date
2 Feb 2021, 9:18 am
To meet their obligations, firms must understand their vendors’ processes for carrying out those functions. [read post]
8 Feb 2007, 12:24 am
They developed a vision of storing this set of collected works and data in a secure, Web-based collaboration system. [read post]
8 Jan 2019, 12:31 am
-based companies processing EU citizen personal data, including employee data. [read post]
25 Oct 2019, 2:06 pm
Data Security and Deletion. [read post]
18 Apr 2017, 4:08 pm
However, in Secure Axcess, LLC v. [read post]
30 Jul 2021, 8:06 am
What you may be saving on the balance sheet by resisting upgrading any law office technology creates its own costs, such as unnecessary time, extra hassle and data security risks (never use systems that are no longer supported; those system updates protect you). [read post]
2 Jun 2014, 2:33 pm
DATA TARGETING, INC., et al., Respondents. [read post]
27 Jul 2017, 6:30 am
Thought leaders within the industry are exploring how this technology can also be used to fit other aspects of the claims process to streamline the system and reduce program costs. [read post]
29 May 2019, 5:06 pm
Here is how a typical ransomware extortion scheme works: Ransomware attackers break into a corporate system and encrypt, or lock-up, a corporate victim’s data. [read post]
5 Aug 2015, 10:01 pm
., director of the Center for Food Safety and Security Systems at the University of Maryland. [read post]
28 Jun 2011, 12:14 pm
Cisco Systems, 2010 WL 2813618 (N.D. [read post]
17 Aug 2009, 4:20 am
A claims processor would retrieve the mortgage default data directly from the servicers accounting system (with 70% of the Servicers, this would be MSP, which is owned and supported by LPS) and complete the Proof of Claim form. [read post]
6 May 2014, 4:26 pm
The cyber threat is much broader than customer data privacy as addressed by the Securities and Exchange Commission’s Regulations S-P (regarding privacy of consumer financial information) and S-ID (regarding identity theft). [read post]
2 Oct 2016, 12:11 pm
Hulu, LLC, 772 F.3d 709, 716 (Fed. [read post]
19 Mar 2019, 11:15 am
Buckeye Tree Lodge & Sequoia Village Inn, LLC v. [read post]
16 Dec 2009, 8:53 am
Las Lomas Land Co., LLC v. [read post]
8 Jan 2019, 12:52 pm
Relying on Integrated Logistics Support Systems International, Inc. v. [read post]
9 Aug 2023, 11:25 am
This includes having systems in place to detect and prevent unauthorized access to records, as well as procedures for the backup and recovery of data in the event of a disaster or other unforeseen event. [read post]
20 Sep 2021, 3:31 pm
Cisco Systems, Inc., asks whether a user-manual counts for a machine that costs $25,000. [read post]
30 Nov 2010, 4:01 pm
Thorn Energy, LLC, 2010 WL 1712236 (S.D.N.Y. 2010), the defendant corporation identified a flash drive that contained relevant ESI, but rather than copying that data safely to a centralized evidence repository, the defendant’s employee chose to hold on to the drive, putting it instead into a desk drawer. [read post]