Search for: "Data Processing Systems, LLC" Results 601 - 620 of 1,321
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
8 Feb 2007, 12:24 am
They developed a vision of storing this set of collected works and data in a secure, Web-based collaboration system. [read post]
30 Jul 2021, 8:06 am by Laura Keeler
What you may be saving on the balance sheet by resisting upgrading any law office technology creates its own costs, such as unnecessary time, extra hassle and data security risks (never use systems that are no longer supported; those system updates protect you). [read post]
27 Jul 2017, 6:30 am by Michael B. Stack
  Thought leaders within the industry are exploring how this technology can also be used to fit other aspects of the claims process to streamline the system and reduce program costs. [read post]
29 May 2019, 5:06 pm by Kevin LaCroix
Here is how a typical ransomware extortion scheme works: Ransomware attackers break into a corporate system and encrypt, or lock-up, a corporate victim’s data. [read post]
5 Aug 2015, 10:01 pm by Cathy Siegner
., director of the Center for Food Safety and Security Systems at the University of Maryland. [read post]
17 Aug 2009, 4:20 am
A claims processor would retrieve the mortgage default data directly from the servicers accounting system (with 70% of the Servicers, this would be MSP, which is owned and supported by LPS) and complete the Proof of Claim form. [read post]
6 May 2014, 4:26 pm by BakerHostetler
The cyber threat is much broader than customer data privacy as addressed by the Securities and Exchange Commission’s Regulations S-P (regarding privacy of consumer financial information) and S-ID (regarding identity theft). [read post]
9 Aug 2023, 11:25 am by GraceLegere
This includes having systems in place to detect and prevent unauthorized access to records, as well as procedures for the backup and recovery of data in the event of a disaster or other unforeseen event. [read post]
20 Sep 2021, 3:31 pm by Dennis Crouch
Cisco Systems, Inc., asks whether a user-manual counts for a machine that costs $25,000. [read post]
30 Nov 2010, 4:01 pm by Brandon D'Agostino
Thorn Energy, LLC, 2010 WL 1712236 (S.D.N.Y. 2010), the defendant corporation identified a flash drive that contained relevant ESI, but rather than copying that data safely to a centralized evidence repository, the defendant’s employee chose to hold on to the drive, putting it instead into a desk drawer. [read post]