Search for: "Data Processing Systems, LLC" Results 621 - 640 of 1,335
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
9 Aug 2023, 11:25 am by GraceLegere
This includes having systems in place to detect and prevent unauthorized access to records, as well as procedures for the backup and recovery of data in the event of a disaster or other unforeseen event. [read post]
20 Sep 2021, 3:31 pm by Dennis Crouch
Cisco Systems, Inc., asks whether a user-manual counts for a machine that costs $25,000. [read post]
8 Sep 2024, 9:52 pm by Ilana Korchia
Data show that eggs supplied by Milo’s Poultry Farms LLC are contaminated with Salmonella and are making people sick. [read post]
30 Nov 2010, 4:01 pm by Brandon D'Agostino
Thorn Energy, LLC, 2010 WL 1712236 (S.D.N.Y. 2010), the defendant corporation identified a flash drive that contained relevant ESI, but rather than copying that data safely to a centralized evidence repository, the defendant’s employee chose to hold on to the drive, putting it instead into a desk drawer. [read post]
21 Nov 2023, 6:00 am by Adonis Hoffman, Esq.
  Without proper oversight, AI systems can inadvertently perpetuate or even amplify biases present in the data they are trained on. [read post]
10 Aug 2016, 1:27 pm by Steven Boutwell
Ransomware is a form of malware that targets a user’s critical data and systems in order to extort payment for restoration of the data or system. [read post]
17 Jan 2020, 4:50 pm by Mitch Stoltz
Ethos could sell the browsing data of users who visit .ORGs. [read post]
8 Oct 2020, 3:45 pm by Jim Soong
Reprinted with permission from the October 1, 2020 issue of The Intellectual Property Strategist, ALM Media, LLC. [read post]
13 May 2011, 12:57 am by Marie Louise
Teachbook.com, LLC (Internet Cases) (Likelihood of Confusion) [read post]
5 Mar 2012, 7:59 am by Russell S. Whittle Esq. MSCC
Whittle, Esq., is the Vice President of MSP Compliance for Gould & Lamb, LLC. [read post]
15 Jul 2016, 7:00 am by Steve Parker
The guidance also specifies that advisers should identify key personnel, address and specify hard copy and electronic backup copies of all important firm documents and address data disruption events, maintain an inventory of key documents by name, description and location, and maintain a prioritized list of critical firm functions and systems that are used for processing securities transactions, including trading, allocation, clearing, settlement and similar functions. [read post]
15 Jul 2016, 7:00 am by Steve Parker
The guidance also specifies that advisers should identify key personnel, address and specify hard copy and electronic backup copies of all important firm documents and address data disruption events, maintain an inventory of key documents by name, description and location, and maintain a prioritized list of critical firm functions and systems that are used for processing securities transactions, including trading, allocation, clearing, settlement and similar functions. [read post]
6 Nov 2008, 1:14 pm
Any piece of data that could be used to challenge SOX was trotted out, the need for rigor usually a casualty of the process. [read post]