Search for: "Authentic Designs " Results 681 - 700 of 2,901
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
9 Jan 2014, 9:54 pm by Monique Altheim
(Especially the panel on Privacy by Design, on 1/22/14, which will be moderated by me). [read post]
19 Oct 2022, 3:30 am by Eric B. Meyer
Today, we’re going to focus on the importance of a prompt employer response that is reasonably designed to end the complained-of behavior. [read post]
30 Dec 2015, 6:17 am by Paul Otto
The security principles guide companies to incorporate security at the design stage, then maintain it through regular software updates, continuous threat monitoring, and sound authentication and encryption practices. [read post]
15 Sep 2010, 10:00 am by Stephanie Figueroa
  Maybe it’s because an on-looker can only imagine what’s in my little shopping bag, whereas they can speculate as to the authenticity of my accessories. [read post]
23 Mar 2022, 3:05 am by Nicholas Shepherd and Dan Cooper
  Here, the EDPB gives the example of a platform requesting a phone number for two-factor security authentication of an account, even though an email address could also be used for the same purpose (e.g., to prove a that particular user is in possession of the device used to log into the platform). [read post]
19 Sep 2014, 11:45 am by Kate Fort
Keshick quickly mastered both the traditional cultural designs as well as the basic wildlife and floral designs for which her family was known and which are passed down from generation to generation. [read post]
17 May 2015, 9:07 am by Aaron Weems
As an interim order, this matter was scheduled for an evidentiary hearing and designated complex which allowed the parties to conduct discovery (typically “simple” support cases do not permit discovery). [read post]
14 Jun 2024, 4:00 am by jonathanturley
And, as @AshaRangappa has noted, even if the content was authentic, it still may have been a Russian influence operation, just like the DNC hack-and-leak operation, designed to sow discord. [read post]
10 Apr 2017, 12:01 pm by Nathan D. Taylor and Adam Fleisher
” In a slight twist, the program must also be designed to fulfill applicable reporting obligations imposed by the Rule. [read post]
10 Jan 2024, 10:52 am by Eric Goldman
Most websites will see few ways to mitigate that risk other than to do age authentication and screen out the under-16s. [read post]
27 Dec 2020, 7:07 am by Russell Knight
A statement of the declarant’s then existing state of mind, emotion, sensation, or physical condition (such as intent, plan, motive, design, mental feeling, pain, and bodily health)” Ill. [read post]
21 Jan 2008, 6:42 am
Mifare Classic was designed to use a secret encryption algorithm. [read post]
20 May 2022, 8:04 am by Marina Wilson
However, if budget is a concern, you can treat the design of your case study much like you would a new blog post on your site. [read post]
27 Oct 2014, 1:16 pm by Gene Quinn
This terminal apparatus is designed to aid in blood pressure monitoring among many individuals. [read post]
1 Aug 2018, 3:59 pm by Ted Max and Chidera Anyanwu
Aside from the obvious lack of authenticity by displacing supermodels and celebrity influencers, there are potential legal issues that arise in the United States with respect to the use of digital models. [read post]
1 Aug 2018, 3:59 pm by Ted Max and Chidera Anyanwu
Aside from the obvious lack of authenticity by displacing supermodels and celebrity influencers, there are potential legal issues that arise in the United States with respect to the use of digital models. [read post]
1 Aug 2018, 3:59 pm by Ted Max and Chidera Anyanwu
Aside from the obvious lack of authenticity by displacing supermodels and celebrity influencers, there are potential legal issues that arise in the United States with respect to the use of digital models. [read post]
3 Aug 2011, 12:00 pm by Kim Zetter
But Beresford found a way to bypass this authentication protection. [read post]