Search for: "Secure US, Inc." Results 7921 - 7940 of 17,637
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
9 Jan 2015, 5:00 am by Doug Cornelius
SEC Use of Administrative Proceedings Challenged Again by Thomas O. [read post]
24 Apr 2014, 7:26 am by Nassiri Law
The scheme involved using people’s sick-leave records in order to target those individuals for layoffs. [read post]
12 Jun 2014, 1:36 pm by Tom Bolt
Embassy Suites, Inc. changed the industry’s understanding of this specific legal relationship. [read post]
16 Nov 2015, 11:38 am by Debra A. McCurdy
Exceptional Child Center, Inc. holding that Medicaid providers do not have a cause of action to challenge a state’s Medicaid reimbursement rates. [read post]
15 Apr 2013, 6:00 am by Jon Robinson
A petition for certiorari has been filed in Blackwater Security Consulting, LLC v. [read post]
8 May 2019, 7:14 am by Rebecca Tushnet
  [As Matt Levine of Money Stuff says, sounds like securities fraud because everything is securities fraud.] [read post]
13 Jun 2013, 8:18 am by D. Daxton White
The White Law Group is a national securities fraud, securities arbitration, and investor protection law firm with offices in Chicago, Illinois and Boca Raton, Florida. [read post]
9 May 2012, 3:50 pm by Shannon Harell
 Following settlements with Twitter, Inc. in June 2010, Google, Inc. in March 2011, and Facebook, Inc. in November 2011, on Tuesday, the FTC reached a similar agreement with MySpace LLC (“MySpace”) over its failure to uphold promises made in its privacy policy regarding the collection and dissemination of user information. [read post]
5 Jun 2012, 11:35 am
Bard Inc. and Endo Health Solutions Inc., along with other manufacturers. [read post]
10 Apr 2007, 7:42 am
GATT Method - As used by Pension Appraisers, Inc., it is a method of determining the present value of a defined benefit plan which employs Mortality Tables and the rate on the 30-Year Treasury bond. [read post]
13 Dec 2010, 7:10 am by smlangston
The decision amounts to a repudiation of the process that U.S. authorities use to label people security threats. [read post]
3 Jun 2014, 7:45 am by Steven Boutwell
Allcare Health Management System, Inc. [read post]
3 Jan 2013, 12:46 pm by Cynthia Marcotte Stamer
  Additionally, the Security Rules require specific encryption and other safeguards when covered entities collect, create, use, access, retain or disclose ePHI. [read post]