Search for: "International Systems v. PERSONNEL DATA"
Results 61 - 80
of 272
Sorted by Relevance
|
Sort by Date
25 Jan 2018, 4:11 am
Data sharing Unless the information is de-identified, prior notice and consent from individuals to the transfer or sharing of their data is required (distinct from the consent that covered the initial collection and processing of data), as is also required by China’s Cybersecurity Law. [read post]
12 Dec 2016, 10:01 pm
Al Almanza at the August 2016 conference of the International Association for Food Protection in St Louis. [read post]
30 Apr 2012, 11:51 am
Schutz Container Systems, Inc. v. [read post]
28 Nov 2011, 11:00 am
Attorney Anthony V. [read post]
9 Aug 2017, 2:23 pm
Utilization of Cybersecurity Personnel and Intelligence The NYDFS expects covered institutions to utilize qualified personnel to manage and oversee the core cybersecurity functions specified in the regulations. [read post]
13 May 2021, 7:06 am
The scope of protection and security must include systems that process data (information technology (IT)) and those that run the vital machinery that ensures our safety (operational technology (OT)). [read post]
5 May 2018, 7:43 am
Sophia Brill returned to last Wednesday’s Supreme Court oral argument in Trump v. [read post]
31 Jan 2019, 2:03 pm
Employees quickly become panicked, while there is often now way even contact company executives, salespersons or any other personnel. [read post]
9 Jan 2012, 5:24 pm
In contrast, in 2011, the court in Syncsort Incorporated v. [read post]
28 Jun 2023, 5:49 pm
DCAA’s Mission Prior to 1965, each military department conducted its own contract audits.[2] Contractor and government personnel recognized the need for consistency. [read post]
6 Dec 2006, 8:21 am
Selection and preparation of internal and external personnel who can testify on the inaccessibility of this data to the courts. “While this new accessibility framework seems fairly straightforward, most companies aren’t prepared to identify proactively the wide range of data types that they will collect and produce in the accelerated time frames,” said David K. [read post]
28 Jan 2009, 4:07 pm
See Chamber of Commerce of the U.S. v. [read post]
15 Jun 2012, 2:38 pm
AnimalFeeds International Corp. (2010) ___ U.S. ___, 130 S.Ct. 1758; AT&T Mobility LLC v. [read post]
9 Dec 2014, 10:38 am
Instead, the best approach is a holistic approach: basic blocking and tackling such as password protection, encryption, employee training, and strong, multi-faceted intrusion detection systems[v] really trump reliance on a “50 foot high firewall” alone. [read post]
8 Mar 2010, 5:03 am
He also permitted police personnel below sergeant's rank to view the video. [read post]
25 Mar 2009, 6:00 am
Yesterday afternoon, an eleven-judge en banc Ninth Circuit panel heard oral argument in Dukes v. [read post]
20 Jan 2016, 9:37 am
A few days later, on October 21, plaintiff received notice from Synchron's Facility Security Officer (`FSO’) that plaintiff had a `red flag’ on the Department of Defense Joint Personnel Adjudication System (`JPAS’) indicating a `pending incident report. [read post]
10 Oct 2018, 12:40 pm
Question #1: Was Google’s Internal Investigation of the Google+ API Vulnerability a Fulsome and Robust Process of Neutrality, Objectivity, Transparency and Candor? [read post]
31 Oct 2011, 6:15 am
Farmers' internal computer systems are password protected with restricted access. [read post]
10 Feb 2021, 7:28 am
With tax season upon us, expect to see more creative attempts to bait your personnel. [read post]