Search for: "International Systems v. PERSONNEL DATA" Results 61 - 80 of 272
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
25 Jan 2018, 4:11 am by Yan Luo and Phil Bradley-Schmieg
Data sharing Unless the information is de-identified, prior notice and consent from individuals to the transfer or sharing of their data is required (distinct from the consent that covered the initial collection and processing of data), as is also required by China’s Cybersecurity Law. [read post]
12 Dec 2016, 10:01 pm by Dan Flynn
Al Almanza at the August 2016 conference of the International Association for Food Protection in St Louis. [read post]
30 Apr 2012, 11:51 am by Rebecca Tushnet
Schutz Container Systems, Inc. v. [read post]
Utilization of Cybersecurity Personnel and Intelligence The NYDFS expects covered institutions to utilize qualified personnel to manage and oversee the core cybersecurity functions specified in the regulations. [read post]
13 May 2021, 7:06 am by Bryce Klehm
 The scope of protection and security must include systems that process data (information technology (IT)) and those that run the vital machinery that ensures our safety (operational technology (OT)). [read post]
5 May 2018, 7:43 am by Rachel Bercovitz
Sophia Brill returned to last Wednesday’s Supreme Court oral argument in Trump v. [read post]
31 Jan 2019, 2:03 pm by Kevin LaCroix
  Employees quickly become panicked, while there is often now way even contact company executives, salespersons or any other personnel. [read post]
28 Jun 2023, 5:49 pm by Keith Szeliga and Emily Theriault
DCAA’s Mission Prior to 1965, each military department conducted its own contract audits.[2] Contractor and government personnel recognized the need for consistency. [read post]
6 Dec 2006, 8:21 am
Selection and preparation of internal and external personnel who can testify on the inaccessibility of this data to the courts. “While this new accessibility framework seems fairly straightforward, most companies aren’t prepared to identify proactively the wide range of data types that they will collect and produce in the accelerated time frames,” said David K. [read post]
9 Dec 2014, 10:38 am by Kevin LaCroix
Instead, the best approach is a holistic approach:  basic blocking and tackling such as password protection, encryption, employee training, and strong, multi-faceted intrusion detection systems[v] really trump reliance on a “50 foot high firewall” alone. [read post]
8 Mar 2010, 5:03 am by Susan Brenner
He also permitted police personnel below sergeant's rank to view the video. [read post]
25 Mar 2009, 6:00 am
Yesterday afternoon, an eleven-judge en banc Ninth Circuit panel heard oral argument in Dukes v. [read post]
20 Jan 2016, 9:37 am
A few days later, on October 21, plaintiff received notice from Synchron's Facility Security Officer (`FSO’) that plaintiff had a `red flag’ on the Department of Defense Joint Personnel Adjudication System (`JPAS’) indicating a `pending incident report. [read post]
10 Oct 2018, 12:40 pm by Kevin LaCroix
Question #1: Was Google’s Internal Investigation of the Google+ API Vulnerability a Fulsome and Robust Process of Neutrality, Objectivity, Transparency and Candor? [read post]
31 Oct 2011, 6:15 am by Susan Brenner
Farmers' internal computer systems are password protected with restricted access. [read post]