Search for: "Authentic Designs " Results 781 - 800 of 2,913
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
4 May 2012, 1:31 pm by Scott Koller
  HIPAA was designed to be technology neutral. [read post]
7 Dec 2020, 9:38 am by Tom Smith
Senate runoffs in Georgia, new federal voting mandates designed to supersede state laws will institutionalize the chaos. [read post]
16 Jun 2021, 3:15 am by Lynn Jokela
Importance of Legal Privilege: Companies should consider how to maximize the application of legal privilege to internal factfinding efforts that are designed to address potential legal exposure from cybersecurity and data protection rules. [read post]
14 Nov 2017, 3:49 pm by Sabrina I. Pacifici
Manipulation and disinformation tactics played an important role in elections in at least 17 other countries over the past year, damaging citizens’ ability to choose their leaders based on factual news and authentic debate. [read post]
12 Aug 2022, 9:55 am by Jon Brodkin
"The reason, it was later determined, was that a vendor had not enabled an authentication tool that keeps messages from being marked as spam, according to people briefed on the discussions. [read post]
31 Oct 2016, 6:37 am by Matthew Dresden
., a doll, a graphic design, or a work of art), a certificate alone probably won’t be enough. [read post]
26 Aug 2023, 4:15 am by Berniard Law Firm
Following Steven’s petition, Theresa Pelfrey filed a petition to probate the will and be appointed executrix as Strouder designated in his will. [read post]
9 Oct 2023, 7:00 am by Kenan Farrell
However, the parts being sold by the eBay account are allegedly low-quality counterfeit copies created in China, not authentic Perma-Green products. [read post]
12 Aug 2010, 7:35 am by Jim Calloway
"Here’s the rule: 'When an authenticated, official, or exact copy of a source is available online, citation can be made as if to the original print source (without any URL information appended).'    "An 'exact copy' refers to a PDF file (or scanned page image) that preserves pagination and other attributes of the printed work. [read post]
17 Oct 2010, 6:15 pm
The Federal Motor Carrier Safety Regulations are designed with truck safety in mind. [read post]
17 Dec 2007, 2:20 am
These honeypots are designed to wait for and detect unauthorized use of the IP addresses. [read post]
29 Sep 2024, 9:01 am by Evan Brown
Plaintiff further alleged that defendant continued to produce and sell lubricants with packaging mimicking plaintiff’s design, misleading consumers into believing they were purchasing legitimate products. [read post]
25 Jul 2021, 8:24 am by Russell Knight
“A statement of the declarant’s then existing state of mind, emotion, sensation, or physical condition (such as intent, plan, motive, design, mental feeling, pain, and bodily health)” Rule 803 – Hearsay Exceptions; Availability of Declarant Immaterial, Ill. [read post]
10 Mar 2008, 10:00 am
The protection of intellectual property is at the forefront of agreements between nation-states because of the relative ease of copying, and the lax attitude of some nation-states to prevent and punish infringement.[2] A prevailing argument is the thesis that "technology drives investment" and to the extent that technology is reluctant to flow where it is not protected, the lack of an adequate level of protection could stunt technological transfer and foreign investment… [read post]
21 Mar 2009, 4:00 am
The authentication seems designed around the Martindale listing. [read post]
12 Nov 2015, 12:00 pm by Mark Brennan
  According the FCC, Cox’s data systems lacked technical safeguards, such as multi-factor authentication, for the employees that were compromised. [read post]
23 Dec 2018, 6:57 pm by Sara Xia
In fact, before these Provisions were announced, the Internet Court in Hangzhou for the first time in China admitted evidence that was authenticated by blockchain technology in an online copyright infringement case (link in Chinese, not official source). [read post]
30 Nov 2006, 12:24 am
mailMAC solves the following problems: Mail deletion by users - mailMAC archives mail before it reaches the user Lack of integrity/authenticity of records - mailMAC uses secure encryption and verification to ensure item integrity Storage efficiency - archiving enables centralised Exchange quota enforcement without fear of items being lost Access to old records - the search capabilities of mailMAC enable easy retrieval of items several periods old … [read post]