Search for: "Authentic Designs "
Results 781 - 800
of 2,913
Sorted by Relevance
|
Sort by Date
4 May 2012, 1:31 pm
HIPAA was designed to be technology neutral. [read post]
7 Dec 2020, 9:38 am
Senate runoffs in Georgia, new federal voting mandates designed to supersede state laws will institutionalize the chaos. [read post]
16 Jun 2021, 3:15 am
Importance of Legal Privilege: Companies should consider how to maximize the application of legal privilege to internal factfinding efforts that are designed to address potential legal exposure from cybersecurity and data protection rules. [read post]
14 Nov 2017, 3:49 pm
Manipulation and disinformation tactics played an important role in elections in at least 17 other countries over the past year, damaging citizens’ ability to choose their leaders based on factual news and authentic debate. [read post]
12 Aug 2022, 9:55 am
"The reason, it was later determined, was that a vendor had not enabled an authentication tool that keeps messages from being marked as spam, according to people briefed on the discussions. [read post]
31 Oct 2016, 6:37 am
., a doll, a graphic design, or a work of art), a certificate alone probably won’t be enough. [read post]
26 Aug 2023, 4:15 am
Following Steven’s petition, Theresa Pelfrey filed a petition to probate the will and be appointed executrix as Strouder designated in his will. [read post]
23 Oct 2009, 2:35 pm
It is so over-the-top as to not feel authentic. [read post]
9 Oct 2023, 7:00 am
However, the parts being sold by the eBay account are allegedly low-quality counterfeit copies created in China, not authentic Perma-Green products. [read post]
12 Aug 2010, 7:35 am
"Here’s the rule: 'When an authenticated, official, or exact copy of a source is available online, citation can be made as if to the original print source (without any URL information appended).' "An 'exact copy' refers to a PDF file (or scanned page image) that preserves pagination and other attributes of the printed work. [read post]
17 Oct 2010, 6:15 pm
The Federal Motor Carrier Safety Regulations are designed with truck safety in mind. [read post]
17 Dec 2007, 2:20 am
These honeypots are designed to wait for and detect unauthorized use of the IP addresses. [read post]
30 Aug 2007, 10:20 am
Why not use smart cards for authentication? [read post]
29 Sep 2024, 9:01 am
Plaintiff further alleged that defendant continued to produce and sell lubricants with packaging mimicking plaintiff’s design, misleading consumers into believing they were purchasing legitimate products. [read post]
25 Jul 2021, 8:24 am
“A statement of the declarant’s then existing state of mind, emotion, sensation, or physical condition (such as intent, plan, motive, design, mental feeling, pain, and bodily health)” Rule 803 – Hearsay Exceptions; Availability of Declarant Immaterial, Ill. [read post]
10 Mar 2008, 10:00 am
The protection of intellectual property is at the forefront of agreements between nation-states because of the relative ease of copying, and the lax attitude of some nation-states to prevent and punish infringement.[2] A prevailing argument is the thesis that "technology drives investment" and to the extent that technology is reluctant to flow where it is not protected, the lack of an adequate level of protection could stunt technological transfer and foreign investment… [read post]
21 Mar 2009, 4:00 am
The authentication seems designed around the Martindale listing. [read post]
12 Nov 2015, 12:00 pm
According the FCC, Cox’s data systems lacked technical safeguards, such as multi-factor authentication, for the employees that were compromised. [read post]
23 Dec 2018, 6:57 pm
In fact, before these Provisions were announced, the Internet Court in Hangzhou for the first time in China admitted evidence that was authenticated by blockchain technology in an online copyright infringement case (link in Chinese, not official source). [read post]
30 Nov 2006, 12:24 am
mailMAC solves the following problems: Mail deletion by users - mailMAC archives mail before it reaches the user Lack of integrity/authenticity of records - mailMAC uses secure encryption and verification to ensure item integrity Storage efficiency - archiving enables centralised Exchange quota enforcement without fear of items being lost Access to old records - the search capabilities of mailMAC enable easy retrieval of items several periods old … [read post]