Search for: "Computer Programs and Systems, Inc." Results 781 - 800 of 1,493
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
15 Oct 2012, 8:13 am by Charles Johnson
Layering is the process of converting funds after they have entered the legitimate system. [read post]
10 Oct 2012, 12:05 pm by Jay McDaniel
IVI, Inc., 691 F.3d 275 (2d Cir. 2012), involved a company that retransmitted telephone programs over the Internet. [read post]
8 Oct 2012, 1:43 pm by Glenn
Microsoft was held liable under Section 2 for deceiving Java developers that Java programs written with Microsoft’s JRE tools would be OS-indifferent. [read post]
28 Sep 2012, 10:52 am by Amber Walsh
  Reviewing the organization’s plan documents, training programs, security systems and preparedness for a HIPAA audit are among the most important elements to evaluate, and investors would be well served to include such review in their diligence process. [read post]
28 Sep 2012, 10:52 am by Amber Walsh
Reviewing the organization’s plan documents, training programs, security systems and preparedness for a HIPAA audit are among the most important elements to evaluate, and investors would be well served to include such review in their diligence process. [read post]
13 Sep 2012, 6:00 am by Rebecca Shafer, J.D.
At the end of the month, adjusters who had not closed enough old claims closed files in the computer system that had little current activity. [read post]
10 Sep 2012, 4:42 am by Susan Brenner
  Basically, these seven sections make it a crime under California law to knowingly access without permission and (i) alter, damage, delete, destroy, take, copy or make use of any data, computer software or computer programs in a computer or computer network, (ii) use or cause computer services to be used, (iii) disrupt or cause the disruption of computer services or cause the denial of computer services to an authorized… [read post]
7 Sep 2012, 11:01 am by admin
The insurance companies routinely refuse to pay market prices for homes and replacement contents, they use computer programs to cut payouts, they change policy coverage with no clear explanation, they ignore or alter engineering reports, and they sometimes ask their adjusters to lie to customers, court records and interviews with former employees and state regulators show. [read post]
4 Sep 2012, 10:39 am by Ron Coleman
In case that was a serious question in your mind, the Second Circuit Court of Appeals answered it last week: In September 2010, ivi, Inc. began live streaming WPIX’s copyrighted programming over the internet to paying subscribers who downloaded ivi’s TV player onto their computers. [read post]
1 Sep 2012, 3:10 pm by Russell Beck
Explorica, Inc.) seemingly to the contrary, applied a narrow interpretation to the Computer Fraud and Abuse Act. [read post]
31 Aug 2012, 1:02 pm by David Kravets
Photo: theogee/Flickr A federal appeals court is dealing a death blow to an upstart service that streams broadcast television over the internet, ruling that ivi Inc. is not a cable system and therefore is not protected by the Copyright Act. [read post]
31 Aug 2012, 3:00 am by Joan Feldman
Business Intelligence Associates, Inc. [read post]
31 Aug 2012, 3:00 am by Joan Feldman
Business Intelligence Associates, Inc. [read post]
28 Aug 2012, 11:40 am
LivingSocial also induces infringement by, for example, encouraging use of its computer-based program by consumers and advertisers through the use of discounts and incentives, Blue Calypso says. [read post]
28 Aug 2012, 11:40 am
LivingSocial also induces infringement by, for example, encouraging use of its computer-based program by consumers and advertisers through the use of discounts and incentives, Blue Calypso says. [read post]
28 Aug 2012, 11:40 am
LivingSocial also induces infringement by, for example, encouraging use of its computer-based program by consumers and advertisers through the use of discounts and incentives, Blue Calypso says. [read post]