Search for: "First Data Corporation" Results 8061 - 8080 of 12,669
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
1 Mar 2015, 4:30 am by Barry Sookman
http://t.co/s6yHGnpp5z -> Intellectual Property Rights and Municipal Transit Data http://t.co/P6ngQeioX8 -> Computer and Internet Law Updates for 2015-02-23: Will 2015 Be The Year Piracy Dies? [read post]
27 Feb 2015, 12:27 pm by Rakesh Madhava
The first step to improving law firm security is clear: Encrypting data where its stored and while it’s being transferred. [read post]
27 Feb 2015, 11:52 am by Rebecca Tushnet
Gene patents first granted in early 1980s. [read post]
27 Feb 2015, 9:30 am by Gene Takagi
@AlliantU becomes a benefit corporation, blurring the line between for-profit and nonprofit: http://bit.ly/1BemMtn The post Nonprofit Tweets of the Week – 2/27/15 appeared first on Nonprofit Law Blog. [read post]
26 Feb 2015, 10:00 pm by Doug Austin
Zinn, Managing Director of Huron Consulting Group: eDiscovery TrendsThe First 7 to 10 Days May Make or Break Your Case: eDiscovery Best Practices  [read post]
26 Feb 2015, 5:22 pm by Tanya Forsheit and Will Hellmuth
With respect to data breaches, Director Rich first recognized a universal truth: there is no such thing as perfect data security. [read post]
25 Feb 2015, 12:50 pm by Kevin Smith, J.D.
The post Resistance is Futile appeared first on Scholarly Communications @ Duke. [read post]
25 Feb 2015, 12:50 pm by Kevin Smith, J.D.
The post Resistance is Futile appeared first on Scholarly Communications @ Duke. [read post]
25 Feb 2015, 6:25 am by Rebecca Tushnet
Mich. 2009), applying Michigan law, held that the First Amendment privilege includes “‘all types of factual, educational, and historical data, or even entertainment and amusement, concerning interesting phases of human activity in general. [read post]
24 Feb 2015, 2:53 pm by HL Chronicle of Data Protection
To help companies protect their employees and customers from cyber threats, the report recommends that corporate counsel follow a 10-point cybersecurity agenda first proposed in 2012 by Hogan Lovells Partner Harriet Pearson:  Fulfill Fiduciary Duty of Board and Management. [read post]
24 Feb 2015, 7:19 am by Michael Beumer
Nextpoint is the premier provider of cloud-based collection, eDiscovery, and trial practice technology and the first to validate cloud computing as a means to address exploding volumes of data involved in litigation. [read post]
23 Feb 2015, 10:59 pm by Andres
I mean, you have to be the most incredibly sophisticated data collector in existence. [read post]
23 Feb 2015, 8:49 am by Mark S. Goldstein
This provision echoes a similar obligation already embodied in the Business Corporation Law, pursuant to which employees may recover unpaid compensation from the 10 largest shareholders of a corporation. [read post]
22 Feb 2015, 9:03 pm by Kevin LaCroix
The growth in this kind of litigation first and foremost represents a frequency problem for D&O insurers. [read post]
22 Feb 2015, 4:04 pm by INFORRM
Data Protection The Hawktalk blog argues that the Data Protection Regulation is likely to provide a lower level of protection than the current Data Protection Directive. [read post]
20 Feb 2015, 3:11 pm by Kenneth J. Vanko
In 2013, the Administration rolled its strategy to mitigate trade secrets theft - the first of its kind executive-level white paper that specifically identified trade secrets protection as part of a national economic security strategy.In January of this year, the Administration went further than I anticipated by endorsing amendments to the somewhat controversial Computer Fraud and Abuse Act. [read post]
20 Feb 2015, 6:23 am by Jim Sedor
Just one month after becoming the first Oregon governor to start a fourth term, Kitzhaber became the first to resign because of alleged misconduct, as he and his fiancée, Cylvia Hayes, continue to be investigated for misusing their influence for personal gain. [read post]
20 Feb 2015, 4:24 am by Kevin LaCroix
Indeed, Price himself states that his article is “the first to present extensive data on bondholder actions. [read post]
19 Feb 2015, 1:30 pm by Carrie Cordero
To that end, the report offered a number of proposals aimed towards first, reviewing the European Union’s information technology and security practices, and second, improving the union’s competency at providing for its own technology and communications infrastructure and needs. [read post]