Search for: "Authentic Designs " Results 961 - 980 of 2,913
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
31 Aug 2020, 5:54 pm by Jean O'Grady
 They are the most important prerequisite in designing a digital library strategy. [read post]
31 Aug 2020, 3:39 pm by Alexis Hancock
So privacy and equity must be foremost in discussions about how to design digital identification. [read post]
28 Aug 2020, 1:58 pm
Most of them are designed to keep me from overthinking things. [read post]
25 Aug 2020, 3:08 pm by Rory Mir
Industry leaders need to commit to the principles of privacy by design, security, transparency, and data minimization. [read post]
20 Aug 2020, 2:13 am
Lawyers recognized are divided by geographic region and practice areas, and are reviewed by their peers on the basis of professional expertise, and undergo an authentication process to make sure they are in current practice and in good standing. [read post]
20 Aug 2020, 2:13 am
Lawyers recognized are divided by geographic region and practice areas, and are reviewed by their peers on the basis of professional expertise, and undergo an authentication process to make sure they are in current practice and in good standing. [read post]
17 Aug 2020, 8:49 am by Rebecca Tushnet
” This constituted “passing off Italian VSL#3 as the authentic De Simone Formulation,” which “squarely violates the Permanent Injunction’s bar on ‘stating or suggesting’ that Italian VSL#3 ‘continues to contain’ the DeSimone Formulation. [read post]
13 Aug 2020, 8:18 am by Rebecca Tushnet
Oneida’s representatives expressed enthusiasm, and designated her as an “authorized distributor” in late 2018. [read post]
13 Aug 2020, 5:31 am by Rob Robinson
Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established. [read post]
10 Aug 2020, 7:59 am by Eleonora Rosati
Blockchain technology is being used to fight counterfeits and parallel imports, and can also help track the products' journey in the supply chain, guarantee authenticity and help address the consumers' demands for more transparency. [read post]
6 Aug 2020, 10:23 pm by Jeff Richardson
If you get a new iPhone and you need to move the Microsoft Authenticator app to your new device, your best bet may be to contact the IT department. [read post]
5 Aug 2020, 2:37 pm by Katitza Rodriguez
WhatsApp made a specific privacy-by-design implementation that protects users by making forwarding indistinguishable for WhatsApp server from other kinds of communications. [read post]
5 Aug 2020, 7:59 am by Mark Rienzi
This article is part of a SCOTUSblog symposium on the Roberts court and the religion clauses. [read post]
2 Aug 2020, 2:20 pm
I was delighted to read the June 2020 announcement by Claire Methven O’Brien (Senior Researcher, Research Department, Danish Institute for Human Rights; Lecturer, School of Law, University of Dundee (cob@humanrights.dk) of her proposed Draft text for a Business and Human Rights Treaty. [read post]
31 Jul 2020, 12:38 pm by Rebecca Tushnet
Verified accounts on Instagram: can get a check mark as authentic presence of a global brand represented by a public figure. [read post]
30 Jul 2020, 2:55 pm by Kit Walsh
Nothing in this section shall be compulsory for persons engaged in the production of devices or components, including their parts and their selection, for electronic, telecommunication or computer products, provided that said products are not destined to carry Unlawful conduct, and This provision adopts a broad definition of ‘technological protection measure’ or TPM, so that a wide range of encryption and authentication technologies will trigger this provision. [read post]
The enhanced security requirements focus on promoting (1) penetration-resistant architecture, (2) damage-limiting operations, and (3) designs to achieve cyber resiliency and survivability. [read post]