Search for: "Electronic Data Systems Corporation"
Results 1021 - 1040
of 2,127
Sort by Relevance
|
Sort by Date
5 Jan 2015, 3:31 pm
Section 16 filings are required for “corporate insiders” (including beneficial owners of 10% or more of a registered voting equity security). [read post]
5 Jan 2015, 6:00 am
And, there’s a lot for an in-house IT department to manage: Billing and timekeeping systems, electronic messaging systems including email and mobile messaging, document management systems, and docketing and matter management. [read post]
2 Jan 2015, 10:47 am
, 2014 BCSC 89, found that an idea for re-engineering an order tracking and shipping system was not protectable as “there is no copyright in any arrangement, system, scheme or method for doing a particular thing or process”. [read post]
27 Dec 2014, 2:19 am
More from Europe: In Case C-355/12 Nintendo v PC Box the CJEU said that circumventing a protection system may not be unlawful. [read post]
22 Dec 2014, 11:09 am
In the wake of the incident, I expect that we will see a renewed focus on the security of all electronic data, including email. [read post]
22 Dec 2014, 11:09 am
In the wake of the incident, I expect that we will see a renewed focus on the security of all electronic data, including email. [read post]
17 Dec 2014, 7:00 am
Data controllers who choose not to appoint an AIS will still be required to register personal data filing systems that are maintained electronically (which, in itself, constitutes an alleviation of the existing registration obligations which concern all data filing systems whether paper or electronic). [read post]
15 Dec 2014, 7:56 am
Computerized medical devices, such as dialysis machines, radiology systems, and medication dispensing systems that are integrated with electronic medical records ("EMRs") and the larger health network, pose a growing threat to the security and privacy of personal health information. [read post]
15 Dec 2014, 5:12 am
The fact is that unions are increasingly more technologically sophisticated in their organizing tactics, and I wonder how many are relying on corporate email systems for communication. [read post]
15 Dec 2014, 5:00 am
Patent applications disclose anti-fogging compound for better visibility through vehicle windows and electronic data systems designed to enable community monitoring of local criminal offenders... [read post]
15 Dec 2014, 5:00 am
Patent applications disclose anti-fogging compound for better visibility through vehicle windows and electronic data systems designed to enable community monitoring of local criminal offenders... [read post]
9 Dec 2014, 10:38 am
In a recent book co-authored by Kevin Mandia – the founder (quoted above) of security consulting firm, Mandiant (now FireEye/Mandiant) – entitled Incident Response and Computer Forensics, Mandia simplifies this definition for today’s cyber environment: An incident is “any unlawful, unauthorized, or unacceptable action that involves a computer system, cell phone, tablet, and any other electronic device with an operating system or that… [read post]
8 Dec 2014, 12:01 pm
For example, the US company Verint sells cell phone tracking systems to both corporations and governments worldwide. [read post]
25 Nov 2014, 5:23 pm
Library and Archives Canada does not have a corporate digital strategy for the preservation of digital data. [read post]
25 Nov 2014, 5:37 am
Supreme Court decision in Alice Corporation Pty Ltd. v. [read post]
21 Nov 2014, 11:22 am
Electronic submission. [read post]
18 Nov 2014, 7:04 am
Let's Encrypt will be overseen by the Internet Security Research Group (ISRG), a California public benefit corporation. [read post]
10 Nov 2014, 6:38 am
The Government of Canada Backgrounder says that “Canada’s Digital Privacy Act provides important improvements to Canada’s private sector privacy legislation, the Personal Information Protection and Electronic Documents Act (PIPEDA)” and that it “will ensure that Canadians are safer and more secure when they surf the web or shop online”. [read post]
7 Nov 2014, 11:54 am
” Principle 6 provides an example of such a “pretext call”: An agent is seeking information about an attack on a computer system. [read post]
6 Nov 2014, 3:36 am
In essence, hash numbers are unique number-strings that can be used to archive packets of data —“fingerprint[s]” for electronic media. [read post]