Search for: "Electronic Data Systems Corporation" Results 1021 - 1040 of 2,127
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
5 Jan 2015, 3:31 pm by nedaj
Section 16 filings are required for “corporate insiders” (including beneficial owners of 10% or more of a registered voting equity security). [read post]
5 Jan 2015, 6:00 am by Rakesh Madhava
And, there’s a lot for an in-house IT department to manage: Billing and timekeeping systems, electronic messaging systems including email and mobile messaging, document management systems, and docketing and matter management. [read post]
2 Jan 2015, 10:47 am by Barry Sookman
,  2014 BCSC 89, found that an idea for re-engineering an order tracking and shipping system was not protectable as “there is no copyright in any arrangement, system, scheme or method for doing a particular thing or process”. [read post]
27 Dec 2014, 2:19 am by Ben
More from Europe: In Case C-355/12 Nintendo v PC Box the CJEU said that circumventing a protection system may not be unlawful. [read post]
22 Dec 2014, 11:09 am by Jeff Neuburger
In the wake of the incident, I expect that we will see a renewed focus on the security of all electronic data, including email. [read post]
22 Dec 2014, 11:09 am by Jeff Neuburger
In the wake of the incident, I expect that we will see a renewed focus on the security of all electronic data, including email. [read post]
17 Dec 2014, 7:00 am by Ewa Kacperek and Jakub Baczuk
Data controllers who choose not to appoint an AIS will still be required to register personal data filing systems that are maintained electronically (which, in itself, constitutes an alleviation of the existing registration obligations which concern all data filing systems whether paper or electronic). [read post]
15 Dec 2014, 7:56 am
Computerized medical devices, such as dialysis machines, radiology systems, and medication dispensing systems that are integrated with electronic medical records ("EMRs") and the larger health network, pose a growing threat to the security and privacy of personal health information. [read post]
15 Dec 2014, 5:12 am by Jon Hyman
The fact is that unions are increasingly more technologically sophisticated in their organizing tactics, and I wonder how many are relying on corporate email systems for communication. [read post]
15 Dec 2014, 5:00 am by Steve Brachmann
Patent applications disclose anti-fogging compound for better visibility through vehicle windows and electronic data systems designed to enable community monitoring of local criminal offenders... [read post]
15 Dec 2014, 5:00 am by Steve Brachmann
Patent applications disclose anti-fogging compound for better visibility through vehicle windows and electronic data systems designed to enable community monitoring of local criminal offenders... [read post]
9 Dec 2014, 10:38 am by Kevin LaCroix
 In a recent book co-authored by Kevin Mandia – the founder (quoted above) of security consulting firm, Mandiant (now FireEye/Mandiant) – entitled Incident Response and Computer Forensics, Mandia simplifies this definition for today’s cyber environment:   An incident is “any unlawful, unauthorized, or unacceptable action that involves a computer system, cell phone, tablet, and any other electronic device with an operating system or that… [read post]
8 Dec 2014, 12:01 pm by Wells Bennett
For example, the US company Verint sells cell phone tracking systems to both corporations and governments worldwide. [read post]
25 Nov 2014, 5:23 pm by Michel-Adrien
Library and Archives Canada does not have a corporate digital strategy for the preservation of digital data. [read post]
18 Nov 2014, 7:04 am by Rebecca Jeschke
Let's Encrypt will be overseen by the Internet Security Research Group (ISRG), a California public benefit corporation. [read post]
10 Nov 2014, 6:38 am by Barry Sookman
The Government of Canada Backgrounder says that “Canada’s Digital Privacy Act provides important improvements to Canada’s private sector privacy legislation, the Personal Information Protection and Electronic Documents Act (PIPEDA)” and that it “will ensure that Canadians are safer and more secure when they surf the web or shop online”. [read post]
7 Nov 2014, 11:54 am by Andy Wang
” Principle 6 provides an example of such a “pretext call”: An agent is seeking information about an attack on a computer system. [read post]
6 Nov 2014, 3:36 am by SHG
In essence, hash numbers are unique number-strings that can be used to archive packets of data —“fingerprint[s]” for electronic media. [read post]