Search for: "Authentic Designs " Results 1101 - 1120 of 2,913
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
25 Jun 2024, 9:39 am by Chante Westmoreland
Anti-counterfeiting laws are designed to combat the production, distribution, and sale of fake products that mimic genuine brands, ranging from luxury goods and electronics to pharmaceuticals and automotive parts. [read post]
3 Oct 2018, 5:58 pm by Ani Gevorkian and Jadzia Pierce
The bill specifies that one way a manufacturer can meet this reasonableness standard for a device equipped with a means for authentication outside a local area network is to include a preprogrammed password unique to each device or to include a security feature that requires a user to generate a new means of authentication before access is granted to the device for the first time. [read post]
20 May 2024, 9:01 pm by News Desk
Oil authenticity and Easter checksIn other work, ASAE’s southern regional unit helped to check the authenticity and quality of olive oil sold in Portalegre, Beja, and Silves. [read post]
8 Apr 2023, 5:50 am by Lex-Warrier
These resources offer pre-designed contract structures and provisions that can be customized to fit specific needs. [read post]
16 Sep 2015, 2:10 pm by Proskauer on Privacy
It may also review how a firm verifies authenticity of client requests to transfer funds. [read post]
1 Apr 2016, 5:54 pm by Richard Hunt
Second, part of making sure a letter is reliable is confirming not only that it is authentic, but that the author is qualified to make the diagnosis of disability. [read post]
9 May 2017, 11:43 am by Randal L. Gainer
The same Russian-based criminal group, designated by Mandiant as “Fin5,” was responsible for five of the 10 largest network intrusion attacks. [read post]
17 Mar 2011, 1:00 pm by Christine Hurt
How authentic can these shows be when producers design challenges for the participants and then editors alter filmed scenes? [read post]
16 Dec 2010, 7:53 am by admin
  These include things like: Issuance of shares: section 23(1) Meetings by electronic means: section 94(2) Quorum at a shareholder meeting: section 101(1) Manner of voting at shareholder meetings: section 103(1) Calling of shareholder meeting: section 105(5) Making, amending, or repealing the by-laws of the corporation that regulate the business and affairs of the corporation: section 116 The location of a meeting of the board of directors: section 126(2) Quorum at a director meeting: section… [read post]
1 May 2020, 11:24 am by Genevieve Perez and Jason Mueller
AI company Tangent.ai is seeking to capitalize on this with an algorithm designed to help consumers determine what products will look like on them. [read post]
9 Feb 2015, 4:00 am by HL Chronicle of Data Protection
’s knowledge-based authentication as a new verifiable parental consent method and in 2014, the Commission approved iVeriFly, Inc. [read post]
26 Dec 2006, 12:09 pm
  Because TrueView Vignettes are unscripted, they bring out a lawyer's authentic voice. [read post]
3 Sep 2013, 10:19 am by Ron Coleman
Some sellers have even included the serial number found at the bottom of each e-meter in their listings in order to authenticate them. [read post]
20 Jul 2008, 4:46 pm
Identity management and network authentication 10 + 2. [read post]
26 Nov 2018, 2:45 pm by Foran & Foran, P.A.
 However, the plaintiffs did not introduce any evidence to authenticate the images, or show that they depicted what the plaintiffs claimed. [read post]
26 Dec 2006, 12:09 pm
  Because TrueView Vignettes are unscripted, they bring out a lawyer's authentic voice. [read post]
28 May 2015, 7:49 am by Joseph J. Lazzarotti
In addition, firms must adopt policies and procedures reasonably designed to ensure that their associated persons who participate in social media sites for business purposes are reasonably supervised to ensure that their communications are fair and balanced. [read post]
For example, the FTC recommends that systems be designed to automatically reject passwords that are too obvious or simple and to suspend accounts whenever multiple incorrect logins have been attempted. [read post]