Search for: "Electronic Data Systems Corporation" Results 1161 - 1180 of 2,127
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
25 Mar 2019, 6:11 am by Scarlet Kim, Paulina Perlin
” (Compare that with, for example, the statement by David Lange, the former prime minister of New Zealand, who remarked that “it was not until I read [the] book [“Secret Power” by Nicky Hager, which details the history of New Zealand’s Government Communications Security Bureau] that I had any idea that we had been committed to an international integrated electronic network. [read post]
13 Feb 2024, 4:07 pm by Jason Kelley
  Remember that it takes time to change the system. [read post]
18 Jan 2022, 1:41 am by rainey Reitman
And I'm the Executive Director of the Electronic Frontier Foundation. [read post]
13 Jan 2016, 5:05 pm by Kevin LaCroix
  Second, we explain how and why cybersecurity has begun to eclipse financial reporting as a top corporate risk. [read post]
13 Aug 2021, 5:28 am by Andrew Appel
The basic principle is that someone with physical access doesn’t have to log in using the password, they can just unscrew your hard drive (or SSD, or other memory) and read the data, or overwrite it with modified data, modified application software, or modified operating system. [read post]
17 Feb 2023, 3:46 am by Rob Robinson
EDRM has an international presence in 145 countries, an innovative support infrastructure for individuals, law firms, corporations and government organizations seeking to improve the practice and provision of data and legal discovery. [read post]
23 Sep 2011, 3:17 am by Marie Louise
(Docket Report) Samsung – ALJ Gildea sets procedural schedule in Certain Electronic Devices, Including Wireless Communication Devices, Portable Music And Data Processing Devices, And Tablet Computers (337-TA-794) (ITC Law Blog) Trading Technologies – Court grants limited jurisdictional discovery: Trading Techs. [read post]
9 Jul 2012, 6:15 am by Gritsforbreakfast
Moreover, rapid technological changes in cellphones have blurred the lines on what is legally required to get data — particularly the use of GPS systems to identify the location of cellphones.The Wall Street Journal mentioned the particular concern regarding "cell tower dumps," which are "requests that carriers provide all the phone numbers of cell users that connect with a tower during a specific period of time. [read post]
12 Mar 2010, 9:40 am by axd10
New Liabilities and Policies for Incidental Private Use of Company Electronic Systems and PDAs. 26 Computer & Internet Lawyer 17-18 (July 2009). [read post]
 According to the SIG website, the Bluetooth Specifications enable interoperability between systems by defining the protocol messages that are exchanged between equivalent layers. 3. [read post]
23 Jul 2012, 3:00 am by Terry Hart
New Zealand police and the FBI haven’t responded, and it is highly likely the ruling will be appealed up through the New Zealand court system. [read post]
17 Apr 2012, 1:18 pm by K&L Gates
Apr. 6, 2012) Here, the court granted plaintiff’s motion to compel mirror-imaging of defendants’ personal computers for the purpose of preservation where plaintiff alleged that defendants had wrongfully accessed its computer systems using the personal computers at issue, where plaintiff asserted that defendants’ ongoing use of the computers would result in the loss of relevant data, and where the court determined that in light of the circumstances of the case (and… [read post]
2 Sep 2012, 10:21 pm by Leland E. Beck
And not to be outdone the Federal Deposit Insurance Corporation (FDIC), Federal Reserve System (FRS), and the Department of the Treasury, Comptroller of the Currency (COC) joined forces to publish one final and three proposed rules. [read post]
10 Jan 2012, 7:30 am by Allison Walton
In their plans, agencies must describe how they will improve or maintain their records management programs, particularly with regard to email, social media and other electronic communications. [read post]
14 Jun 2012, 4:30 am by Steven Buckingham
” Stuxnet is computer malware designed to subvert industrial systems, particularly, certain data systems that control and monitor uranium enrichment infrastructure. [read post]
16 Apr 2011, 3:06 pm by Daisy Khambatta
 Prudent corporations should heed the governmental warnings. [read post]
11 Aug 2014, 5:20 am by Randi Morrison
 What types of Board related information might be subject to corporate information governance polices? [read post]
4 Jun 2008, 5:36 pm
In addition, the Electronic Stability Program, which integrates the throttle and brake system to prevent over braking and swerving maneuvers. [read post]