Search for: "Anne Hacker" Results 101 - 120 of 137
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
7 Mar 2012, 5:54 am by Rob Robinson
 bit.ly/xZ4R0Y (Sean Doherty) Windows Server 8 Will Emphasize Storage - bit.ly/x1eya8 (John Mello) YouSendIt Debuts Workstream, A File Sharing Platform For The Enterprise - tcrn.ch/zdbGar (Leena Rao) Vendor Views Industry Landscape 2012-2013 EDRM Kickoff Meeting Set for May 16-17, 2012 - bit.ly/ykAXU1 (EDRM) ACC Mountain West Chapter – 7th Annual CLE & SKI – OrangeLT Sweepstakes - bit.ly/AuQg0X (@OrangeLT) A… [read post]
22 Feb 2012, 9:30 pm by Paul Jacobson
This means that if a hacker, for example, obtained a customer's access credentials, ABSA would regard that hacker as the customer's agent. [read post]
17 Feb 2012, 1:30 am by Monique Altheim
Top stories today via @theprofileva @rtediscovery @derekkol # Hacker Says He Compromised Intel, Gained Private Info http://t.co/9opR6a0a # Brazzers pornography site forum broken into, hacker says more than 350,000 users’ data compromised http://t.co/7Q2O9aDh # NY: Student hacker arrested at Bethlehem High http://t.co/vIXCdfYB # Nl: E-mail via Dutch KPN suspended after data theft http://t.co/rkDnIF34 # Ediscovery and DataProtection Daily is out! [read post]
15 Feb 2012, 8:48 am by Rob Robinson
Peck’s Court - bit.ly/wLHPAm (Michael Roach) Sedona Conference Issues International Principles On Discovery And Data Protection - bit.ly/AmMSng (Steven Bennett) Statistics for eDiscovery – http://bit.ly/zAQKlY (@OrangeLT) Technology on Trial: Predictive Coding - bit.ly/yi98hv (Sean Doherty) Technology: Spoliators and the Sanctions they Receive - bit.ly/ybjDws (Barry Shelton) The Art of Production – How to Minimize Risk When Replying To A… [read post]
18 Dec 2011, 4:11 pm by INFORRM
The Guardian reporter Nick Davies appeared on Newsnight to defend the Guardian’s reporting, alongside NoW’s former head of features Jules Stenson, PCC chair Lord Hunt and journalist Anne Diamond. [read post]
31 Oct 2011, 6:40 am by Lorraine Fleck
Touts Its Cybersecurity Cred on.wsj.com/t5SMK0 Beware social engineering | Hackers Press the ‘Schmooze’ Button on.wsj.com/tC4dhA RIM relents to India demands, sets up local surveillance outpost natpo.st/tT8rSD Apple’s App Store remains top choice for world’s top brands natpo.st/thFCyD Canada | Anti-spam law in limbo as groups seek exceptions bit.ly/rsWGKU Music licensing | Coldplay’s new album off-limits for online music streaming services Canada | $25 million… [read post]
Carrns pointed out that the Privacy Rights Clearinghouse had tracked 313 corporate breaches of data by hackers or by compromising confidential information by the corporation — during the first 8 months of 2011. [read post]
19 Aug 2011, 2:08 pm by M Bates
I say this in response to the recent Herald editorial comment entitled "Impaired Judgment" which discusses the impaired driving sentencing decision of Alberta Provincial Court Judge Anne Brown in the case of Dominika Duris. [read post]
18 Aug 2011, 2:29 pm by Hunton & Williams LLP
  During this time, hackers were able to the access payment card details of more than 5,000 Lush customers who had previously used the company’s website. [read post]
20 Jul 2011, 5:22 am by Rob Robinson
http://tinyurl.com/5vpylk2 (Sarbanes-Oxley Compliance Journal) New Standards Activity for Enterprise Content and Records Management - http://tinyurl.com/4xf8mau (Josette Rigsby) Personal and Professional Use of Digital and Social Media – http://tinyurl.com/6gz3kuk (Socialware) The 2011 GC Compensation Survey - http://tinyurl.com/4xkgqpu (Shannon Green) The Scope and Framework of Successful Information Governance – http://tinyurl.com/3ga7ev8 (Teradata) Technology and Tactics 4 Things IT… [read post]
20 Jul 2011, 5:22 am by Rob Robinson
http://tinyurl.com/5vpylk2 (Sarbanes-Oxley Compliance Journal) New Standards Activity for Enterprise Content and Records Management - http://tinyurl.com/4xf8mau (Josette Rigsby) Personal and Professional Use of Digital and Social Media – http://tinyurl.com/6gz3kuk (Socialware) The 2011 GC Compensation Survey - http://tinyurl.com/4xkgqpu (Shannon Green) The Scope and Framework of Successful Information Governance – http://tinyurl.com/3ga7ev8 (Teradata) Technology and Tactics 4 Things IT… [read post]
19 Jul 2011, 3:24 pm by Kim Zetter
The UK arrest was reportedly of “Tflow”, a former member of the hacker group LulzSec, identified by police as a 16-year-old male. [read post]
29 Apr 2011, 8:28 am by tjsllibrary
I guess these are the rare hackers that prefer millions of dollars over notoriety. [read post]
28 Apr 2011, 3:18 pm by Bexis
By now Restatement (Second) of Torts §402A (1965) is so old as to be thought of as somewhat antediluvian. [read post]
8 Apr 2011, 7:29 am by Adam Thierer
  In critiquing Zittrain’s book, Ann Bartow has noted that “if Zittrain is correct that CompuServe and America Online (AOL) exemplify the evils of tethering, it’s pretty clear the market punished those entities pretty harshly without Internet governance-style interventions. [read post]
8 Apr 2011, 3:03 am
Next up was Anne Marie Verschuur (NautaDutilh, Amsterdam), whose topic was “The use of seized evidence cross border”. [read post]
23 Mar 2011, 4:59 am by Rob Robinson
Andrew Peck) Technology and Tactics 5 Reason Why Google Uses Tape for Disaster Recovery – http://tinyurl.com/4stevdl (B&L Blog) 5 Reasons Why Hackers Want to Break into Your Email Server – http://tinyurl.com/4zaymrq (Paul Mah) Actionable Information Governance - http://tinyurl.com/4la5rer (Steve Bennett) Astroturfing the Message Boards - http://tinyurl.com/4g28lct (Ron Miller) Biles’ Hierarchy of Disaster Recovery Needs – http://tinyurl.com/4v9bbuc (Simon Biles)… [read post]
30 Dec 2010, 6:21 am
The law Walker is being charged under is usually used against hackers intent on making money or causing damage. [read post]