Search for: "Authentic Designs" Results 1261 - 1280 of 2,918
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
22 Jun 2023, 5:35 am by Robert Kraft
Telecom companies are deploying call authentication technologies like STIR/SHAKEN to verify caller identities and reduce fraudulent calls. [read post]
This act is designed to shield whistleblowers from retribution when they unveil potential legal breaches within publicly traded companies. [read post]
28 Feb 2019, 6:57 am by Michael Beumer
After authentication, they can upload all files or folders via drag-&-drop. [read post]
28 Jun 2007, 7:49 am
., deforming) authentic culture, corporate and technological opacity and barony, &c. [read post]
8 Mar 2016, 10:56 am by Christopher E. Hoyme
In a nutshell, the CFPB alleged that Dwolla’s representations regarding “securely encrypted and stored data,” were inaccurate for a number of specific reasons including: Failing to implement appropriate data security policies and procedures until at least September 2012, Failing to implement a written data security plan until at least October 2013, Failing to conduct adequate risk assessments, Failing to use encryption technology to properly safeguard consumer information, Failing… [read post]
17 Nov 2015, 12:58 pm by Hunton & Williams LLP
., multi-factor authentication) to prevent the compromised credentials from being used to access customer information. [read post]
13 Nov 2020, 6:00 am by Terry Hart
IP rights enable us to protect Enda’s business interests and grow the company, ensuring that when people buy our shoes, they get an authentic, high-quality product. [read post]
14 Feb 2013, 7:15 am by aallwash
We were also pleased to see the Panel’s repeated acknowledgment of the public’s need for permanent public access to authentic government information in tangible and electronic formats. [read post]
27 Oct 2017, 1:12 pm by Linda Holmes
  He also presented historical information and illustrations of the three types of patents available from the USPTO: utility, design, and plant patents. [read post]
14 Nov 2007, 8:56 pm
Deep and frivolous.Tim Gunn is back as the design-room mentor. [read post]
2 Sep 2010, 7:23 am
In addition, there are social media account authentication issues that will have to be addressed. [read post]
7 Mar 2023, 2:25 pm by Overhauser Law Offices, LLC
The EMSCULPT is a non-invasive medical device designed to stimulate muscle contraction using electromagnetic energy. [read post]
15 Oct 2008, 3:27 pm
This family has always practiced the most authentic Christian values and been a model and example for the entire lay and Catholic community of the city. [read post]
19 Apr 2012, 6:51 am by Deborah A. Wilcox
However, validation for proof of use is not required for recording data in the Clearinghouse or for participation in the Trademark Claims – two key aspects designed to help trademark owners monitor their brand. [read post]
6 Nov 2008, 10:45 pm
Both orders allow the judge to apply a “presumption of accuracy and authenticity” for the government’s evidence against a detainee. [read post]
6 Dec 2019, 5:04 am by Joseph J. Lazzarotti
These include: Anti-virus software Firewalls Two-factor authentication Backup software/services Drive encryption Virtual Private Network (VPN) These six protections likely are not enough, other controls include: Train yourself and staff to spot and avoid phishing attacks. [read post]
23 Feb 2008, 12:21 pm
If your bath requires changing a single window, you may have to pay for a design review, additional drawings, or even a public hearing. [read post]