Search for: "Center for Information Technology Policy" Results 1301 - 1320 of 5,254
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
12 Oct 2010, 6:56 am by Gwendolyn Majette
  In my article, from Concierge Medicine to Patient-Centered Medical Homes:  International Lessons and the Search for a Better Way to Deliver Primary Health Care in the U.S., I discuss how the patient-centered medical home (PCMH) model is a tool that can be used to improve the provision of primary care in the U.S. based on lessons from international organizations that focus on health policy and an examination of the laws and policies of countries that… [read post]
12 Jun 2021, 4:00 am by Public Employment Law Press
  School Districts East Syracuse-Minoa Central School District – Information Technology (Onondaga County and Madison County) District officials did not adequately apply established information technology (IT) controls to ensure private and sensitive information was protected from unauthorized access, use and loss. [read post]
12 Jun 2021, 4:00 am by Public Employment Law Press
  School Districts East Syracuse-Minoa Central School District – Information Technology (Onondaga County and Madison County) District officials did not adequately apply established information technology (IT) controls to ensure private and sensitive information was protected from unauthorized access, use and loss. [read post]
12 Jun 2021, 4:00 am by Public Employment Law Press
  School Districts East Syracuse-Minoa Central School District – Information Technology (Onondaga County and Madison County) District officials did not adequately apply established information technology (IT) controls to ensure private and sensitive information was protected from unauthorized access, use and loss. [read post]
12 Jun 2021, 4:00 am by Public Employment Law Press
  School Districts East Syracuse-Minoa Central School District – Information Technology (Onondaga County and Madison County) District officials did not adequately apply established information technology (IT) controls to ensure private and sensitive information was protected from unauthorized access, use and loss. [read post]
14 Apr 2014, 8:45 am by WIMS
Holdren on the IPCC's Working Group Report on Climate-Change Mitigation - Statement by Assistant to the President for Science & Technology and Director of the White House Office of Science & Technology Policy Dr. [read post]
14 Jan 2013, 7:55 am by Debra A. McCurdy
Other long-term actions include a final rule implementing ACA requirements related to reporting and returning of overpayments (February 2015); a variety of rules dealing with the 340B discount drug program (timing listed as “to be determined”); and a final HIPAA privacy rule on accounting for disclosures under the Health Information Technology for Economic and Clinical Health Act (TBD). [read post]
31 Jan 2014, 7:33 am
The discussion at the Wilson Center event focused on how most people do not realize that America’s current abundance of oil and gas has greatly changed America’s foreign policy options in the space of only five years. [read post]
19 Jun 2017, 8:17 am
  Entitled, National Security Presidential Memorandum on Strengthening the Policy of the United States Toward Cuba, the Memorandum is well worth reading, if only because it will likely be at the center of future litigation about the scope of jurisdiction of administrative agencies and their authority to enact regulatory changes in the forms they will put forward sometime soon. [read post]
26 May 2016, 5:38 am
Information Technology has seen the most innovation this yearThomson Reuters 2016 State of Innovation Study. [read post]
10 Apr 2025, 12:04 pm by Geoff Schweller
National Whistleblower Center has set up an Action Alert allowing supporters to write to Congress demanding protections for artificial intelligence whistleblowers. [read post]
22 Nov 2012, 1:08 pm by legalinformatics
The workshop is being held in conjunction with JURIX 2012: International Conference on Legal Knowledge and Information Systems, being held 17-20 December 2012 at Leibniz Center for Law, University of Amsterdam. [read post]
19 Dec 2022, 9:05 am by Colin Zick
Requires the routine exchange of information related to cybersecurity threats and reported incidents between the Commonwealth Fusion Center and the Commonwealth Security Operations Center. [read post]
10 Oct 2013, 2:11 pm by Robert B. Milligan
Provide the departing employee with any previously signed agreements pertaining to company property and confidential and trade secret information, including agreements/policies relating to cloud storage. [read post]
4 Oct 2015, 5:24 pm by Mitchell Lazarus
Such a grant is informally called an “office waiver. [read post]
9 Oct 2017, 8:53 am
The conference will center on empirical evidence based in IP statistics and analysis. [read post]
14 Nov 2023, 7:27 am by Beth Kent
The discussion informed the Emmett Institute’s newest report, A Heavy Lift: Policy Solutions to Accelerate Deployment of Zero-Emission Cargo Handling Equipment at the Ports of Long Beach and Los Angeles and Beyond. [read post]