Search for: "Authentic Designs" Results 1321 - 1340 of 2,918
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
 For example, the Controls suggest that outside counsel be required to maintain logical access controls designed to manage access to Company Confidential information and system functionality on a least privilege and need-to-know basis, including through the use of defined authority levels and job functions, unique IDs and passwords, [and] two-factor or stronger authentication for its employee remote access systems. [read post]
2 May 2023, 8:55 pm by Lawrence Solum
Section IV discusses how the key features of blockchain—transparency, traceability, data consistency and security, authenticity, and completeness—can alleviate problems of information asymmetry, rule of law gaps, and corporate compliance along GSCs, further helping to ameliorate transnational human rights issues. [read post]
8 Aug 2013, 11:32 am by Ed Felten
Megamos wirelessly authenticates a key to the car, and vice versa, so that the car can be started only by an authorized key. [read post]
7 Sep 2018, 10:32 am by Bruce Zagaris
Simultaneously, Treasury Secretary Steven Mnuchin announced that the Treasury’s Office of Foreign Assets Control (OFAC) designated Park and KEJV under Executive Order 13722 based on the malicious cyber and cyber-enabled activity alleged in the criminal complaint. [read post]
5 Sep 2009, 11:47 pm
Unlike most churches, perhaps, he spoke with authentic vulnerability. [read post]
21 Apr 2007, 10:11 pm
  "Lisamarie" -- whoever she may be -- is in thrall to pricey designer goods, to the point of starting a blog about them, yet at the same time resents them. [read post]
28 Apr 2023, 6:41 pm by Rudolf J. Karvay
Executors must provide the necessary documents to the probate court, such as the will, death certificate, and an authenticated copy of the domiciliary probate proceedings. [read post]
19 Sep 2008, 10:09 am
The SEC also adopted revisions to Form D designed to simplify and restructure information requirements. [read post]
15 Aug 2024, 5:04 pm by Justia Team
Our state-of-the-art platform is designed specifically for lawyers and law firms, featuring advanced tools tailored to your unique needs. [read post]
17 Nov 2021, 5:20 am by Jackson Biesecker
MFA – Covered businesses are now required to implement multi-factor authentication for all remote connections. [read post]
7 Jan 2014, 6:00 am by Jonathan Brun
If we think about authenticating an audit report and its completion, a signature seems archaic. [read post]
28 Aug 2008, 4:33 pm
The bigger problem comes when the copycats are able to fool others into thinking that they are the authentic source. [read post]
15 Dec 2010, 6:00 pm by Dwight Sullivan
  He argued that the design element hadn’t been satisfied. [read post]
7 Dec 2006, 4:47 pm
  I am uncertain what Hawthorne was hoping for -- Oregonians have reason to be pleased that they were spared something like Maynes' authentically frightening Caltrans District 7 Headquarters, up with which we are obliged to put in downtown Los Angeles. [read post]
3 Jul 2024, 7:33 am by Eric Goldman
Further, Snap can keep these individuals from connecting on its network only if it engages in invasive user authentication, like age authentication (to segregate minors from adults). [read post]
26 Jul 2012, 2:16 am by tekEditor
The resulting specification is a designed-by-committee patchwork of compromises that serves mostly the enterprise. [read post]
24 Mar 2010, 11:55 am by Ryan Singel
According to the flyer: “Users have the ability to import a copy of any legitimate key they obtain (potentially by court order) or they can generate ‘look-alike’ keys designed to give the subject a false sense of confidence in its authenticity. [read post]