Search for: "Authentic Designs" Results 1341 - 1360 of 2,918
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
28 Feb 2023, 11:51 am by Unknown
In cybersecurity, we might see them conduct employee awareness training for phishing, deploy multi-factor authentication, or buy expensive security tools. [read post]
3 Jul 2023, 11:00 am by Rebecca Tushnet
” Zuluaga told a designer to look at Industria’s website when creating Latinfood’s packaging designs for Zenú and Ranchera and brought one of Industria’s Ranchera labels to the designer’s office. [read post]
3 Jul 2024, 5:55 am by Rob Robinson
Commitment to Authenticity and Transparency In line with its commitment to authenticity and transparency, ComplexDiscovery OÜ regularly publishes detailed communication metrics. [read post]
21 Mar 2023, 6:35 am by Elliot Siebers and Ali Albazzaz
” The settlement requires DDC to develop, implement, and maintain a comprehensive information security program that is reasonably designed to safeguard the security, integrity, and confidentiality of the company’s collected, stored, transmitted, and/or maintained personal information. [read post]
20 May 2014, 2:12 pm by Alexander Major
” The part is deemed “counterfeit” when found to be an unlawful or unauthorized reproduction, substitution, or alteration that has been knowingly mismarked, misidentified, or otherwise misrepresented to be an authentic, unmodified electronic part from the original manufacturer, or a source with the express written authority of the original manufacturer or current design activity, including an authorized aftermarket manufacturer. [read post]
In addition, this year we’ve gotten even better at designing the platform and job search tools to reflect candidate preferences. [read post]
5 Apr 2016, 2:58 pm by Alex Braun
Nextpoint employs two-factor authentication, meaning both users and their specific device (laptop, tablet, etc.) must be verified with a unique password and PIN to log in. [read post]
25 Jun 2011, 1:42 pm by legalinformatics
Abstract: Several public institutions and agencies around the world have designed and implemented important electronic government strategies and plans. [read post]
17 Apr 2018, 8:00 am by David Kitchen
A company utilizes web based email access but has not enabled multi-factor authentication. [read post]
22 May 2008, 6:36 am
Gave piece of mind to senior management yet designed something that was social. [read post]
2 Apr 2024, 8:38 am by Holly
In addition, Amazon has introduced some other adjacent services to have product authentication or listing verification quicker. [read post]
1 Mar 2016, 8:01 am by Paul Otto and Brian Kennedy
And all of the controls are designed to be highly scalable to the needs of each organization. [read post]
21 Sep 2009, 10:51 am
Com Subject: XXXXXXXX Date: September 4, 2009 8:09:50 PM EDT To: Simon Fodden Delivered-To: simon@xxxx.com Received: by 10.220.86.205 with SMTP id t13cs205780vcl; Fri, 4 Sep 2009 17:09:55 -0700 (PDT) Received: by 10.150.210.8 with SMTP id i8mr19614943ybg.41.1252109395087; Fri, 04 Sep 2009 17:09:55 -0700 (PDT) Received: from deed.osgoode.yorku.ca (deed.osgoode.yorku.ca [130.63.63.52]) by mx.google.com with ESMTP id 26si5263977ywh.35.2009.09.04.17.09.54; Fri, 04 Sep 2009 17:09:54 -0700 (PDT)… [read post]
19 Dec 2023, 8:50 am by zola.support.team
Appoint a Digital Executor: Designate someone you trust as your digital executor in your will or estate plan. [read post]
11 Mar 2020, 4:20 am by Nancy Halstead and Vicki Tankle
 According to ONC, the attestations will serve to identify whether or not health IT developers support encrypting authentication credentials and/or multi-factor authentication. [read post]
5 Apr 2016, 2:58 pm by Alex Braun
Nextpoint employs two-factor authentication, meaning both users and their specific device (laptop, tablet, etc.) must be verified with a unique password and PIN to log in. [read post]