Search for: "Authentic Designs "
Results 1421 - 1440
of 2,913
Sorted by Relevance
|
Sort by Date
12 Sep 2021, 7:01 am
“No concessions” policies are also designed to deny benefits to hostage-takers. [read post]
22 Feb 2022, 5:01 am
One requires encryption of signals for integrity and authentication, but only for the subset of control systems known as positive train control. [read post]
20 Jun 2022, 1:09 pm
Perceived by some as a distraction from existing efforts to create a binding treaty in the field, others consider the treaty design choice for a framework agreement as offering a promising and realistic route. [read post]
8 Jun 2022, 5:01 am
The GDPR basically ensures that some degree of network effects are preserved because, by design, it prevents personal data from being transmitted without consent. [read post]
8 Nov 2017, 7:40 am
In a recent HOA assessment case, the San Antonio court of appeals affirmed a take-nothing judgment entered after exclusion of the association's witness because the witness had not been disclosed and was to do more than merely authenticate business records. [read post]
8 Nov 2017, 7:40 am
In a recent HOA assessment case, the San Antonio court of appeals affirmed a take-nothing judgment entered after exclusion of the association's witness because the witness had not been disclosed and was to do more than merely authenticate business records. [read post]
4 Jan 2017, 8:47 pm
For the requirements in sections 500.04(b) (Chief Information Security Officer report), 500.05 (penetration testing and vulnerability assessments), 500.09 (risk assessment), 500.12 (multi-factor authentication), and 5000.14(a)(2) (cybersecurity training for personnel), the compliance deadline is March 1, 2018. [read post]
11 Mar 2012, 2:27 pm
Levine: Ipsos public affairs – designed to get a spectrum of views. [read post]
10 Jun 2024, 4:00 am
., 2021 as evidence of the pending collapse of democracy, the system worked as designed on that day. [read post]
Generative AI Risk in Legal Research: Is the Fault in the Technology or in Ourselves? Answer is Both
1 Jul 2024, 5:47 am
Lex Machina’s analytics platform was designed through a combination of human and machine analysis of docket data. [read post]
7 Apr 2020, 10:17 am
Disable legacy account authentication. [read post]
3 Mar 2010, 2:44 pm
The incentives for improvement and the protection of invention apply as well to the creator of a new hair-extension design as to a researcher pursuing a cure for cancer. [read post]
22 Jul 2021, 10:35 am
First, target audience and degree of reach: Is the operation designed to target the population of concern, and has it broken into public discourse? [read post]
28 Sep 2015, 8:00 am
These initial examinations were designed to discern basic distinctions in the level of preparedness among the examined firms and focused on cybersecurity governance, network and information security policies and procedures, vendor management policies, and online customer access. [read post]
12 May 2009, 7:38 am
" Prior approval should be sought prior to use of such official designations and markings in marketing or promotional material. [read post]
10 Jul 2018, 5:00 am
Congress passed the Cloud Act as part of an omnibus spending bill in March over the objection of many civil society groups, including the Center for Democracy & Technology (with which I am affiliated). [read post]
27 Jul 2021, 1:17 pm
But it is immediate and authentic. [read post]
25 Apr 2011, 1:00 pm
Article 5 Transmission and authentication of documents 1. [read post]
30 Jul 2012, 3:09 pm
But the researchers found that the terminals do not authenticate the servers with which they communicate, so the researchers were able to design a man-in-the-middle attack that tricks the terminal into communicating with their rogue server and allows them to download malware to the device. [read post]
6 May 2015, 1:39 pm
Upon approval of an application, NDHHS issues a serially numbered MMJ card to the applicant and, if the applicant designates a primary caregiver, to the designated primary caregiver. [read post]