Search for: "Authentic Designs"
Results 1601 - 1620
of 2,918
Sort by Relevance
|
Sort by Date
3 Feb 2017, 1:37 pm
This post examines an opinion from the Court of Appeals of Texas, El Paso: O’Brien v. [read post]
2 Feb 2017, 9:29 am
Biometric technology such as facial recognition, iris scans, or fingerprint authentication is being used and further developed to improve the security of financial and other sensitive transactions. [read post]
29 Jan 2017, 7:04 pm
The implementation of safeguards to control risks, such as multi-factor authentication for remote access, an intrusion detection system, quarterly vulnerability assessments and annual penetration testing, together with testing of systems, controls and safeguards on a regular basis. [read post]
27 Jan 2017, 10:28 am
-Mexico border and drafting executive orders that would halt all refugee admissions; declare a moratorium on new multilateral treaties; mandate audits of U.S. funding for international organizations; and review U.S. cyber capabilities and designations of foreign terrorist organizations. [read post]
27 Jan 2017, 9:23 am
This law gave the Department of State the responsibility for publishing, distributing and authenticating copies of each law passed by Congress. [read post]
26 Jan 2017, 3:22 am
Opposer Luxco had the burden to prove by a preponderance of the evidence that the designation TEQUILA is generic. [read post]
24 Jan 2017, 4:13 am
So can the implementation of more securely designed email systems and authentication protocols. [read post]
5 Jan 2017, 2:22 pm
Throughout 2016, Seyfarth Shaw’s dedicated Trade Secrets, Computer Fraud & Non-Competes Practice Group hosted a series of CLE webinars that addressed significant issues facing clients today in this important and ever-changing area of law. [read post]
5 Jan 2017, 2:22 pm
Throughout 2016, Seyfarth Shaw’s dedicated Trade Secrets, Computer Fraud & Non-Competes Practice Group hosted a series of CLE webinars that addressed significant issues facing clients today in this important and ever-changing area of law. [read post]
4 Jan 2017, 8:47 pm
For the requirements in sections 500.04(b) (Chief Information Security Officer report), 500.05 (penetration testing and vulnerability assessments), 500.09 (risk assessment), 500.12 (multi-factor authentication), and 5000.14(a)(2) (cybersecurity training for personnel), the compliance deadline is March 1, 2018. [read post]
4 Jan 2017, 10:24 am
Building a Legal Practice Designed to Last: What Are Others Saying About You? [read post]
3 Jan 2017, 6:33 am
Multi-Factor Authentication. [read post]
1 Jan 2017, 8:58 pm
[9] The plaintiff submits that the trial judge discounted the evidence of expert witnesses called by the plaintiff on the design of gas delivery systems and the behaviour of workers. [read post]
29 Dec 2016, 4:10 pm
Unfortunately, this “mixed mode” design may do more harm than good by teaching users the wrong lessons about encryption. [read post]
Financial Industry Groups Criticize New York Department of Financial Services Cybersecurity Proposal
21 Dec 2016, 12:40 pm
Moreover, some third parties that engage in penetration testing force firms to disclaim liabilities associated with such tests; and The requirement that a Covered Entity designate a CISO (a) does not accommodate other titles that might already exist within a firm that fulfill the same functions as a CISO and (b) does not recognize how certain firms have information systems governed by the CISO of an affiliate or a subsidiary. [read post]
19 Dec 2016, 9:39 am
The link was designed to function as a confidence-building measure and should not be confused with the White House-Kremlin Direct Communication line, or secure hotline, used to manage crisis situations. [read post]
1 Dec 2016, 10:13 am
Apparently one no longer has to provide a fax number to have a complete agent designation, which is good news. [read post]
21 Nov 2016, 6:14 am
Design with system and operational disruption in mind. [read post]
14 Nov 2016, 10:31 am
The ruling was that if one should expect the bones in this authentic chowder, that the user had essentially assumed the risk of this type of injury. [read post]
9 Nov 2016, 9:29 am
The children were placed in foster care, and mother signed a case plan designed to address her issues, which included mental health, substance abuse and intellectual disability. [read post]