Search for: "Authentic Designs" Results 1601 - 1620 of 2,918
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
3 Feb 2017, 1:37 pm
This post examines an opinion from the Court of Appeals of Texas, El Paso: O’Brien v. [read post]
2 Feb 2017, 9:29 am by Jeffrey Neuburger
Biometric technology such as facial recognition, iris scans, or fingerprint authentication is being used and further developed to improve the security of financial and other sensitive transactions. [read post]
29 Jan 2017, 7:04 pm by Rosemary McKenna
The implementation of safeguards to control risks, such as multi-factor authentication for remote access, an intrusion detection system, quarterly vulnerability assessments and annual penetration testing, together with testing of systems, controls and safeguards on a regular basis. [read post]
27 Jan 2017, 10:28 am by Jordan Brunner
-Mexico border and drafting executive orders that would halt all refugee admissions; declare a moratorium on new multilateral treaties; mandate audits of U.S. funding for international organizations; and review U.S. cyber capabilities and designations of foreign terrorist organizations. [read post]
27 Jan 2017, 9:23 am by Margaret Wood
 This law gave the Department of State the responsibility for publishing, distributing and authenticating copies of each law passed by Congress. [read post]
26 Jan 2017, 3:22 am
Opposer Luxco had the burden to prove by a preponderance of the evidence that the designation TEQUILA is generic. [read post]
24 Jan 2017, 4:13 am by Richard Forno
So can the implementation of more securely designed email systems and authentication protocols. [read post]
5 Jan 2017, 2:22 pm by Robert B. Milligan
Throughout 2016, Seyfarth Shaw’s dedicated Trade Secrets, Computer Fraud & Non-Competes Practice Group hosted a series of CLE webinars that addressed significant issues facing clients today in this important and ever-changing area of law. [read post]
5 Jan 2017, 2:22 pm by Robert B. Milligan
Throughout 2016, Seyfarth Shaw’s dedicated Trade Secrets, Computer Fraud & Non-Competes Practice Group hosted a series of CLE webinars that addressed significant issues facing clients today in this important and ever-changing area of law. [read post]
4 Jan 2017, 8:47 pm by Tiffany Quach
For the requirements in sections 500.04(b) (Chief Information Security Officer report), 500.05 (penetration testing and vulnerability assessments), 500.09 (risk assessment), 500.12 (multi-factor authentication), and 5000.14(a)(2) (cybersecurity training for personnel), the compliance deadline is March 1, 2018. [read post]
4 Jan 2017, 10:24 am by Minick Law
Building a Legal Practice Designed to Last: What Are Others Saying About You? [read post]
1 Jan 2017, 8:58 pm by David Cheifetz
[9] The plaintiff submits that the trial judge discounted the evidence of expert witnesses called by the plaintiff on the design of gas delivery systems and the behaviour of workers. [read post]
29 Dec 2016, 4:10 pm by Bill Budington and Gennie Gebhart
Unfortunately, this “mixed mode” design may do more harm than good by teaching users the wrong lessons about encryption. [read post]
21 Dec 2016, 12:40 pm by Tiffany Quach
Moreover, some third parties that engage in penetration testing force firms to disclaim liabilities associated with such tests; and The requirement that a Covered Entity designate a CISO (a) does not accommodate other titles that might already exist within a firm that fulfill the same functions as a CISO and (b) does not recognize how certain firms have information systems governed by the CISO of an affiliate or a subsidiary. [read post]
19 Dec 2016, 9:39 am by Andrew McClure
  The link was designed to function as a confidence-building measure and should not be confused with the White House-Kremlin Direct Communication line, or secure hotline, used to manage crisis situations. [read post]
1 Dec 2016, 10:13 am by Rebecca Tushnet
Apparently one no longer has to provide a fax number to have a complete agent designation, which is good news. [read post]
14 Nov 2016, 10:31 am by Law Offices of Jeffrey S. Glassman
  The ruling was that if one should expect the bones in this authentic chowder, that the user had essentially assumed the risk of this type of injury. [read post]
9 Nov 2016, 9:29 am by Woodruff Family Law Group
The children were placed in foster care, and mother signed a case plan designed to address her issues, which included mental health, substance abuse and intellectual disability. [read post]