Search for: "Authentic Designs" Results 1621 - 1640 of 2,918
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
3 May 2024, 3:25 am by Terrence Cummings, Guild
Lastly, and potentially most importantly: Create authentic space for ideas. [read post]
22 Apr 2021, 5:38 pm by Jordana Sanft (CA)
A brand should be backed up by authentic goals, facts and actions. [read post]
8 Apr 2019, 8:55 am by Laura E. Jehl and Andreas Kaltsounis
By implementing strong security controls – including multifactor authentication for remote access to email and other sensitive data stores – entities can prevent the breach from occurring. [read post]
The groups provide an opportunity for interaction in a safe space where group members can be authentic. [read post]
22 Apr 2021, 5:38 pm by Jordana Sanft (CA)
A brand should be backed up by authentic goals, facts and actions. [read post]
The groups provide an opportunity for interaction in a safe space where group members can be authentic. [read post]
17 Feb 2016, 9:18 am by Kenneth Vercammen Esq. Edison
"Proof of death" includes a certified or authenticated copy of a death certificate purporting to be issued by an official or agency of the place where the death purportedly occurred, and a certified or authenticated copy of any judgment or record or report of a court or a governmental agency, domestic or foreign, that a person is dead;j. [read post]
30 May 2012, 6:20 am by Rebecca Tushnet
  The mark and the basketball design were virtually indistinguishable. [read post]
Prior to the identification of the vulnerability, only Cathay Pacific’s IT support teams were required to use multi-factor authentication to access internal systems remotely (an oversight remedied in July, 2018). [read post]
27 Jan 2016, 1:47 pm by Jenna N. Felz
The SEC found that the investment adviser violated the Safeguards Rule by failing to: adopt written policies and procedures reasonably designed to safeguard customer information; conduct periodic risk assessments; implement a firewall; encrypt PII stored on its server; and maintain a response plan for cybersecurity incidents. [read post]
26 Jul 2010, 10:01 am by Susan Brenner
As the Supreme Court has explained in a number of decisions, the privilege was designed to protect witnesses subpoenaed to testify in a court proceeding from the “cruel trilemma of self-accusation, perjury or contempt. [read post]
21 Feb 2018, 7:00 am by Robert Chesney, Danielle Citron
Think of it as a destructive variation of the Turing test: imitation designed to mislead and deceive rather than to emulate and iterate. [read post]
27 Sep 2015, 1:13 am
  These were [with my emphasis added]: Option 1: that consumers recognised and associated that shape exclusively with the applicant or its goods/services, i.e. if asked who marketed the goods they would identify the applicant or its related brand names just from seeing the shape; orOption 2: as per Option 1 but also that consumers rely on the shape on its own as indicating trade origin (what "rely" is to mean precisely is not clear but Arnold J used the term in the context of consumer… [read post]
29 Apr 2018, 1:48 am by Orin Kerr
  The password was bad, but it seems to have been a bad password that was being used as a genuine account authentication mechanism to access nonpublic parts of the website. [read post]
18 Nov 2014, 1:57 am
In his Opinion in both cases, [Katnote: the bold black text that follows is all in the Curia media release: it's designed to aid the reader who is just skimming for the juicy bits] Advocate General Yves Bot proposes that the Court of Justice should dismiss Spain’s actions.As regards the creation of unitary patent protection conferred by a patent (Regulation No 1257/2012), the Advocate General observes that the sole purpose of the contested regulation is to incorporate… [read post]
18 Apr 2018, 2:42 pm by Riana Pfefferkorn
The latter are not designed or deployed with an eye towards having to reveal them to a judge and defense counsel in court later—nor having to authenticate the evidence they gathered. [read post]
4 Aug 2021, 7:18 am by Timothy Edgar
” These separate crimes are designed to cover distinct types of malicious cyber activity: outside intrusions into a computer or computer network (accessing without authorization), and insider threats (exceeding authorized access). [read post]
18 Jun 2024, 9:03 am by Thorin Klosowski
Final bonus tip: enable two-factor authentication: Bluesky rolled out email-based two-factor authentication well after many people signed up. [read post]