Search for: "Leach" Results 1661 - 1680 of 1,729
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
6 May 2016, 11:44 am by Alan L. Friel and Suchismita Pahi
On March 31, 2016, the Federal Communications Commission (FCC) issued a Notice of Proposed Rulemaking (NPRM) of privacy and security regulations for Internet service providers (ISPs). [read post]
29 Jun 2011, 12:02 pm
In fact, I would consolidate LinkedIn and Facebook to be self-contained systems that are parasitic in nature because they will leach from web sites, Twitter and blogs. [read post]
30 Jul 2015, 10:01 pm by Cookson Beecher
In addition, galvanized metal can leach toxic zinc and should not be used as a rotisserie spit. [read post]
10 Feb 2021, 3:09 pm by Apsosredesign
After seeking out the best options and doctors and trusting the implant to complete its function to the safest possible extent,  they do not expect the potential for leaching of metal fragments or faulty devices in an increasingly common surgery. [read post]
29 Jan 2020, 9:26 am by skelly
The insurance industry experienced significant and varied forms of new legislation and regulation during the last decade. [read post]
29 Apr 2011, 1:03 pm
Prior art bottles turned hazy when filled by hot liquids that promote leaching of endocrine disruptors, which all hot-filled PET bottles do - hazy or clear. [read post]
2 Mar 2020, 1:56 pm by Shea M. Leitch and Andreas Kaltsounis
” The bill does not apply to state and local governments, tribes, and municipal corporations; certain health information regulated by state and federal laws, including the Health Insurance Portability and Accountability Act; information regulated by the Gramm-Leach-Bliley Act, Fair Credit Reporting Act or Family Educational Rights and Privacy Act; and data maintained “for employment records purposes. [read post]
6 May 2015, 10:02 pm by Roy Costa, RS, MS (MBA)
Food and Drug Administration (FDA) tells us to consider the following pre-harvest risks when growing fruits and vegetables, and this paper will evaluate the relative importance of the most significant ones and further explore current public health concerns: Feces contamination of growing and harvesting areas by humans and wild and domestic animals Unsafe irrigation water Runoff Flooding Growing area land use Adjacent land use (septic systems, leach fields, biosolids, industrial… [read post]
13 Feb 2007, 7:41 pm by John R. Christiansen
Specification of Legal Security Issues.Legal requirements for security compliance, whether under HIPAA, Gramm-Leach-Bliley, emerging common law or almost any other law, are organizational obligations, not technical specifications. [read post]
7 May 2011, 5:56 am by Rebecca Tushnet
Same question as when should we say that the private regulatory regime of FB is something that leaches out into the rest of the world. [read post]
10 Apr 2017, 12:01 pm by Nathan D. Taylor and Adam Fleisher
., the Gramm-Leach-Bliley Act) and best practices, in that it requires that the cybersecurity program be designed to perform the core cybersecurity functions of identifying and assessing threats and risks, protecting Information Systems and Nonpublic Information from malicious use and unauthorized access and detecting, responding to and recovering from “Cybersecurity Events,” which the rule defines as “any act or attempt, successful or unsuccessful, to gain unauthorized… [read post]
30 Sep 2024, 2:48 pm by Michael Lowe
Specifically, under 18 USC § 1028(c) these are statutorily identified to involve: (1) section 641 (relating to theft of public money, property, or rewards [1]), section 656 (relating to theft, embezzlement, or misapplication by bank officer or employee), or section 664 (relating to theft from employee benefit plans); (2) section 911 (relating to false personation of citizenship); (3) section 922(a)(6) (relating to false statements in connection with the acquisition of a firearm); (4) any… [read post]
The Supreme Court in AMG foreclosed the FTC’s ability to pursue monetary remedies under Section 13(b) of the FTC Act. [read post]
11 Sep 2017, 9:18 am by Wolfgang Demino
On September 15, 2017, the Texas Supreme Court will sit in Houston, TX (University of Houston Law Center) to hear oral argument on whether a payday lender may divert a class action filed against it over its practice of pursuing the collection of defaulted civil debts through criminal prosecution with bad-debt affidavits in violation of Texas law. [read post]
6 Oct 2022, 5:16 am by Jim Dempsey
After Colonial Pipeline suffered a ransomware attack in May 2021 and took its 5,500-mile system offline for nearly a week, the Transportation Security Administration (TSA) issued a set of first-ever directives imposing mandatory cybersecurity requirements on pipeline operators. [read post]
14 Mar 2010, 10:47 pm by admin
The following is a summary review of articles from all over the nation concerning environmental law settlements, decisions, regulatory actions and lawsuits filed during the past week. [read post]
31 Jan 2019, 2:03 pm by Kevin LaCroix
John Reed Stark As cybersecurity has become an increasingly important consideration for all corporate operations, one of the most pernicious problems has been the rise of so-called “ransomware” attacks – that is, systems breaches in which hackers take control of corporate networks and demand ransom payments as a condition of unlocking the systems. [read post]
29 Dec 2017, 7:34 am by Ben
When historians look back at the copyright worlf in 2017 (if our attention spans allow us to have roles such as a 'historian' in the future!) [read post]