Search for: "Authentic Designs " Results 1681 - 1700 of 2,913
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
28 Apr 2016, 8:18 am by Ezra Rosser
Through these examples the authors expose an inherent problem in the design of the SRP that they remedy with a statutory amendment. [read post]
21 Apr 2016, 12:23 pm by John Chierichella
  Finally, if several transferors are involved, such as where two or more independently incorporated affiliates, or the assets of two or more such affiliates, are being acquired in a single transaction, the responsible contracting officer is the ACO administering the largest unsettled dollar balance or the contracting officer (or ACO) designated by the agency having the largest unsettled dollar balance, if none of the affected contracts have been assigned to an ACO. [read post]
18 Apr 2016, 2:36 pm by Laura E. Goldsmith
Invest resources in design, testing, and implementation of authentication for user credentials. 4. [read post]
16 Apr 2016, 10:22 am by Paul J. Feldman
With that in mind, the Commission asks commenters to address data breach notification requirements designed to give consumers and law enforcement notice of failures to protect such information. [read post]
 Because BLE is designed for sending small chunks of data; it does not support streaming and is not optimized for file transfer. [read post]
13 Apr 2016, 11:32 am
  Good faith is defined in this context as an honest belief, the absence of malice, or the absence of a design to defraud or to seek an unconscionable advantage. [read post]
12 Apr 2016, 11:30 am by Torrie Bethany
Use 2 Factor Authentication to add an extra layer of security to your login process by requiring more than one method of authorization. [read post]
10 Apr 2016, 5:32 pm by Kevin LaCroix
The endorsements are designed to provide coverage when an employee is intentionally misled by electronic or written instructions from a person purporting to be a company executive or employee, vendor, client, or customer, to transfer money or property. [read post]
5 Apr 2016, 2:58 pm by Alex Braun
Nextpoint employs two-factor authentication, meaning both users and their specific device (laptop, tablet, etc.) must be verified with a unique password and PIN to log in. [read post]
5 Apr 2016, 2:58 pm by Alex Braun
Nextpoint employs two-factor authentication, meaning both users and their specific device (laptop, tablet, etc.) must be verified with a unique password and PIN to log in. [read post]
”  Commissioner Ramirez emphasized the importance of developing IoT products with a “privacy by design” approach, and addressing issues as they arise throughout the product’s life cycle. [read post]
1 Apr 2016, 5:54 pm by Richard Hunt
Second, part of making sure a letter is reliable is confirming not only that it is authentic, but that the author is qualified to make the diagnosis of disability. [read post]
23 Mar 2016, 4:53 pm by Sabrina I. Pacifici
USLM is an XML information model designed to represent the legislation of United States Congress. [read post]
20 Mar 2016, 6:49 am by INFORRM
But for other celebrities this means crafting a product designed specifically for public consumption that is as tightly managed as a magazine photoshoot. [read post]
18 Mar 2016, 6:21 am by Patricia Klusmeyer
In addition, it agreed to take certain steps to adopt reasonable appropriate data security practices, including, among others: 1) establishing a written comprehensive data security plan reasonably designed to protect customer information; 2) designating a qualified individual to coordinate and be accountable for the data security program; 3) conducting biannual data security risk assessments to identify internal and external security risks; 4) conducting regular employee training… [read post]
8 Mar 2016, 2:00 pm by Dykema
The enforcement action requires Dwolla to take the following actions: Stop misrepresenting its data security practices; Adopt and implement reasonable and appropriate data-security measures to protect consumers’ personal information; Establish, implement, and maintain a written, comprehensive data-security plan and appropriate data security policies and procedures; Designate a qualified person to coordinate and be accountable for the data-security program; Conduct data-security risk… [read post]
8 Mar 2016, 10:56 am by Christopher E. Hoyme
In a nutshell, the CFPB alleged that Dwolla’s representations regarding “securely encrypted and stored data,” were inaccurate for a number of specific reasons including: Failing to implement appropriate data security policies and procedures until at least September 2012, Failing to implement a written data security plan until at least October 2013, Failing to conduct adequate risk assessments, Failing to use encryption technology to properly safeguard consumer information, Failing… [read post]
8 Mar 2016, 10:39 am by Andrew Crocker
Second, many safety regulations might indirectly require companies to make certain design decisions in order to comply. [read post]
8 Mar 2016, 10:37 am by John G. Browning, Guest Blogger
Together, we bemoaned the difficulty of finding authentic New York Italian cuisine in far-flung places like Virginia and Texas. [read post]