Search for: "Authentic Designs " Results 1701 - 1720 of 2,913
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
3 Mar 2016, 12:39 pm by Andrew Crocker and Jamie Williams
Apple has chosen to build its iOS in such a way that its devices only accept iOS code signed by Apple, a design it believes best ensures user trust and strengthens the security of these devices. [read post]
  To address these concerns, the Order provides that Dwolla must adopt and implement reasonable and appropriate data security measures to protect the personal information of consumers, including designating a qualified person to be accountable for the data security program; conducting bi-annual data security risk assessments; conducting regular, mandatory employee training on data security; developing and implementing appropriate methods of consumer authentication; and… [read post]
1 Mar 2016, 8:01 am by Paul Otto and Brian Kennedy
And all of the controls are designed to be highly scalable to the needs of each organization. [read post]
26 Feb 2016, 8:21 am by James Denvil and Paul Otto
In several sections of the complaint, the FTC alleges that ASUS failed to adequately respond to reports of security vulnerabilities that allowed hackers to bypass authentication requirements (thereby allowing attackers to directly access consumers’ data) as well as retrieve and modify router login credentials (thereby allowing attackers to modify all router settings). [read post]
24 Feb 2016, 3:09 pm by Francesca Procaccini
BG Martins first asserts that these transcripts are not judicial documents because they are not the transcript that is authenticated by the military judge. [read post]
24 Feb 2016, 12:06 pm by Kenneth B. Weckstein
Some of the new requirements, such as the use of multifactor authentication, could involve significant time and money to implement. [read post]
22 Feb 2016, 8:23 am by John Jascob
Securities professionals would need to create and maintain procedures reasonably designed to ensure cybersecurity. [read post]
17 Feb 2016, 9:18 am by Kenneth Vercammen Esq. Edison
"Proof of death" includes a certified or authenticated copy of a death certificate purporting to be issued by an official or agency of the place where the death purportedly occurred, and a certified or authenticated copy of any judgment or record or report of a court or a governmental agency, domestic or foreign, that a person is dead;j. [read post]
16 Feb 2016, 6:34 am by Samir Saran, Bedavyasa Mohanty
Norms, regulations and laws must be designed so as to allow technology to be its own antidote. [read post]
15 Feb 2016, 3:18 pm by Michel-Adrien
"FDsys and govinfo will run in parallel during a testing and design phase. [read post]
14 Feb 2016, 4:27 pm by Sarah Y Reis
GPO assures that the electronic documents on govinfo are official and authentic by applying a visible digital signature on online PDF documents. [read post]
14 Feb 2016, 4:16 pm by Benjamin Wittes, Zoe Bedell
In Part I of this series, we listed the many designated foreign terrorist organizations (DFTOs) that seem to have overt Twitter accounts. [read post]
14 Feb 2016, 3:35 pm by Benjamin Wittes, Zoe Bedell
Uncertainty as to the authenticity of the individual accounts may create a real question as to whether Twitter is “knowingly” providing service to terrorist groups. [read post]
14 Feb 2016, 2:05 pm by Zoe Bedell, Benjamin Wittes
(The State Department conveniently makes available its list of such designations.) [read post]
14 Feb 2016, 2:05 pm by Zoe Bedell, Benjamin Wittes
(The State Department conveniently makes available its list of such designations.) [read post]
12 Feb 2016, 3:01 pm by Nikki Siesel
An example is the prefix “E” which is now commonly understood as a designation for the Internet. [read post]
12 Feb 2016, 11:27 am by John Chierichella and Keith Szeliga
  Finally, if several transferors are involved, such as where two or more independently incorporated affiliates, or the assets of two or more such affiliates, are being acquired in a single transaction, the responsible contracting officer is the ACO administering the largest unsettled dollar balance or the contracting officer (or ACO) designated by the agency having the largest unsettled dollar balance, if none of the affected contracts have been assigned to an ACO. [read post]
11 Feb 2016, 9:42 am by sklemp
Documentation: The OurFamilyWizard website is designed to capture family communication in its original, unedited form. [read post]