Search for: "Authentic Designs" Results 1721 - 1740 of 2,918
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
29 Jan 2016, 8:00 am by Juan C. Antúnez
The Trustees handled litigation of employment and intellectual property issues, and managed authentication requests. [read post]
27 Jan 2016, 1:47 pm by Jenna N. Felz
The SEC found that the investment adviser violated the Safeguards Rule by failing to: adopt written policies and procedures reasonably designed to safeguard customer information; conduct periodic risk assessments; implement a firewall; encrypt PII stored on its server; and maintain a response plan for cybersecurity incidents. [read post]
27 Jan 2016, 9:10 am by John Gregory
So the law can probably safely leave authentication and authority questions to the plan administrators (given that they would run the risk of having to pay twice if they paid to a wrongfully designated beneficiary). [read post]
20 Jan 2016, 7:51 am by Robin Shea
(Don’t worry about cheating – this app has two-factor authentication, and it automatically flags suspicious-looking results. [read post]
20 Jan 2016, 4:00 am by Lynn Foley
This will be the way agile law firms in 2016 will tackle their site re-designs. [read post]
15 Jan 2016, 4:00 am by John Gregory
(s. 31.2) However, the UEEA was designed not to create new burdens to the admission of evidence that was not seriously disputed. [read post]
13 Jan 2016, 5:05 pm by Kevin LaCroix
John Reed Stark David Fontaine In this day and age, the members of the boards of directors of most companies understand that cybersecurity issues are both important and should be a board-level priority. [read post]
12 Jan 2016, 9:01 pm by Michael C. Dorf
Interests in authenticity and sincerity justify a right to avoid compelled speech because of its internal effects on the speaker. [read post]
30 Dec 2015, 6:17 am by Paul Otto
The security principles guide companies to incorporate security at the design stage, then maintain it through regular software updates, continuous threat monitoring, and sound authentication and encryption practices. [read post]
30 Dec 2015, 4:00 am by Steve Brachmann
Patent No. 9184918, entitled Trusted Hardware for Attesting to Authenticity in a Cloud Environment. [read post]
17 Dec 2015, 4:55 am by Randi Morrison
Astounding in its depth and breadth, the new regulatory requirements would be expected to cover these areas, at a minimum: Implementation of written cybersecurity policies & procedures Implementation of policies & procedures to ensure data security accessible to/held by third parties Use of multi-factor authentication as it applies to enumerated applications, servers, data Designation of a CISO with enumerated responsibilities, including annual reporting to the NYDFS… [read post]
9 Dec 2015, 12:38 pm by Alan L. Friel and Daniel Goldberg
Companies may use and share such device graphs for a multitude of reasons, such as to authenticate consumers or for targeted advertising. [read post]
Similarly, many advertising agencies do not belong to industry associations and it can be challenging to find a substitute document (like a properly authenticated industry award) the SAIC will accept. [read post]
4 Dec 2015, 3:52 am by Benjamin Wittes
  The Estonian card is designed to allow people to verify their identities for purposes of signature, login, secure communications, and other interactions with government, companies and individuals. [read post]
3 Dec 2015, 12:22 am by Herb Lin
  But authentication can also be based on something that the file owner is, such as a fingerprint or a full DNA sequence. [read post]
1 Dec 2015, 6:08 am by Suchismita Pahi and Kathryn Mellinger
It calls for covered entities to designate a Chief Information Security Officer (CISO) and personnel to create a response team that can identify, protect, detect, respond, and recover data security, though a covered entity may create its response team from third parties. [read post]
24 Nov 2015, 8:18 am
Such legal protection implies no obligation to design devices, products, components or services to correspond to technological measures, so long as such device, product, component or service does not otherwise fall under the prohibition of Article 6. [read post]
21 Nov 2015, 6:44 am by John Ehrett
Blackston 15-161Issue: (1) Whether the Sixth Circuit erred when it granted habeas relief based on the theory that respondent was denied the right to confront the two witnesses when the state courts did not allow him to introduce their post-testimony written recantations to impeach their former testimony; (2) whether the Sixth Circuit erred in holding that a written statement recanting former testimony is not “extrinsic” to that testimony and that such statements may be admitted by… [read post]
20 Nov 2015, 9:42 am by Kelly Phillips Erb
” campaign is designed to raise public awareness and complement the protections the IRS, states and tax industry are putting in place for upcoming tax season. [read post]