Search for: "Authentic Designs" Results 1741 - 1760 of 2,918
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
20 Nov 2015, 9:41 am by Kelly Phillips Erb
” campaign is designed to raise public awareness and complement the protections the IRS, states and tax industry are putting in place for upcoming tax season. [read post]
Multi-Factor Authentication: the use of multi-factor authentication would be required for customer access to web applications capturing or displaying confidential information, privileged access to database servers allowing access to confidential information, and remote access. [read post]
17 Nov 2015, 12:58 pm by Hunton & Williams LLP
., multi-factor authentication) to prevent the compromised credentials from being used to access customer information. [read post]
13 Nov 2015, 3:18 pm by Kendra Albert
The Register made a number of compromises on many of the exemptions, designed to find a middle ground between proponents and opponents. [read post]
13 Nov 2015, 10:46 am by Elina Saxena, Cody M. Poplin
The video, entitled “Soon Very Soon the Blood Will Spill Like an Ocean,” shows the watermark of ISIS’s propaganda, but has not yet been verified as authentic. [read post]
12 Nov 2015, 12:00 pm by Mark Brennan
  According the FCC, Cox’s data systems lacked technical safeguards, such as multi-factor authentication, for the employees that were compromised. [read post]
12 Nov 2015, 11:30 am by John Elwood
John Elwood reviews Monday’s relisted cases. [read post]
10 Nov 2015, 8:00 pm by John Ehrett
§2254(d)—conflicts with this Court’s rulings holding that “clearly established” law does not require a case with an identical fact pattern but instead includes legal principles and standards flowing from precedent and general standards designed to apply to a myriad of factual situations; and (2) whether this Court’s standard that a state evidentiary ruling can be so egregious as to deny a defendant fundamental fairness and thus violate the federal due… [read post]
6 Nov 2015, 8:57 am by John Elwood
John Elwood (briefly) reviews Monday’s relisted cases. [read post]
2 Nov 2015, 4:00 am by Susannah Tredwell
Passwords or IP authentication? [read post]
29 Oct 2015, 2:42 pm by John Gregory
Here is an article that asks “should cyber-security vulnerabilities really be treated the same as design defects under traditional products liability law? [read post]
26 Oct 2015, 10:37 am by Andrea Patrick
., methods designed to ensure that only authorized employees are able to access sensitive data. [read post]
24 Oct 2015, 12:43 pm
We don’t really know what women are and I think that a lot of women are female impersonators, because our notion of who we are is not authentic, and so I am not surprised men are better at impersonating women than women are. [read post]
21 Oct 2015, 6:21 am by Juan C. Antúnez
Follow the steps laid out in F.S. 733.205, Florida’s specifically designed mechanism for dealing with foreign notarial wills. [read post]
15 Oct 2015, 7:46 am by The Law Office of John Guidry II
  (Yes, I have come to believe this to be true, but for reasons apart from the fact that the Book claims to be self-authenticating). [read post]
8 Oct 2015, 10:27 pm by Jeff Richardson
  Thus, "we design our products in such a way that privacy is designed into the product, and security is designed in. [read post]
6 Oct 2015, 6:31 am by Adam Levitin
 ApplePay was rolled out last spring, the EMV liability shift went into effect on October 1, and the Fed has convened a task force on designing a faster payment system. [read post]
4 Oct 2015, 1:02 am by rhapsodyinbooks
There are only 10 authentic Trappist breweries in the world, and six of those are in Belgium. [read post]