Search for: "Authentic Designs " Results 1841 - 1860 of 2,913
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
28 Apr 2015, 10:50 am by Lisa Harris and Dorna Moini
The new regulations also prohibit employers from contacting health care providers except to authenticate a medical certification. [read post]
24 Apr 2015, 1:38 pm by Heidi Alexander
  For example, vendors should agree to use “information security best practices” and “secure methods of authentication” for accessing the service. [read post]
21 Apr 2015, 1:37 pm
The reform will improve conditions for businesses to innovate and to benefit from more effective trade mark protection against counterfeits, including non-authentic goods in transit through the EU's territory.Dream Package forIP enthusiasts ...European Commissioner for Internal Market, Industry, Entrepreneurship and SMEs, Elżbieta Bieńkowska, said: "Trade mark intensive industries contribute enormously to economic performance and employment in the European Union. [read post]
13 Apr 2015, 5:14 pm by Sabrina I. Pacifici
For example, fraudsters can bypass various forms of authentication by using social-engineering campaigns to convince users to divulge their credentials online. [read post]
10 Apr 2015, 4:26 pm
In September 2014, luxury jewelry designer David Yurman filed a trademark infringement lawsuit against Sam’s Club over the alleged unauthorized sales of David Yurman jewelry at Sam’s Club stores. [read post]
7 Apr 2015, 2:42 pm by JB
The Fourteenth Amendment was designed to enforce equality before the law and ban class legislation. [read post]
3 Apr 2015, 11:36 am by The Law Office of John Guidry II
One Orange County judge affectionately refers to probation as an “Early DOC Entry Program”, designed for those defendants that are not willing to take prison up front–just give them enough rope to hang themselves, and you can give them prison on the violation. [read post]
31 Mar 2015, 12:07 pm by Kenneth Vercammen Esq. Edison
Implicit in local proof of an instrument by means of authentication provided by a foreign official, is the problem of proving the authority of the official. [read post]
31 Mar 2015, 12:06 pm by Kenneth Vercammen Esq. Edison
Nonetheless, the competent authorities of any Contracting Party may, if necessary, satisfy themselves as to the authenticity of the signature of the authorized person. [read post]
31 Mar 2015, 12:01 pm by Kenneth Vercammen Esq. Edison
Each sheet has to be signed by the testator, to guarantee its authenticity and to avoid substitutions. [read post]
29 Mar 2015, 12:02 am by Sanjana
We also hardened security over key social media accounts by enabling two-step authentication, minimising the risk of unauthorised access and hacking attempts. [read post]
16 Mar 2015, 10:10 am by Katie McMullan
This could be achieved by forcing customers to choose a new password during first use of the device or to consider an alternative authentication method. [read post]
13 Mar 2015, 12:53 pm by Winston Maxwell and Patrice Navarro
The employer is permitted to implement a remote wipe tool specifically designed to capture the remote access of corporate resources through the employee’s device. [read post]
11 Mar 2015, 8:44 pm
Reports can be delivered to interested lawyers by sending them a link to a report which  can transparently authenticated and will continue to  update. [read post]
8 Mar 2015, 9:02 am by Kenneth Vercammen Esq. Edison
 Uniform Probate CodeSubject to additional definitions contained in the subsequent [articles] that are applicable to specific [articles,] [parts,] or sections and unless the context otherwise requires, in this [code]: (1) “Agent” includes an attorney-in-fact under a durable or nondurable power of attorney, an individual authorized to make decisions concerning another’s health care, and an individual authorized to make decisions for another under a natural death act. (2)… [read post]
4 Mar 2015, 11:19 am by Bret Cohen
Access control and authentication, such as requiring proper user authentication before providing access to data, user credentialing procedures, and password requirements. [read post]
3 Mar 2015, 8:30 am by azatty
That playful attitude clearly informed the gallery’s design, which includes large and eye-catching color-blocks. [read post]
27 Feb 2015, 8:26 am by Rebecca Tushnet
They do share designs, but against outsiders they won’t share. [read post]
19 Feb 2015, 6:31 am by Tiffany Blofield
Now I do not mean to tell you that you should return an authentic Longchamp bag from the shops in Paris or the famous bags sold in boutiques stateside. [read post]