Search for: "Authentic Designs" Results 1961 - 1980 of 2,935
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
12 Oct 2017, 2:19 pm by Kenneth Vercammen Esq. Edison
If a party has mistakenly designated a defense as a counterclaim or a counterclaim as a defense, the court, on terms if the interest of justice requires, shall treat the pleading as if there had been a proper designation. 4:5-5. [read post]
12 Aug 2021, 2:06 pm by Rebecca Tushnet
Inconsistency/predictability critiques could be applied to reasonable royalties too, especially in patent, but there are some ways to deal with that, and it might be easier in © and design patent where the damage awards are lower. [read post]
20 May 2016, 10:07 am by Rebecca Tushnet
 Hartzog: authenticity fraud: you don’t understand that there’s a mechanism hidden behind the interaction by which this stuff is delivered to you. [read post]
From battlefield pictures and press releases to screenshots and memes, images afford innumerable opportunities to jihadists eager to design, package, or disseminate content advancing IS’ cause. [read post]
One apparent misfire, for example, was the suppression of an October 2020 New York Post article about Hunter Biden’s laptop (most of which other publications have now confirmed to be authentic). [read post]
26 Dec 2019, 5:00 am by Eric Halliday
It would also mandate that foreign banks provide authentic account records and comply with subpoenas produced by American law enforcement officials in AML and CFT investigations. [read post]
13 May 2021, 7:06 am by Bryce Klehm
       (c)  The recommended contract language and requirements described in subsection (b) of this section shall be designed to ensure that:           (i)    service providers collect and preserve data, information, and reporting relevant to cybersecurity event prevention, detection, response, and investigation on all information systems over which they have control, including systems operated on… [read post]
15 Jun 2023, 11:31 am by John Butler, Steve Stransky
These measures address technical security (configuration management, identification and authentication, systems and communication protection), physical security (access controls, environmental safety), and administrative security (awareness, training, personnel security). [read post]
8 Dec 2022, 7:50 am by James M. Campbell
  DLT could potentially serve as the digital ledger for the registration, authentication, and participation of these DERs in a smart grid, enabling flexible grid operations as more variable renewables are adopted. [read post]
22 Mar 2019, 4:47 am
The Opponent favors the French interpretation of the relevant provision, arguing that the French text of the Paris Convention is the authentic text.On the question of the applicability of national law to the question of the right to claim priority, Opponent 1 argued that is it is simply not necessary to look into the substantive national law of any one country, and to do so would be unworkable. [read post]
28 Aug 2020, 1:58 pm
Most of them are designed to keep me from overthinking things. [read post]
14 Feb 2016, 4:16 pm by Benjamin Wittes, Zoe Bedell
In Part I of this series, we listed the many designated foreign terrorist organizations (DFTOs) that seem to have overt Twitter accounts. [read post]
16 Dec 2020, 11:24 am by Daly Barnett
To protect your account security, are you using strong unique passwords and multi-factor authentication on each of your accounts? [read post]
2 Jun 2014, 2:33 pm by Law Lady
VICTOR TOMAS GONZALEZ DEL REAL, Appellee. 2nd District.Eminent domain -- Inverse condemnation -- Trial court properly determined that city's refusal to change comprehensive plan's designation of two parcels, a golf course parcel and a condo parcel within the golf course parcel, did not deprive the owners of all economically viable use of property -- City rebutted presumption that the two parcels should be treated separately -- Expert testimony that the parcels, treated as a single… [read post]
20 Mar 2018, 6:30 am by Alina Polyakova
The name, NotPetya, referred to the disguised nature of the attack; it appeared as a previously launched ransomware attack (Petya) but was in fact designed to destroy and delete information systems in Ukraine. [read post]
4 Aug 2017, 5:30 am by Randy Milch
IOTCIA would require vendors to Certify that the “hardware, firmware or software” in a device contains no known security vulnerabilities, can accept authenticated updates, uses current industry-standard protocols for communications, encryption and interconnection with other devices, and has security mechanisms for remote administration of the device that can themselves be updated in response to threats and breaches; Notify the purchasing agency of any new software or firmware… [read post]
7 Jun 2022, 6:30 am by Guest Blogger
NFL rules are theory-driven to maximize competitive equity, authenticity, and drama. [read post]
8 Jun 2018, 1:44 pm by John K. Ross
The FTC orders LabMD to adopt "reasonably designed" cybersecurity measures. [read post]
17 Aug 2017, 12:00 pm by Bob Bauer
He has always chosen to govern by the tweet: It is his authentic voice in communicating with “his” people. [read post]