Search for: "ELECTRONIC DATA SYSTEMS, ETC. v. Social SEC." Results 1 - 15 of 15
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
12 Nov 2011, 12:56 pm by Rebecca Tushnet
Need audit trails in the health privacy context, as we do with SEC and national security. [read post]
12 Mar 2018, 12:42 am by Kevin LaCroix
  In connection with that review, I was recently informed for the first time that an intrusion occurred in 2016 in the SEC’s Electronic Data Gathering, Analysis, and Retrieval (“EDGAR”) system. [read post]
11 Sep 2012, 1:36 am by Kevin LaCroix
For the most part, the information stolen consisted of personal identification information (PII) — name, address, email address, telephone number, social security number and credit card information — or personal health information (PHI). [read post]
12 Dec 2017, 4:36 pm by Kevin LaCroix
 This new team will “apply the lessons learned from [past securities fraud] cases and leverage data analytics and technology to identify large-scale misconduct affecting retail investors. [read post]
16 Jun 2020, 2:18 pm by Kevin LaCroix
That is the question that John Reed Stark, President of John Reed Stark Consulting and former Chief of the SEC’s Office of Internet Enforcement, examines in the following guest post. [read post]
31 Jan 2019, 2:03 pm by Kevin LaCroix
Ransomware is a type of malicious software that infects a computer and restricts users’ access to certain data, systems and/or files until a ransom is paid. [read post]
13 Apr 2016, 4:55 pm by Kevin LaCroix
John is the President of John Reed Stark Consulting and former Chief of the SEC’s Office of Internet Enforcement. [read post]
13 Jan 2016, 5:05 pm by Kevin LaCroix
  The SEC subsequently mandated that publicly traded U.S. companies submit various periodic reports to the agency in a timely fashion, including an annual financial report. [read post]
6 Aug 2015, 6:21 pm by Kevin LaCroix
What steps does the company undertake in the realm of security science to stay current about the latest cybersecurity intrusion modus operandi, cybersecurity-related software patches,[6] data breach trends, etc.? [read post]
2 Mar 2016, 4:26 pm by Kevin LaCroix
  Specifically, Apple’s iOS operating system is designed to automatically erase local data after too many incorrect passcode attempts and only someone knowing the password would be able to unlock the phone. [read post]
2 Mar 2012, 4:26 pm by Ailyn Cabico
  Part 1 and Part 2A of the Form ADV must be filed with the SEC through the electronic IARD system. [read post]
15 Dec 2015, 6:01 am by Barry Sookman
Geist’s claims were not true and they had the effect of creating a moral panic.[5] As described below, they were disseminated in the social media, in the national press, and on TV. [read post]
3 Mar 2010, 7:33 pm by Adam Thierer
“[R]egulation cannot, in a liberal democracy, force viewers to consumer media products they do not think they want in the name of the public interest,” argues Goodman.[16] (This dilemma creates additional practical problems for proposals to expand public interest regulation, which will be discussed in Sec. [read post]