Search for: "SECURITY INS. CO. v. DEAL" Results 81 - 100 of 183
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
15 Aug 2016, 4:31 pm by Michael B. Stack
After graduating with a degree in elementary education and securing certification and license to teach, I was unable to secure a position due to budget cuts. [read post]
13 Apr 2016, 4:55 pm by Kevin LaCroix
  Law firms provide a “back door” for a treasure trove of cherished electronic material for cyber criminals eager to gain an edge in the stock market or capture a particularly sensitive batch of data to sell or ransom, including:   Secret and sensitive information about corporate client’s finances; Documents relating to confidential corporate deals; Valuable information relating to patented, original and invaluable intellectual property and trade secrets; Key… [read post]
23 Dec 2015, 6:50 am
’ Laughland contacted Marquette University security and was referred to local law enforcement. [read post]
16 Dec 2015, 9:26 am by Robert B. Milligan
To mitigate the risk of trade secrets theft, companies should review their security procedures, policies on IT resources and email usage, and employee exit interview/termination processes to ensure that the company’s assets are adequately protected. [read post]
30 Jun 2015, 6:52 am by Schachtman
 A party will not be heard to complain, or attack its adversary, about failure to produce materials never requested.[13] Citing Rule 26(a) and its subsections, which deal with the report, and not discovery beyond the report, several cases take a narrow view of disclosure as embodied in the report requirement.[14] In one case, McCoy v. [read post]
28 May 2015, 6:00 am by Administrator
Many papers deal with community use of academic libraries. [read post]