Search for: "Size, Inc. v. Network Solutions, Inc." Results 41 - 60 of 86
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
3 Aug 2015, 12:07 pm by Cynthia Marcotte Stamer
Group health plans and insurance policies generally must count toward the out-of-pocket maximum limit all deductibles, coinsurance, copayments, or similar charges and any other expenditure the group health plan requires a covered person to pay for a qualified medical expense that is an “essential health benefit” within the meaning of ACA other than premiums, balance billing amounts for non-network providers and other out-of-network cost-sharing, or spending for… [read post]
11 Jul 2015, 2:14 pm by Cynthia Marcotte Stamer
Specifically with respect to the use of internet applications for accessing and sharing ePHI, the Resolution Agreement reflects that these compliance efforts should include documented self-initiated audits and spot checks of: Self-audits and spot checks of workforce members’ familiarity and compliance with HIPAA policies and procedures on transmitting ePHI using unauthorized networks; storing ePHI on unauthorized information systems, including unsecured networks and devices;… [read post]
27 Dec 2014, 2:19 am by Ben
More from Europe: In Case C-355/12 Nintendo v PC Box the CJEU said that circumventing a protection system may not be unlawful. [read post]
8 Oct 2014, 1:11 pm by John Hopkins
The exchange server database has approximately 200 mailboxes ranging in size from 500 megabytes to 1 gigabyte each. [read post]
27 Feb 2014, 12:10 pm by Rebecca Tushnet
Wellness Support Network, Inc., 2014 WL 644749, No. 10–cv–04879 (N.D. [read post]
4 Nov 2013, 9:46 am by Jane Chong
Over the last month, on our New Republic: Security States newsfeed, we rolled out a series designed to explain why fairly allocating the costs of software deficiencies between software makers and users is so critical to addressing the growing problem of vulnerability-ridden code—and how such a regime will require questioning some of our deep-seated beliefs about the very nature of software security. [read post]
28 Jul 2013, 5:30 am by Barry Sookman
Almunia http://t.co/RXQqUwKtZD -> E-Signatures and Assents http://t.co/r2qs1RbRAR -> Update on Networks v. [read post]
10 Apr 2013, 11:38 am by Matthew David Brozik
One such business solution would be to take the network and turn it into a subscription service. [read post]
20 Dec 2012, 7:00 am by James F. Aspell
Only by using objective metrics can you identify the needs and cost drivers to build network solutions that are unique and specific to employers medical cost problems. [read post]
11 Sep 2012, 1:36 am by Kevin LaCroix
” It cites Basic Inc v Levinson (1988) for the proposition that “information is considered material if there is a substantial likelihood that a reasonable investor would consider it important in making an investment decision or if the information would significantly alter the total mix of information made available. [read post]
16 May 2012, 7:37 am by Rob Robinson
 bit.ly/K08f5j (Michelle L’Hommedieu) Blogging, Proportional Review and Predictive Coding - bit.ly/JbCFQs (Ralph Losey) Budgeting for E-Discovery: The Big 5 Expenses - bit.ly/K06hSw (Bill George) Car ‘Black Box’ Recorders Provide Evidence for Personal Injury Suits - bit.ly/IUCYAL (Thomas Scheffey) Communication is King in E-Discovery Matters - http://bit.ly/ISDly8 (Daniel Garrie) Court Denies Criminal Defendant’s Attempt to… [read post]
18 Apr 2012, 4:59 am by Rob Robinson
Nolan to Go Out On Limb In Kleen Products Predictive Coding Case - bit.ly/HGgMfD (Matthew Nelson) Proportionality Demystified: How Organizations Can Get eDiscovery Right by Following Four Key Principles – http://bit.ly/IUFds3 (Philip Favro) Redefine Transparency in Predictive Coding: Shoot for Validity - bit.ly/HL7PhL (Gerard Britton) Robinson v. [read post]