Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • Basel II uses a "three pillars" concept; (1) Capital requirement (addressing risk), (2) Bank regulation Supervisory rev 1. Standardized Approach ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ...93-177 February 1993, Capability Maturity Model SM for Software, Version 1.1) and as a book by the same authors in 1995. ...ined/confirmed as a standard business process, and decomposed to levels 0, 1 and 2 (the latter being Work Instructions). ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    14 KB (2,165 words) - 16:53, 22 September 2009
  • Image:Asset Protection Standard(1).png|Asset Protection Standard page two of seven. ...
    5 KB (673 words) - 18:16, 14 January 2014
  • ...n in an effort to provide citizens with safeguards for their personal data.1 Some of these laws apply both to data transfers internally within a nation’ (1) EU Standards for Processing Personal Data. ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • ...ation about others in their databases must ensure that such information is 1) Materially, 2) Truthful complete, 3) Accurate, and 4) Individuals have acc ...
    4 KB (561 words) - 16:45, 29 August 2014
  • Image:Configuration Management Standard(1).png|Configuration Management Standard page two of nine. ...
    5 KB (681 words) - 21:56, 15 January 2014
  • (1) A Federal Reserve;<br> ...
    4 KB (657 words) - 23:02, 1 November 2012
  • ...a elements, when either the name or the data elements are not encrypted: (1) Social security number. (2) Driver's license number or California Identifi ...e constitution declares privacy an inalienable right in Article 1, Section 1. ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • '''1.''' The elements that must be proved to establish defamation typically are: ...rifiable fact is not actionable. Milkovich v. Lorain Journal Co., 497 U.S. 1, 20 (1990) (not defamatory if statement "cannot ‘reasonably [be] interprete ...
    9 KB (1,422 words) - 14:29, 10 April 2011
  • 1. 15 U.S.C. § 1114 prohibits using: ...rs that vary somewhat between jurisdictions. The primary factors include: (1) strength of the mark; (2) market proximity of the goods involved; (3) simi ...
    17 KB (2,794 words) - 10:00, 13 April 2011
  • == Requirement 1: Install and maintain a firewall configuration to protect data. == :'''[[PCI-1.1:|PCI-1.1 Establish firewall configuration standards that include:]]'''<br> ...
    5 KB (702 words) - 12:20, 16 June 2010
  • Image:Incident Response Standard(1).png|Incident Response Standard page two of nine. ...
    5 KB (737 words) - 15:24, 21 January 2014
  • ...n may not be presented to a magistrate. See 18 U.S.C. §§ 2510(9) and 2516(1); see also In re United States of America, 10 F.3d 931 (2d Cir. 1993), cert ...origin and the point of reception, i.e., telephone calls. 18 U.S.C. § 2510(1). This includes cellular phones, cordless phones, voice mail, and voice pag ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • [[PO1:| '''1 Define a Strategic IT Plan''']]<br> [[PO1.1:| 1.1 IT Value Management]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • * Eddie Antar, founder of Crazy Eddie, who has about $1 billion worth of judgments against him stemming from fraudulent accounting ...Monus, founder of Phar-Mor, which ultimately cost its investors more than $1 billion. ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...le I requires that any preexisting condition begin to be covered on August 1, 2006.<br> ...ting the rule, CMS granted a one-year extension to all parties. On January 1, 2012 the newest version 5010 becomes effective, replacing the version 4010 ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • #''' Web Bugs.''' Web bugs are small, transparent image files, typically 1-by-1 pixel in size, placed on websites or in email messages. Site operators and ...57. In Viacom v. YouTube, 2008 WL 2627388 (S.D.N.Y. 2008) (slip. at p. 20)[1], the court held that YouTube was a remote computing service (and therefore ...
    14 KB (2,207 words) - 17:22, 13 April 2011
  • ...le to the heirs and assignees of deceased persons. Civil Code Section 3344.1. New York Civil Rights Law sections 50 and 51 create a private right of act ...under the common law, a plaintiff must plead and prove that a defendant "(1) used plaintiff’s identity; (2) appropriated plaintiff’s name and likeness ...
    11 KB (1,744 words) - 16:53, 13 April 2011
  • ...gh its confidentiality continued to be protected under 18 U.S.C. § 1030(a)(1). To remedy this situation in the 1996 Act, 18 U.S.C. § 1030(a)(5) was redr ...
    5 KB (773 words) - 11:40, 27 August 2011
View ( | ) (20 | 50 | 100 | 250 | 500)