Mostrando 661 - 680 Resultados de 823 Para Buscar '"Disclosure"', tiempo de consulta: 0.09s Limitar resultados
  1. 661
    Publicado 2017
    Tabla de Contenidos: “…Visa 102 3 Cybersecurity Requirements for Specific Industries 105 3.1 Financial Institutions: Gramm-Leach-Bliley Act Safeguards Rule 106 3.1.1 Interagency Guidelines 106 3.1.2 Securities and Exchange Commission Regulation S-P 109 3.1.3 FTC Safeguards Rule 110 3.2 Financial Institutions and Creditors: Red Flag Rule 112 3.2.1 Financial Institutions or Creditors 116 3.2.2 Covered Accounts 116 3.2.3 Requirements for a Red Flag Identity Theft Prevention Program 117 3.3 Companies that use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS) 118 3.4 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule 121 3.5 Electric Utilities: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards 127 3.5.1 CIP-003-6: Cybersecurity - Security Management Controls 127 3.5.2 CIP-004-6: Personnel and Training 128 3.5.3 CIP-006-6: Physical Security of Cyber Systems 128 3.5.4 CIP-007-6: Systems Security Management 128 3.5.5 CIP-009-6: Recovery Plans for Cyber Systems 129 3.5.6 CIP-010-2: Configuration Change Management and Vulnerability Assessments 129 3.5.7 CIP-011-2: Information Protection 130 3.6 Nuclear Regulatory Commission Cybersecurity Regulations 130 4 Cybersecurity and Corporate Governance 133 4.1 Securities and Exchange Commission Cybersecurity Expectations for Publicly Traded Companies 134 4.1.1 10-K Disclosures: Risk Factors 135 4.1.2 10-K Disclosures: Management's Discussion and Analysis of Financial Condition and Results of Operations (MD&A) 137 4.1.3 10-K Disclosures: Description of Business 137 4.1.4 10-K Disclosures: Legal Proceedings 138 4.1.5 10-K Disclosures: Examples 138 4.1.5.1 Wal-Mart 138 4.1.5.2 Berkshire Hathaway 143 4.1.5.3 Target Corp 144 4.1.6 Disclosing Data Breaches to Investors 147 4.2 Fiduciary Duty to Shareholders and Derivative Lawsuits Arising from Data Breaches 150 4.3 Committee on Foreign Investment in the United States and Cybersecurity 152 4.4 Export Controls and the Wassenaar Arrangement 154 5 Anti-Hacking Laws 159 5.1 Computer Fraud and Abuse Act 160 5.1.1 Origins of the CFAA 160 5.1.2 Access without Authorization and Exceeding Authorized Access 161 5.1.2.1 Narrow View of "Exceeds Authorized Access" and "Without Authorization" 163 5.1.2.2 Broader View of "Exceeds Authorized Access" and "Without Authorization" 167 5.1.2.3 Attempts to Find a Middle Ground 169 5.1.3 The Seven Sections of the CFAA 170 5.1.3.1 CFAA Section (a)(1): Hacking to Commit Espionage 172 5.1.3.2 CFAA Section (a)(2): Hacking to Obtain Information 172 5.1.3.3 CFAA Section (a)(3): Hacking a Federal Government Computer 176 5.1.3.4 CFAA Section (a)(4): Hacking to Commit Fraud 178 5.1.3.5 CFAA Section (a)(5): Hacking to Damage a Computer 181 5.1.3.5.1 CFAA Section (a)(5)(A): Knowing Transmission that Intentionally Damages a Computer Without Authorization 181 5.1.3.5.2 CFAA Section (a)(5)(B): Intentional Access Without Authorization that Recklessly Causes Damage 184 5.1.3.5.3 CFAA Section (a)(5)(C): Intentional Access Without Authorization that Causes Damage and Loss 185 5.1.3.5.4 CFAA Section (a)(5): Requirements for Felony and Misdemeanor Cases 186 5.1.3.6 CFAA Section (a)(6): Trafficking in Passwords 188 5.1.3.7 CFAA Section (a)(7): Threatening to Damage or Obtain Information from a Computer 190 5.1.4 Civil Actions under the CFAA 193 5.1.5 Criticisms of the CFAA 195 5.2 State Computer Hacking Laws 198 5.3 Section 1201 of the Digital Millennium Copyright Act 201 5.3.1 Origins of Section 1201 of the DMCA 202 5.3.2 Three Key Provisions of Section 1201 of the DMCA 203 5.3.2.1 DMCA Section 1201(a)(1) 203 5.3.2.2 DMCA Section 1201(a)(2) 208 5.3.2.2.1 Narrow Interpretation of Section (a)(2): Chamberlain Group v. …”
    Libro electrónico
  2. 662
    Publicado 2015
    “…Exclusive coverage includes school districts, public authorities, and individual pension plans financial statements, with a disclosure checklist that helps preparers ensure compl…”
    Libro electrónico
  3. 663
    Publicado 2010
    “…This fun, friendly, and practical guide walks you through using blogging as a first line of communication to customers and explains how to protect your company and employees through privacy, disclosure, and moderation policies. Blogging guru Douglas Karr demonstrates how blogs are an ideal way to offer a conversational and approachable relationship with customers. …”
    Libro electrónico
  4. 664
    Publicado 2012
    Tabla de Contenidos: “…The Art of Narration: Biblical Style and Its Fundamental Tenets; 2.1. Gradual Disclosure of Information; 2.2. Non-Chronological Arrangement; 2.3. …”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  5. 665
    Publicado 2021
    Tabla de Contenidos: “…Current trends and future developments in human health research regulation / Stuart Nicholls -- Regulatory authorities and decision-making in health research : the institutional dimension / Aisling McMahon -- The once and future role of policy advice for health regulation by experts and advisory committees / Eric Meslin -- Changing identities in disclosure of research findings / Emily Postan -- Health research and privacy through the lens of public interest : a monocle for the myopic? …”
    Libro electrónico
  6. 666
    por OECD
    Publicado 2021
    Tabla de Contenidos: “…Intro -- Foreword -- Acknowledgements -- Abbreviations and acronyms -- Definitions of terms -- Executive summary -- Key findings -- 1 Lobbying in the 21st Century -- Introduction -- Lobbying is a broad and complex activity -- Major global challenges are strongly influenced by lobbying practices -- COVID-19 highlighted governance frameworks' susceptibility to undue influence -- References -- 2 Transparency -- Introduction -- Transparency on the targets of lobbying activities is limited -- Few countries are transparent about lobbying that targets all branches of government -- Transparency is still the exception at the subnational level -- Transparency on who is conducting lobbying activities is limited -- Certain actors who are de facto lobbyists are not always covered by transparency requirements -- Further transparency is needed to determine the beneficial owners of companies influencing the policy-making process -- In most countries there is no transparency on the influence of foreign governments -- More transparency is needed on all forms of influence -- Transparency on core lobbying activities is limited -- Transparency on political finance is greater than on lobbying, although loopholes remain -- More transparency is needed on the sources of funds for research, think tanks and grassroots organisations -- More transparency is needed on the use of media and social media as a lobbying tool -- Transparency on interests advising government ad hoc bodies is limited -- Information disclosed is usually incomplete and does not allow public scrutiny -- Information on the objective of the lobbying activity is limited -- The timing of disclosures does not allow for public scrutiny -- Engagement with lobbyists and digital tools are used to promote compliance…”
    Libro electrónico
  7. 667
    Publicado 2007
    Tabla de Contenidos: “…9.3 SOURCES AND SUGGESTED REFERENCESVALUABLE WEB SITE SOURCES; Chapter 10: FINANCIAL STATEMENTS: FORM AND CONTENT; 10.1 INTRODUCTION; 10.2 PRINCIPLES UNDERLYING FINANCIAL STATEMENTS; 10.3 BALANCE SHEET; 10.4 INCOME STATEMENT; 10.5 STATEMENT OF STOCKHOLDERS' EQUITY; 10.6 STATEMENT OF CASH FLOWS; 10.7 ARTICULATION OF FINANCIAL STATEMENTS; 10.8 FINANCIAL STATEMENT DISCLOSURE; 10.9 LIMITATIONS OF FINANCIAL STATEMENTS; 10.10 SOURCES AND SUGGESTED REFERENCES; Chapter 11: INCOME STATEMENT PRESENTATION AND EARNINGS PER SHARE; 11.1 OFFICIAL PRONOUNCEMENTS ON INCOME STATEMENT PRESENTATION…”
    Libro electrónico
  8. 668
    por Maurer, Paul J.
    Publicado 2024
    Tabla de Contenidos: “…-- Long-Standing Models for the Code -- Why the Need for the Code Is Urgent -- Chapter 2 This Is a Human Business -- Cybersecurity Is a Human Business -- Humans Have Inherent Value -- Humans Over Technology -- The Solution to the Problem of Cybersecurity Is Principally a Human Solution -- Character Costs and Character Pays -- Case Study: When Security Is on the Chopping Block -- Chapter 3 To Serve and Protect -- We Need You on That Wall -- Know Your Why-Purpose and People -- Service Means Sharing: Sharing Starts with Good Communication -- Sharing with the Broader Cyber Community: We Are All on the Same Wall -- Checking In -- A Final Example -- Case Study: Responsible Disclosure of a Security Flaw -- Chapter 4 "Zero-Day" Humanity and Accountability -- Bad Decisions and Multiplication -- Humans Are Flawed -- Turning Vulnerability into Strength: It Begins with Humility -- Being a Lifelong Learner -- Handling the Mistakes of Others -- Let's Try to Avoid "Breaking Bad" -- How to Develop a Reflective Practice -- Case Study: To Pay or Not to Pay-A Ransomware Quandary -- Chapter 5 It Begins and Ends with Trust -- The Secret of Success -- Trust Is the Currency of Cybersecurity -- How Trust Is Built -- When Things Go Bad -- Building Trust Requires Courage -- The Role of Leadership in Building a Culture of Trust -- A Checklist for Building Trust…”
    Libro electrónico
  9. 669
    por Adam, Alexandre
    Publicado 2007
    Tabla de Contenidos: “…3.1 General balance sheet presentation3.2 A/L manager's balance sheet presentation; 3.3 Banking Book and Insurance Book; 3.4 Income statement and statement of cash flows; 4 "Accrued Accounting" for Interest Rate Instruments Versus "Marked-to-Market" Accounting; 4.1 General principles; 4.2 Accrued accounting examples; 5 IFRS and IAS Accounting; 5.1 IFRS, international organizations and rule presentation; 5.2 IAS 39; 5.3 Financial disclosures; 5.4 IFRS and insurance; 5.5 Other IFRS specificities; 5.6 Impact of IFRS on ALM and criticism of IFRS…”
    Libro electrónico
  10. 670
    por Christian, Dieter, 1977-
    Publicado 2013
    Tabla de Contenidos: “…4.6 Presentation and Disclosure…”
    Libro electrónico
  11. 671
    por McDonald, Kelly
    Publicado 2012
    Tabla de Contenidos: “…The Truth Can Never Hurt You: Practice Full DisclosureShow Me All Options-Yes, All 178 of Them, Please; Families; Those with Disabilities; Chapter 11: Hispanics/Latinos; ""Press 1 for English"" Isn't a Fad; Latino-Ready; Latino-Friendly; Latino-Ready; Latino-Friendly; La Familia (The Family) is Key; Good Service Can Save a Bad Experience; Chapter 12: Serving Different Racial and Ethnic Communities; Blacks and African Americans; Insight #1: Show People of Color When Targeting People of Color; Insight #2: Diversity in Skin Tone Is Very Important…”
    Libro electrónico
  12. 672
    por Graham, Lynford
    Publicado 2012
    Tabla de Contenidos: “…3.9 Myths and Misconceptions about International Standards3.10 Sources and Suggested References; 4 Financial Statements: Form and Content; 4.1 Introduction; 4.2 Principles Underlying Financial Statements; 4.3 Balance Sheet; 4.4 Income Statement; 4.5 Statement of Stockholders' Equity; 4.6 Statement of Cash Flows; 4.7 Articulation of Financial Statements; 4.8 Financial Statement Disclosure; 4.9 Limitations of Financial Statements; 4.10 International Perspective; 4.11 References to the Historical Accounting Literature; 5 Securities and Exchange Commission Reporting Requirements…”
    Libro electrónico
  13. 673
    por Jacob, Susan
    Publicado 2016
    Tabla de Contenidos: “…Nondiscriminatory Assessment -- Personality Assessment -- Professional Competence and Autonomy -- Computer-Assisted Psychoeducational Assessment -- Concluding Comments -- Study and Discussion -- Chapter 7: Ethical and Legal Issues in School-Based Interventions -- Multitiered Systems of Academic and Behavioral Support -- Therapeutic Interventions Within the Context of a School Psychologist-Client Relationship -- Duty to Protect -- Competence and Responsibility -- Psychopharmacologic Interventions -- Concluding Comments -- Study and Discussion -- Chapter 8: Indirect Services I: Ethical-Legal Issues in Working With Teachers and Parents -- Consultation With Teachers -- Special Issues in Working With Parents -- Concluding Comments -- Study and Discussion -- Chapter 9: Indirect Services II: Special Topics in Systems-Level Consultation -- Large-Scale Assessment Programs -- Instructional Programs, Policies, and Practices -- School Discipline -- Discrimination, Harassment, and Bullying -- Concluding Comments -- Study and Discussion -- Chapter 10: Research in the Schools: Ethical and Legal Issues -- Competence, Responsibility, and Welfare of Participants -- Informed Consent and Privacy -- Exposure to Stress or Harm and Denial of Beneficial Treatment -- Post-Data-Collection Responsibilities -- Concealment and Deception -- Research With Culturally and Linguistically Diverse Populations -- Scientific Misconduct -- Concluding Comments -- Study and Discussion -- Chapter 11: Ethical and Legal Issues in Supervision -- Professional Standards for Supervision -- Professional Disclosure Statement and Individualized Learning Plan -- Ethical Principles and Supervision -- Liability Issues -- Concluding Comments -- Study and Discussion -- Epilogue: Ethics, Law, and Advocacy -- Advocacy and a Complex Legal Landscape -- Proactive Survival Strategies for Advocates…”
    Libro electrónico
  14. 674
    Publicado 2023
    Tabla de Contenidos: “…-- Generally Accepted Privacy Principles -- Management -- Notice -- Choice and Consent -- Collection -- Use, Retention, and Disposal -- Access -- Disclosure to Third Parties -- Security for Privacy -- Quality -- Monitoring and Enforcement -- Developing a Privacy Program -- Crafting Vision, Strategy, Goals, and Objectives -- Structuring the Privacy Team -- Creating a Program Scope and Charter -- Privacy Roles -- Building Inventories -- Conducting a Privacy Assessment -- Implementing Privacy Controls -- Ongoing Operation and Monitoring -- Data Governance -- Data Governance Approaches -- Data Governance Roles -- Access Requirements -- Governing Information Processing -- Managing the Privacy Budget -- Organizational Budgeting -- Expense Types -- Budget Monitoring -- Communicating about Privacy -- Creating Awareness -- Building a Communications Plan -- Privacy Program Operational Life Cycle -- Summary -- Exam Essentials -- Review Questions -- Chapter 2 Privacy Program Framework -- Develop the Privacy Program Framework -- Examples of Privacy Frameworks -- Develop Privacy Policies, Procedures, Standards, and Guidelines -- Define Privacy Program Activities -- Implement the Privacy Program Framework -- Communicate the Framework -- Aligning with Applicable Laws and Regulations -- Develop Appropriate Metrics -- Identify Intended Audience for Metrics -- Define Privacy Metrics for Oversight and Governance per Audience…”
    Libro electrónico
  15. 675
    Publicado 2024
    Tabla de Contenidos: “…-- Data flow diagrams -- Microsoft Threat Modeling Tool -- Identifying threats with STRIDE -- Spoofing -- Tampering -- Repudiation -- Information Disclosure -- Denial of Service -- Elevation of Privilege -- What are we going to do about it? …”
    Libro electrónico
  16. 676
    Publicado 2016
    Tabla de Contenidos: “…/ Fidelis Oditah -- Expansion of arbitral subject matter : new topics and new areas of law / Fan Kun --- Emergence of new arbitral centres in Asia and Africa : competition, cooperation and contributionn to the rule of law / Mohamed Abdel Raouf -- The geography of International arbitration : places of arbitration : the old ones and the new ones / Andrea Calevaris -- Soft law and power / Paul Friedland -- A new approach to regulating counsel conduct in International arbitration / Michael Hwang & Jennifer Hon -- Conflicts disclosures : the IBA guidelines and beyond / Alexis Mourre -- The future of science and technoogy in International arbitration : the next thirty years / Robert H. …”
    Libro electrónico
  17. 677
    Publicado 2016
    Tabla de Contenidos: “…; 1.3.1 Business Intelligence; 1.3.2 Predictive Analytics; 1.3.3 Prescriptive Analytics; 1.3.4 Cognitive Computing; Notes; Chapter 2: Analytics and the Office of Finance; 2.1 The Challenges of Finance; 2.2 Performance Management and Integrated Decision-Making; 2.3 Finance and Insurance; 2.4 Reporting and Regulatory Disclosure; 2.5 GAAP and IFRS; 2.6 Mergers, Acquisitions and Divestments; 2.7 Transparency, Misrepresentation, the Securities Act and 'SOX'; 2.8 Social Media and Financial Analytics…”
    Libro electrónico
  18. 678
    Publicado 2010
    Tabla de Contenidos: “…-- The cash flow statement in detail -- IMI's cash flow statement -- Other information found in the accounts -- Introduction -- Segmental analysis -- Employee benefits -- Contingent liabilities -- Commitments for future capital expenditure -- Events after the reporting period -- Related party transactions -- Financial risk management disclosures -- The operating and financial reviews -- IMI's financial review -- A comparison of IFRS and UK GAAP -- Introduction -- The main differences between the international rules and UK GAAP -- The presentation of the financial statements -- The income statement/profit and loss account…”
    Libro electrónico
  19. 679
    por Crone, Tom
    Publicado 2002
    Tabla de Contenidos: “…9.5 Restrictions on the publication of information relating to children9.6 Committal proceedings before the magistrates' court; 9.7 Hearings concerning sexual offences and indecency; 9.8 Divorce cases; 9.9 Fraud; 9.10 Official secrets; 9.11 Material made available on disclosure; 9.12 Press challenges to reporting restrictions; 9.13 Interviewing jurors; 9.14 Tape recorders, photographs and sketches; 9.15 Restrictions on reporting in other courts; Chapter 10. …”
    Libro electrónico
  20. 680
    por Jaeger, Lars
    Publicado 2008
    Tabla de Contenidos: “…Alternative Beta Strategies and Hedge Fund Replication; Contents; Preface; 1 Breaking the Black Box; 1.1 New popularity, old confusion; 1.2 The challenges of understanding hedge funds; 1.3 Leaving Alphaville; 1.4 The beauty of beta; 1.5 Alternative versus traditional beta; 1.6 The replication revolution; 1.7 Full disclosure; 2 What Are Hedge Funds, Where Did They Come From, and Where Are They Going?…”
    Libro electrónico