نتایج جستجو برای: ghayyem custodian

تعداد نتایج: 236  

Journal: :Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad 2017

2009
John Wang Cameron Coles Rob Elliot Sofia Andrianakou

Organizations responding to requests to produce electronically stored information (ESI) for litigation today often conduct information retrieval with a limited amount of data that has first been culled by custodian mailboxes, date ranges, or other factors chosen semi-arbitrarily based on legal negotiations or other exogenous factors. The culling process does not necessarily take into account th...

Journal: :Kanun (Banda Aceh) 2022

This purpose of this research is to identify the constrains that arise in inventory efforts carried out by Directorate General Intellectual Property at Ministry Law and Human Rights Republic Indonesia order realize legal protection communal intellectual property. The method used normative with an evaluative nature, where sources material obtained are then analyzed qualitatively. have been ident...

Journal: :Health law review 2005
Mat Rose

32. The Act should be amended to mandate disclosure of limited health information without consent to police services where a custodian has reasonable grounds to suspect a prescription reveals or tends to reveal that an offence has been committed or is being attempted, including the individual’s name, address, date of birth, personal health number, the drug, dosage, prescriber’s name and address...

Journal: :Ekonomska Istrazivanja-economic Research 2023

Unlike the banking industry, insurers’ risk management framework (RMF) is not governed internationally. For this reason, their (RM) practices are comparable. We surveyed insurance personnel regarding understanding and (URRM), identification (RI), assessment analysis (RAA), monitoring (RMON), (RMP). These were working at various hierarchical levels in life non-life insurance. insurers operating ...

Journal: :Wireless Communications and Mobile Computing 2013
Gabriel Sandulescu Péter Schaffer Simin Nadjm-Tehrani

Routing in delay and disruption-tolerant networks (DTNs) relies on intermediary nodes, called custodians, to deliver messages to destination. However, nodes usually differ significantly in terms of available resources: energy, buffer space, and bandwidth. Routing algorithms need to make the most efficient use of custodian resources while also making sure those in limited supply are not exhauste...

2013
Chia-Chun Chen Chua-Huang Huang Feng Chia

Currently, continuous preservation of evidence is based on a list of signatures which are signed at the time when law enforcement officers obtain, transfer, and store evidences. With signature process, it is possible to protect the continuity of custody of evidence, evidence identification, and integrity of the state. However, it can hardly ensure the evidence is under security control at any t...

Journal: :Transplantation 2013
Gabriel M Danovitch Jeremy Chapman Alexander M Capron Adeera Levin Mario Abbud-Filho Mustafa Al Mousawi William Bennett Debra Budiani-Saberi William Couser Ian Dittmer Vivek Jha Jacob Lavee Dominique Martin Marwan Masri Saraladevi Naicker Shiro Takahara Annika Tibell Faissal Shaheen Vathsala Anantharaman Francis L Delmonico

By 2005, human organ trafficking, commercialization, and transplant tourism had become a prominent and pervasive influence on transplantation therapy. The most common source of organs was impoverished people in India, Pakistan, Egypt, and the Philippines, deceased organ donors in Colombia, and executed prisoners in China. In response, in May 2008, The Transplantation Society and the Internation...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید