نتایج جستجو برای: ghayyem custodian
تعداد نتایج: 236 فیلتر نتایج به سال:
Organizations responding to requests to produce electronically stored information (ESI) for litigation today often conduct information retrieval with a limited amount of data that has first been culled by custodian mailboxes, date ranges, or other factors chosen semi-arbitrarily based on legal negotiations or other exogenous factors. The culling process does not necessarily take into account th...
This purpose of this research is to identify the constrains that arise in inventory efforts carried out by Directorate General Intellectual Property at Ministry Law and Human Rights Republic Indonesia order realize legal protection communal intellectual property. The method used normative with an evaluative nature, where sources material obtained are then analyzed qualitatively. have been ident...
32. The Act should be amended to mandate disclosure of limited health information without consent to police services where a custodian has reasonable grounds to suspect a prescription reveals or tends to reveal that an offence has been committed or is being attempted, including the individual’s name, address, date of birth, personal health number, the drug, dosage, prescriber’s name and address...
Unlike the banking industry, insurers’ risk management framework (RMF) is not governed internationally. For this reason, their (RM) practices are comparable. We surveyed insurance personnel regarding understanding and (URRM), identification (RI), assessment analysis (RAA), monitoring (RMON), (RMP). These were working at various hierarchical levels in life non-life insurance. insurers operating ...
Routing in delay and disruption-tolerant networks (DTNs) relies on intermediary nodes, called custodians, to deliver messages to destination. However, nodes usually differ significantly in terms of available resources: energy, buffer space, and bandwidth. Routing algorithms need to make the most efficient use of custodian resources while also making sure those in limited supply are not exhauste...
Currently, continuous preservation of evidence is based on a list of signatures which are signed at the time when law enforcement officers obtain, transfer, and store evidences. With signature process, it is possible to protect the continuity of custody of evidence, evidence identification, and integrity of the state. However, it can hardly ensure the evidence is under security control at any t...
By 2005, human organ trafficking, commercialization, and transplant tourism had become a prominent and pervasive influence on transplantation therapy. The most common source of organs was impoverished people in India, Pakistan, Egypt, and the Philippines, deceased organ donors in Colombia, and executed prisoners in China. In response, in May 2008, The Transplantation Society and the Internation...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید