Assisted in maintaining total facility security and safety and reported any breach or
potential breach of security.
Not exact matches
Finally, the SEC's order finds that Yahoo failed to maintain disclosure controls and procedures designed to ensure that reports from Yahoo's information
security team concerning cyber
breaches, or the risk
of such
breaches, were properly and timely assessed for
potential disclosure.
The affair could have provided
potential blackmail fodder to foreign intelligence agencies while raising the possibility
of just the kind
of security breach Petraeus may now be charged with.
Honda apologized for the
security breach and advised customers to be vigilant
of potential marketing campaigns from third - party organizations making a reference to data that may have been stolen.
While the misuse and exploitation
of information people share with companies does not constitute the type
of «
breach» or theft discussed in the previous chapter on
security (because the information was not technically stolen), the
potential for harm to individuals and to vulnerable categories
of people is nonetheless very real.
Important factors that may affect the Company's business and operations and that may cause actual results to differ materially from those in the forward - looking statements include, but are not limited to, operating in a highly competitive industry; changes in the retail landscape or the loss
of key retail customers; the Company's ability to maintain, extend and expand its reputation and brand image; the impacts
of the Company's international operations; the Company's ability to leverage its brand value; the Company's ability to predict, identify and interpret changes in consumer preferences and demand; the Company's ability to drive revenue growth in its key product categories, increase its market share, or add products; an impairment
of the carrying value
of goodwill or other indefinite - lived intangible assets; volatility in commodity, energy and other input costs; changes in the Company's management team or other key personnel; the Company's ability to realize the anticipated benefits from its cost savings initiatives; changes in relationships with significant customers and suppliers; the execution
of the Company's international expansion strategy; tax law changes or interpretations; legal claims or other regulatory enforcement actions; product recalls or product liability claims; unanticipated business disruptions; the Company's ability to complete or realize the benefits from
potential and completed acquisitions, alliances, divestitures or joint ventures; economic and political conditions in the United States and in various other nations in which we operate; the volatility
of capital markets; increased pension, labor and people - related expenses; volatility in the market value
of all or a portion
of the derivatives we use; exchange rate fluctuations; risks associated with information technology and systems, including service interruptions, misappropriation
of data or
breaches of security; the Company's ability to protect intellectual property rights; impacts
of natural events in the locations in which we or the Company's customers, suppliers or regulators operate; the Company's indebtedness and ability to pay such indebtedness; the Company's ownership structure; the impact
of future sales
of its common stock in the public markets; the Company's ability to continue to pay a regular dividend; changes in laws and regulations; restatements
of the Company's consolidated financial statements; and other factors.
Important factors that may affect the Company's business and operations and that may cause actual results to differ materially from those in the forward - looking statements include, but are not limited to, increased competition; the Company's ability to maintain, extend and expand its reputation and brand image; the Company's ability to differentiate its products from other brands; the consolidation
of retail customers; the Company's ability to predict, identify and interpret changes in consumer preferences and demand; the Company's ability to drive revenue growth in its key product categories, increase its market share or add products; an impairment
of the carrying value
of goodwill or other indefinite - lived intangible assets; volatility in commodity, energy and other input costs; changes in the Company's management team or other key personnel; the Company's inability to realize the anticipated benefits from the Company's cost savings initiatives; changes in relationships with significant customers and suppliers; execution
of the Company's international expansion strategy; changes in laws and regulations; legal claims or other regulatory enforcement actions; product recalls or product liability claims; unanticipated business disruptions; failure to successfully integrate the business and operations
of the Company in the expected time frame; the Company's ability to complete or realize the benefits from
potential and completed acquisitions, alliances, divestitures or joint ventures; economic and political conditions in the nations in which the Company operates; the volatility
of capital markets; increased pension, labor and people - related expenses; volatility in the market value
of all or a portion
of the derivatives that the Company uses; exchange rate fluctuations; risks associated with information technology and systems, including service interruptions, misappropriation
of data or
breaches of security; the Company's inability to protect intellectual property rights; impacts
of natural events in the locations in which the Company or its customers, suppliers or regulators operate; the Company's indebtedness and ability to pay such indebtedness; tax law changes or interpretations; and other factors.
These risks and uncertainties include: fluctuations in U.S. and international economies and currencies, our ability to preserve, grow and leverage our brands,
potential negative effects
of material
breaches of our information technology systems if any were to occur, costs associated with, and the successful execution
of, the company's initiatives and plans, the acceptance
of the company's products by our customers, the impact
of competition, coffee, dairy and other raw material prices and availability, the effect
of legal proceedings, and other risks detailed in the company filings with the
Securities and Exchange Commission, including the «Risk Factors» section
of Starbucks Annual Report on Form 10 - K for the fiscal year ended September 28, 2014.
Leading the latest edition
of the ISMG
Security Report: Cambridge Analytica shuts down, saying it's lost all
of its customers, and Australia's Commonwealth Bank spots a big, bad
potential data
breach.
The state
of New Jersey's Board
of Public Utilities recently adopted stringent rules that would require utilities to develop cyber-response units within their companies and report regularly on any
potential security breaches.
And the government must be willing to provide the resources needed to properly evaluate personnel and raise awareness about the
potential consequences
of security breaches.
Research projects can also contain highly confidential information, and this is highlighted by the fact that 77 per cent
of those surveyed thought that a cyber «
security breach had the
potential to impact national
security».
This doesn't mean that Amazon will offer any special support for such endeavors, and indeed it will still most likely result in a
breach of warranty for anybody who chooses to go this route, but they don't seem to see much profit in staying on top
of any
potential exploits and holes in the
security.
Cyber
Security Risk: The U.S. Micro Cap Portfolio's and its service providers» use of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information
Security Risk: The U.S. Micro Cap Portfolio's and its service providers» use
of internet, technology and information systems may expose the Portfolio to
potential risks linked to cyber
security breaches of those technological or information
security breaches of those technological or information systems.
Cyber
Security Risk: The U.S. Large Cap Equity Portfolio's and its service providers» use of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information
Security Risk: The U.S. Large Cap Equity Portfolio's and its service providers» use
of internet, technology and information systems may expose the Portfolio to
potential risks linked to cyber
security breaches of those technological or information
security breaches of those technological or information systems.
Cyber
Security Risk: The International Large Cap Growth Portfolio's and its service providers» use of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information
Security Risk: The International Large Cap Growth Portfolio's and its service providers» use
of internet, technology and information systems may expose the Portfolio to
potential risks linked to cyber
security breaches of those technological or information
security breaches of those technological or information systems.
That is surprising, especially given what has happened with
security breaches in the past year and the
potential for millions to be victims
of identity theft.
Cyber
Security Risk: The U.S. Large Company Portfolio's and its service providers» use of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information
Security Risk: The U.S. Large Company Portfolio's and its service providers» use
of internet, technology and information systems may expose the Portfolio to
potential risks linked to cyber
security breaches of those technological or information
security breaches of those technological or information systems.
Travellers need to be more aware
of the
potential data
security breaches they risk by logging onto unsecure networks while travelling.
I expect the AD and other donors will be extremely unhappy about the
breach of security, and that has
potential for damage second only to their 501c3 status problem (the big revelation, relating mainly to the overtly political «Operation Angry Badger» but also to the questionable educational status
of spreading lies; so that's your direct answer I suppose).
There is a
potential role for the Australian
Securities and Investment Commission to examine whether the stigmatisation
of the fossil fuel sector via the divestment campaign is a
breach of the [Corporations Act].
Workshare is injecting
security into practice and case management flow to help you track and reduce the chance
of potential data
breaches.
According to
security professionals consulted by networking hardware company Cisco, operations
of an organisation (36 %) are most likely to be affected by any
potential cyber - attack /
breach.
The Mossack Fonseca leak, which came about via an anonymous tip off to German newspaper Süddeutsche Zeitung, has brought into sharpest relief the
potential consequences
of a law firm
security breach, which the legal profession has been warned about with growing urgency over the past two years.
Hank's data and the practice management system reside on different servers «to minimize
potential exposure in the event
of a
security breach.»
How to have a conversation with clients about data
security (in terms
of potential added costs and what to do in the event
of a
breach) would also be considered.
These situations also include internal investigations where there are allegations
of harassment or discrimination, or where a third - party agency such as a
securities commission has requested information relating to
potential breaches of the company's obligations.
If an actual or perceived
breach of our
security measures occurs as a result
of third - party action, employee error, malfeasance or otherwise, our brand and reputation may be harmed, customers may curtail or stop using our services and we may face claims and
potential liabilities, which could adversely affect our business, results
of operations, financial condition and future prospects.
This constant and unpredictable rotation
of instances is highly resilient against
potential security breaches, including DDoS attacks, website defacement, nuke attacks and wrong patching, as damaged or
breached systems are constantly being replaced with a functioning instance.
Investors in initial coin offerings (ICOs) should take necessary precautions when sending Ether, the native token
of Ethereum, to ICOs due to
potential hacking attacks and
security breaches.
Indeed, as reflected in recent news, broad definitions
of «personal information» render a wide range
of non-retail industries vulnerable to
potential liability due to a data
security breach.
Notify your broker immediately if you are aware
of any
potential security breach, such as a lost or stolen laptop or a possible virus.
On one hand, there are significant benefits to installing certain connected devices in a rental unit, but there's also the
potential risk
of security breaches and other complications.