Sentences with phrase «potential breach of security»

Assisted in maintaining total facility security and safety and reported any breach or potential breach of security.

Not exact matches

Finally, the SEC's order finds that Yahoo failed to maintain disclosure controls and procedures designed to ensure that reports from Yahoo's information security team concerning cyber breaches, or the risk of such breaches, were properly and timely assessed for potential disclosure.
The affair could have provided potential blackmail fodder to foreign intelligence agencies while raising the possibility of just the kind of security breach Petraeus may now be charged with.
Honda apologized for the security breach and advised customers to be vigilant of potential marketing campaigns from third - party organizations making a reference to data that may have been stolen.
While the misuse and exploitation of information people share with companies does not constitute the type of «breach» or theft discussed in the previous chapter on security (because the information was not technically stolen), the potential for harm to individuals and to vulnerable categories of people is nonetheless very real.
Important factors that may affect the Company's business and operations and that may cause actual results to differ materially from those in the forward - looking statements include, but are not limited to, operating in a highly competitive industry; changes in the retail landscape or the loss of key retail customers; the Company's ability to maintain, extend and expand its reputation and brand image; the impacts of the Company's international operations; the Company's ability to leverage its brand value; the Company's ability to predict, identify and interpret changes in consumer preferences and demand; the Company's ability to drive revenue growth in its key product categories, increase its market share, or add products; an impairment of the carrying value of goodwill or other indefinite - lived intangible assets; volatility in commodity, energy and other input costs; changes in the Company's management team or other key personnel; the Company's ability to realize the anticipated benefits from its cost savings initiatives; changes in relationships with significant customers and suppliers; the execution of the Company's international expansion strategy; tax law changes or interpretations; legal claims or other regulatory enforcement actions; product recalls or product liability claims; unanticipated business disruptions; the Company's ability to complete or realize the benefits from potential and completed acquisitions, alliances, divestitures or joint ventures; economic and political conditions in the United States and in various other nations in which we operate; the volatility of capital markets; increased pension, labor and people - related expenses; volatility in the market value of all or a portion of the derivatives we use; exchange rate fluctuations; risks associated with information technology and systems, including service interruptions, misappropriation of data or breaches of security; the Company's ability to protect intellectual property rights; impacts of natural events in the locations in which we or the Company's customers, suppliers or regulators operate; the Company's indebtedness and ability to pay such indebtedness; the Company's ownership structure; the impact of future sales of its common stock in the public markets; the Company's ability to continue to pay a regular dividend; changes in laws and regulations; restatements of the Company's consolidated financial statements; and other factors.
Important factors that may affect the Company's business and operations and that may cause actual results to differ materially from those in the forward - looking statements include, but are not limited to, increased competition; the Company's ability to maintain, extend and expand its reputation and brand image; the Company's ability to differentiate its products from other brands; the consolidation of retail customers; the Company's ability to predict, identify and interpret changes in consumer preferences and demand; the Company's ability to drive revenue growth in its key product categories, increase its market share or add products; an impairment of the carrying value of goodwill or other indefinite - lived intangible assets; volatility in commodity, energy and other input costs; changes in the Company's management team or other key personnel; the Company's inability to realize the anticipated benefits from the Company's cost savings initiatives; changes in relationships with significant customers and suppliers; execution of the Company's international expansion strategy; changes in laws and regulations; legal claims or other regulatory enforcement actions; product recalls or product liability claims; unanticipated business disruptions; failure to successfully integrate the business and operations of the Company in the expected time frame; the Company's ability to complete or realize the benefits from potential and completed acquisitions, alliances, divestitures or joint ventures; economic and political conditions in the nations in which the Company operates; the volatility of capital markets; increased pension, labor and people - related expenses; volatility in the market value of all or a portion of the derivatives that the Company uses; exchange rate fluctuations; risks associated with information technology and systems, including service interruptions, misappropriation of data or breaches of security; the Company's inability to protect intellectual property rights; impacts of natural events in the locations in which the Company or its customers, suppliers or regulators operate; the Company's indebtedness and ability to pay such indebtedness; tax law changes or interpretations; and other factors.
These risks and uncertainties include: fluctuations in U.S. and international economies and currencies, our ability to preserve, grow and leverage our brands, potential negative effects of material breaches of our information technology systems if any were to occur, costs associated with, and the successful execution of, the company's initiatives and plans, the acceptance of the company's products by our customers, the impact of competition, coffee, dairy and other raw material prices and availability, the effect of legal proceedings, and other risks detailed in the company filings with the Securities and Exchange Commission, including the «Risk Factors» section of Starbucks Annual Report on Form 10 - K for the fiscal year ended September 28, 2014.
Leading the latest edition of the ISMG Security Report: Cambridge Analytica shuts down, saying it's lost all of its customers, and Australia's Commonwealth Bank spots a big, bad potential data breach.
The state of New Jersey's Board of Public Utilities recently adopted stringent rules that would require utilities to develop cyber-response units within their companies and report regularly on any potential security breaches.
And the government must be willing to provide the resources needed to properly evaluate personnel and raise awareness about the potential consequences of security breaches.
Research projects can also contain highly confidential information, and this is highlighted by the fact that 77 per cent of those surveyed thought that a cyber «security breach had the potential to impact national security».
This doesn't mean that Amazon will offer any special support for such endeavors, and indeed it will still most likely result in a breach of warranty for anybody who chooses to go this route, but they don't seem to see much profit in staying on top of any potential exploits and holes in the security.
Cyber Security Risk: The U.S. Micro Cap Portfolio's and its service providers» use of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information Security Risk: The U.S. Micro Cap Portfolio's and its service providers» use of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information security breaches of those technological or information systems.
Cyber Security Risk: The U.S. Large Cap Equity Portfolio's and its service providers» use of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information Security Risk: The U.S. Large Cap Equity Portfolio's and its service providers» use of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information security breaches of those technological or information systems.
Cyber Security Risk: The International Large Cap Growth Portfolio's and its service providers» use of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information Security Risk: The International Large Cap Growth Portfolio's and its service providers» use of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information security breaches of those technological or information systems.
That is surprising, especially given what has happened with security breaches in the past year and the potential for millions to be victims of identity theft.
Cyber Security Risk: The U.S. Large Company Portfolio's and its service providers» use of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information Security Risk: The U.S. Large Company Portfolio's and its service providers» use of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information security breaches of those technological or information systems.
Travellers need to be more aware of the potential data security breaches they risk by logging onto unsecure networks while travelling.
I expect the AD and other donors will be extremely unhappy about the breach of security, and that has potential for damage second only to their 501c3 status problem (the big revelation, relating mainly to the overtly political «Operation Angry Badger» but also to the questionable educational status of spreading lies; so that's your direct answer I suppose).
There is a potential role for the Australian Securities and Investment Commission to examine whether the stigmatisation of the fossil fuel sector via the divestment campaign is a breach of the [Corporations Act].
Workshare is injecting security into practice and case management flow to help you track and reduce the chance of potential data breaches.
According to security professionals consulted by networking hardware company Cisco, operations of an organisation (36 %) are most likely to be affected by any potential cyber - attack / breach.
The Mossack Fonseca leak, which came about via an anonymous tip off to German newspaper Süddeutsche Zeitung, has brought into sharpest relief the potential consequences of a law firm security breach, which the legal profession has been warned about with growing urgency over the past two years.
Hank's data and the practice management system reside on different servers «to minimize potential exposure in the event of a security breach
How to have a conversation with clients about data security (in terms of potential added costs and what to do in the event of a breach) would also be considered.
These situations also include internal investigations where there are allegations of harassment or discrimination, or where a third - party agency such as a securities commission has requested information relating to potential breaches of the company's obligations.
If an actual or perceived breach of our security measures occurs as a result of third - party action, employee error, malfeasance or otherwise, our brand and reputation may be harmed, customers may curtail or stop using our services and we may face claims and potential liabilities, which could adversely affect our business, results of operations, financial condition and future prospects.
This constant and unpredictable rotation of instances is highly resilient against potential security breaches, including DDoS attacks, website defacement, nuke attacks and wrong patching, as damaged or breached systems are constantly being replaced with a functioning instance.
Investors in initial coin offerings (ICOs) should take necessary precautions when sending Ether, the native token of Ethereum, to ICOs due to potential hacking attacks and security breaches.
Indeed, as reflected in recent news, broad definitions of «personal information» render a wide range of non-retail industries vulnerable to potential liability due to a data security breach.
Notify your broker immediately if you are aware of any potential security breach, such as a lost or stolen laptop or a possible virus.
On one hand, there are significant benefits to installing certain connected devices in a rental unit, but there's also the potential risk of security breaches and other complications.
a b c d e f g h i j k l m n o p q r s t u v w x y z