Sentences with phrase «use of documents protected»

The courts have always recognised that lawyers will often be unable properly to defend themselves as they will be unable to make use of documents protected by legal professional privilege to justify their actions, it being a matter for the client alone to decide whether to waive privilege.

Not exact matches

On Sunday, a leak of documents from off - shore law firm Appleby revealed how individuals and companies use tax - havens and complex structures to legally protect their wealth from tax.
In order to protect your privacy which is of great importance to us, we offer this document which helps explain our practices related to online information and the way this information is used and collected by us can be chosen by you.
«Perhaps the most important thing is we're amassing a huge amount of data,» which can be used to document and study these sites and protect their resources.
One journalist who went to great pains to protect the identity of sources by only meeting in person, for instance, used an iPad to photograph sensitive documents.
To address concerns about the spacecraft's radioisotope thermoelectric generators, which are commonly used for NASA missions, NASA responded by issuing a supplementary document about the flyby and detailing the agency's methodology for protecting the planet, saying there was less than a one - in - a-million chance of an impact occurring.
Those with a history background may be aware that the earliest documented use of CCTV technology is reported to have been in Germany in 1942, when it was used to protect V2 rockets.
And of course eBrary says that their DRM is absolutely necessary to protect the copyright holders, but then you have a platform like EBook Library, where users can download books using Adobe Digital Editions where the document will simply expire after a predetermined amount of time.
BlackBerry 7 OS also includes several other pre-loaded applications, such as the Premium version of the mobile document editing suite Documents To Go, and BlackBerry Protect, which enables users to back - up and secure data in the cloud and locate their misplaced BlackBerry smartphone using GPS or by remotely turning up the ringer volume.
Features: — Browse your handset's file system using a web browser — View or download files from your handset over wifi — Host static web pages, documents and media on your device — Can run in background while you use other handset functions The web server provides a password to protect your data from random visitors; this password is displayed on the main screen of PortaServer.
This may be required because we use your income to qualify you for the loan so we won't need copies of your tax documents and as a way to protect you in case your refund is late or kept by the IRS for some reason.
ICFE DCCS ® Independent Study Guide Table of Contents Consumer Financial Protection Bureau to oversee debt collectors Collection agencies and junk debt buyers - Mini-Miranda What to do if a debtor is contacted about past debts Sample cease and desist letter Fair Debt Collection Practices Act Summary from the CFPB Debt that is covered Debt Collectors that are covered Debt Collectors that are NOT covered Debt Collection for Active and Veteran Military Personnel Communications connected with debt collection When, where and with who communications is permitted Ceasing Communication with the consumer Communicating with third parties Validation of debts Prohibited Practices: Harassing or abusive Practices False or misleading representations Unfair Practices Multiple debts Legal Actions by debt collectors Furnishing certain deceptive forms Civil liability Defenses CFPB / FTC staff's commentary on the FDCPA Common debt collector violations How to document a collector's abusive behavior What to do if a collector breaks the law How collectors are trained - examples of collector training courses FDCPA Sample Exam from ACA for Collectors How collectors are using Social Medias in collections Dealing with creditors and third party collectors Other factors for a debtor in collection: Credit reports and scores Reviewing credit reports with debtors - Permissible uses Rules about credit decisions and notices Debtor education about credit reports and FICO scores Specialty Report Providers Rules to protect consumers in credit card debt How to read and understand credit reports How to make changes or dispute accuracy Freezing Credit Files FCRA / FACTA Provisions of ID Theft victims How credit scoring works The Credit Card Accountability and Disclosure Act Credit Rules CFPB rules establish strong protections for homeowners facing foreclosure Other Resources
Animal Folks Minnesota - Legislative Action (AFMN) has used these documents when lobbying at the State Capitol for animal protection bills as well as when testifying in MN counties and cities in support of local ordinances that protect animals.
Working in photography, as well as video and installation, her projects have documented same - sex marriage and used first - person accounts to surface the «experience of living in a country that constitutionally protects the rights of LGBTI people but often fails to defend them from targeted violence.»
The document recommends the use of adaptive forest management to protect forest resources against increasing abiotic disturbances, and calls for the use of strategies such as species diversification, windbreaks and mixed cropping patterns to enhance ecosystem resilience, as well as selective planting.
This document can also provide a more equal distribution of power, so that if you are a minority shareholder, you can use an Investors Agreement to help protect your best interests.
Howard Bashman comments on this story from the New York Times (6/22/06), reporting that eight pages of a 51 - page government brief filed in federal court that had been blacked out to protect sensitive information concerning a grand jury investigation of steroid use in baseball can be viewed by cutting and pasting the passages into a word - processing document.
If you live in Alaska, and want to help ensure that your best interests are protected, you can use our Healthcare Power of Attorney document today, and protect your family.
Topics may include: creating document templates; understanding and using tokens; modifying user preferences and security preferences; creating file menu templates, creating custom windows; leveraging the power of Task Wizards and the Open File Wizard; managing changing data / reporting needs; capturing online, legal research time within a file; tracking time in a more efficient and flexible way; and protecting your data using Legal Files security controls.
«The cases, no doubt, establish that such documents are protected where they have come into existence after litigation commenced or in contemplation, and where they have been made with a view to such litigation, either for the purpose of obtaining advice as to such litigation, or of obtaining evidence to be used in such litigation, or of obtaining information which might lead to the obtaining of such evidence.»
This document can be one part of an overall estate plan, or you can use it by itself to protect you and your family.
With respect to voluntary production of documents protected by privacy law, as a general rule — and subject to certain requirements depending on the case — persons may use third parties» personal data to defend their rights in court (either in Italy or abroad) without obtaining those third parties» consent and (when the data is not collected directly from the data subjects) even without informing them of the data processing.
Within a single consent document, the consent for use and disclosure of protected health information required or permitted under this rule must be visually and organizationally separate from the other consents or authorizations and must be separately signed by the individual and dated.
An authorization for use or disclosure of protected health information may not be combined with any other document to create a compound authorization, except as follows:
The firewalls include: describing the employees or classes of employees with access to protected health information; restricting access to and use of the protected health information to the plan administration functions performed on behalf of the group health plan and described in plan documents; and providing an effective mechanism for resolving issues of noncompliance.
Under § 164.506 (b)(4), consents for uses and disclosures of protected health information to carry out treatment, payment, and health care operations may be combined in a single document covering all three types of activities and may be combined with other types of legal permission from the individual.
In § 164.508 (b)(3), we also permit covered entities to combine an authorization for the use or disclosure of protected health information created for purposes of research including treatment of individuals with certain other documents.
Specifically, in order for a plan sponsor to obtain without authorization protected health information from a group health plan, health insurance issuer, or HMO, the documents under which the group health plan was established and is maintained must be amended to: (1) Describe the permitted uses and disclosures of protected health information by the plan sponsor (see above for further explanation); (2) specify that disclosure is permitted only upon receipt of a written certification that the plan documents have been amended; and (3) provide adequate firewalls.
Under § 164.506 (e), when the terms of a covered entity's consent conflict with the terms of another written legal permission from the individual to use or disclose protected health information (such as a consent obtained under state law by another covered entity or an authorization), the covered entity must adhere to the more restrictive document.
In order for the group health plan to disclose protected health information to a plan sponsor, the plan documents under which the plan was established and is maintained must be amended to: (1) Describe the permitted uses and disclosures of protected health information; (2) specify that disclosure is permitted only upon receipt of a certification from the plan sponsor that the plan documents have been amended and the plan sponsor has agreed to certain conditions regarding the use and disclosure of protected health information; and (3) provide adequate firewalls to: identify the employees or classes of employees who will have access to protected health information; restrict access solely to the employees identified and only for the functions performed on behalf of the group health plan; and provide a mechanism for resolving issues of noncompliance.
First, under § 164.508 (f)(described in more detail, below), an authorization for the use or disclosure of protected health information created for research that includes treatment of the individual may be combined with a consent for the use or disclosure of that protected health information to carry out treatment, payment, or health care operations under § 164.506 and with other documents as provided in § 164.508 (f).
Second, authorizations for the use or disclosure of psychotherapy notes for multiple purposes may be combined in a single document, but may not be combined with authorizations for the use or disclosure of other protected health information.
• Balancing money transfer transactions and order receipts • Verifying and preparing deposits and inputting sales and item counts • Compiling and sorting documents such as invoices, checks and account statements using manual calculators and sophisticated technology • Maintaining confidentiality of proprietary information and protecting company assets
• Demonstrated expertise in reading and interpreting blueprints and ensuring that all construction work procedures are properly aligned to them • Hands - on experience in performing construction work according to specified building codes and state - specified procedures • Documented success in erecting structures and handling demolition work by following safety procedures • Qualified to mix concrete and cement in prescribed consistencies and pouring them in a safe and accurate manner • Skilled in leveling concrete and earth using trowels and shovels and other construction tools • Highly skilled in operating jackhammers and drills to break up concrete and pavement and place, consolidate and protect case - in - place masonry structures • Proficient in cleaning and preparing construction sites by removing debris and hazardous materials and ensuring that constructional materials are properly loaded and unloaded from delivery trucks • Competent in controlling passing traffic by erecting traffic cones and signaling vehicles toward diverted routes • Proven ability to perform physically taxing work such as digging ditches and trenches using shovels and picks • Demonstrated ability to operate pneumatic hammers, vibrators and tampers to provide logistical assistance with construction projects • Proven record of carefully demolishing structures by using allowed explosives in a safe manner
Client and Service Use Predictors of Successfully Completing a Child Maltreatment Prevention Program Theriot, O'Day, & Hatfield Protecting Children, 24 (2), 2009 View Abstract and Document Examines a Family Connections program in Tennessee and finds that families receiving more comprehensive direct services and those served for a shorter time period were more likely to complete services.
a b c d e f g h i j k l m n o p q r s t u v w x y z