Inslaw was never paid for any of the unauthorized uses
But if OReGO is implemented without unauthorized uses
or breaches of personal information, acceptance of the technology needed to make a per-mile fee work will spread.
of potential unauthorized uses
or disclosures of personal (“protected”) health information (PHI).
Although not every use of a trademark can be controlled, keeping track of potential unauthorized uses
of the medtech company's trademarks is important to protect the goodwill associated with the brand and the legal validity of the trademarks.
In fact, Carlisle said that there are dozens of unauthorized uses
involving most of the top athletes during any Olympics.
RFID tags also are being used in more sophisticated applications, from matching hospital patients with laboratory test results to tracking systems for dangerous materials, and concerns have been raised about preventing eavesdropping and unauthorized uses
They love the city because it's the last party town left in an America that is increasingly efficient, puritanical, and unforgiving about any unauthorized uses
of what used to be, but no longer is, "free time.
Just over half (56 percent) of the respondents claimed unauthorized uses
, but these included employees' inappropriate use of company bandwidth (sharing jokes, downloading music, and the like).
Such real-time network usage monitoring has been helpful in eliminating unauthorized uses
that deplete bandwidth.
Widespread unauthorized uses
may cause the mark to lose its trademark significance altogether and fall into the public domain.
Examples would include losses caused by unauthorized uses
and disclosures or any loss of data integrity, such as that caused by a system crash with no current backup.
Louisiana retailers are liable to the cardholder for any damages and expenses, including attorney fees, incurred by unauthorized uses
of the card.