Computer ethics

Results: 6625



#Item
201Safety engineering / Environmental social science / Industrial hygiene / Occupational safety and health / Risk management / Fire safety / Safety / Risk / Ethics

Departmental Safety Code of Practice Department of Electronic and Computer Engineering

Add to Reading List

Source URL: www.ecestudents.ul.ie

Language: English - Date: 2010-01-20 13:31:01
202Law / Computer network security / Secure communication / Electronic commerce / Information privacy / Internet privacy / Personally identifiable information / United States Department of Homeland Security / Data breach / Security / Ethics / Privacy

Cybersecurity Assessment: What Will the Regulators Be Looking For?

Add to Reading List

Source URL: www.buckleysandler.com

Language: English - Date: 2015-03-18 15:48:10
203Privacy / Ethics / Data Protection Directive / European Union / Computer law / European Data Protection Supervisor / Personally identifiable information / Information privacy / Privacy policy / Data privacy / Privacy law / Law

Privacy and Security Law Report ® Reproduced with permission from Privacy & Security Law Report, 11 PVLR 06, Copyright 姝 2012 by The Bureau of National Affairs, Inchttp://www.bna.com

Add to Reading List

Source URL: www.huntonprivacyblog.com

Language: English - Date: 2015-02-25 20:15:13
204Ethics / Computer network security / Human rights / Chief privacy officer / Privacy Office of the U.S. Department of Homeland Security / Privacy / Health Insurance Portability and Accountability Act / Internet privacy / Information security / Computer security / Data security / Security

LIFE SCIENCE DATA PRIVACY, INTEGRITY AND SECURITY SUMMIT Technical Strategies for Secure and Accessible Health Data and Patient Records in Clinical Trials

Add to Reading List

Source URL: www.pmaconference.com

Language: English - Date: 2015-05-01 09:51:24
205Open-source software / Free software / Software / Open source / Government / Ethics / Software licenses / Computer law / Proprietary software

SOFTWARE/COPYRIGHT DISCLOSURE FORM Information contained in this disclosure is CONFIDENTIAL and PROPRIETARY. For assistance, please call the Office of Technology Alliances at. This disclosure will normall

Add to Reading List

Source URL: ota.uci.edu

Language: English - Date: 2015-03-23 15:58:12
206Crime prevention / Data security / Information security / National security / Internet privacy / Privacy / Public safety / Ethics / Security / Computer security

MayThe Research Foundation for The State University of New York Acceptable Use and Security of RF Data and Information Technology

Add to Reading List

Source URL: www.rfsuny.org

Language: English - Date: 2015-05-06 09:21:31
207Privacy law / Identity management / Social issues / Computer law / Computing / Personally identifiable information / Privacy / Data quality / Data Protection Act / Ethics / Law / Data privacy

Privacy Code of Conduct Code of Conduct for the Protection of the Individual’s Right to Privacy in the Handling of Personal Data within the Deutsche Telekom Group Preamble and Recitals

Add to Reading List

Source URL: www.combridge.ro

Language: English - Date: 2010-09-24 00:31:45
208Social issues / Internet / World Wide Web / Human–computer interaction / Internet privacy / Privacy / Behavioral targeting / Personalization / Ethics / Identity management / Marketing

Data Transparency Lab Call For Proposals April 2015 The Data Transparency Lab is a collaborative effort between universities, businesses and institutions to support research in tools, data, and methodologies for shedding

Add to Reading List

Source URL: www.datatransparencylab.org

Language: English - Date: 2015-06-02 04:13:37
209Data / Corporations law / Identity management / Social issues / Privacy / Information privacy / Corporation / Personally identifiable information / Computer data processing / Ethics / Law / Data privacy

Informativa azionisti TI_nov2014_ENG

Add to Reading List

Source URL: www.telecomitalia.com

Language: English - Date: 2015-06-09 04:02:21
210Internet / Email / Internet ethics / Internet privacy / Authorization / Password / Health Insurance Portability and Accountability Act / Access control / Network security / Security / Computing / Computer security

Acceptable Use of Information Systems General Principles Access to computer systems and networks owned, operated, or provided by the University is predicated on compliance with certain responsibilities and obligations an

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2015-04-08 09:06:59
UPDATE