Computer ethics

Results: 6625



#Item
261Identity management / Social issues / Law / Computer law / Security / Privacy / Personally identifiable information / Data quality / Data Protection Act / Ethics / Data privacy / Privacy law

Code of Conduct for the Protection of the Individual’s Right to Privacy in the Handling of Personal Data within the Deutsche Telekom Group Preamble and Recitals (1) Due to increasing networking of information and commu

Add to Reading List

Source URL: www.t-systems.co.za

Language: English - Date: 2013-10-22 09:24:28
262Behavior / Social psychology / Persecution / Computer crimes / Cyber-bullying / School bullying / Youth Internet Safety Survey / Victimisation / Social networking service / Ethics / Bullying / Abuse

11 Comparisons of Bully and Unwanted Sexual Experiences Online and Offline Among a National Sample of Youth Michele L. Ybarra, Kimberly J. Mitchell and Dorothy L. Espelage

Add to Reading List

Source URL: cdn.intechopen.com

Language: English - Date: 2012-07-03 10:25:07
263Cross-platform software / Web 2.0 / Privacy of telecommunications / Gmail / Internet privacy / Webmail / Cloud computing / Ontario v. Quon / Privacy / Computing / Ethics / Internet

Computer & Internet Lawyer The

Add to Reading List

Source URL: www.cades.com

Language: English - Date: 2015-01-09 21:50:43
264Human rights / Computer law / Identity management / Internet privacy / Confidentiality / Freedom of information legislation / Personally identifiable information / The right to privacy in New Zealand / R. v. Patrick / Ethics / Privacy law / Privacy

State of Cyber Security and Surveillance in India A Review of the Legal Landscape Introduction The issue of cyber security and surveillance, especially unauthorised surveillance, though traditionally unprioritised, has r

Add to Reading List

Source URL: cis-india.org

Language: English
265Data privacy / Law / Internet privacy / Computer law / Privacy policy / Information privacy / HTTP cookie / Data Protection Act / Personally identifiable information / Ethics / Privacy / Computing

Protecting your online privacy At NPT-UK we are committed to protecting your privacy online. This policy governs all pages hosted at www.NPT-UK.org. It does not apply to pages hosted by other organisations to which we ma

Add to Reading List

Source URL: www.npt-uk.org

Language: English - Date: 2014-06-21 18:53:42
266Government / Computer security / Data security / Information security / National security / Internet privacy / Privacy / Personally identifiable information / Password / Ethics / Security / Privacy law

Employee Last Name: Employee Start Date: Development & Alumni Relations Advance Security and Use Statement

Add to Reading List

Source URL: ais.ucdavis.edu

Language: English - Date: 2014-10-21 18:46:08
267Crime prevention / National security / Public safety / Computer security / Electronic commerce / Internet privacy / Password / Information security / Information privacy / Security / Ethics / Privacy

Privacy Policy Summary of MTM Privacy Policy MTM Technologies, Inc. (the “Company” or “MTM”,) Privacy Policy is a statement that discloses some or all of the ways MTM gathers, uses, discloses and manages MTM cust

Add to Reading List

Source URL: www.mtm.com

Language: English - Date: 2014-11-19 15:21:36
268Computer crimes / Behavior / Bullying / Crime / Persecution / Parry Aftab / Online predator / Cyberbully / Social networking service / Cyber-bullying / Ethics / Abuse

T oday’s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social networking

Add to Reading List

Source URL: www.victimvoice.org

Language: English - Date: 2013-01-23 18:54:43
269Surveillance / Face recognition / Crime prevention / Privacy / Automatic identification and data capture / Facial recognition system / Face detection / Biometrics / Internet privacy / Security / National security / Ethics

GARP-Face: Balancing Privacy Protection and Utility Preservation in Face De-identification Liang Du1 , Meng Yi1 , Erik Blasch2 , and Haibin Ling1 1 Department of Computer and Information Science Temple University

Add to Reading List

Source URL: www.dabi.temple.edu

Language: English - Date: 2014-09-30 14:55:32
270Computer law / Electronic Privacy Information Center / Internet privacy / Web 2.0 / Marc Rotenberg / Privacy / Consumer Watchdog / Consumer protection / Class action / World Wide Web / Computing / Ethics

August 27, 2014 Clerk of the United States District Court for the Northern District of California San Jose Courthouse, Courtroom 4 - 5th Floor 280 South 1st Street San Jose, CARE: Google Referrer Header Litigation

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2014-08-27 15:31:21
UPDATE