Computer ethics

Results: 6625



#Item
461Data privacy / Computer security / Data Protection Directive / European Union / Information privacy / Personally identifiable information / Data security / Threat / Privacy law / Ethics / Privacy

Evolution or revolution? Steps forward to a new generation of data protection regulation 22th January 2014, Brussels Dr. KISS Attila, PhD student

Add to Reading List

Source URL: www.cpdp.be

Language: English - Date: 2014-02-25 06:33:29
462Law / Electronic Privacy Information Center / Human rights / Marc Rotenberg / P3P / Internet privacy / Information privacy / Privacy in Australian law / Alan Westin / Ethics / Privacy / Computer law

Annual Report F2--for pdf

Add to Reading List

Source URL: epic.org

Language: English - Date: 2007-09-27 15:12:44
463Law / Australian copyright law / Information / Privacy law / Privacy / Legal aspects of computing / Copyright / Intellectual property / Internet privacy / Monopoly / Ethics / Computer law

Microsoft Word - CR6 Master DraftDART Interim Report_final.doc

Add to Reading List

Source URL: dart.edu.au

Language: English - Date: 2007-02-01 19:43:20
464World Wide Web / Internet privacy / Federal Trade Commission / Computer law / Electronic Privacy Information Center / Privacy policy / FTC Fair Information Practice / Google Buzz / Information privacy / Privacy / Ethics / Computing

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE FEDERAL TRADE COMMISSION In the Matter of Apperian, Inc.; Atlanta Falcons Football Club, LLC; Baker Tilly Virchow Krause, LLP; BitTorrent, Inc.; Charles River

Add to Reading List

Source URL: epic.org

Language: English - Date: 2014-02-21 11:54:40
465Human rights / Computer network security / Crime prevention / National security / SCADA / Telemetry / Computer security / Cloud computing / Stuxnet / Technology / Security / Ethics

Future Research in Systems Security Evangelos Markatos and Davide Balzarotti⋆ , eds The SysSec Project Abstract. During its first year of operation, the SysSec network of excellence has creat

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2012-09-04 10:19:02
466Law / Electronic Privacy Information Center / Internet privacy / Medical privacy / Barack Obama / Identity theft / Consumer privacy / Alan Westin / Privacy policy / Ethics / Privacy / Computer law

December 19, 2008 President-elect Obama: We congratulate you on your election as the 44th President of the United States, and we look forward to working with you on one of the most challenging issues facing the country t

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2009-08-03 11:18:45
467Public safety / .357 SIG firearms / Ethics / Tab key / Whitespace / Information security / Tab / Security controls / SIG Sauer Pro series / Security / Computer security / Data security

shared assessments final logo.eps

Add to Reading List

Source URL: sharedassessments.org

Language: English - Date: 2015-01-16 10:11:53
468Law / Internet privacy / Electronic Privacy Information Center / Surveillance / Medical privacy / Consumer Watchdog / P3P / FTC Fair Information Practice / Ethics / Privacy / Computer law

April 4, 2014 Big Data Study Office of Science and Technology Policy Eisenhower Executive Building 1650 Pennsylvania Ave. NW Washington, DC 20502

Add to Reading List

Source URL: privacycoalition.org

Language: English - Date: 2014-04-04 22:03:55
469Internet ethics / Internet / Computer network security / Content-control software / Internet censorship / Privacy / Freedom of speech / OpenNet Initiative / Network neutrality / Ethics / Computer law / Technology

“REGARDLESS OF FRONTIERS:” THE INTERNATIONAL RIGHT TO FREEDOM OF EXPRESSION IN THE DIGITAL AGE Version 0.5 – Discussion Draft April 2011 The Internet empowers individuals around the world with the potential to seek

Add to Reading List

Source URL: cdt.org

Language: English - Date: 2011-04-04 15:32:03
470Ethics / Cybercrime / Crimes / Legal aspects of computing / Defamation / Bail / International Cybercrime / Internet police / Computer crimes / Law / Computer law

CYBER LAW & INFORMATION TECHNOLOGY by Talwant Singh Addl. Distt. & Sessions Judge, Delhi Success in any field of human activity leads to crime that needs mechanisms to control it. Legal provisions should provide assuranc

Add to Reading List

Source URL: delhicourts.nic.in

Language: English - Date: 2009-10-01 04:04:11
UPDATE