Computer ethics

Results: 6625



#Item
501Computer law / Internet ethics / Identity management / Internet privacy / Personally identifiable information / Electronic Privacy Information Center / Social Security / Ethics / Privacy law / Privacy

Understanding Amy Boyer’s Law: Social Security Numbers, Crime Control, and Privacy A Special Report Issued by Privacilla.org

Add to Reading List

Source URL: www.privacilla.org

Language: English - Date: 2015-04-23 13:20:14
502Computer law / Electronic Privacy Information Center / Internet privacy / Marc Rotenberg / Amicus curiae / Customer proprietary network information / Consumer protection / Liberty Coalition / Consumer privacy / Ethics / Privacy / Law

No__________________________ IN THE UNITED STATES COURT OF APPEALS FOR THE DISTRICT OF COLUMBIA CIRCUIT __________________________ National Cable & Telecommunications Association,

Add to Reading List

Source URL: epic.org

Language: English - Date: 2008-05-06 14:53:04
503Ethics / Cryptography / Business law / Copyright law / Trusted Platform Module / Integrity / Data integrity / Kernel / SPARK / Computing / Computer security / Trusted computing

Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence ∗ † Chongkyung Kil§, Emre C. Sezer§, Ahmed M. Azab§, Peng Ning§, Xiaolan Zhang†† †† §

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:05
504Computer law / Privacy / Data Protection Act / Law / Information privacy / Personally identifiable information / Data protection (privacy) laws in Russia / Information privacy law / Data privacy / Ethics / Privacy law

ICO VIEW OF DATA SHARING In context of the Troubled Families initiative While the general public policy questions around sharing information for the purposes of assisting ‘troubled families’ are not considerations fo

Add to Reading List

Source URL: informationsharing.co.uk

Language: English - Date: 2014-08-08 11:51:58
505National security / Network security / Cyberwarfare / Computer security / Password / Public safety / Information security / Defensive computing / Computer network security / Security / Crime prevention

Computer Account Agreement This agreement, the Computing Ethics Statement, and Web Guidelines which can be found in the student, faculty, and administrative handbooks, set forth the conditions of use for all University c

Add to Reading List

Source URL: www.utbildning.fysik.lu.se

Language: English - Date: 2013-11-01 08:09:41
506Data Protection Act / Law / National Health Service / Data sharing / Personally identifiable information / Information privacy / Criminal law / Ethics / Bundesdatenschutzgesetz / Computer law / Data privacy / Privacy law

DECIDING THE LEGAL BASIS FOR SHARING DATA Sharing antenatal and live birth data between the NHS and local authority children’s centres Local authorities have requested antenatal and live birth data from the health auth

Add to Reading List

Source URL: informationsharing.co.uk

Language: English - Date: 2014-07-25 12:08:09
507Computer crimes / Electronic warfare / Hacking / Military technology / Mass surveillance / International Multilateral Partnership Against Cyber Threats / Cyberwarfare / Personally identifiable information / Internet privacy / Security / Ethics / National security

The Protecting Cyber Networks Act   Undermines Privacy, Enables Cyber­Surveillance, and Threatens Internet Security    By Robyn Greene, Policy Counsel    This month, the House of Representative

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-04-20 18:04:23
508Data privacy / Law / Computer security / Data security / Health Insurance Portability and Accountability Act / Electronic health record / Canadian Institute for Health Information / Internet privacy / Information privacy / Privacy / Ethics / Security

  Health Big Data in the Government Context Data-driven and information-based systems have quickly become the new paradigm for American health care. Using the vast amounts of data produced from both traditional healthc

Add to Reading List

Source URL: d1ovv0c9tw0h0c.cloudfront.net

Language: English - Date: 2015-04-21 15:59:58
509Privacy law / Law / Computer law / Privacy / Data Protection Act / Information privacy / Information security / Personally identifiable information / Data protection (privacy) laws in Russia / Ethics / Security / Data privacy

Records Management and Data Protection Checklist Beforehand At the start of any project the following conditions must be met: Any third parties with access to University data are aware of their security obligations an

Add to Reading List

Source URL: www.exeter.ac.uk

Language: English - Date: 2014-10-04 19:13:13
510Computer security / Data security / Information sensitivity / Information security / Freedom of information legislation / Data Protection Act / Confidentiality / Public records / Classified information / Security / Ethics / National security

Records Management Guidance: Access to information 1. The aims of Information Security and Records Management include ensuring the availability, integrity and confidentiality of information. It is vital for the Universit

Add to Reading List

Source URL: www.exeter.ac.uk

Language: English - Date: 2014-10-04 15:27:54
UPDATE