Computer ethics

Results: 6625



#Item
721Risk / Business ethics / Information technology audit / Computer security / Security / Compliance and ethics program / Auditing / Data security / Business

INTEGRITY AND ACCOUNTABILITY Reform Program INTERIM Update 17 September 2012

Add to Reading List

Source URL: uq.edu.au

Language: English - Date: 2012-09-26 19:05:59
722Crime prevention / Data security / Information security / National security / Privacy / Public safety / Ethics / Security / Computer security

Security and privacy standardization for the SME community NLO meeting, Athens, March 4thEuropean Union Agency for Network and Information Security

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
723Cyber-bullying / Ethics / Crime / Criminology / Statutory law / Abuse / Computer crimes / Bullying

CYBERBULLYING “Keep Kids Safe!” TV and Radio Public Service Announcement :30 – FINAL (National Association of Broadcasters  iKeepSafe) VISUAL (A mother or father helps a child put on a helmet to ride a bike. A f

Add to Reading List

Source URL: www.nab.org

Language: English - Date: 2015-01-05 09:34:36
724Privacy / Law / Computer law / Data Protection Directive / European Union / Information privacy / Telecommunications data retention / Personally identifiable information / Privacy policy / Data privacy / Privacy law / Ethics

‘Future of Data Protection’ – Stakeholder Consultation Responses from the World Federation of Advertisers (WFA) Preliminary remark: The General Data Protection Directive is recognised around the world as a comprehe

Add to Reading List

Source URL: www.wfanet.org

Language: English - Date: 2012-07-13 10:33:35
725Internet privacy / Internet ethics / Proxy servers / Software / Content-centric networking / Tor / Internet / Computing / Cache / Computer networking

Cache Privacy in Named-Data Networking Gergely Acs∗ ,# , Mauro Conti† ,#,+ , Paolo Gasti‡ ,# , Cesar Ghali§ , Gene Tsudik§ ∗ INRIA † University of Padua ‡ New York Institute of Technology § University of C

Add to Reading List

Source URL: camera.crysys.hit.bme.hu

Language: English - Date: 2013-04-10 09:15:50
726Business software / Ethics / Regulatory compliance / Payment Card Industry Data Security Standard / Gramm–Leach–Bliley Act / Corporate governance / U.S. Securities and Exchange Commission / Telecommunications data retention / Email archiving / Business / Computer law / Law

Financial Services Policies Overview The Sentrion Financial Services Policies Application provides a very broad and complete set of policies that can be fine-tuned to meet regulatory compliance, corporate governance and

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2010-04-21 19:52:00
727Online chat / Social information processing / Privacy / Recommender system / Internet privacy / Website / Computer-mediated communication / Ethics / Groupware / Internet forum

Connect4Climate Short Video Documentary Competition Rules And Regulations About the ACTION4CLIMATE Video Documentary Competition The Action4Climate video competition invites young aspiring film makers from all over the w

Add to Reading List

Source URL: www.connect4climate.org

Language: English - Date: 2014-01-10 18:13:26
728Spamming / Computer-mediated communication / Internet ethics / Privacy / Anti-spam techniques / Spam filtering / Email spam / Internet privacy / HTML email / Computing / Internet / Email

jMailPro Privacy Policy Personal information Except as provided elsewhere in this privacy policy, jDynamic will not divulge any User’s personal information. The User can, without obligation, gather essential informatio

Add to Reading List

Source URL: www.jdynamic.com

Language: English - Date: 2014-05-31 02:36:29
729Privacy / Law / Data Protection Act / Ethics / Information privacy / Personally identifiable information / Data protection (privacy) laws in Russia / Information privacy law / Data privacy / Privacy law / Computer law

Data protection policy Principles In order to operate effectively and fulfil its legal obligations, English in Chester needs to collect, maintain and use certain personal information about current, past and prospective e

Add to Reading List

Source URL: www.english-in-chester.co.uk

Language: English - Date: 2015-03-19 05:30:57
730Identity management / Password / Cryptography / Internet privacy / Privacy / Password strength / Password policy / Security / Computer security / Ethics

Volunteer Privacy Educators Program Lesson Plan Outlines © 2014 Fordham Center on Law and Information Policy. These materials may be reproduced in whole or in part for educational and non-commercial purposes provided th

Add to Reading List

Source URL: law.fordham.edu

Language: English - Date: 2015-02-10 12:32:46
UPDATE