Computer ethics

Results: 6625



#Item
731Discrimination / Prejudices / Behavior / Bullying / Harassment / Ageism / Sexism / Sexual harassment / Workplace bullying / Ethics / Social psychology / Abuse

CODE OF CONDUCT POLICY RATIONALE North Melbourne Language and Learning (NMLL) seeks to create an environment of cooperation and mutual respect in which Language, Literacy and Computer courses are delivered. This policy a

Add to Reading List

Source URL: www.nmll.org.au

Language: English - Date: 2013-08-13 17:17:31
732Computer security / Identity management / Computer crimes / Internet privacy / Privacy / Phishing / Password strength / Password policy / Ethics / Security / Password

Volunteer Privacy Educators Program Teacher Training Manual © 2014 Fordham Center on Law and Information Policy. These materials may be reproduced in whole or in part for educational and non-commercial purposes provided

Add to Reading List

Source URL: law.fordham.edu

Language: English - Date: 2015-02-10 12:32:43
733Computer law / Law / Computing / Data Protection Act / Internet privacy / Information privacy / Personally identifiable information / Telecommunications data retention / Information privacy law / Ethics / Privacy / Data privacy

PRIVACY POLICY 1. Introduction 1. DELSEY deals with personal data about you as a data controller in connection with the use of its website. 2. It is respectful of privacy and protects the personal data of the users of ww

Add to Reading List

Source URL: www.delseypluggage.com

Language: English - Date: 2014-11-26 09:22:57
734Computer networking / Internet privacy / Network performance / Proxy server / Online advertising / World Wide Web / Internet / Computing / Internet ethics

PulsePoint’s Brand Safety Policy and Impression Quality Index™ Brand-Safety Overview PulsePoint is committed to providing value to both the supply and demand sides of the digital ecosystem. We do this by holding our

Add to Reading List

Source URL: www.pulsepoint.com

Language: English - Date: 2015-03-26 11:20:50
735Data privacy / Law / Email / Computer law / Internet privacy / Information privacy / Data Protection Act / Internet / Personally identifiable information / Ethics / Computing / Privacy

Privacy Policy Women in Mining is committed to protecting your privacy in accordance with the Data Protection ActThis privacy policy explains what information we collect about users of the Website and how we will

Add to Reading List

Source URL: www.womeninmining.org.uk

Language: English - Date: 2015-02-26 06:08:17
736Discrimination / Prejudices / Behavior / Bullying / Harassment / Ageism / Sexism / Sexual harassment / Workplace bullying / Ethics / Social psychology / Abuse

CODE OF CONDUCT POLICY RATIONALE North Melbourne Language and Learning (NMLL) seeks to create an environment of cooperation and mutual respect in which Language, Literacy and Computer courses are delivered. This policy a

Add to Reading List

Source URL: www.nmll.org.au

Language: English - Date: 2013-08-13 17:17:54
737Computer law / Internet ethics / Anti-spam techniques / Spam filtering / Spam / ITU-T / Internet censorship / Email spam / Freedom of speech / Internet / Computing / Spamming

Proposed Revisions to the ITRs Could Expand ITU Jurisdiction to the Internet, Justify Censorship and Violate Right to Freedom of Expression This December, the International Telecommunication Union (ITU), an UN agency, wi

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2012-12-07 10:54:40
738Computer law / Law / Data Protection Act / Internet privacy / Information privacy / Personally identifiable information / Public records / Information Commissioner / FTC Fair Information Practice / Data privacy / Ethics / Privacy

PROTECTING YOUR IDENTITY – MANAGING PERSONAL DATA IN THE WORKPLACE* The management of personal data in the workplace is soon to be regulated by the provisions of a ‘Protection of Personal Information Act’. A draft

Add to Reading List

Source URL: www.lexisnexis.co.za

Language: English - Date: 2012-08-23 07:44:26
739Law / Internet privacy / United Nations / P3P / In re Gateway Learning Corp. / Ethics / Privacy / Identity management

The UN Women Donation Privacy Policy (“Policy”) was created to help you understand how UN Women uses information that is automatically collected from your computer and information you submit through the donation site

Add to Reading List

Source URL: az668017.vo.msecnd.net

Language: English - Date: 2015-04-29 19:40:12
740Privacy / Ethics / Identity management / Social issues / Computer security / Personally identifiable information / Internet privacy / Information privacy / Software as a service / Computing / Cloud computing / Centralized computing

SECURITY & PRIVACY CHECKLIST FOR CLOUD SERVICE PROVIDERS IN HANDLING PERSONAL IDENTIFIABLE INFORMATION IN CLOUD PLATFORMS “Cloud001010010100101010100101001010

Add to Reading List

Source URL: www.infocloud.gov.hk

Language: English - Date: 2013-04-15 02:59:19
UPDATE