Computer ethics

Results: 6625



#Item
751Ethics / Public safety / Information security / Data breach / Internet privacy / Information privacy / Privacy / Security / Data security / Computer security

Is Your Company Ready for a Big Data Breach? Sponsored by Experian® Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: March 2013

Add to Reading List

Source URL: assets.fiercemarkets.com

Language: English - Date: 2013-04-30 10:27:36
752Computing / Data security / Privacy / Crime prevention / National security / Information security / Privacy policy / Internet privacy / Health Insurance Portability and Accountability Act / Security / Computer security / Ethics

Microsoft Word - SecurityPoliciesEnableBusiness.doc

Add to Reading List

Source URL: www.informationshield.com

Language: English - Date: 2010-06-03 23:12:32
753Data security / Privacy / Human rights / Public safety / Internet privacy / Information privacy / European Network and Information Security Agency / Information security / Ethics / Computer security / Security

Οnline privacy tools for the general public European Union Agency for Network and Information Security www.enisa.europa.eu

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
754Computer law / Law / Privacy / Data Protection Act / Personally identifiable information / Information privacy / Information privacy law / Data protection (privacy) laws in Russia / Data privacy / Privacy law / Ethics

Microsoft Word - Data Protection Policy Nov 08

Add to Reading List

Source URL: 217.199.187.71

Language: English - Date: 2014-02-06 12:03:11
755Identity management / Electronic commerce / Public key certificate / HTTP cookie / Internet privacy / Computer security / Privacy / Security / Certificate policy / Key management / Public-key cryptography / Ethics

Privacy Policy _English Version_

Add to Reading List

Source URL: www.adacom.com

Language: English - Date: 2011-04-04 02:05:33
756Computer law / Accountability / Freedom of Information Act / Right to Information Act / Audit / Data Protection Act / Ethics / Freedom of information legislation / Law / Privacy law

Model Publication Scheme for Gorseinon College

Add to Reading List

Source URL: 31.193.5.46

Language: English - Date: 2014-09-25 18:41:27
757Finance / Risk / Computer security / Vulnerability / Financial planner / Financial adviser / Management / Actuarial science / Ethics

Money matters in times of change: financial vulnerability through the life course

Add to Reading List

Source URL: www.bsl.org.au

Language: English - Date: 2014-08-26 22:16:20
758Philosophy of science / Engineer / Software / Ethology / Systems psychology / Fırat University / The William Davidson Faculty of Industrial Engineering & Management at the Technion / Engineering / Science / Ethics

Microsoft Word - Computer Sciences Engineering.doc

Add to Reading List

Source URL: www.uba.ar

Language: English - Date: 2008-04-21 15:06:54
759Computer network security / Secure communication / Computer security / Data security / Data breach / Internet privacy / Identity theft / Information privacy / Personally identifiable information / Security / Ethics / Privacy

Submission to the Attorney-General’s Department on the Australian Privacy Breach Notification Discussion Paper Pirate Party Australia

Add to Reading List

Source URL: pirateparty.org.au

Language: English - Date: 2014-09-06 02:56:13
760Computing / Media technology / Computer network security / Content-control software / Privacy / Internet / Telecommunication / Electronic commerce / Jonathan Zittrain / Internet ethics / Ethics / Technology

Number 22 February 2013 The Internet, Cross-Border Data Flows and International Trade

Add to Reading List

Source URL: www.brookings.edu

Language: English - Date: 2013-02-22 17:05:12
UPDATE