Computer ethics

Results: 6625



#Item
851Crime prevention / National security / Public safety / Computer security / Information security / Internet privacy / Policy / ISO/IEC 27002 / Information privacy / Security / Data security / Ethics

Microsoft Word - PolicyShield DataSheetV3.doc

Add to Reading List

Source URL: www.informationshield.com

Language: English - Date: 2010-06-03 23:29:11
852Computer crimes / Law / Data Protection Act / Privacy / Criminal law / Personally identifiable information / Information privacy / Ethics / Information privacy law / Data privacy / Privacy law / Computer law

DATA PROTECTION STATEMENT The information you provide is subject to the Data Protection Actthe “Act”). By using this site you consent to us or any company associated with us (such companies include, for the av

Add to Reading List

Source URL: www.life-ins.co.uk

Language: English - Date: 2008-06-20 08:32:55
853Computer crimes / National security / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Risk management / Computer security / Privacy / National Cyber Security Division / IT risk management / Security / Ethics / Public safety

Cybersecurity Framework - Applying Framework to Mobile & BYOD, March 2015

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2015-03-18 16:57:46
854Data privacy / Privacy law / Health Insurance Portability and Accountability Act / Privacy / Computer security / Data security / Privacy policy / Information security / Protected health information / Ethics / Law / Health

Microsoft Word - Clean Copy - Case HIPAA Policies.DOC

Add to Reading List

Source URL: research.case.edu

Language: English - Date: 2012-11-13 14:10:49
855Management / Risk / Risk management / Computer security / Data protection / Information privacy / Data Protection Directive / Data Protection Act / Data privacy / Ethics / Privacy law

2. Following the discussions at DAPIX onJuly 2014 on the risk-based approach, delegations sent in many written comments 1. A revised text was discussed at the DAPIX meeting ofSeptember 2014 and again at t

Add to Reading List

Source URL: lobbyplag.eu

Language: English - Date: 2015-03-09 19:45:25
856Law / Privacy / Personal life / Personally identifiable information / Information privacy / Ethics / Data Protection Act / Data protection (privacy) laws in Russia / Privacy law / Data privacy / Computer law

Session: 2002 Bill No. 26 Hon. Perry G. Christie or a member of government 23 January, 2003

Add to Reading List

Source URL: www.lexbahamas.com

Language: English - Date: 2009-02-17 19:57:12
857Computer network security / Public-key cryptography / Sandbox / Crime prevention / National security / Computer security / Internet / Trust / Operating system / Ethics / Security / Software

Government role in Trust Government has a pivotal role in establishing the level of trust that society needs in many areas. We trust banks and hospitals, without having to rely on anecdotal endorsement from others, becau

Add to Reading List

Source URL: gov2.net.au

Language: English - Date: 2014-05-22 00:52:12
858European Union law / Information privacy / Law / Ethics / Data Protection Act / Criminal law / Bundesdatenschutzgesetz / Data privacy / Privacy law / Computer law

In conjunction with the general and horizontal law on data protection implementing the 95Directive 1, Denmark has several sector specific laws in areas that need a more detailed/precise/specific regulation. These nation

Add to Reading List

Source URL: lobbyplag.eu

Language: English - Date: 2015-03-09 19:45:25
859Law / Computer law / Privacy / Data Protection Act / Information privacy / Personally identifiable information / Data protection (privacy) laws in Russia / Information privacy law / Data privacy / Privacy law / Ethics

Christ The King Sixth Form College Data Protection Policy Mission Statement We are a Catholic College dedicated to the education and development of the whole person, so that all students can realise their full potential.

Add to Reading List

Source URL: www.ctksfc.ac.uk

Language: English - Date: 2013-08-22 07:20:58
860Evaluation / Actuarial science / Risk analysis / Evaluation Assurance Level / Risk management / Vulnerability / Computer security / Systems engineering process / IT risk management / Risk / Ethics / Security

Build a CC assurance package dedicated to your risk assessment Francois GUERIN Security Program Manager

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:04:30
UPDATE