Computer surveillance

Results: 1478



#Item
511Crime prevention / National security / Public safety / Human rights / Internet privacy / Surveillance / Communications protocol / Computer security / Medical privacy / Ethics / Security / Privacy

Designing Privacy into Internet Protocols IAB Privacy Program Why are we here?

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2014-01-22 13:55:10
512Infographics / Scientific modeling / Visualization / Security / Surveillance / Data visualization / Public safety / Science / Computational science / Computer graphics

® • Organization: Logos Technologies, Inc • PI: Rob Grossman-Vermaas, Lead Social Sciences (S²) Group

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:45
513Telecommunications / Telecommunications data retention / Computer law / Privacy / Surveillance / Regulation of Investigatory Powers Act / Communications data / Regulation of Interception of Communications and Provision of Communication-related Information Act / Anti-terrorism /  Crime and Security Act / Privacy of telecommunications / Law / National security

Retention of Communications Data

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2015-03-05 06:34:11
514Regulation of Investigatory Powers Act / Albert Ho / Ioco /  Port Moody / Hong Kong / Law / Mass surveillance / Politics of Hong Kong / Computer law

LC Paper No. CB[removed]) EXTRACT 立法會 Legislative Council

Add to Reading List

Source URL: www.legco.gov.hk

Language: English
515National security / French words and phrases / Blogs / Crime prevention / Sociology / Sousveillance / Steve Mann / Wearable computer / Lifelog / Technology / Surveillance / Security

Praxistemology 1 Steve Mann

Add to Reading List

Source URL: wearcam.org

Language: English - Date: 2012-11-25 21:04:00
516Surveillance / Computer security / Key size / National Security Agency / Smart card / Password / Export of cryptography in the United States / Security / National security / Cryptography

CATEGORY 5-TELECOMMUNICATIONS AND "INFORMATION SECURITY" Part 2-"Information Security" Notes: 1. The status of "information security" equipment, "software", systems, application specific "electronic assemblies", modules,

Add to Reading List

Source URL: www.stc.tid.gov.hk.

Language: English - Date: 2013-11-27 01:15:12
517Computer network security / National security / Security guard / Surveillance / Computer security / UTC Fire & Security / Protection One / Security / Crime prevention / Public safety

» Corporate & High Rise Residential Security ESP Security Australia Pty Limited ABN[removed]Master License[removed]Office[removed]Email [removed] Commercial & Residential Security espsecu

Add to Reading List

Source URL: www.espsecurity.com.au

Language: English - Date: 2012-04-30 22:26:33
518Radio-frequency identification / Reliability engineering / Technology / Image scanner / Office equipment / Barcode / Surveillance / Intermec / Airline / Automatic identification and data capture / Human–computer interaction / Maintenance

PDF Document

Add to Reading List

Source URL: www.imsicorp.com

Language: English - Date: 2009-03-31 14:05:40
519Telecommunications / Telecommunications data retention / Computer law / Security / Surveillance / Regulation of Investigatory Powers Act / Anti-terrorism /  Crime and Security Act / Communications data / Regulation of Interception of Communications and Provision of Communication-related Information Act / Privacy of telecommunications / National security / Law

Retention of Communications Data

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2015-03-05 09:10:10
520Clinical surveillance / Surveillance / Health promotion / Mental health / Health care / Disease surveillance in China / Health / Health policy / Public health

2nd Australian Computer Assisted Telephone Interview (CATI) Population Health Forum

Add to Reading List

Source URL: health.adelaide.edu.au

Language: English - Date: 2012-01-16 22:08:11
UPDATE