Computer law

Results: 22619



#Item
51Computer security / Law / Cryptography / Human rights / Business law / Copyright law / Trusted Computing / Health Insurance Portability and Accountability Act / Privacy / Medical privacy / Trusted system / Internet privacy

This is the second part of HW5

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2008-11-18 08:01:23
52Security / Artificial intelligence / Electronic toll collection / Automatic number plate recognition / Optical character recognition / Road traffic management / Surveillance / Audit / Telecommunications data retention / Computer security

Automated License Plate Reader Audit Review Background Legislation related to law enforcement’s use of automated license plate reader (ALPR) data went into effect inAgencies using ALPRs when the new requirements

Add to Reading List

Source URL: www.ipad.state.mn.us

Language: English - Date: 2016-07-26 08:51:50
53Security / Prevention / Safety / National security / Port Authority of New York and New Jersey / Law enforcement / Crime prevention / Public safety / Port Authority of New York and New Jersey Police Department / United States Department of Homeland Security / Computer security / Emergency Service Unit

Thomas Belfiore, Chief Security Officer The Port Authority of New York and New Jersey Testimony for the House Emergency Preparedness, Response and Communications Subcommittee on “Protecting our Passengers: Perspectives

Add to Reading List

Source URL: docs.house.gov

Language: English
54Law / Behavior / Abuse / Child pornography / Crimes / Pornography / Sex and the law / Sex laws / Laws regarding child pornography / Child pornography laws in the United States

Library Law April 27, 2011 “A Patron Is Viewing What Appears To Be Child Pornography On A Library Computer; What Should Be Done?” A report is made that a library patron is viewing what appears to be child

Add to Reading List

Source URL: www.webjunction.org

Language: English - Date: 2016-08-22 12:05:32
55Information privacy / Economy / Payment cards / Computing / E-commerce / Information / Cryptography / Computer law / Payment Card Industry Data Security Standard / Information security / Data security / Network segmentation

Microsoft Word - PCI DSS Information Security Policy (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:12
56Security / Prevention / Safety / Crime prevention / Law enforcement / National security / Closed-circuit television / Surveillance / Tablet computer

Information Technology Solutions Portable OmniWatch® ISR Video Kit P o rt a b l e I S R V i d e o K i t DESIGN

Add to Reading List

Source URL: insitupacific.com.au

Language: English - Date: 2015-08-09 23:36:27
57Computer architecture / Computing / Computer law / Software / Free and open-source software licenses / Red Hat software / Linux distributions / End-user license agreement / Red Hat Enterprise Linux / License / Red Hat / Linux

Microsoft Word - EULA RHEL6 English

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2013-06-07 09:59:30
58Free and open-source software licenses / Software licenses / Computer law / Law / Contract law / End-user license agreement / End user / License / Private law / Economy / Frameworx License

Microsoft Word - NavData EULA.doc

Add to Reading List

Source URL: secure.uasc.com

Language: English - Date: 2011-11-28 16:35:32
59Internet privacy / Privacy / Computing / Law / Computer security / Privacy policy / Information privacy / Medical privacy / Personally identifiable information / HTTP cookie / Web analytics / P3P

STEMTECH INTERNATIONAL, INC. PRIVACY STATEMENT INTRODUCTION Stemtech International, Inc. ("Stemtech," "us," or "we") has created this Privacy Statement to inform you about how we collect, use and disclose information. Th

Add to Reading List

Source URL: www.st-files.com

Language: English
60Computer security / Cybercrime / Harassment / Cyber / Crime / Misconduct

Assessing Police Perceptions of Cybercrime and the Law Enforcement Response in England and Wales Adam M. Bossler, Georgia Southern University George W. Burruss, University of South Florida Thomas J. Holt, Michigan State

Add to Reading List

Source URL: www.cambridgecybercrime.uk

Language: English - Date: 2016-08-05 10:26:39
UPDATE