Data breach

Results: 1224



#Item
231Types of insurance / Financial economics / Institutional investors / Insurance broker / Insurance / Data breach / Liability insurance / Identity theft / Australian Financial Services License / Security / Investment / Financial institutions

10 Reasons Why You Need Cyber Insurance. 1. Data is one of your most important assets yet it is not covered by standard property insurance policies. Most businesses would agree that data or information is

Add to Reading List

Source URL: www.pscinsurance.com.au

Language: English - Date: 2014-05-13 00:27:25
232Data security / Secure communication / National security / Security breach notification laws / Data breach / Health Insurance Portability and Accountability Act / Identity theft / Information security / Government procurement in the United States / Security / Computer security / Computer network security

STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific data breach incid

Add to Reading List

Source URL: www.privacyandsecuritymatters.com

Language: English - Date: 2015-01-06 12:58:06
233Corporate crime / Internet privacy / Computer law / Privacy / Security / Personal Data Privacy and Security Act / FTC regulation of behavioral advertising / Ethics / Federal Trade Commission / Consumer protection

Opening Statement of Ranking Member Frank Pallone, Jr. Committee on Energy and Commerce Subcommittee on Commerce, Manufacturing, and Trade Markup of H.R. ___, the Data Security and Breach Notification Act of 2015 March 2

Add to Reading List

Source URL: democrats.energycommerce.house.gov

Language: English - Date: 2015-03-24 17:57:46
234Ethics / Public safety / Information security / Data breach / Internet privacy / Information privacy / Privacy / Security / Data security / Computer security

Is Your Company Ready for a Big Data Breach? Sponsored by Experian® Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: March 2013

Add to Reading List

Source URL: assets.fiercemarkets.com

Language: English - Date: 2013-04-30 10:27:36
235Smartphones / Hacking / Software testing / Vulnerability / Cisco IOS / Patch / Computer architecture / IOS / Social vulnerability / Risk / Computer security / Computing

SESSION ID: MBS-T09 Mobile Vulnerabilities From Data Breach to Complete Shutdown

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-04-21 13:46:51
236Data security / Identity management / Password / Health Insurance Portability and Accountability Act / Information security / Data breach / Social engineering / Password strength / Password policy / Security / Computer security / Cryptography

Passwords Selected by Hospital Employees: An Investigative Study

Add to Reading List

Source URL: thesai.org

Language: English - Date: 2012-09-19 16:26:53
237Cyberwarfare / Computer security / Crimes / Identity theft / Theft / Malware / Data breach / Verizon Communications / Security / Computer network security / Secure communication

D ATA B R E A C H I N V E S T I G AT I O N S R E P O R T A study conducted by the Verizon Business RISK team in cooperation with the United States Secret Service. Executive Summary

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2014-06-21 20:00:00
238Computer network security / Secure communication / Computer security / Data security / Data breach / Internet privacy / Identity theft / Information privacy / Personally identifiable information / Security / Ethics / Privacy

Submission to the Attorney-General’s Department on the Australian Privacy Breach Notification Discussion Paper Pirate Party Australia

Add to Reading List

Source URL: pirateparty.org.au

Language: English - Date: 2014-09-06 02:56:13
239Computing / Cyberwarfare / Computer network security / Data breach / Secure communication / Information security / Data loss / Malware / Remote data deletion / Data security / Security / Computer security

2013 Cost of Data Breach Study: United States Benchmark research sponsored by Symantec Independently Conducted by Ponemon Institute LLC May 2013

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-06-04 16:37:57
240Secure communication / Data security / National security / Data breach / Personally identifiable information / Internet privacy / Privacy / Personal Data Privacy and Security Act / Information security / Security / Computer security / Computer network security

DOC Document

Add to Reading List

Source URL: www.americanbusinessmedia.com

Language: English - Date: 2009-07-09 15:52:17
UPDATE