Data breach

Results: 1224



#Item
781Government / Data privacy / Health Insurance Portability and Accountability Act / Healthcare in the United States / Protected health information / Data breach / Personally identifiable information / Privacy Office of the U.S. Department of Homeland Security / TRICARE / Security / Ethics / Privacy law

Microsoft PowerPoint - TMAStandardContractLanguage

Add to Reading List

Source URL: www.tricare.mil

Language: English - Date: 2013-03-18 16:28:34
782Computer network security / Secure communication / National security / Public safety / Data breach / Information security / Malware / Database / Credit card / Security / Data security / Computer security

The following diagram illustrates the activity-based costing schema used in the current benchmark study

Add to Reading List

Source URL: public.dhe.ibm.com

Language: English - Date: 2014-08-14 18:40:04
783Identity management / Federal Trade Commission / Social issues / Security / Internet privacy / Privacy policy / FTC Fair Information Practice / Data breach / Credit card / Ethics / Privacy / Computing

March 31, 2014 Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Ave., NW Washington, DC[removed]Attn: Big Data Study

Add to Reading List

Source URL: www.techpolicyinstitute.org

Language: English - Date: 2014-03-31 09:12:06
784Secure communication / Computer security / Human rights / National security / Personally identifiable information / Privacy / Information privacy / Internet privacy / Personal Data Privacy and Security Act / Security / Ethics / Computer network security

Breach Response Breach Response Purpose Provide a thorough understanding of the requirements of

Add to Reading List

Source URL: www.tricare.mil

Language: English - Date: 2010-06-15 18:48:42
785Government / Personally identifiable information / Health Insurance Portability and Accountability Act / Chief privacy officer / Information privacy / Internet privacy / Data breach / Medical privacy / Data Privacy Day / Privacy / Ethics / Security

West Virginia State Privacy Office 2010 Annual Report A Report by the State Privacy Office West Virginia Health Care Authority December 2010

Add to Reading List

Source URL: www.privacy.wv.gov

Language: English - Date: 2012-08-13 11:16:12
786Personal life / Personally identifiable information / Public safety / Council of Inspectors General on Integrity and Efficiency / Inspector General / Federal Information Security Management Act / United States Department of Homeland Security / Data breach / Joe Lieberman / Computer security / Security / Government

November 30, 2009    The Honorable Joseph Lieberman  Chairman  Senate Homeland Security and Government Affairs Committee   United States Senate 

Add to Reading List

Source URL: www.ignet.gov

Language: English - Date: 2009-12-14 09:22:42
787Computer security / Cyberwarfare / Data security / Electronic commerce / Data breach / Identity theft / Password / Safenet / Personal Data Privacy and Security Act / Security / Computer network security / Secure communication

BREACH LEVEL INDEX TOP BREACH RECORDS BY SOURCE SECOND QUARTER RECAP

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2014-07-22 15:57:53
788Human rights / Data privacy / Computer security / Privacy / Law / Health Insurance Portability and Accountability Act / Identity theft / Internet privacy / Chief privacy officer / Ethics / Security / Government

BORN Ontario Breach Management Protocol A privacy breach occurs when there is unauthorized access to, or collection, use, disclosure or disposal of Personal Health Information whether done deliberately or inadvertently.

Add to Reading List

Source URL: www.bornontario.ca

Language: English - Date: 2013-08-13 14:37:17
789Turbines / Aerodynamics / Compressors / Gas turbine / Thermodynamics / Turbomachinery / Rolls-Royce RB211 / Data breach / Mechanical engineering / Fluid mechanics / Technology

20th SYMPOSIUM ON INDUSTRIAL APPLICATIONS OF GAS TURBINES Practical Lessons on Design and Implementation of a Condition Based Monitoring System by Jay West

Add to Reading List

Source URL: www.iagtcommittee.com

Language: English - Date: 2013-12-11 15:08:34
790Computer network security / Data security / Crime prevention / National security / Information security / Maricopa County Community College District / Identity theft / Data breach / Vulnerability / Security / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: www.gknet.com

Language: English - Date: 2014-04-30 13:20:50
UPDATE