Data breach

Results: 1224



#Item
791Credit union / National Credit Union Administration / Notification system / Data breach / Personally identifiable information / CUA / Cyberwarfare / Government / Security / Computer security / Data security

State of Wisconsin Department of Financial Institutions Lorrie Keating Heinemann, Secretary Jim Doyle, Governor

Add to Reading List

Source URL: www.wdfi.org

Language: English - Date: 2008-07-12 13:21:30
792Cyberwarfare / Data security / Secure communication / National security / Data breach / Information security / Personally identifiable information / Information privacy / Privacy / Security / Computer security / Computer network security

Monthly Cyber Security Tips - NEWSLETTER June 2008 Volume 3, Issue 6 Data Breach

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:18:57
793Security / Cyberwarfare / Database activity monitoring / Data breach / Database / Email / Information privacy / Computing / Computer security / Data security

ON THEEDGE The Use & Misuse of Information Protecting Information from Insiders Although organizations are making strides in protecting their sensitive

Add to Reading List

Source URL: www.arma.org

Language: English - Date: 2008-04-09 18:53:40
794Business / Crimes / Identity / Identity theft / Theft / Phishing / Data breach / Debit card / Personally identifiable information / Security / Electronic commerce / Payment systems

FOR IMMEDIATE RELEASE Thursday, Jan. 16, 2014 CONTACTS: Susan Grant, CFA, [removed]

Add to Reading List

Source URL: consumerfed.org

Language: English - Date: 2014-01-16 10:32:24
795Privacy law / Ethics / Health informatics / Law / Electronic health record / Medical informatics / Protected health information / Data breach / Privacy / Health / Data privacy / Health Insurance Portability and Accountability Act

Craig P. Tanio, M.D. Ben Steffen CHAIR

Add to Reading List

Source URL: mhcc.dhmh.maryland.gov

Language: English - Date: 2014-09-11 11:19:31
796Computer network security / Data security / National security / Crime prevention / Threat / Information security / Identity theft / Data breach / Network security / Security / Computer security / Cyberwarfare

Microsoft Word - state_of_or_cyber_risk.doc

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 18:59:45
797Data breach / Data security / Secure communication / Computing / Electronic commerce / Cyberwarfare / Security / Computer network security / Computer security

The Big Data Revolution: Privacy Considerations Identity fraud trend – constant or declining

Add to Reading List

Source URL: www.techpolicyinstitute.org

Language: English - Date: 2014-01-22 10:10:25
798Computer security / Data security / National security / Data breach / Identity theft / Health Insurance Portability and Accountability Act / Information security / Information privacy / Security / Computer network security / Secure communication

ON THEEDGE The Use & Mi su se of In fo rm a ti o n Congress Assesses Data Security Proposals

Add to Reading List

Source URL: www.arma.org

Language: English - Date: 2008-04-09 18:53:24
799Identity theft / Data breach / Law / Government / Equal Justice for United States Military Personnel legislation / Dodd–Frank Wall Street Reform and Consumer Protection Act / 111th United States Congress / Security / Congressional Budget Office

109TH CONGRESS " HOUSE OF REPRESENTATIVES 2d Session !

Add to Reading List

Source URL: democrats.financialservices.house.gov

Language: English - Date: 2007-02-11 23:00:00
800Smartphones / Computer network security / Hardware restrictions / Data breach / IOS jailbreaking / Rooting / Copyright / Computing / Data / Computer security

Health Information Technology (HIT) Security Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS

Add to Reading List

Source URL: hawaiipca.net

Language: English - Date: 2012-08-26 23:19:01
UPDATE