Data breach

Results: 1224



#Item
821Cyberwarfare / Computer security / Data breach / Data security / Safenet / Identity theft / Personal Data Privacy and Security Act / Security / Computer network security / Secure communication

FIRST QUARTER RECAP[removed]TOP BREACH RECORDS BY SOURCE Malicious insider ( 52% )

Add to Reading List

Source URL: www.breachlevelindex.com

Language: English - Date: 2014-04-22 16:35:26
822Computer security / Data security / National security / Identity theft / Data breach / Health Insurance Portability and Accountability Act / Protected health information / Information security / Personal Data Privacy and Security Act / Security / Computer network security / Secure communication

PolicySensitiveDataDef2010622a

Add to Reading List

Source URL: www.cio.wisc.edu

Language: English - Date: 2014-09-30 14:59:33
823Computer security / Cyberwarfare / Data security / Electronic commerce / Data breach / Identity theft / Password / Safenet / Personal Data Privacy and Security Act / Security / Computer network security / Secure communication

BREACH LEVEL INDEX TOP BREACH RECORDS BY SOURCE SECOND QUARTER RECAP

Add to Reading List

Source URL: www.breachlevelindex.com

Language: English - Date: 2014-07-22 15:57:53
824Data privacy / Information technology management / Risk analysis / Health Insurance Portability and Accountability Act / Information security / Chief information security officer / Payment Card Industry Data Security Standard / Asset / Privacy Office of the U.S. Department of Homeland Security / Computer security / Security / Data security

    Information Security Incident & Breach Handling Procedure 1. Introduction An information technology (IT) security incident is an event involving an IT resource at University of

Add to Reading List

Source URL: info.alaska.edu

Language: English - Date: 2014-06-09 20:07:31
825Fraud / Criminal law / Identity theft / Theft / Data security / Phishing / Personally identifiable information / Data breach / Online shopping / Security / Identity / Crimes

Still @ Risk New Technology & Identity Theft Trends In California Still @ Risk New Technology &

Add to Reading List

Source URL: calpirgorg.live.pubintnet-dev.org

Language: English - Date: 2012-06-26 18:59:52
826Cyberwarfare / Data security / Secure communication / National security / Data breach / Identity theft / Information security / Threat / International Traffic in Arms Regulations / Security / Computer security / Computer network security

Local Government Information Security: The Cost of Inadequate Protections

Add to Reading List

Source URL: www.osc.state.ny.us

Language: English - Date: 2014-05-10 06:08:46
827Privacy law / Computer security / Health Insurance Portability and Accountability Act / Data security / Government procurement in the United States / Data breach / Confidentiality / Protected health information / Privacy / Ethics / Security / Data privacy

BUSINESS ASSOCIATE AGREEMENT

Add to Reading List

Source URL: www.safetynetcenter.org

Language: English - Date: 2014-05-22 18:03:20
828Personally identifiable information / Information security / Notification system / Government procurement in the United States / Security breach notification laws / Personal Data Privacy and Security Act / Security / Computer security / Personal life

Town of West Monroe Citizens’ Notification Policy

Add to Reading List

Source URL: www.tughill.org

Language: English - Date: 2011-10-26 15:15:34
829Computer security / Security / Health Insurance Portability and Accountability Act / Internet privacy / Data breach / Privacy / Personal Data Privacy and Security Act / Ethics / Privacy law / Data privacy

The HIPAA Omnibus Rule Addressing New Requirements Agenda I. Introduction II. Covered Entities

Add to Reading List

Source URL: www.safetynetcenter.org

Language: English - Date: 2014-05-22 18:09:12
830Data security / Privacy law / Data privacy / Health Insurance Portability and Accountability Act / Medical informatics / Data breach / Medical record / Protected health information / Privacy / Computer security / Ethics / Security

LEGALEASE HIPAA BREACH NOTIFICATION RULE – THE TIME TO COMPLY IS NOW! By Jeanine Freeman

Add to Reading List

Source URL: www.iowamedical.org

Language: English - Date: 2013-10-08 12:38:56
UPDATE