Data corruption

Results: 301



#Item
251Corruption / Human trafficking / Eurojust / Law enforcement in Europe / United Nations Office on Drugs and Crime / Extradition / Convention against Transnational Organized Crime / Transnational organized crime / Organized crime / Law / Crime / Government

Factsheet: Judicial Cooperation* According to data collected by UNODC during 2012, roughly 35% per cent of countries had concluded bilateral or multilateral agreements or memoranda of understanding on extradition. A key

Add to Reading List

Source URL: www.unodc.org

Language: English - Date: 2014-01-03 11:03:04
252Computing / Computer architecture / Computer storage / Server hardware / Server / Hot swapping / Disk array / Xserve RAID / Nested RAID levels / Fault-tolerant computer systems / RAID / Computer hardware

RAID - FIBRE CHANNEL - SAN - DLT - CD ARCHIVE - CLUSTERS - FAULT TOLERANT SERVERS - NETWORK STORAGE MAXI RAID RAID 5 Data Protection When it comes to your data, any exposure to downtime, corruption, or loss puts your or

Add to Reading List

Source URL: www.firststorage.com

Language: English - Date: 2006-01-02 07:00:27
253Abuse / Political corruption

Action plan to mitigate potential areas of corruption in Labour Bureau Labour Bureau is an apex organization in the field of labour and price statistics. The organization is responsible for providing appropriate data ba

Add to Reading List

Source URL: labourbureau.nic.in

Language: English - Date: 2011-12-09 06:51:32
254Ethics / Finance / Data security / Auditing / Internal control / Due diligence / Political corruption / Whistleblower / Information security management system / Business ethics / Law / Business

Summary of World Bank Group Integrity Compliance Guidelines As part of the World Bank Group’s (WBG) continuing effort to improve its sanctions regime, the existing sanction of debarment

Add to Reading List

Source URL: siteresources.worldbank.org

Language: English - Date: 2012-02-17 14:36:13
255Sociology / Behavior / Accountability / Social epistemology / Social psychology / Trust / Legitimacy / Political corruption / Ethics / Social philosophy / Reputation management

Public trust and police legitimacy: Concepts and data from the British (and European) context Jonathan Jackson, London School of Economics

Add to Reading List

Source URL: teise.org

Language: English - Date: 2012-09-06 07:21:02
256Accountability / Scottish Information Commissioner / Information Commissioner / Ethics / Corruption / Social epistemology / Freedom of Information Act / Freedom of information legislation / Freedom of information in the United Kingdom / Data privacy

Microsoft Word[removed]DOC

Add to Reading List

Source URL: www.itspublicknowledge.info

Language: English - Date: 2011-10-24 11:17:00
257European Anti-fraud Office / Political corruption / Institutions of the European Union / Europol / European Parliament / European Data Protection Supervisor / European Union / Court of Auditors / Treaty of Lisbon / Law / Europe / Politics of the European Union

REFLECTION PAPER ON THE REFORM OF THE EUROPEAN ANTI-FRAUD OFFICE (OLAF) ANNEX 1: Options for taking forward the legislative procedure version of[removed]

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2010-12-07 08:21:15
258Council of Europe / Biometric passport / Biometrics / Data security / Passports / Radio-frequency identification / Ukraine / Group of States Against Corruption / Political corruption / Europe / Security / National security

EUROPEAN COMMISSION HIGH REPRESENTATIVE OF THE EUROPEAN UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2012-06-29 13:57:59
259Council of Europe / Biometric passport / Biometrics / Data security / Passports / Radio-frequency identification / Ukraine / Group of States Against Corruption / Political corruption / Europe / Security / National security

EUROPEAN COMMISSION HIGH REPRESENTATIVE OF THE EUROPEAN UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2011-09-22 01:54:20
260Disk encryption / Mac OS X / Password / Personally identifiable information / Internet privacy / Telecommunications data retention / TrueCrypt / Encryption / FileVault / Software / Cryptographic software / Cryptography

Guide to Secure Data Storage A PD-Net Study Process Template Data collected in the context of PD-Net should be protected from loss, corruption, and unauthorized access. Of particular importance is the confidentiality of

Add to Reading List

Source URL: pd-net.org

Language: English - Date: 2013-05-29 09:22:29
UPDATE