Data privacy

Results: 29851



#Item
541Economy / Business / Money / E-commerce / Information privacy / Payment cards / Secure communication / Payment systems / Payment Card Industry Data Security Standard / Credit card / Data breach / Payment processor

PRATT’S PRIVACY & CYBERSECURITY LAW REPORT AN A.S. PRATT PUBLICATION MAY 2016 VOL. 2 • NO. 4

Add to Reading List

Source URL: www.privsecblog.com

Language: English - Date: 2016-06-14 14:03:14
542Law / Misconduct / Statutory law / Identity documents / Privacy / Information privacy / Data security / Computer law / GrammLeachBliley Act / Family Educational Rights and Privacy Act / Payment Card Industry Data Security Standard / Privacy law

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:33:18
543Software / Computing / User interface techniques / System software / Mobile operating systems / Smartphones / Form / HTML / World Wide Web / Mobile app / Widget / Internet privacy

Owner-centric Protection of Unstructured Data on Smartphones Yajin Zhou1⋆ , Kapil Singh2 , and Xuxian Jiang1 1 North Carolina State University

Add to Reading List

Source URL: yajin.org

Language: English - Date: 2016-06-04 10:52:06
544Radio-frequency identification / Automatic identification and data capture / Humancomputer interaction / Privacy / Ubiquitous computing / Wireless / Technology / Computing / Middleware / Antenna / Guard RFID Solutions Inc. / SAP Auto-ID Infrastructure

SMART_INVENTORY Inventory of goods in “real time” with RFID technology Kyema: the Swiss RFID solution

Add to Reading List

Source URL: www.kyema.ch

Language: English - Date: 2009-12-03 10:44:08
545Identity management / Data security / Law / Privacy / Neelie Kroes / Computing / Personal /  Inc. / Medical privacy / Information technology / Politics of the Netherlands / Fraunhofer Institute for Open Communication Systems

Exclusive panel on Identity Management, Privacy and Security Achieves Success at the World Economic Forum Meeting in Davos 2014 Geneva 28th January, 2014 – At the roundtable on Addressing Identity of People and Things,

Add to Reading List

Source URL: www.iked.org

Language: English - Date: 2014-01-30 13:49:03
546Internet privacy / Computing / World Wide Web / Digital media / Privacy policy / Privacy / HTTP cookie / Web analytics / Medical privacy / Information privacy / Website / Local shared object

Last modified: MacStadium, Inc. Privacy Notice MacStadium respects your privacy and is committed to protecting the privacy and confidentiality of personal data we collect. The purpose of our Privacy Notice is to

Add to Reading List

Source URL: www.macstadium.com

Language: English - Date: 2016-04-25 16:27:08
547European Union law / Security / Law / Information privacy / European Union directives / Data security / Privacy / Data Protection Directive / Telecommunications data retention / Security breach notification laws / Personally identifiable information / Data breach

WP29 opinionon e-privacy directive

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2010-08-12 12:28:12
548Privacy / Data security / Personal life / Personally identifiable information / Email / Travel visa / Address / Mail / Internet privacy / Anthropology / Computing / Humanities

University of California, Irvine ACADEMIC — PERSONAL DATA SHEET

Add to Reading List

Source URL: www.ap.uci.edu

Language: English - Date: 2012-11-16 18:56:09
549Health informatics / Health / Computer security / Data security / Security / Health information exchange / Integrating the Healthcare Enterprise / Information security / Medical privacy / Privacy / Health Insurance Portability and Accountability Act / Security controls

Integrating the Healthcare Enterprise 5 10

Add to Reading List

Source URL: www.ihe.net

Language: English - Date: 2008-10-24 17:11:46
550Security / Secure communication / Economy / E-commerce / Information privacy / Payment cards / Cryptography / Data breach / Computer security / Payment card industry / Payment terminal / Hackers: Heroes of the Computer Revolution

Small businesses globally are a prime target for cybercriminals. DON’T LEAVE YOUR BUSINESS OPEN TO ATTACK When your payment card data is breached, the fallout can strike quickly.

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2016-07-06 20:56:33
UPDATE