Data privacy

Results: 29851



#Item
641Economy / Business / Information privacy / Payment cards / Payment systems / Peripheral Component Interconnect / Computing / PA-DSS / Payment card industry / Conventional PCI / Payment Card Industry Data Security Standard / Certified Payment-Card Industry Security Implementer

Microsoft Word - PCI Recert PR_3_.docx

Add to Reading List

Source URL: www.lgbs.com

Language: English - Date: 2015-01-29 20:36:09
642Automatic identification and data capture / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Humancomputer interaction / Institute for Applied Information Processing and Communications / Computing

Internet of Things Devices Under Attack Advisor(s): Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
643Software / Computing / Information privacy / Data protection / Privacy / Human rights / Data / Skype / Data Protection Act / Data protection (privacy) laws in Russia

Application Form The undersigned First name Surname Date of birth Place of birth

Add to Reading List

Source URL: www.cittadellascienza.it

Language: English - Date: 2016-06-22 04:10:30
644Scientific method / European Society for Opinion and Marketing Research / Research / Qualitative research / Science / Information privacy / Methodology / Data Protection Act / Ethical research in social science

PROPOSED REVISION OF THE ICC/ESOMAR INTERNATIONAL CODE ON MARKET, OPINION AND SOCIAL RESEARCH CONSULTATION DRAFT JULY 2016 CONSULTATION DRAFT ICC/ESOMAR INTERNATIONAL CODE

Add to Reading List

Source URL: www.esomar.org

Language: English - Date: 2016-07-11 11:20:13
645Economy / Business / Payment systems / E-commerce / Information privacy / Payment cards / Computer law / Payment Card Industry Data Security Standard / PA-DSS / Payment card industry / Credit card / Acquiring bank

Payment Card Industry Data Security Standard Self-Assessment Questionnaire C Guide PCI DSS Version: V3.1, Rev 1.1

Add to Reading List

Source URL: 3fup3p2pb35f2iroyz2x2mre.wpengine.netdna-cdn.com

Language: English - Date: 2016-08-01 11:54:56
646Local government ombudsman / Parliamentary and Health Service Ombudsman / Legal professions / Information privacy / Parliamentary Commissioner Act / Government / Ombudsman / Information Commissioner / Health Service Commissioners Act / Political philosophy / Ethics

Microsoft Word - Joint data controller agreement - LGO and PHSO - V1 Final

Add to Reading List

Source URL: www.ombudsman.org.uk

Language: English - Date: 2015-07-23 06:02:11
647Security / Secure communication / Prevention / Data security / Data breach / Identity theft / SafeNet / Computer security / Personal Data Privacy and Security Act

FIRST QUARTER RECAPTOP BREACH RECORDS BY SOURCE Malicious insider ( 52% )

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
648Cryptography / E-commerce / Business / Information privacy / Payment cards / Economy / Computer law / Payment Card Industry Data Security Standard / JCB Co. /  Ltd. / Conventional PCI / Public key certificate

CERTIFICATE OF COMPLIANCE Awarded to: SF Software Ltd t/a Pebble PCI v3.0 – SAQ A-EP Level 3 Merchant (MID)

Add to Reading List

Source URL: www.mypebble.co.uk

Language: English - Date: 2016-08-19 05:55:42
649Technology / Computing / Emerging technologies / Policy / Privacy policy / Unmanned aerial vehicle / Privacy / Information privacy / Aerial photography / Electronics / Telecommunications data retention / Internet privacy

Voluntary Best Practices for UAS Privacy, Transparency, and Accountability I. INTRODUCTION The benefits of commercial and private unmanned aircraft systems (UAS) are substantial. Technology has moved forward rapidly, an

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2016-05-20 06:58:45
650Computing / Law / Privacy / Copyright law / Data security / Cryptography / Computer security / Identity management / P3P / Digital rights management / Internet privacy / Digital Millennium Copyright Act

Towards Realistic Assumptions, Models, and Goals for Security Research

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-05-22 10:45:07
UPDATE