Data privacy

Results: 29851



#Item
661Internet privacy / Privacy / Computing / Data security / Computer security / Privacy policy / HTTP cookie / Information privacy / Personally identifiable information / Medical privacy / P3P / Privacy concerns regarding Google

Privacy Policy The following text is a full statement of the privacy policy of Mergermarket Limited (we, us, our) with registered address at 10 Queen Street Place, London, EC4R 1BE. We respect your privacy rights. This p

Add to Reading List

Source URL: www.debtwire.com

Language: English - Date: 2015-07-31 11:28:40
662Computing / New Mexico / Prevention / Computer security / Data security / University of New Mexico / V-12 Navy College Training Program / Web 2.0 / Web application / Internet privacy / Provisioning / Information security

Technology Days gives UNM’s faculty, staff, and students an opportunity to learn about technologies on campus and participate in discussions of the current state of technology and future innovations at UNM. • Provi

Add to Reading List

Source URL: techdays.unm.edu

Language: English - Date: 2016-06-14 17:14:47
663Computing / Software / Application software / Scientific method / Salvatore J. Stolfo / User / Milgram experiment / Statistics / ROOT / Internet privacy / Data analysis / Windows Vista

On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:25
664Provinces of Kenya / Computing / Coast Province / Data management / Scientific method / Data security / Personal /  Inc. / Kilifi / Wellcome Trust / Medical privacy / Data sharing / Privacy

Appendix B. Application form/Data Transfer Agreement for external requests 1. REQUESTOR DETAILS Name

Add to Reading List

Source URL: kemri-wellcome.org

Language: English - Date: 2016-05-05 08:47:43
665Data security / Data protection / Privacy / Data management / Law / Information privacy / Computing / Information

Unsafe Harbors Data Protection Strikes Back Amelia Andersdotter & Anders Jensen-Urstad WordCamp Norway 2016

Add to Reading List

Source URL: dataskydd.net

Language: English - Date: 2016-02-20 09:40:57
666Information privacy / Airline tickets / Europe / Information sensitivity / Passenger name record / Travel technology / Information / Privacy / Data Protection Directive / Unitary patent / United StatesEuropean Union Agreement on Passenger Name Records

COUNCIL OF THE EUROPEAN UNION Brussels, 23 May

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2008-05-28 13:18:27
667Computing / Computer access control / Computer security / Cloud standards / Federated identity / Identity management / User-Managed Access / OAuth / OpenAM / Cloud computing / Authorization / Internet privacy

USER-MANAGED ACCESS DATASHEET ForgeRock Identity Platform: User-Managed Access User-controlled data sharing for privacy and trust

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-01-27 00:48:20
668Computing / Information privacy / Computer security / Privacy / Computer law / Technology / Identity documents / Internet privacy / Privacy policy / Personally identifiable information / Payment Card Industry Data Security Standard / HTTP cookie

Privacy Policy We are committed to protecting your privacy. We will only use the information that we collect about you lawfully in accordance with the Data Protection Act. We collect information about you for 2 reasons:

Add to Reading List

Source URL: www.ssc.com.fj

Language: English - Date: 2014-06-25 16:33:21
669Doping in sport / Sports / Privacy / Data security / World Anti-Doping Agency / Human behavior / Biological passport / Privacy law / Internet privacy / Personally identifiable information / Adams / Information privacy

NOTICE TO ATHLETES ABOUT PROCESSING OF PERSONAL INFORMATION IN ADAMS Processing Data in ADAMS You are being asked to read the following Information Notice to ensure that you are aware that some personal information rela

Add to Reading List

Source URL: d2aygmo1xd84v8.cloudfront.net

Language: English - Date: 2016-01-28 04:11:48
670Wireless / Automatic identification and data capture / Privacy / Radio-frequency identification / Ubiquitous computing / Telecommunications engineering / Humancomputer interaction / Near field communication / MIFARE / Eavesdropping / ISO/IEC 14443

Eavesdropping Attacks on High-Frequency RFID Tokens Gerhard P. Hancke July 11, 2008 Eavesdropping Attacks on High-Frequency RFID Tokens – p. 1

Add to Reading List

Source URL: www.rfidblog.org.uk

Language: English - Date: 2009-03-13 17:23:04
UPDATE