Data privacy

Results: 29851



#Item
671Security / Secure communication / Prevention / Data security / Data breach / Identity theft / Electronic health record / Computer security / Health Insurance Portability and Accountability Act / Mobile device management / Information privacy / Mobile app

stethoscope on keyboard laptop

Add to Reading List

Source URL: downloads.cloudsecurityalliance.org

Language: English - Date: 2016-01-25 16:10:03
672Economy / Business / Information privacy / Payment cards / Computing / Peripheral Component Interconnect / Payment systems / E-commerce / Payment Card Industry Data Security Standard / Payment card industry / EMV / Conventional PCI

Not rendering correctly? View this email as a web page here. 7 October 2015 | Vol. 3, Issue 38 Upcoming Events Asia­Pacific Community Meeting 14­15 October 

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-11-17 05:39:51
673Structure / Community organizing / Counterculture of the 1960s / Social work / Los Angeles Police Department / Community / Welfare / Internet privacy / Privacy

COMMUNITY RESEARCHER/ORGANIZER — LOS ANGELES POSITION DESCRIPTION PROJECT OVERVIEW The Stop LAPD Spying Coalition is excited to be part of a nationwide research and education project exploring data rights, digital priv

Add to Reading List

Source URL: stoplapdspying.org

Language: English - Date: 2015-10-20 20:10:48
674Statistics / Probability / Mathematical analysis / Probability distributions / Normal distribution / Randomness extractor / Exponential distribution / Central limit theorem / Gaussian function

LNCSOur Data, Ourselves: Privacy Via Distributed Noise Generation

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2008-09-15 04:56:28
675File sharing networks / Computing / File sharing / Concurrent computing / Distributed data storage / Intellectual property law / Gnutella / Privacy in file sharing networks / Peer-to-peer / GiFT / Chord / Scalability

Intelligent Club Management in Peer-to-Peer Networks Atip Asvanund*, Sarvesh Bagla**, Munjal H. Kapadia**, Ramayya Krishnan*, Michael D. Smith*, Rahul Telang* *Heinz School of Public Policy and Management, CMU

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-11-30 14:31:59
676Computing / Data management / Data security / Information technology / Cloud infrastructure / Big data / Technology forecasting / Transaction processing / Internet privacy / Data quality / Personally identifiable information / Cloud computing

Ethical Market Models in the Personal Data Ecosystem Kaliya “Identity Woman” Personal Data Ecosystem Consortium ABSTRACT

Add to Reading List

Source URL: deviw.evelurie.net

Language: English - Date: 2016-04-07 21:09:36
677Privacy / Information privacy / Law / Data security / Data protection / Computing / Privacy policy / Data Protection Act / Personally identifiable information

Wednesday, December 21, 2011 FEDERAL OFFICIAL GAZETTE Translation from Spanish

Add to Reading List

Source URL: inicio.ifai.org.mx

Language: English - Date: 2013-04-25 20:38:16
678Privacy / Information privacy / Data security / Data protection / Information technology / Information / Cybercrime / Data Protection Act / Personally identifiable information / Records management / Information privacy law

DATA PROTECTION CODE OF PRACTICE ON ARCHIVAL INFORMATION March 2010 Contents

Add to Reading List

Source URL: www.nas.gov.uk

Language: English - Date: 2011-03-10 08:13:18
679Computing / Europe / Technology / Information privacy / Telephony / Economy of the European Union / European Union law / European Union directives / Directive on Privacy and Electronic Communications / Services in the Internal Market Directive / Consumer protection / Telecommunications data retention

ACHIEVING A STRONGER DIGITAL UNION ETNO contribution to the Digital Single Market Strategy European Telecommunications Network Operators’ Association

Add to Reading List

Source URL: www.etno.eu

Language: English - Date: 1969-12-31 19:00:00
680Internet privacy / Computing / Computer security / Microsoft / Computer access control / Hypertext Transfer Protocol / Privacy / Identity documents / HTTP cookie / Information privacy / Personally identifiable information / Single sign-on

  Castle Software, Inc. Data Privacy & Security Policy Castle Software, Inc. ("Castle") is committed to protecting the privacy of its users. Because  Castle gathers certain types of information abou

Add to Reading List

Source URL: www.castlelearning.com

Language: English - Date: 2015-09-17 09:11:17
UPDATE