Data privacy

Results: 29851



#Item
871Security / Computer security / Data security / Impact assessment / Risk analysis / Privacy Impact Assessment / Risk management / Privacy / Internet privacy / IT risk / Risk assessment / Threat

Microsoft Word - EvotePosterPaperResubmit

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-31 10:35:58
872Privacy / Data security / Personal life / Personally identifiable information / Medical privacy / Confidential

Title 1—OFFICE OF ADMINISTRATION Division 10—Commissioner of Administration Chapter 2—Privacy of Computer- Accessible, Confidential Personal Information

Add to Reading List

Source URL: www.sos.mo.gov

Language: English - Date: 2001-03-16 10:51:24
873Internet advertising / Internet marketing / Information privacy / Data Protection Directive / European Union / Online advertising / Behavioral targeting / Internet privacy / Web analytics / Computer security / FTC regulation of behavioral advertising / Network Advertising Initiative

IAB Europe EU Framework for Online Behavioural Advertising April 2011 Introduction

Add to Reading List

Source URL: meine-cookies.org

Language: English - Date: 2015-05-08 03:28:45
874Academic transfer / Dual enrollment / New Mexico State University / Family Educational Rights and Privacy Act / Dual credit enrollment / Integrated Postsecondary Education Data System / College in the Schools

2013 NEW MEXICO STATE UNIVERSITY GRANTS SUMMER DUAL ENROLLMENT ACADEMY Thank you for your interest in applying for the 2013 New Mexico State University Summer Dual Enrollment Academy. Please complete all portions of the

Add to Reading List

Source URL: grants.nmsu.edu

Language: English - Date: 2015-08-10 19:08:54
875Privacy / Data security / Identity management / Personal life / Personally identifiable information / Internet privacy / Medical privacy / Information privacy / Privacy policy

UC Irvine Privacy Impact Assessment The University has obligations to protect Personally Identifiable Information (PII) under state and federal laws and UC policies and values. PII is defined as any information that desc

Add to Reading List

Source URL: security.uci.edu

Language: English - Date: 2016-02-23 19:33:16
876Privacy / Data retention / Data security / Information privacy / Data protection / Data Protection Act / Telecommunications data retention / Backup / Data sharing / Personally identifiable information / Freedom of information laws by country

University of Kent Students’ Union

Add to Reading List

Source URL: 2015.yusu.org

Language: English - Date: 2015-03-09 07:35:50
877Data security / Privacy / Family Educational Rights and Privacy Act / United States Department of Education / Information privacy / Information security / Personally identifiable information / Data breach / Electronic Privacy Information Center / Student rights in higher education / Internet privacy / Medical privacy

June 6, 2016 Secretary John B. King U.S. Department of Education 400 Maryland Avenue, SW Washington, D.CRE: Petition to Amend 34 C.F.R. Part 99 (“Family Educational Rights and

Add to Reading List

Source URL: epic.org

Language: English - Date: 2016-06-04 21:40:07
878Information privacy / Payment cards / E-commerce / Payment systems / PA-DSS / Cryptography / Payment Card Industry Data Security Standard / Payment card industry / Conventional PCI / Information security / Payment card number / DSS

Payment Card Industry (PCI) Data Security Standard Requirements and Security Assessment Procedures Version 2.0 October 2010

Add to Reading List

Source URL: pcidss.ru

Language: English - Date: 2013-11-15 09:19:18
879Data management / Free culture movement / Open data / Geographic information system / Privacy / Data management plan / Telecommunications (Interception and Access) Amendment (Data Retention) Act

Step 1 - Identifying data for release 1.1 What data does my agency collect and manage? The public sector creates, collects and manages a range of datai in the course of its everyday operations, including through administ

Add to Reading List

Source URL: data.wa.gov.au

Language: English - Date: 2015-06-22 10:20:50
880Health informatics / Emerging technologies / Bioinformatics / Genomics / Personalized medicine / Personal health record / Electronic health record / Whole genome sequencing / Health information exchange / Medical privacy / Big data / Health information technology

Modelling the Financial Value of the Maroochy River to Property Values: An Application of Neural Networks

Add to Reading List

Source URL: s3-sa-east-1.amazonaws.com

Language: English - Date: 2015-01-22 09:42:38
UPDATE