Data security

Results: 28926



#Item
331Computer security / Computing / Data security / Prevention / Security / IT risk management / Information privacy / Payment Card Industry Data Security Standard / Information security / Security controls / Federal Information Security Management Act / Regulatory compliance

Guide to IT Seurity Policies & Standards

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:17:55
332

Конференция «Информационная безопасность платежных систем. PCI DSS Russia 2016» PCI DSS: от Data Security к Business Security Гольдштейн Анна,

Add to Reading List

Source URL: www.payment.ib-bank.ru

Language: Russian - Date: 2016-06-09 03:22:57
    333Security / Data management / Computing / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Data / Computer emergency response team / Search engine indexing

    Data Mining in Incident Response Challenges and Opportunities Alexandre Dulaunoy TLP:WHITE Information Security Education

    Add to Reading List

    Source URL: www.circl.lu

    Language: English - Date: 2016-08-11 10:49:35
    334Data security / Policy / Privacy policy / Internet privacy / Personally identifiable information / Privacy / Medical privacy / Government / Computing / Politics

    California Department of Social Services (CDSS) PRIVACY NOTICE The CDSS Privacy Notice explains how personal information is collected and maintained when completing applications or forms (online or hardcopy). Personal

    Add to Reading List

    Source URL: secure.dss.ca.gov

    Language: English - Date: 2015-10-28 18:11:18
    335Data security / Internet privacy / Privacy / Data protection / Identity management / Computing / Computer security / HTTP cookie / Information privacy / Web portal / Directive on Privacy and Electronic Communications / Data Protection Act

    PRIVACY POLICY for the portal http://infoshare.pl (also published as http://theinfoshare.org) § 1. General provisions 1. This Privacy Policy sets forth the rules for the processing and protection of personal data of Por

    Add to Reading List

    Source URL: infoshare.pl

    Language: English - Date: 2016-02-08 04:34:19
    336Computing / Security / Computer network security / Cybercrime / Data security / Computer security / Cryptography / Secure communication / Cloud computing / Multi-factor authentication / De-perimeterisation

    Two Factor Authentication: Security in an Age of Zero Trust Jon Oberheide, CTO, Duo Security Not-so-surprising trends  Cloud

    Add to Reading List

    Source URL: jon.oberheide.org

    Language: English - Date: 2015-10-18 22:20:40
    337Information privacy / Human rights / Data mining / Information / Data security / Privacy / Internet privacy / Data Protection Directive / Intellectual property / Computing

    – Grant Agreement noD5.2 – Legal and ethical issues regarding data warehouse Deliverable No. 5.2 Report on Legal and Ethical Issues Regarding Data Warehouse, Data

    Add to Reading List

    Source URL: p-medicine.eu

    Language: English - Date: 2013-08-09 04:11:27
    338Cognos / Password / Information technology / Business intelligence / Data management / Business / Computing / IBM software

    *Form Valid UntilState Security Access Form Cognos Group Manager Establishes the manager with the ability to assign Cognos group membership for users on the local level.

    Add to Reading List

    Source URL: adedata.arkansas.gov

    Language: English - Date: 2016-08-05 10:46:05
    339Computing / Internet privacy / Law / Computer security / Information privacy / Privacy policy / Privacy / HTTP cookie / Medical privacy / Personal /  Inc. / Data Protection Act / P3P

    PRIVACY POLICY BACKGROUND: This Policy applies as between you, the User of this Website and Call Print Group Limited the owner and provider of this Website. This Policy applies to our use of any and all Data collected by

    Add to Reading List

    Source URL: www.callprint.co

    Language: English - Date: 2015-07-20 10:13:05
    340Computing / Security / Secure communication / Cyberwarfare / Computer security / Information privacy / Human rights / Data protection / Internet privacy / Privacy / Data mining / Internet security

    Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges∗ (position paper) Phillip Porras Vitaly Shmatikov

    Add to Reading List

    Source URL: www.cyber-ta.org

    Language: English - Date: 2006-07-31 13:42:23
    UPDATE