Data security

Results: 28926



#Item
471Prevention / Security / Safety / Cryptography / Password / Santander /  Spain / Computer security

Third Party Authorisation Form At Santander Consumer Finance we take great care to ensure your personal details remain safe. In order to safeguard your data and fulfil our obligations under the Data Protection Act we wil

Add to Reading List

Source URL: www.santanderconsumer.co.uk

Language: English - Date: 2016-05-23 05:39:29
472

報道関係各位 2008 年 10 月 22 日 株式会社 VASCO Data Security Japan ================================================================== VASCO が同社初の超小型・軽量の PKI 対応 USB トークン

Add to Reading List

Source URL: www.vasco.co.jp

Language: Japanese - Date: 2008-10-23 02:17:04
    473Information privacy / Computing / E-commerce / Economy / Information technology / Payment cards / Computer law / Payment Card Industry Data Security Standard / Cryptography / Qualified Security Assessor / PA-DSS / Health Insurance Portability and Accountability Act

    COMPANY HISTORY In 1998, CEO Brad Caldwell recognized the need for affordable data security for the masses after his former company’s website was hacked. At the time, the only organization qualified to help his busine

    Add to Reading List

    Source URL: www.securitymetrics.com

    Language: English - Date: 2016-08-17 15:46:07
    474Computing / Security / Data management / Computer security / Cloud computing / Cryptography / E-commerce / Cloud computing security / Application security / Database / DDS / NoSQL

    1 Auditing Distributed Databases A new paradigm is among us beyond the “Cloud” or mobile devices, and that is with the use of Distributed Database Systems (DDS). Though they have been around for the better part of a

    Add to Reading List

    Source URL: cloudsecurityalliance.org

    Language: English - Date: 2015-04-27 14:00:07
    475Data security / Economy / Business / Identity management / Law / Privacy / Generally Accepted Privacy Principles / American Institute of Certified Public Accountants / Medical privacy / SOC / Service Organization Controls / SSAE 16

    CPA Firm Issues SOC 3SM Report on Controls Over [Insert relevant principle(s)(Security, Availability, Processing Integrity, Confidentiality, or Privacy)] at [Insert name of your company] STATE, CITY - ( DATE) – YOUR CO

    Add to Reading List

    Source URL: www.heincpa.com

    Language: English - Date: 2015-05-05 13:12:27
    476Security / Prevention / Safety / Cryptography / Computer security / E-commerce / Computer access control / Payment Card Industry Data Security Standard / Data security / Payment card / Multi-factor authentication / Information security

    Mapping ISO27001 <> PCI-DSS 2.0

    Add to Reading List

    Source URL: www.forinsect.com

    Language: English - Date: 2011-08-26 04:51:29
    477Privacy / Data security / Data protection / Identity management / Computing / Internet privacy / Information privacy / Government / Personally identifiable information / Privacy law / Directive on Privacy and Electronic Communications

    Privacy Policy Sure respects the privacy of you, its customer and takes its responsibilities regarding the security of your customer information very seriously. Sure is committed to providing you with a professional, val

    Add to Reading List

    Source URL: web.sure.com

    Language: English - Date: 2014-03-12 06:14:51
    478Internet privacy / Privacy / Data security / Computing / Computer security / Privacy policy / HTTP cookie / Information privacy / Personally identifiable information / Medical privacy / P3P

    Privacy policy statement 1.0 Statement of Intent This is the VisitScotland website policy relating to the personal information that you may be asked to provide when using this website. This includes personal data, e-mail

    Add to Reading List

    Source URL: www.conventionscotland.com

    Language: English - Date: 2012-10-31 10:29:53
    479Cyberwarfare / Computer network security / Security / Computer security / Cybercrime / Social engineering / E-commerce / Phishing / Threat / Targeted threat / Threat Intelligence Platform / Advanced persistent threat

    T2 SPEAR PHISHING PROTECTION T2 Analysis & Mitigation Disrupt spear phishing attacks before systems and data are compromised. Spear phishing is the most prevalent and successful tactic used in advanced targeted attacks.

    Add to Reading List

    Source URL: pages.phishlabs.com

    Language: English - Date: 2016-08-11 09:01:38
    480Information privacy / Privacy / Law / Data security / Data protection / Data Protection Act / Ghana / Register of data controllers / Personally identifiable information / Criminal record

    Act CXII of 2011 on the Right of Informational Self-Determination and on Freedom of Information In order to ensure the right of informational self-determination and the freedom of information, Parliament has adopted the

    Add to Reading List

    Source URL: en.foldhivatal.hu

    Language: English - Date: 2013-01-04 07:33:06
    UPDATE