Data security

Results: 28926



#Item
891Election technology / Voluntary Voting System Guidelines / Election Assistance Commission / Help America Vote Act / Information security / Freedom of information laws by country / Evaluation / Data Quality Act

U.S. ELECTION ASSISTANCE COMMISSION 1201 New York Ave. NW – Suite 300 Washington, DCEAC INFORMATION QUALITY GUIDELINES I. OVERVIEW

Add to Reading List

Source URL: www.eac.gov

Language: English - Date: 2010-07-08 15:38:05
892Information privacy / Payment cards / E-commerce / Computer law / Payment Card Industry Data Security Standard / Payment card industry / Payment Card Industry Security Standards Council / PA-DSS

Assessed against the PCI Data Security Standard MasterCard DataCash http://www.datacash.com Name & Services: Level 1 Service Provider

Add to Reading List

Source URL: www.mastercard.com

Language: English - Date: 2015-09-09 04:48:03
893Social programs / Welfare economics / Labour economics / Labour law / Social security / Unemployment benefits / Unemployment / Freelancer

Accessing German Social Security Records Through the Research Data Center (FDZ) of the BA at IAB Stefan Bender Berkeley, December 2, 2013

Add to Reading List

Source URL: cle.berkeley.edu

Language: English - Date: 2013-12-04 23:34:05
894Data management / Computer security / Information technology management / Data governance / Information technology governance / Cloud computing security / Enterprise data management / Cloud storage / Cloud computing / Data quality / Data defined storage / Data-centric security

Enterprise Strategy Group | Getting to the bigger truth.™ White Paper Meeting Data Governance Requirements Starts with Data Visibility

Add to Reading List

Source URL: www.egnyte.com

Language: English - Date: 2016-06-07 21:04:42
895Cyberwarfare / Computational linguistics / Automatic identification and data capture / Computer accessibility / Speech recognition / Mel-frequency cepstrum / Computer security / Denial-of-service attack / Artificial neural network / CMU Sphinx / Vector / CAPTCHA

Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay Shields

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2016-06-29 23:07:54
896Information privacy / Payment cards / E-commerce / Payment systems / Merchant services / Payment Card Industry Data Security Standard / Payment card industry / Card security code / Payment terminal / Credit card / Payment card / Data security

Payment Card Industry Data Security Standard (PCI DSS) Information Merchant Responsibilities • • •

Add to Reading List

Source URL: 3fup3p2pb35f2iroyz2x2mre.wpengine.netdna-cdn.com

Language: English - Date: 2016-02-29 10:48:40
897Cryptography / Crime prevention / Information governance / National security / Data management / Information security / Data steward / Database / Computer security

ENTERPRISE IT STANDARDS AND PROCEDURES DATA STEWARDSHIP STANDARDS Policy: Enterprise Data Stewardship Policy

Add to Reading List

Source URL: www.montana.edu

Language: English - Date: 2016-01-19 13:45:51
898Payment systems / Identity documents / Privacy / Data security / Banking / Cheque / Internet privacy / Email / Credit card / Personally identifiable information / EFTPOS / Copyright law of the United States

Botany Bay Family History Society Inc PO Box 1006 Sutherland 1499 ABNAPPLICATION FOR MEMBERSHIP

Add to Reading List

Source URL: www.botanybayfhs.org.au

Language: English - Date: 2016-04-07 09:37:42
899Biometrics / Data security / Information sensitivity / Passports / Ubiquitous computing / Biometric passport / Radio-frequency identification / Authentication / Basic access control / ISO/IEC 14443 / International Civil Aviation Organization / Supplemental access control

BAC & EAC Safety Mechanisms fo MRTDs

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-19 02:33:50
900Data security / Computer security / Information privacy / Privacy / Cloud computing / Internet privacy / International Safe Harbor Privacy Principles / Cloud computing security / Personal /  Inc. / Safe harbor / Information security

EEMA online October 2015 Issue 18 Dates for your diary 15 October Fireside Chat

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
UPDATE