Data security

Results: 28926



#Item
961Computer access control / Biometrics / Identification / Surveillance / Data security / Authentication / Strong authentication / Biometric Tokenization / Biometric passport

Trusted BWI: Privacy and Trust Enhanced Biometric Web Identities Abdullah A. Albahdal, Hamdan Alzahrani, Lalit Prithviraj Jain, and Terrance E. Boult University of Colorado at Colorado Springs Colorado Springs, CO 80918

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:56:27
962Windows Vista / Cryptographic software / Data security / Folder lock / File Explorer

Microsoft Word - Configuring JHBox for secure sharing

Add to Reading List

Source URL: www.it.johnshopkins.edu

Language: English
963Identity documents / Privacy / Data security / Personal life / Personally identifiable information / Privacy Office of the U.S. Department of Homeland Security / Internet privacy / Personal identifier / Medical privacy / Information security / Public-interest immunity

  Minimize the collection, use, and retention of PII to what is strictly required in order to accomplish the organization’s mission.

Add to Reading List

Source URL: www.tradoc.army.mil

Language: English - Date: 2015-08-07 08:51:21
964National security / Computer security / Data security / Security / Criminal law / Information security / Misdemeanor / Copyright law of the United States / Copyright infringement

Confidential Treatment of Information Acknowledgement (CTIA)

Add to Reading List

Source URL: comptroller.texas.gov

Language: English - Date: 2014-10-09 16:33:31
965Postal system / ZIP code / Address / Mail

Office of Financial Aid Personal Data Sheet Name Social Security Number

Add to Reading List

Source URL: trainingcenters.org

Language: English - Date: 2016-08-08 14:18:31
966Payment systems / E-commerce / Payment cards / Computer law / Information privacy / Payment Card Industry Data Security Standard / Interactive voice response / Call centre / Direct debit / Payment

Case Study Pure Gym Overview: Pure Gym was founded in 2009 after opening its first sites in Leeds and Manchester. With over half a million members, operating over 100 gyms across the UK, it was imperative that Pure Gym

Add to Reading List

Source URL: www.paytelsolutions.com

Language: English - Date: 2016-03-31 05:45:59
967ISO standards / Common Criteria / Security Target / Evaluation / Tests / Computer security / Common Criteria Testing Laboratory / Crime prevention / Data security

Process for Empanelment and Operation of labs under IC3S (STQC/CC/D03) Issue : 03

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2014-11-20 05:22:06
968Cloud storage / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Data center / Internet / Metaswitch

TECHNOLOGY SYSTEMS DIVISION CLIENT RELATIONS DATABASE APPLICATION SERVICES

Add to Reading List

Source URL: itu.gmu.edu

Language: English - Date: 2013-11-15 08:36:30
969Payment systems / EMV / Smart card / Chargeback / Tokenization / Credit card / Payment card / Interac / Cash machine / Payment Card Industry Data Security Standard / Card security code / Magnetic stripe card

HPS231 EMV Rest R0.2.indd

Add to Reading List

Source URL: www.garestaurants.org

Language: English - Date: 2015-09-23 10:09:16
970Payment systems / Heartland Payment Systems / Credit card / Debit card / Data breach

The Voice of Georgia’s Restaurants Advocacy | Education | Awareness It’s Time To Get Serious About Card Data Security 03 Aug:51 PM |Anonymous

Add to Reading List

Source URL: www.garestaurants.org

Language: English - Date: 2015-04-24 14:25:44
UPDATE