Data theft

Results: 1222



#Item
151Cyberwarfare / Crime prevention / National security / Information security / Security controls / Security awareness / 201 CMR 17.00 / Password / IT risk / Computer security / Security / Data security

Microsoft Word - Security-Policies-Fo-rMA-State-Identity-Theft-Law.doc

Add to Reading List

Source URL: www.informationshield.com

Language: English - Date: 2010-06-03 23:12:46
152Computer security / Data security / Information privacy / Internet privacy / Information security / Personally identifiable information / Identity theft / Personal Data Privacy and Security Act / Privacy / Ethics / Security

How Global Organizations Approach the Challenge of Protecting Personal Data Contents Passing the Tipping Point. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2010-07-14 11:22:08
153Business / Thomson Reuters / Reuters / Grand Theft Auto V / Electronic Arts / Operating cash flow / Financial data vendors / Finance / Video game development

THOMSON REUTERS STREETEVENTS EDITED TRANSCRIPT ACTA - Q4 2014 Actua Corp Earnings Call EVENT DATE/TIME: FEBRUARY 26, :00PM GMT

Add to Reading List

Source URL: www.actua.com

Language: English - Date: 2015-03-02 10:42:29
154Privacy / Computer security / Identity management / Social issues / Data security / Internet privacy / Facebook / Identity theft / PlayStation Network outage / Computing / Technology / Electronics

How Privacy Flaws Affect Consumer Perception Sadia Afroz, Aylin Caliskan Islam, Jordan Santell, Aaron Chapin and Rachel Greenstadt Department of Computer Science Drexel University Abstract—We examine how consumers per

Add to Reading List

Source URL: www.cs.drexel.edu

Language: English - Date: 2013-09-25 04:25:44
155Crime prevention / Computer security / Data security / Identity theft / Information security / Critical infrastructure protection / Institute for Information Infrastructure Protection / Risk / Business continuity planning / Security / National security / Public safety

1001 PENNSYLVANIA AVE., NW SUITE 500 SOUTH WASHINGTON, DCTELFAX

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:27:34
156Information sensitivity / Security breach notification laws / Data breach / Identity theft / Personally identifiable information / Internet privacy / Privacy / Information privacy / Contract / Security / Computer security / Data security

Information Privacy & Data Security Practice Group Law Alert A Corporate Department Publication State Data Breach Notification Laws

Add to Reading List

Source URL: cmhinfragard.org

Language: English - Date: 2013-12-19 14:45:03
157National security / Computer network security / Secure communication / Data security / Identity theft / Computer security / Information security / Data breach / Personally identifiable information / Security / Crime / Crime prevention

STATEMENT OF JOHN CARLSON ON BEHALF OF BITS AND THE FINANCIAL SERVICES ROUNDTABLE

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:42:21
158Data privacy / Freedom of information in the United Kingdom / Freedom of information legislation / Privacy Commissioner of Canada / Identity theft / Identity Cards Act / Internet privacy / Information privacy / Biometrics / Ethics / Privacy / Law

IN FACT Information Act newsletter Freedom of Information and Privacy Protection in the NT Public Sector Issue 2 – June 2006

Add to Reading List

Source URL: www.courts.nt.gov.au

Language: English - Date: 2008-08-06 21:25:47
159Law / Security / Data protection / Information privacy / Data Protection Directive / Identity theft / Regulatory risk differentiation / Data Protection Act / Data privacy / Privacy law / Privacy

2. Following the discussions at DAPIX onJuly 2014 on the risk-based approach, delegations sent in many written comments 1. A revised text was discussed at the DAPIX meeting ofSeptember 2014 and again at t

Add to Reading List

Source URL: lobbyplag.eu

Language: English - Date: 2015-03-09 19:45:25
160Measurement / Electricity meter / Smart grid / Load profile / Root-mean-square deviation / Smart meter / Electric power transmission / Electromagnetism / Energy / Electric power

MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Electricity Theft Detection Using Smart Meter Data

Add to Reading List

Source URL: www.merl.com

Language: English - Date: 2015-03-10 17:35:05
UPDATE