Data theft

Results: 1222



#Item
201Security / Federal Trade Commission / Consumer protection / Computer law / United States federal banking legislation / Identity theft / Health Insurance Portability and Accountability Act / Gramm–Leach–Bliley Act / Data breach / Law / Privacy law / Government

Microsoft WordJoint Trades Letter on S 3742.DOC

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:28:19
202Ethics / Computer security / Data security / Data breach / L0pht / Uber / Identity theft / Internet privacy / Chris Wysopal / Security / Computer network security / Secure communication

Details of 50,000 Uber drivers breached The Financial Times By Sarah Mishkin February 27, 2015 The personal information of about 50,000 Uber drivers has been accessed by an unknown third party, in one of the largest data

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-03-03 18:14:01
203National security / Electronic commerce / Crimes / Data security / Password / Phishing / Identity theft / Malware / Internet privacy / Security / Computer security / Crime prevention

Learning from Early Attempts to Measure Information Security Performance Jing Zhang1 , Robin Berthier2 , Will Rhee3 , Michael Bailey1 , Partha Pal4 , Farnam Jahanian1 , and William H. Sanders2 1 Dept. of Computer Scienc

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:18
204Burglary / Robbery / Property crime / Crime / Theft / Public-order crime / Crimes / Criminal law / Criminology

CRAIGAVON Performance Against The Policing Plan[removed]Figures are based on 12 months rolling data to 31 March 2013 Figures extracted 17 May 2013

Add to Reading List

Source URL: www.psni.police.uk

Language: English - Date: 2013-05-28 09:09:24
205Identity / Personal finance / Identity theft / Theft / Fair and Accurate Credit Transactions Act / Credit freeze / Credit report monitoring / Equifax / Data breach / Financial economics / Credit / Crimes

IronPro® Credit Monitoring versus Identity Monitoring By: Kurtis E. Suhs Vice President / Technology E&O & Privacy National Practice Leader Ironshore Insurance Services, LLC

Add to Reading List

Source URL: www.ironshore.com

Language: English - Date: 2014-06-10 10:04:43
206Intellectual property law / Cross-platform software / Oracle Database / Identity theft / Copyright law of the United States / Copyright / Audit trail / Oracle Corporation / Software / Data / Information

Microsoft PowerPoint - IdentityInTheDatabase-NOUG

Add to Reading List

Source URL: www.petefinnigan.com

Language: English - Date: 2012-09-03 04:57:58
207Motor vehicle theft / National Incident Based Reporting System / Property crime / Theft / Grand Theft Auto / Uniform Crime Reports / Crimes / Car theft / United States Department of Justice

Thefts from Automobiles: Using Data to Address Community Problems An Analysis of Thefts from Automobiles Utilizing NIBRS Data Roy City, Utah March 2002

Add to Reading List

Source URL: www.popcenter.org

Language: English - Date: 2008-06-18 15:53:15
208Computing / Computer network security / Computer security / International standards / Data breach / Secure communication / Electronic health record / Identity theft / Health Insurance Portability and Accountability Act / Health / Health informatics / Security

stethoscope on keyboard laptop

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2015-03-04 10:20:04
209Computing / Crime prevention / National security / Computer network security / Computer security / Data theft / USB flash drive / Universal Serial Bus / USB mass-storage device class / Security / Data security / Computer hardware

Secure Passage through a World of Technological Threats

Add to Reading List

Source URL: www.endpoint-security.info

Language: English - Date: 2007-10-24 10:06:13
210Ethics / Computer security / Data security / Computer network security / Information security / National security / Data breach / Identity theft / Encryption / Security / Computing / Email

Email Encryption The Case for Email Encryption Why protecting your customers’ data is a top priority You can’t escape the headlines — computer crime is on the rise. According to

Add to Reading List

Source URL: www.greenviewdata.com

Language: English - Date: 2014-07-24 11:09:46
UPDATE