Data theft

Results: 1222



#Item
231Computer security / Data security / Encryption / TrueCrypt / Laptop theft / USB flash drive / Disk encryption hardware / Network Security & Cryptography / Disk encryption / Software / Computing

Microsoft Word - JUCC Newsletter-General-7 Data Encryption vFINAL2.doc

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2011-06-23 00:07:29
232Data security / Theft / Computer storage / USB flash drive / Data theft / Backup / Identity theft / Computer data storage / Data loss / Computing / Computer hardware / Technology

Information Security Updates Portable Storage Media Issue 8 Education Sector Updates Related Article

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2011-06-07 05:10:39
233Data privacy / Freedom of information in the United Kingdom / Freedom of information legislation / Privacy Commissioner of Canada / Identity theft / Identity Cards Act / Internet privacy / Information privacy / Biometrics / Ethics / Privacy / Law

IN FACT Information Act newsletter Freedom of Information and Privacy Protection in the NT Public Sector Issue 2 – June 2006

Add to Reading List

Source URL: www.cjc.nt.gov.au

Language: English - Date: 2008-08-06 21:25:47
234ISO standards / Telecommunications engineering / Human–computer interaction / Automatic identification and data capture / Radio-frequency identification / Near field communication / Gemalto / ICa / Smart card / Technology / Wireless / Ubiquitous computing

case studieswww.rfidprotect.co.uk Case Study # 10: David Beckham, victim of RFID theft!

Add to Reading List

Source URL: www.rfidprotect.co.uk

Language: English - Date: 2013-04-19 07:23:29
235Crime prevention / National security / Crime / Public safety / GFI Software / Data theft / USB flash drive / Information security / Identity theft / Security / Data security / Theft

GFI White Paper The threats posed by portable storage devices Uncontrolled use of iPods, USB sticks, PDAs and other devices on your network can lead to data theft, introduction of viruses,

Add to Reading List

Source URL: www.gfi.com

Language: English - Date: 2011-06-05 06:17:48
236Electronic commerce / Crime / Cyberwarfare / Data privacy / Computer crimes / Data breach / Identity theft / Malware / Payment Card Industry Data Security Standard / Security / Computer network security / Secure communication

3 color blend star [Converted]

Add to Reading List

Source URL: chzv.net

Language: English - Date: 2010-10-24 07:06:47
237Identity theft / Identity Theft Resource Center / Social issues / Ontology / Ethics / Crimes / Identity / Theft

Identity Theft Resource Center 2015 Data Breach Stats How is this report produced? What are the rules? See last page of report for details. Report Date:

Add to Reading List

Source URL: www.idtheftcenter.org

Language: English - Date: 2015-04-14 18:33:55
238Healthcare in the United States / Crimes / Identity / Identity theft / Theft / Data breach / Anthem / Blue Cross Blue Shield Association / Credit card / Financial economics / Security / Credit

FOR IMMEDIATE RELEASE Feb. 23, 2015 For more information, contact: Bob Hanson Director of Communications

Add to Reading List

Source URL: www.ksinsurance.org

Language: English - Date: 2015-02-23 16:59:01
239Crime / Secure communication / Social issues / Types of insurance / Data security / Data breach / Identity theft / Liability insurance / Insurance / Security / Computer network security / Ethics

Financial Lines CyberEdge CyberEdge Cyber Risk Protection for Commercial Entities

Add to Reading List

Source URL: www.aig.com.au

Language: English
240Applied ethics / Medical ethics / Design of experiments / Pharmacology / Internet privacy / Data sharing / Privacy / Institutional review board / Identity theft / Ethics / Science / Clinical research

APPROVED Dec 11, 2014 WIRB Research Subject Information and Consent Document TITLE:

Add to Reading List

Source URL: www.openhumans.org

Language: English - Date: 2015-04-12 16:23:38
UPDATE