Data theft

Results: 1222



#Item
371Antivirus software / Computing / ESET / ESET NOD32 / Malware / Windows / Microsoft Servers / Server / Software / Windows Server / System software

Datasheet Protecting valuable business data files from infections and theft or loss is a top priority of IT departments. ESET File Security for Microsoft Windows Server provides maximum security and ease of management wh

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2013-03-27 09:37:23
372Identity theft / Theft / Personally identifiable information / Data breach / Personal Data Privacy and Security Act / Fair and Accurate Credit Transactions Act / Security / Crimes / Identity

Opening Statement of the Honorable Fred Upton Subcommittee on Commerce, Manufacturing, and Trade Hearing on “Protecting Consumer Information: Can Data Breaches Be Prevented?” February 5, 2014 (As Prepared for Deliver

Add to Reading List

Source URL: energycommerce.house.gov

Language: English - Date: 2014-02-05 14:46:45
373Social issues / Internet privacy / Identity theft / Telecommunications data retention / Social Security / Information privacy / Ethics / Privacy / Identity management

Privacy Impact Assessment (PIA) – template for report This template was developed by the SG Data Protection and Information Assets team, in the ISIS Office of Information, Security and Cyber Defence. Before conducting

Add to Reading List

Source URL: www.scotland.gov.uk

Language: English - Date: 2014-12-15 09:41:51
374Business / Privacy policy / Internet privacy / Federal Trade Commission / Fair Credit Reporting Act / Identity theft / Information privacy / Consumer privacy / ChoicePoint / Privacy / Ethics / Computing

Harvard Journal of Law & Technology Volume 28, Number 1 Fall 2014 THREE’S A CROWD: TOWARDS CONTEXTUAL INTEGRITY IN THIRD-PARTY DATA SHARING Natalie Kim*

Add to Reading List

Source URL: jolt.law.harvard.edu

Language: English - Date: 2014-12-24 13:27:01
375Ethics / Credit / United States federal banking legislation / National security / Identity theft / Fair and Accurate Credit Transactions Act / Credit card / Information security / Personally identifiable information / Security / Computer security / Data security

C/O ID Experts PO Box 6336 Portland, OR[removed] <> <> <> <
>

Add to Reading List

Source URL: oag.ca.gov

Language: English - Date: 2015-01-23 14:08:14
376Motor vehicle theft / National Incident Based Reporting System / Property crime / Theft / Grand Theft Auto / Uniform Crime Reports / Crimes / Car theft / United States Department of Justice

Thefts from Automobiles: Using Data to Address Community Problems An Analysis of Thefts from Automobiles Utilizing NIBRS Data Roy City, Utah March 2002

Add to Reading List

Source URL: www.jrsa.org

Language: English - Date: 2012-08-02 11:19:10
377Law / Data privacy / Privacy law / Identity management / Privacy / Internet privacy / Identity theft / Franks Report / Human Rights Review Tribunal / Ethics / Government / Human rights

Guidance Document | Document d’orientation Electronic Disclosure of Personal Information in the Decisions of Administrative Tribunals What should administrative tribunals consider when contemplating Internet publicatio

Add to Reading List

Source URL: www.priv.gc.ca

Language: English - Date: 2012-02-10 00:07:33
378Identity management / Identity / Federated identity / Internet privacy / Crimes / Identity theft / Social networking service / Digital identity / Authentication / Computing / Security / Computer security

INTERNET LIFE VERIFICATION Using social data as part of the identify verification process.   Internet Life Verification White Paper THE OPEN IDENTITY EXCHANGE |BLUE MARBLE RESEARCH

Add to Reading List

Source URL: oixuk.org

Language: English - Date: 2014-04-24 06:57:42
379Analytics / National security / Identity theft / Predictive analytics / Business intelligence / Statistics / Business

North Carolina Government Data Analytics Center Report to the Chairs of the House of Representatives Appropriations Committee Chairs of the Senate Based Budget/Appropriations Committee

Add to Reading List

Source URL: www.scio.nc.gov

Language: English - Date: 2014-12-30 09:25:31
380Law / Privacy law / Government / Data security / Health Insurance Portability and Accountability Act / Information security / Identity theft / Personally identifiable information / HITRUST / Security / Computer security / Data privacy

Sensitive Information Security Policy

Add to Reading List

Source URL: www.amwater.com

Language: English - Date: 2015-01-22 16:04:22
UPDATE