Data theft

Results: 1222



#Item
381Cyberwarfare / Credit cards / Crimes / Identity theft / Theft / Data breach / Credit card fraud / Credit card / Internet privacy / Security / Computer network security / Secure communication

Prevent Data Breach! According to the most recent Verizon Data Breach and hot dog stands – as well as high-end establishments – 

Add to Reading List

Source URL: www.mydigitalshield.com

Language: English - Date: 2014-07-06 16:44:19
382Identity / Credit / Identity theft / Theft / Credit report monitoring / Federal Trade Commission / Personally identifiable information / Social Security / Data breach / Crimes / Security / Financial economics

Identity Theft: Why 50+ Americans Are At Risk An overview of why 50+ adults are vulnerable to identity theft and how people can help protect themselves and their loved ones June 2014

Add to Reading List

Source URL: www.trustedid.com

Language: English - Date: 2014-06-06 18:20:31
383Tort law / Identity theft / Standing / Lawsuit / Negligence / Law / Judicial remedies / Damages

Microsoft Word - Data Breach White Paper.doc

Add to Reading List

Source URL: www.laresinstitute.com

Language: English - Date: 2011-09-02 02:44:47
384Human–computer interaction / Business / Commerce / Security / Theft / Electronic article surveillance / Retail loss prevention / Impinj / SAP Auto-ID Infrastructure / Radio-frequency identification / Technology / Automatic identification and data capture

Security Technology From RF EAS to RFID Solutions RF Technology T o Be Taken To New Heights

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-09-08 11:55:19
385Identity theft / Data breach / Law / Government / Equal Justice for United States Military Personnel legislation / Dodd–Frank Wall Street Reform and Consumer Protection Act / 111th United States Congress / Security / Congressional Budget Office

109TH CONGRESS " HOUSE OF REPRESENTATIVES 2d Session !

Add to Reading List

Source URL: archives.financialservices.house.gov

Language: English - Date: 2007-02-11 23:00:00
386Computer security / Crime prevention / National security / Data security / Network security / Password / Information security / Identity theft / Malware / Security / Computer network security / Cyberwarfare

Protecting Personal Information: A Guide for Business

Add to Reading List

Source URL: womencan.us

Language: English - Date: 2012-08-27 16:11:34
387Identity theft / Data breach / Credit card / Information security / Internet privacy / Payment card / Online shopping / Personally identifiable information / Identity document / Security / Computer security / Data security

WHITE PAPER FINANCIAL INSTITUTIONS THRIVING IN A POST-BREACH WORLD PROTECTING YOUR ORGANIZATION,

Add to Reading List

Source URL: www.idt911.com

Language: English - Date: 2014-12-16 21:56:25
388Security / Computing / Identity theft / Malware / Target Corporation / Debit card / Data breach / Payment Card Industry Data Security Standard / Payment card / Payment systems / Electronic commerce / Business

WRITTEN TESTIMONY BEFORE THE HOUSE COMMITTEE ON ENERGY AND COMMERCE SUBCOMMITTEE ON COMMERCE, MANUFACTURING, AND TRADE

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2014-02-03 12:59:08
389Medicine / Medical informatics / Privacy law / Health informatics / Health Insurance Portability and Accountability Act / Privacy / Electronic medical record / Medical record / Medical transcription / Health / Data privacy / Ethics

Chapter II Federal Privacy and Security Laws (HIPAA, ARRA, HITECH, Prevention of Medical Identity Theft) Disclaimer: The information contained in this manual is not intended to be used as legal advice. Please refer to th

Add to Reading List

Source URL: www.mehima.org

Language: English - Date: 2012-01-11 13:25:48
390Personal finance / Computer network security / Secure communication / Credit card / Identity theft / Equifax / Credit report monitoring / Computer security / United States Postal Service / Financial economics / Credit / Security

USPS Cyber Intrusion and Employee Data Compromise Updated Dec. 18, 2014 Employee Frequently Asked Questions 1. How and when did the security breach occur? The Postal Service recently learned of a cyber intrusion into som

Add to Reading List

Source URL: liteblue.usps.gov

Language: English - Date: 2015-01-12 09:01:10
UPDATE