Digital identity

Results: 1391



#Item
561Criminology / Computer security / International Multilateral Partnership Against Cyber Threats / Identity theft / RSA / International Cybercrime / Computer crimes / Crime / Security

Security concept: blue opened padlock on digital background

Add to Reading List

Source URL: www.ag.gov.au

Language: English - Date: 2014-01-08 22:42:27
562Credit card / Internet / BPAY / Identity document / Internet privacy / Email / Personal digital assistant / Payment systems / Technology / Computing

JULY 2013 | VERSION 10 PLEASE COMPLETE THE FOLLOWING IN BLOCK LETTERS 1. Applicant’s current details Title

Add to Reading List

Source URL: www.qbcc.qld.gov.au

Language: English - Date: 2014-12-17 19:22:58
563Mobile telecommunications / Videotelephony / Mobile phone companies / Optus / International Mobile Equipment Identity / Mobile phone / Subscriber identity module / SMS / Mobile telephony / Technology / Mobile technology / Electronic engineering

20 OPTUS DIGITAL MOBILE SERVICE SERVICE DESCRIPTION

Add to Reading List

Source URL: www.optus.com.au

Language: English - Date: 2014-10-08 07:50:33
564Identity management / Two-factor authentication / Authentication / Electronic authentication / Security token / Password / Digital Signature and Electronic Authentication Law / Anakam / Security / Cryptography / Computer security

8_implement_e_auth_system_2_eng

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-28 04:23:20
565Identity management / Social issues / Internet privacy / Information privacy / Personally identifiable information / Social networking service / Criticism of Facebook / Privacy in Australian law / Ethics / Privacy / Human rights

SERIOUS INVASION OF PRIVACY IN A DIGITAL AGE Discussion Paper SUBMISSION

Add to Reading List

Source URL: www.alrc.gov.au

Language: English - Date: 2014-05-14 21:47:03
566Identity management / Two-factor authentication / Authentication / Electronic authentication / Security token / Password / Digital Signature and Electronic Authentication Law / Anakam / Security / Cryptography / Computer security

8_implement_e_auth_system_2_eng

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-28 04:23:20
567Identity assurance / Identity theft / Electronic authentication / Digital identity / Identity document / Authentication / Information security / Personally identifiable information / Biometrics / Security / Identity management / Identity

NATIONAL IDENTITY PROOFING GUIDELINES Contents

Add to Reading List

Source URL: www.ag.gov.au

Language: English - Date: 2014-11-02 21:59:23
568Social issues / Internet privacy / Privacy / Digital media / Ethics / Australia.gov.au / Identity management

Introduction of myGov (first release) - Privacy Impact Assessment

Add to Reading List

Source URL: www.humanservices.gov.au

Language: English - Date: 2014-10-07 23:55:47
569Distress signals / Digital Selective Calling / Global Maritime Distress Safety System / Mayday / Automatic Identification System / Marine VHF radio / Voice procedure / Maritime Mobile Service Identity / Call sign / Public safety / Emergency management / Rescue

DIGITAL SELECTIVE CALLING Frequently Asked Questions 22

Add to Reading List

Source URL: www.amsa.gov.au

Language: English - Date: 2014-10-08 00:24:35
570Identity document / Soviet Union passport / Russian passport / Passports / Radio-frequency identification / Macedonian passport / United States passport / Security / Government / Identification

OFFICE OF THE PRESIDENT DEPARTMENT OF INFORMATION COMMUNICATIONS TECHNOLOGY APPLICATION FORM – DIGITAL SIGNATURE Instructions: 1. Please fill the form in BLOCK LETTERS 2. Items marked with * are mandatory.

Add to Reading List

Source URL: www.src.gov.sc

Language: English - Date: 2013-04-05 06:02:54
UPDATE