Internet privacy

Results: 53994



#Item
351Computing / Internet / Secure communication / Network architecture / Information science / Knowledge representation / Technical communication / Tor / Ontology / HTTPS / Internet privacy

Representing Network Trust and Using It to Improve Anonymous Communication? Aaron D. Jaggard1 , Aaron Johnson1 , Paul Syverson1 , and Joan Feigenbaum2 1 U.S. Naval Research Laboratory

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-06-03 06:13:52
352Software / Digital media / Technology / Social networking services / Internet privacy / Twitter / Privacy / Counsel / Social media

Microsoft Worddoc

Add to Reading List

Source URL: www.osbar.org

Language: English - Date: 2015-11-14 10:31:13
353Computer network security / Computing / Internet privacy / Network architecture / Crypto-anarchism / Computer security / Computer architecture / Virtual private networks

How to get access to Processing Servers Projects inside DAPA DAPA offer two solutions for processing data related to ongoing projects.  

Add to Reading List

Source URL: dapa.ciat.cgiar.org

Language: English - Date: 2015-02-20 09:23:24
354Health / Academia / Personal life / Health informatics / Medical law / Medical privacy / Privacy / Medical record / Internet privacy / Confidentiality / Public health / Health Insurance Portability and Accountability Act

Notice of Privacy Practices (Effective September, 2013) THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.

Add to Reading List

Source URL: www.ichs.com

Language: English - Date: 2013-12-23 11:39:51
355Common law / Medical law / Proxy / Power of attorney / Law / Internet privacy / Computing / Computer networking / Terminology / Proxy voting

Microsoft Word - MyHospitalChart Proxy Access _2_.doc

Add to Reading List

Source URL: www.smhc.org

Language: English - Date: 2014-08-12 15:51:42
356Computing / Software / Cloud clients / Internet privacy / Norton / Symantec / Malware / Medical privacy / Smartphone / Mobile app / Personal /  Inc. / Norton Internet Security

Norton Mobile Apps Survey Report December 2014 An alarming percentage of apps collect and send personally identifiable information (PII) to app developers. Newly released

Add to Reading List

Source URL: now.symassets.com

Language: English - Date: 2016-04-18 05:29:35
357Privacy / Identity management / Digital rights / Human rights / P3P / World Wide Web / Data security / Computing / Internet privacy / Information privacy / Computer security / Recommender system

By Bettina Berendt, Oliver Günther, and Sarah Spiekermann PRIVACY IN E-COMMERCE: Stated Preferences vs.

Add to Reading List

Source URL: www.wiwi.hu-berlin.de

Language: English - Date: 2008-06-14 12:00:44
358Television / Broadcasting / Visual arts / Digital television / Internet television / Interactive television / Consumer electronics / Internet broadcasting / Smart TV / Medical privacy / Federal Communications Commission / Set-top box

#DitchTheBox: A New Approach to Increase Consumer Choice in the Video Marketplace TV Providers & Independent Networks Back a New Solution with Open Standards, Cross-App Search, FCC-Enforced Deadlines The FCC’s goals of

Add to Reading List

Source URL: futureoftv.com

Language: English - Date: 2016-06-16 11:07:21
359Computer access control / Computer security / Security / Identity management / Cryptography / Cybercrime / Computer network security / Password / Internet privacy / Password manager / Password strength

FAB_OnlineBankingSecurityTips

Add to Reading List

Source URL: www.firstamb.net

Language: English - Date: 2015-10-14 13:11:43
360Cryptography / Australian property law / Real property law / Real estate / Economy / Law / Genealogy / Property law / Conveyancing / Internet privacy / Privacy / Torrens title

PISEV No. (Office Use: affix EV barcode here)

Add to Reading List

Source URL: www.lpi.nsw.gov.au

Language: English - Date: 2011-07-18 23:13:59
UPDATE