Privacy International

Results: 3296



#Item
561Web 2.0 / Gmail / Internet privacy / Webmail / Email / Advisory board / World Wide Web / Computing / Internet / Cross-platform software

ISSN: INTERNATIONAL JOURNAL OF BIOLOGICAL AND MEDICAL RESEARCH (IJBMR) EDITORIAL BOARD / ADVISORY BOARD FORM NAME: Prof./Dr: ________________________________________________________________ DESIGNATION: _______

Add to Reading List

Source URL: www.biomedscidirect.com

Language: English - Date: 2014-02-15 10:33:31
562Pleuronectidae / Computing / Radio-frequency identification / IPHC / Image scanner / International Pacific Halibut Commission / Scanner / Tagged Image File Format / Technology / Privacy / Pacific halibut

PIT tag scanning investigations Joan E. Forsberg Abstract Several tests of equipment and methods for detecting Passive Integrated Transponder (PIT) tags were conducted inResults of these tests are discussed.

Add to Reading List

Source URL: www.iphc.washington.edu

Language: English - Date: 2010-11-15 18:53:57
563Business / Economics / Privacy / Taxation / Tax haven / Bank secrecy / Offshore financial centre / Offshore bank / Banking in Switzerland / International taxation / Finance / Offshore finance

32 issue thirty-two april 2009

Add to Reading List

Source URL: www.sovereigngroup.com

Language: English - Date: 2009-03-26 05:31:36
564Computer crimes / National security / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Risk management / Computer security / Privacy / National Cyber Security Division / IT risk management / Security / Ethics / Public safety

Cybersecurity Framework - Applying Framework to Mobile & BYOD, March 2015

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2015-03-18 16:57:46
565Government / Computing / Identity management / Law / Internet privacy / International Safe Harbor Privacy Principles / Personally identifiable information / Safe harbor / In re Gateway Learning Corp. / Ethics / Privacy / Data privacy

Privacy Policy Overview This privacy policy applies to the privacy practices for www.globallearningsystems.com, www.keystoneondemand.com and www.keystonelearning.com (collectively referred to as ‘website’) and owned

Add to Reading List

Source URL: www.keystonelearning.com

Language: English - Date: 2015-04-15 09:34:13
566European Union / Law / Directive on services in the internal market / Europe / Country of origin principle / Internal Market / Directive 2001/83/EC / Copyright Duration Directive / Directive on Privacy and Electronic Communications / European Union law / International trade / European Union directives

INFSO-EN-REV-00

Add to Reading List

Source URL: www.fia-actors.com

Language: English - Date: 2008-09-27 07:27:49
567Security / Computing / Identity management / Social issues / Information privacy / International Safe Harbor Privacy Principles / Data Protection Directive / IT risk / Information security / Privacy / Ethics / Data privacy

Kenny S and Borking J The Value of Privacy Engineering JILT 2002 Issue 1 http://elj.warwick.ac.uk/jilt/02-1/kenny.html Refereed Article

Add to Reading List

Source URL: www2.warwick.ac.uk

Language: English - Date: 1970-01-01 18:00:00
568Knowledge / International recognition of the National Transitional Council / National Telecommunication Corporation / Academic transfer / Transcript / Family Educational Rights and Privacy Act

A T- A - G L A N C E National Transcript Center FAQs Security: How secure is the transmission of electronic records/transcripts sent through NTC?

Add to Reading List

Source URL: www.hobsons.com

Language: English - Date: 2013-07-01 10:38:26
569Privacy law / Privacy of telecommunications / Law / Cuba–United States relations / Definitions of terrorism / International law / Terrorism

THE WHITE HOUSE Office of the Press Secretary For Immediate Release April 14, 2015

Add to Reading List

Source URL: s0.uvnimg.com

Language: English - Date: 2015-04-14 16:01:02
570Computer crimes / National security / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Risk management / Computer security / Privacy / National Cyber Security Division / IT risk management / Security / Ethics / Public safety

Cybersecurity Framework - Applying Framework to Mobile & BYOD, March 2015

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-03-18 16:57:46
UPDATE