Privacy engineering

Results: 1416



#Item
411Occupational safety and health / Risk / Safety / Internet privacy / Management / Victorian Workcover Authority / Safety engineering / WorkSafe Victoria / Industrial hygiene

Application for homogenous workplaces Prior to completing this application you must have read and understood the Homogenous Workplaces Ruling. This document must be completed, signed and returned to your WorkSafe Agent.

Add to Reading List

Source URL: www.worksafe.vic.gov.au

Language: English - Date: 2015-03-31 17:50:53
412Privacy / Radio-frequency identification / Ubiquitous computing / Wireless / Telecommunications engineering / Automatic identification and data capture / Technology / Human–computer interaction

Long-Range RFID Ultra Long Range Tags RFID solutions for Vehicle, Asset and Personnel Tracking

Add to Reading List

Source URL: www.iautomate.com

Language: English - Date: 2014-09-17 16:55:20
413Internet privacy / Hong Kong / Ethics / Sadeh / Privacy

Mobile App Privacy: How Bad Is It & What Can We Do About It? Norman Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Co-Director, MSIT in Privacy Engineering Program

Add to Reading List

Source URL: www.ecom-icom.hku.hk

Language: English - Date: 2014-05-30 05:23:16
414Plumbing / Bathrooms / Military discharge / Termination of employment / Internet privacy / Waste / Privacy / Software / Ethics / Building engineering

Lower Murray Water Application for Consent to Discharge Trade Waste to the Corporation’s Sewer CTDPAC:

Add to Reading List

Source URL: www.lmw.vic.gov.au

Language: English - Date: 2014-11-20 00:48:19
415Web 2.0 / Social information processing / Blog hosting services / Social media / Human rights / Internet privacy / Social networking service / Facebook / Privacy / World Wide Web / Computing / Technology

The PViz Comprehension Tool for Social Network Privacy Settings ∗ Alessandra Mazzia∗ Kristen LeFevre∗ and Eytan Adar ∗† University of Michigan, Computer Science and Engineering, 2260 Hayward Ave. Ann Arbor, MI

Add to Reading List

Source URL: www-personal.umich.edu

Language: English - Date: 2011-08-15 14:25:20
416Videotelephony / Lawful interception / Regulation of Interception of Communications and Provision of Communication-related Information Act / Electronics / Integrated Services Digital Network / Privacy of telecommunications / Electronic engineering / Surveillance

COUNCIL OF THE EUROPEAN UNION Brussels, 20 June[removed]OR. en[removed]

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2006-07-12 08:24:18
417Privacy / Law / Computing / Systems engineering / Social issues / International Association of Privacy Professionals / Health Insurance Portability and Accountability Act / Requirement / Information privacy / Software requirements / Ethics / Privacy law

Introduction to IT Privacy A Handbook for Technologists Executive Editor Travis Breaux, CIPT Contributors

Add to Reading List

Source URL: privacyassociation.org

Language: English - Date: 2014-08-15 10:00:04
418Electronics / Electronic engineering / Computer security / Security / Data security / Information security / Internet privacy / Regulatory compliance / Call centre / Telecommunications / Customer proprietary network information / Telemarketing

Federal Communications Commission DA[removed]Before the Federal Communications Commission

Add to Reading List

Source URL: cdn.arstechnica.net

Language: English - Date: 2015-04-08 14:00:03
419Secure multi-party computation / Public key infrastructure / Algorithm / Information privacy / Transmission Control Protocol / Preparer Tax Identification Number / Internet privacy / Cryptography / Cryptographic protocols / Public-key cryptography

A Trusted Execution Platform for Multiparty Computation by Sameer Ajmani Submitted to the Department of Electrical Engineering and Computer

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2002-06-04 13:33:05
420Data security / Email / Password / Hacker / Social engineering / Internet privacy / Information security / Hacking: The Art of Exploitation Second Edition / Password policy / Computing / Hacking / Computer security

COMPUTER SECURITY 261 SOCIAL HACKING (ALSO KNOWN AS SOCIAL ENGINEERING)

Add to Reading List

Source URL: www.privacytactics.com

Language: English - Date: 2012-08-13 12:49:14
UPDATE