Privacy engineering

Results: 1416



#Item
981Fraud / Ethics / Confidence tricks / Business / Online shopping / Advance-fee fraud / Scam baiting / Social engineering / Spamming / Business ethics

Protecting yourself against scams [cartoon] There are so many scams – how do I spot one?

Add to Reading List

Source URL: privacy.org.nz

Language: English - Date: 2014-09-24 22:14:50
982Electronic engineering / Wireless LAN / Wired Equivalent Privacy / Service set / Wireless access point / Wireless security / Wireless networking / Technology / Telecommunications engineering

CYBERSCIENCE L ABOR ATORY CSL DESKTOP REFERENCE CARD Wireless Networking Security Tips • Set up access points (APs) in the center of the building if possible, or use a directional antenna to direct the RF signals into

Add to Reading List

Source URL: www.forwardedge2.com

Language: English - Date: 2012-05-15 23:26:04
983Computer crimes / Spyware / Computer network security / Social engineering / Malware / Identity theft / Keystroke logging / Internet privacy / Computer security / Espionage / Cybercrime / Security

DOC Document

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:18:56
984Wireless networking / Electronic engineering / Cryptographic protocols / Wi-Fi / Internet privacy / Wireless LAN / Wireless access point / Wireless security / Router / Computing / Technology / Computer network security

Work From Home Securely Brochure - 3 pannel.pub

Add to Reading List

Source URL: csn.nebraska.edu

Language: English - Date: 2008-11-07 09:33:40
985Radio-frequency identification / Ubiquitous computing / Wireless / Computer & Communication Industry Association / Community-led total sanitation / Beef / AT&T / Telecommunications engineering / Human–computer interaction / Technology / Automatic identification and data capture / Privacy

LIVESTOCK TRACEABILITY AGENCY ANNOUNCES COMMUNICATIONS REFRESH

Add to Reading List

Source URL: www.canadaid.ca

Language: English - Date: 2014-07-30 23:40:00
986Electronic engineering / Technology / Network security / Hotspot / Virtual private network / Password / Router / Wireless security / Wi-Fi Protected Access / Computer network security / Computing / Wi-Fi

FCC Consumer Tip Sheet Wi-Fi Networks and Consumer Privacy Background Wi-Fi networks are powerful, valuable tools in our modern communications and information society, enabling users to connect wirelessly to the Internet

Add to Reading List

Source URL: www.its.ms.gov

Language: English - Date: 2014-09-19 10:01:22
987Industrial hygiene / Safety engineering / Ethics / Medical record / Occupational safety and health / Internet privacy / Health informatics / Confidentiality / Occupational health psychology / Medical informatics / Medicine / Health

Notice of Privacy Practices The University of Texas HealthPoint Occupational Health Program (OHP) respects your right to privacy. OHP has a professional responsibility to safeguard medical confidentiality; therefore, you

Add to Reading List

Source URL: www.utexas.edu

Language: English - Date: 2009-10-12 16:46:24
988Risk management / Safety engineering / Customer service / Management / Business / Environmental social science / Industrial hygiene / Occupational safety and health

Customer Service Behavior Expectations Customer Awareness Confidentiality and Privacy -Maintain a secure and trusting environment.  Ensure that personal information is kept confidential.  Never discuss customers an

Add to Reading List

Source URL: www.randolphhospital.org

Language: English - Date: 2014-01-03 11:29:42
989Electronic engineering / Computing / Technology / Computer network / Telecommunications engineering / Internet privacy

Onslow County Schools District Issued Device or Personally Owned Device Responsible Use Guidelines Purpose The purpose of this guideline is to define standards, procedures, and restrictions for students who are connectin

Add to Reading List

Source URL: images.pcmac.org

Language: English - Date: 2014-07-18 12:10:35
990Software engineering / Lattice theory / Data mining / Formal concept analysis / Machine learning / Ontology / Attribute grammar / Graph / EXPRESS / Data modeling / Mathematics / Data management

Bootstrapping Privacy Compliance in Big Data Systems Shayak Sen∗ , Saikat Guha† , Anupam Datta∗ , Sriram K. Rajamani† , Janice Tsai‡ and Jeannette M. Wing‡ ∗ Carnegie Mellon University, Pittsburgh, USA

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2014-05-01 09:38:10
UPDATE