Privacy law

Results: 41875



#Item
521Internet privacy / Computing / Law / Privacy / Computer security / Identity management / Medical privacy / Personally identifiable information / HTTP cookie / Privacy concerns with social networking services / P3P

  DEXTERITY VENTURES PRIVACY POLICY Dexterity Ventures Inc. (“​ Dexterity​ ”/“​

Add to Reading List

Source URL: dexterityventures.com

Language: English - Date: 2016-03-24 13:33:27
522Economy / Business / Payment systems / E-commerce / Information privacy / Payment cards / Computer law / Payment Card Industry Data Security Standard / PA-DSS / Payment card industry / Credit card / Acquiring bank

Payment Card Industry Data Security Standard Self-Assessment Questionnaire C Guide PCI DSS Version: V3.1, Rev 1.1

Add to Reading List

Source URL: 3fup3p2pb35f2iroyz2x2mre.wpengine.netdna-cdn.com

Language: English - Date: 2016-08-01 11:54:56
523Security / Prevention / National security / Mass surveillance / Crime prevention / Law enforcement / Surveillance / National Security Agency / Internet privacy / Cloud computing / Internet / Edward Snowden

On the Feasibility of a Technological Response to the Surveillance Morass Joan Feigenbaum and J´er´emie Koenig Yale University, New Haven CT, USA E-mail: {joan.feigenbaum, jeremie.koenig}@yale.edu

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-05-31 10:55:23
524Judicial branch of the United States government / Online law databases / Congressional Research Service / Carl Malamud / Government / PACER / Public.Resource.Org / Joe Lieberman / Privacy / Politics / Law / Aaron Swartz

PUBLIC.RESOURCE.ORG ~ A Nonprofit Corporation Open Source America’s Operating System “It’s Not Just A Good Idea—It’s The Law!” May 21, 2009

Add to Reading List

Source URL: public.resource.org

Language: English - Date: 2009-05-22 10:58:58
525Harvard University / Internet activism / Information society / Berkman Klein Center for Internet & Society / Harvard Law School / Bruce Schneier / Fletcher School of Law and Diplomacy / Technology / Legal aspects of computing / Privacy / Internet privacy

MIRANDA BOGEN • • @mbogen 1200 18th St., NW Suite 808, Washington DCPROFESSIONAL

Add to Reading List

Source URL: www.teamupturn.com

Language: English - Date: 2016-07-06 10:37:50
526Identity management / Law / Privacy / Academic freedom / Nipissing University / Education

Reclaiming the University FASBU Collective Bargaining Proposals for Reclaiming the University • Teaching and Scholarship - Core of the University

Add to Reading List

Source URL: nufa.ca

Language: English - Date: 2011-11-21 15:12:53
527Intellectual property law / Law / Monopoly / Information / Computing / Copyright infringement / File sharing / Organized crime / Tort law / Privacy / Internet privacy / Intellectual property

GETOCT-TERMS OF USE THIS AGREEMENT GOVERNS YOUR USE OF THE GETOCT WEBSITE. This Web site is owned and operated by GETOCT (“ GETOCT”). Access and use of this Web site is provided by GETOCT to you on condition that you

Add to Reading List

Source URL: www.getoct.ch

Language: English - Date: 2011-07-01 16:25:14
528Cryptography / E-commerce / Business / Information privacy / Payment cards / Economy / Computer law / Payment Card Industry Data Security Standard / JCB Co. /  Ltd. / Conventional PCI / Public key certificate

CERTIFICATE OF COMPLIANCE Awarded to: SF Software Ltd t/a Pebble PCI v3.0 – SAQ A-EP Level 3 Merchant (MID)

Add to Reading List

Source URL: www.mypebble.co.uk

Language: English - Date: 2016-08-19 05:55:42
529Identity management / Law / Privacy / Internet privacy / Medical privacy / Government / Politics / Computing / Do Not Track legislation / P3P

Pet Poison Helpline Privacy Policy We are committed to keeping all personal and medical information we have about consumers confidential and secure. This policy describes how we protect this privacy.

Add to Reading List

Source URL: 48qbc13dv397vzass1iql2a1.wpengine.netdna-cdn.com

Language: English - Date: 2016-02-16 15:33:15
530Computing / Law / Privacy / Copyright law / Data security / Cryptography / Computer security / Identity management / P3P / Digital rights management / Internet privacy / Digital Millennium Copyright Act

Towards Realistic Assumptions, Models, and Goals for Security Research

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-05-22 10:45:07
UPDATE