Protected computer

Results: 695



#Item
281Data security / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Protected health information / Data breach / Information security / URAC / Security / Computer security / Health

Experience the Eide Bailly Difference Are you effectively protecting your patient information? California State Rural Health Association

Add to Reading List

Source URL: www.csrha.org

Language: English - Date: 2014-12-10 13:13:29
282Computer network security / Data security / Software testing / Vulnerability / Information security / Database security / Security testing / Security risk / Security controls / Computer security / Security / Cyberwarfare

Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY

Add to Reading List

Source URL: www.healthreformgps.org

Language: English - Date: 2014-09-24 14:02:12
283Cryptographic protocols / Security / Computer network security / Secure communication / Cryptographic software / Opportunistic encryption / Tcpcrypt / HTTP Secure / Linked data / Computing / Internet privacy / Internet

Taken from: https://strint.pads.ccc.de/1 (backup at http://kuix.de:9321/p/strint-abstracts ) (updated Feb 27, 16:50 GMT) ============================== 1: Privacy Protected Email Phillip Hallam-Baker https://www.w3.org/2

Add to Reading List

Source URL: kuix.de

Language: English - Date: 2014-02-27 11:57:47
284Cyberwarfare / Crime prevention / National security / Cryptography / Network security / Surveillance / Computer security / Malware / Backdoor / Security / Espionage / Computer network security

Abstract— The material released by Edward Snowden has raised serious concerns about pervasive surveillance. People worry that their privacy is not properly protected when they are using the Internet. Network product ve

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
285Classical cipher / Tanzanian conservation organisations / Computer programming / Computing / Software engineering

Share the Shore! http://www.nwr.noaa.gov/protected_species/marine_mammals/ stranding_network_information/stranding_network_information.html Seal word search! H

Add to Reading List

Source URL: www.westcoast.fisheries.noaa.gov

Language: English - Date: 2014-12-16 23:46:44
286Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Law / Computer network security / Security controls / Protected health information / Computer security / Data security / Security

RETIRED--FOR HISTORICAL PURPOSES ONLY Health and Human Services Agency California Office of HIPAA Implementation POLICY MEMORANDUM TO:

Add to Reading List

Source URL: www.ohii.ca.gov

Language: English
287Computer law / United States Federal Sentencing Guidelines / United States federal law / Attempt / Financial crimes / Protected computer / National Information Infrastructure Protection Act / United States federal probation and supervised release / Criminal law / Law / Crime

Proposed Guideline Amendments for Public Comment

Add to Reading List

Source URL: www.ussc.gov.

Language: English - Date: 2014-01-08 18:20:34
288CE mark / Computer programming / Computing / Communication design / Logos / Software engineering

USE OF NAME & LOGO REQUEST FORM I. Use of Logo The IFCR name and logo are legally protected service marks owned by the

Add to Reading List

Source URL: www.cdkl5.com

Language: English - Date: 2010-07-06 09:22:49
289Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Citrix Systems / Password / Cloud computing / Law / Computer security / Cloud computing security / Centralized computing / Computing / Remote desktop

What is the Citrix ShareFile Cloud for Healthcare? Safeguarding protected health information in the cloud. Manny Landron Cameron Jahn Citrix ShareFile

Add to Reading List

Source URL: www.sharefile.com

Language: English - Date: 2014-05-05 11:10:15
290CE mark / Computer programming / Computing / Communication design / Logos / Software engineering

USE OF NAME & LOGO REQUEST FORM I. Use of Logo The IFCR name and logo are legally protected service marks owned by the

Add to Reading List

Source URL: cdkl5.com

Language: English - Date: 2010-07-06 09:22:49
UPDATE