Protected computer

Results: 695



#Item
291Computer law / Privacy / Internet privacy / Information privacy law / Information privacy / Ethics / Privacy law / Data privacy

Authorization to Release Information Use this form when you want Blue Cross Blue Shield of Arizona to release your Protected Health Information to a person or organization on your behalf, such as a family member, friend

Add to Reading List

Source URL: www.yourazmedicaresolutions.com

Language: English - Date: 2014-10-01 01:42:15
292Computer network security / Data security / Software testing / Vulnerability / Information security / Database security / Security testing / Security risk / Security controls / Computer security / Security / Cyberwarfare

Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY

Add to Reading List

Source URL: oig.hhs.gov

Language: English - Date: 2014-09-19 13:06:15
293Computer security / Privacy law / Data security / Data privacy / Health Insurance Portability and Accountability Act / Protected health information / Information security / Government procurement in the United States / Electronic health record / Ethics / Security / Health

Microsoft Word - DUA Version 7.4 April 23, 2014.docx

Add to Reading List

Source URL: www.hhsc.state.tx.us

Language: English - Date: 2014-10-23 14:19:51
294Privacy law / Health Insurance Portability and Accountability Act / Law / Computer security / Privacy / Information privacy / Personally identifiable information / Protected health information / Chief privacy officer / Ethics / Security / Data privacy

[removed]HIPAA Breach Notification Policy

Add to Reading List

Source URL: www.howard.edu

Language: English - Date: 2014-09-17 12:59:26
295IEEE 802.11 / Computing / Technology / Wireless / Wi-Fi Protected Access / IEEE 802.11i-2004 / Wired Equivalent Privacy / Wi-Fi / Wireless LAN / Wireless networking / Computer network security / Cryptographic protocols

[removed]Wireless LAN Vulnerability Assessment (ITSPSR-21A)

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2014-12-10 04:10:52
296Cyberwarfare / FIPS 140-2 / Cryptographic Module Validation Program / Communications security / Computer security / Classified information / FIPS 140-3 / Cryptography standards / Cryptography / Security

Security Considerations for the Use of Removable Media Devices for Protected C and Classified Information

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2014-12-09 21:29:08
297Ethics / Privacy law / Health Insurance Portability and Accountability Act / Health informatics / Computer security / Data security / Data breach / Electronic health record / Protected health information / Health / Medicine / Data privacy

Business Associate Compliance With HIPAA: Findings From a Survey of Covered Entities and Business Associates Deven McGraw, Partner, Healthcare Industry, Manatt, Phelps & Phillips, LLP Susan Ingargiola, Director, Manatt H

Add to Reading List

Source URL: www.manatt.com

Language: English - Date: 2014-10-20 17:47:13
298Electronics / Intel / Computing / Numbers / Protected mode / Central processing unit / Instruction set / Computer

TD OPERATING SYSTEM ADDENDUM FOR CR510, CR10X, AND CR23X MANUALS REVISION: 1/03 COPYRIGHT  [removed]CAMPBELL SCIENTIFIC, INC.

Add to Reading List

Source URL: s.campbellsci.com

Language: English - Date: 2012-01-23 18:22:37
299Eduroam / Protected Extensible Authentication Protocol / Wireless networking / Wi-Fi / Computer network security / Computing / IEEE 802.1X

Microsoft Word - Windows 7 - eduroam configuration

Add to Reading List

Source URL: www.ku.ac.ke

Language: English - Date: 2014-06-19 09:25:21
300System software / ESET / Computer virus / Internet security / Rogue security software / Web threat / Panda Pro / Antivirus software / Malware / Software

SPRING 2013 Why last year’s security strategy can’t protect you from today’s threats If you deployed your security solution even just last year, you may not be protected from some of today’s most common malware

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2014-02-25 10:50:30
UPDATE