Protected computer

Results: 695



#Item
301Privacy law / Data remanence / Protected health information / Law / Computer security / Health / Data security / Data privacy / Health Insurance Portability and Accountability Act

STATE OF ALASKA DEPARTMENT OF HEALTH & SOCIAL SERVICES SECTION: HIPAA Number: HIPAA Security 5 Page:

Add to Reading List

Source URL: dhss.alaska.gov

Language: English - Date: 2013-07-17 16:46:57
302Protected computer / Law / Computer law / Computer network security / Cybercrime

2010 Federal Sentencing Guidelines Manual - Appendix A - Amendments to the Guidelines Manual

Add to Reading List

Source URL: www.ussc.gov.

Language: English - Date: 2014-01-08 18:23:06
303Containers / Door / Safe / Burglary / Access control / Aviva Canada / Security / Crime / Computer security

Your guide to... Protection from burglary You work hard to build and maintain your business. That’s why it’s important to ensure you’re protected from all potential losses – including burglary. There are many opt

Add to Reading List

Source URL: www.avivacanada.com

Language: English - Date: 2014-04-30 11:40:42
304Protected mode / Memory management unit / Interrupt / MIL-STD-1553 / Booting / Spaceflight / Computer architecture / Cassini–Huygens

DOC Document

Add to Reading List

Source URL: caps.space.swri.edu

Language: English - Date: 2006-09-12 13:02:02
305Privacy law / Security / Computer security / Data security / Protected health information / Privacy / Internet privacy / Data breach / Information security / Ethics / Data privacy / Health Insurance Portability and Accountability Act

ADAMH BOARD OF FRANKLIN COUNTY HIPAA Policy H[removed] – Privacy BREACH OF PROTECTED HEALTH INFORMATION A.

Add to Reading List

Source URL: adamhfranklin.org

Language: English - Date: 2014-04-29 16:55:40
306Law / Authorization / Computer security / Privacy / Privacy law / Data privacy / Health Insurance Portability and Accountability Act

ADAMH BOARD OF FRANKLIN COUNTY HIPAA Policy H[removed] – Privacy AUTHORIZATION FOR USE OR DISCLOSURE OF PROTECTED HEALTH INFORMATION FOR PURPOSES OUTSIDE THOSE PERMITTED FOR TREATMENT, PAYMENT, OR HEALTH PLAN OPERATIONS

Add to Reading List

Source URL: adamhfranklin.org

Language: English - Date: 2014-04-29 16:55:30
307Data security / Public safety / National security / Information security / Health Insurance Portability and Accountability Act / Payment Card Industry Data Security Standard / Internet privacy / IT risk / FTC Fair Information Practice / Security / Data privacy / Computer security

APPENDIX – DATA SECURITY AND PRIVACY ARTICLE 1 – PURPOSE AND SCOPE OF APPLICATION A. This Data Security and Privacy Appendix is designed to protect the University of California’s (UC) Protected Information and UC n

Add to Reading List

Source URL: www.ucop.edu

Language: English - Date: 2014-11-06 19:41:39
308Public safety / Cyberwarfare / Infrastructure / National Cyber Security Division / Computer security / Critical infrastructure / DHS Directorate for Science and Technology / Critical infrastructure protection / United States Department of Homeland Security / National security / Security

Protected Critical Infrastructure Information Program Office of Infrastructure Protection  Infrastructure Information Collection Division Overview Information shared with the Federal Government typically becomes a pub

Add to Reading List

Source URL: www.ak-prepared.com

Language: English - Date: 2012-05-02 15:33:16
309Data security / Privacy law / Data privacy / Health Insurance Portability and Accountability Act / Data breach / Identity theft / Privacy / Internet privacy / Personally identifiable information / Security / Ethics / Computer security

Tompkins County Compliance Program Fact Sheet Series—Issue No. 4, August 2014 Think Compliance First! Safeguarding Protected Information

Add to Reading List

Source URL: tompkinscountyny.gov

Language: English - Date: 2014-09-08 13:06:46
310Western United States / Protected areas of the United States / Sierra Nevada / Geography of California / Yosemite National Park

Overnight Visitor Use and Computer Simulation Modeling of the Yosemite Wilderness Mark Douglas, Research Assistant, Natural Resources, Humboldt State University, 1 Harpst Street, Arcata, CA 95521; marklanedouglas@gmail.c

Add to Reading List

Source URL: www.georgewright.org

Language: English - Date: 2012-03-01 11:50:58
UPDATE