Protected computer

Results: 695



#Item
321Health / Online chat / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Health informatics / Protected health information / Electronic health record / Information security / Computer-mediated communication / Computing / Email

Information Technology Services Effective Date: [removed]Reviewed Dates: [removed]; [removed]; [removed]; [removed]; [removed]; [removed]; [removed]Electronic Communication of Protected Health Information (PHI)

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-09-24 17:09:12
322Computing / Software engineering / Classical cipher / Tanzanian conservation organisations / Fauna of Ireland / Harbor seal / Computer programming

Share the Shore! www.westcoast.fisheries.noaa.gov/protected_species/marine_ mammals/stranding_network.html Seal word search! H

Add to Reading List

Source URL: www.westcoast.fisheries.noaa.gov

Language: English - Date: 2014-11-18 23:47:14
323Americans with Disabilities Act / Computer programming / Disability / Ada / Section 508 Amendment to the Rehabilitation Act / Computing / Reasonable accommodation / Software engineering

ARLINGTON COUNTY GOVERNMENT VOLUNTARY REQUEST FOR REASONABLE ACCOMMODATION FORM If you have a disability that is covered (protected) under the Americans with Disabilities Act (ADA) and you are a qualified individual, you

Add to Reading List

Source URL: arlingtonva.s3.amazonaws.com

Language: English - Date: 2014-01-09 12:46:15
324Protected health information / Application software / Law / Computer security / Health / Privacy / Computer network security / Data privacy / Health Insurance Portability and Accountability Act / Privacy law

Security Review Checklist Project Name Technical Contact

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-06-18 09:44:50
325Computing / Computer network security / Wireless / IEEE 802.11 / Wireless security / Wireless access point / Wireless LAN / Lantronix / Wi-Fi Protected Access / Wireless networking / Technology / Cryptographic protocols

The Ultimate in Flexibility, Security, Performance and Affordability in Embedded Wireless Networking MatchPort™ b/g enables you to build wireless networking into virtually any electronic device with a serial interface.

Add to Reading List

Source URL: www.lantronix.com

Language: English - Date: 2013-06-04 18:06:59
326Information technology management / System software / Networking hardware / COM port redirector / Unix / Wireless security / Lantronix / Null modem / Wi-Fi Protected Access / Out-of-band management / Computing / Computer network security

Wirelessly Connect, Monitor, Manage and Control Devices Over a Network or the Internet WiBox® dual-port device servers enable you to connect equipment to 802.11b/g wireless networks via serial or Ethernet, quickly and e

Add to Reading List

Source URL: www.lantronix.com

Language: English - Date: 2014-03-07 17:49:20
327Windows XP / Wireless networking / Computer network security / Protected Extensible Authentication Protocol / Wi-Fi / Windows Me / Service pack / Features new to Windows XP / Security and safety features new to Windows Vista / System software / Microsoft Windows / Computing

Windows XP-Windows Wi-Fi manager Wireless Instructions For Windows XP users, please make sure you have XP Service Pack 3 and/or the WPA2 hotfix installed. This hotfix is included in SP3 and is needed to recognize the WPA

Add to Reading List

Source URL: www.law.sc.edu

Language: English - Date: 2011-08-18 10:31:50
328Law / Privacy / Protected health information / Computer security / Data security / Data privacy / Privacy law / Health Insurance Portability and Accountability Act

HIPAA COMPLIANCE QUESTIONNAIRE As a covered entity, it is the responsibility of the State Health Plan (Plan) to ensure its members’ health information is protected from use and disclosures not allowed under the Health

Add to Reading List

Source URL: www.statehealthplan.state.nc.us

Language: English - Date: 2012-06-26 11:35:42
329Data privacy / Security / Government / Health Insurance Portability and Accountability Act / Computer security / Data security / Chief privacy officer / Protected health information / Privacy policy / Privacy law / Law / Privacy

[The District is a Hybrid Covered Entity and complies with the Health Insurance Portability and Accountability Act of[removed]HIPAA). Generally, HIPAA applies to health plans, providers, and third party intermediaries. The

Add to Reading List

Source URL: ocp.dc.gov

Language: English - Date: 2014-08-21 08:27:56
330Data security / Email / Internet privacy / Health Insurance Portability and Accountability Act / Privacy law / Data breach / Information security / Privacy / Protected health information / Security / Computer security / Computing

Email Encryption The Case for Email Encryption Improve Compliance and Protect PHI on the Move Healthcare organizations face an ongoing compliance burden involving

Add to Reading List

Source URL: www.zixcorp.com

Language: English
UPDATE