Protected computer

Results: 695



#Item
331Cybercrime / Law / Title 18 of the United States Code / Spam / Protected computer / Making false statements / CAN-SPAM Act / Email / National Information Infrastructure Protection Act / Internet / Computing / Computer law

18 USC 1037 NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html). TITLE 18 - CRIMES AND CRIMINAL PROCEDURE PART I - CRIMES CHAPTER 47 - FRAU

Add to Reading List

Source URL: www.law.cornell.edu

Language: English - Date: 2013-07-17 17:57:16
332Data security / Privacy law / Privacy / National security / Health Insurance Portability and Accountability Act / Information security / Information privacy / Chief privacy officer / Internet privacy / Ethics / Security / Computer security

POLICY NUMBER[removed]July 8, 2014 POLICY: BREACHES OF PRIVACY & SECURITY OF PROTECTED HEALTH

Add to Reading List

Source URL: www.policies.uchc.edu

Language: English - Date: 2014-08-15 13:13:38
333Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Computer security / Data security / Privacy / Confidentiality / Electronic medical record / Protected health information / Ethics / Health / Security

New Omnibus HIPAA Rule Requires Close Chiropractic Scrutiny and Full Compliance By Stuart E. Hoffman, DC, FICA ChiroSecure President

Add to Reading List

Source URL: ica.membershipsoftware.org

Language: English - Date: 2014-01-22 11:02:49
334Privacy / Data privacy / Health Insurance Portability and Accountability Act / Computer security / Data security / Medical privacy / Information security / Protected health information / Confidentiality / Ethics / Security / Health

Information Technology Services Information Security Procedure Effective Date: February 2007 Reviewed Dates: [removed], [removed]; [removed]Audit of Electronic Protected Health Information (ePHI) in Information Systems

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-01-17 10:51:10
335Cyberwarfare / Wireless security / Wi-Fi Protected Access / Passphrase / Computer security / Computing / Service set / Computer network security / Cryptographic protocols / Wireless networking

Step by Step Instructions for Using the MED-Duluth Conference Center Wireless Network

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2010-10-14 15:09:07
336Data security / Personal life / Computer security / Data privacy / Privacy law / Personally identifiable information / Protected health information / Health Insurance Portability and Accountability Act / Internet privacy / Security / Ethics / Government

Columbia University IRB Policy Data Security Plans Involving the Storage of Electronic Research Data Constituting Protected Health Information or Personally Identifiable Information I. Background Pursuant to regulations

Add to Reading List

Source URL: cumc.columbia.edu

Language: English - Date: 2013-01-08 12:20:36
337Protected health information / Crime / Science / Government / Human–computer interaction / Notification system / Identity theft

System.Windows.Documents.FixedDocumentSequence

Add to Reading List

Source URL: www.olhsa.org

Language: English - Date: 2014-07-21 16:01:19
338Data security / Data privacy / Privacy law / Law / Health Insurance Portability and Accountability Act / Protected health information / Information security / Privacy / Database security / Ethics / Security / Computer security

Information Technology Services Information Security Procedure Effective Date: September 29, 2003 Reviewed Dates: [removed], [removed], [removed]Database Security

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-01-17 13:53:40
339Civil law / 105th United States Congress / Computer law / United States / Copyright law of the United States / Copyright / Digital Millennium Copyright Act / United States Copyright Office / Fair use / Law / United States copyright law / Copyright law

US Copyright Law and Central Michigan University PolicyIndividuals who infringe copyright-protected materials on Central Michi

Add to Reading List

Source URL: www.laspositascollege.edu

Language: English - Date: 2007-09-17 19:30:59
340System software / ESET / Computer virus / Internet security / Rogue security software / Web threat / Panda Pro / Antivirus software / Malware / Software

SPRING 2013 Why last year’s security strategy can’t protect you from today’s threats If you deployed your security solution even just last year, you may not be protected from some of today’s most common malware

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2013-07-09 15:51:54
UPDATE