Protected computer

Results: 695



#Item
361Identifiers / Markup languages / Technical communication / Computer file formats / XML / Universally unique identifier / Globally unique identifier / HTML element / Windows Media Center / Computing / Universal identifiers / Web standards

Implementing the SourceType XML Element in PBDA Devices Guidelines for Independent Hardware Vendors July 9, 2009  Abstract This white paper provides information about the SourceType XML element of the Protected Broadc

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2009-07-13 18:25:54
362Computer network security / Secure communication / Computer security / Privacy law / Data privacy / Health Insurance Portability and Accountability Act / Data breach / Practice management software / Protected health information / Security / Health / Health informatics

31 Managing Your Practice Could Your Practice Pass a HIPAA Audit? How to avoid common data breaches

Add to Reading List

Source URL: www.aaos.org

Language: English - Date: 2014-09-10 12:48:19
363Privacy law / Government / Law / Computer security / Data security / Security / Medicare / Health insurance / Protected health information / Health / Data privacy / Health Insurance Portability and Accountability Act

Guide to the HIPAA Privacy Rule

Add to Reading List

Source URL: privacy.ohio.gov

Language: English - Date: 2012-06-06 12:11:43
364System software / Access token / Computer security / Windows Vista / Thread / Process / Kernel / Concurrency control / Mandatory Integrity Control / Microsoft Windows / Computing / Concurrent computing

Protected Processes - 5 Protected Processes November 27, 2006

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-11-30 16:47:48
365Electronics / Roku / Audio codecs / Computer file formats / Internet radio device / Windows Media Audio / Windows Media Player / Microsoft PlaysForSure / Digital rights management / Digital audio / Software / SoundBridge

“With the increasing popularity of online music and video services, Windows Media Connect overcomes a key hurdle for consumers by making protected content that is purchased or rented via a subscription service availabl

Add to Reading List

Source URL: soundbridge.roku.com

Language: English - Date: 2010-07-13 05:23:40
366Law / Computer law / Cybercrime / Financial regulation / Money laundering / Tax evasion / Racketeer Influenced and Corrupt Organizations Act / Protected computer / Conspiracy / Crime / Criminal law / Inchoate offenses

MEMORANDUM June 23, 2014 To:

Add to Reading List

Source URL: freebeacon.com

Language: English - Date: 2014-08-05 16:13:14
367Electronics / Wireless security / Password / Network security / Wi-Fi / Home network / Two-factor authentication / Internet privacy / Email / Computing / Computer network security / Internet

As a user with access to sensitive corporate or government information at work , you are at risk at home. In order to gain access to information typically housed on protected work networks, cyber adversaries may target y

Add to Reading List

Source URL: dodcio.defense.gov

Language: English - Date: 2014-07-25 15:12:01
368Law / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / International standards / Computer security / Protected health information / Information privacy / Medical record / Health / Medical informatics / Medicine

Salt Lake County HIPAA-HITECH Risk Assessment

Add to Reading List

Source URL: admin.slco.org

Language: English - Date: 2012-10-12 14:10:33
369DC Comics / Data security / Data privacy / Personal Data Privacy and Security Act / Security / Computer security / Internet privacy / Breach

[removed][removed]Agency Logo Outline for County Agencies to complete prior to submitting the request to HHS.gov Notice to the Secretary of HHS of Breach of Unsecured Protected Health Informa

Add to Reading List

Source URL: admin.slco.org

Language: English - Date: 2012-10-12 14:10:33
370Crime / Information technology audit / Computer crimes / Computer Fraud and Abuse Act / Hacking / Protected computer / United States v. Lori Drew / Computer fraud / Computer Crime and Intellectual Property Section / Cybercrime / Computer law / Law

Prosecuting Computer Crimes H. Marshall Jarrett Director, EOUSA

Add to Reading List

Source URL: itsecurity.cuyahogacounty.us

Language: English - Date: 2014-08-07 10:48:19
UPDATE