Protected computer

Results: 695



#Item
461Data security / Security / Law / Health / Health Insurance Portability and Accountability Act / Patient Safety and Quality Improvement Act / Protected health information / Privacy law / Computer security

45 CFR[removed]Privacy Rule) Requirements Research Authorizations for Use or Disclosure of Protected Health Information Definitions: Protected Health Information (PHI) means individually identifiable health information

Add to Reading List

Source URL: www.dshs.wa.gov

Language: English - Date: 2012-12-17 18:08:48
462Privacy law / Health / Health Insurance Portability and Accountability Act / Computer security / Data security / Privacy / Internet privacy / Protected health information / Information security / Ethics / Security / Data privacy

Role_Based_Access_Updated_February_2012

Add to Reading List

Source URL: www.tricare.mil

Language: English - Date: 2012-12-05 09:50:38
463Computer network security / Cryptographic protocols / Electronic engineering / IEEE 802.11 / Wi-Fi / Wireless security / Wi-Fi Protected Access / IPad / Wireless access point / Computing / Technology / Wireless networking

WP_iPad-in-Enterprise_110920.indd

Add to Reading List

Source URL: www.arubanetworks.com

Language: English - Date: 2011-10-03 15:32:03
464Computing / GUI widget / Wi-Fi / Technology / Telecommunications engineering / Comparison of wireless LAN clients / Wireless security / Computer network security / Wireless networking / Protected Extensible Authentication Protocol

Instructions to Connect to Wireless network SecureHastings

Add to Reading List

Source URL: www.uchastings.edu

Language: English - Date: 2014-07-31 04:16:04
465Long-distance trails in the United States / Great Smoky Mountains / Trans Canada Trail / Appalachian Trail / Trail / Geography of the United States / Protected areas of the United States / United States

March 2013 Issue: Spring towards connection[removed]Explore the Trail from your computer Letter from the President

Add to Reading List

Source URL: tctrail.ca

Language: English - Date: 2013-03-12 13:39:54
466Information technology audit / Cybercrime / Crimes / Computer network security / Protected computer / Computer Fraud and Abuse Act / Racket / Legal aspects of computing / Computer crime / Computer law / Law / Criminal law

Order Code[removed]Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2008-04-21 18:07:40
467Privacy law / Data security / Law / Data privacy / Health Insurance Portability and Accountability Act / Information security / Protected health information / Privacy / Personal Data Privacy and Security Act / Computer security / Security / Ethics

COMPLIANCE policies AUDITS TRENDS

Add to Reading List

Source URL: cumc.columbia.edu

Language: English - Date: 2013-06-25 14:04:18
468Authorization / Law / Computer security / Privacy / Privacy law / Data privacy / Health Insurance Portability and Accountability Act

CHAPTER 8 AUTHORIZATION FOR USE AND DISCLOSURE OF PROTECTED HEALTH INFORMATION I. GENERAL RULE

Add to Reading List

Source URL: www.mass.gov

Language: English - Date: 2013-08-30 22:54:41
469Law / Cybercrime / Computer network security / Protected computer / Mail and wire fraud / Bank fraud / Racket / United States Code / National Information Infrastructure Protection Act / Crime / Computer law / Criminal law

Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C[removed]and Related Federal Criminal Laws Charles Doyle

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2008-06-04 20:45:20
470Health Insurance Portability and Accountability Act / Law / Cyberwarfare / Government procurement in the United States / Threat / Protected health information / Privacy law / Computer security / Data privacy

F[removed]) Page 2 DEPARTMENT OF HEALTH SERVICES STATE OF WISCONSIN

Add to Reading List

Source URL: www.dhs.wisconsin.gov

Language: English - Date: 2014-01-03 15:06:18
UPDATE