Protected computer

Results: 695



#Item
481Health Insurance Portability and Accountability Act / Privacy law / Law / Computer security / Medical record / Protected health information / Internet privacy / Information technology controls / Privacy / Ethics / Health / Data privacy

Assessment Guide for Applications with PHI ______________________________________________________________________________ Assessment Guide for Applications with PHI Assessment Guide for Applications with PHI

Add to Reading List

Source URL: hipaa.dhhs.state.nc.us

Language: English - Date: 2002-09-12 01:00:00
482Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Computer security / Data security / Privacy / Privacy Office of the U.S. Department of Homeland Security / Protected health information / Privacy policy / Ethics / Government / Security

TITLE: SANCTIONS FOR UNAUTHORIZED ACCESS, USE OR DISCLOSURE OF PROTECTED HEALTH INFORMATION POLICY:

Add to Reading List

Source URL: cumc.columbia.edu

Language: English - Date: 2014-04-04 12:04:54
483Crimes / Information technology audit / Cybercrime / United States Federal Sentencing Guidelines / United States federal law / Computer Fraud and Abuse Act / Fraud / Protected computer / Computer crime / Law / Computer law / Criminal law

Computer Fraud Working Group Report

Add to Reading List

Source URL: www.ussc.gov.

Language: English - Date: 2014-01-08 18:20:32
484Law / Data privacy / Health Insurance Portability and Accountability Act / Computer security / Data security / Privacy / Information security / Protected health information / Internet privacy / Ethics / Privacy law / Security

TITLE: MITIGATING EFFECTS OF LOSS OR UNAUTHORIZED RELEASE OF PROTECTED HEALTH INFORMATION POLICY:

Add to Reading List

Source URL: cumc.columbia.edu

Language: English - Date: 2014-06-19 12:41:58
485Law / Cybercrime / Computer network security / Protected computer / Mail and wire fraud / Racket / Bank fraud / United States Code / National Information Infrastructure Protection Act / Crime / Computer law / Criminal law

Cybercrime: A Sketch of 18 U.S.C[removed]and Related Federal Criminal Laws

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2004-01-28 14:38:44
486Privacy law / Data security / Data privacy / Health Insurance Portability and Accountability Act / Vulnerability / Audit / Protected health information / Data breach / Regulatory compliance / Computer security / Cyberwarfare / Security

Nine Network Considerations in the New HIPAA Landscape

Add to Reading List

Source URL: www.cisco.com

Language: English
487Nursing research / Research / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Institutional Animal Care and Use Committee / United States Office of Research Integrity / Grant / National Institutes of Health / Medicine / Health

A Review: Registration of Research Databases and Computer Applications Involving Human Subjects Investigators may establish research databases involving protected health information (PHI) to be used in the conduct of a s

Add to Reading List

Source URL: www.southalabama.edu

Language: English - Date: 2011-06-16 12:17:11
488Cybercrime / Crimes / Information technology audit / Computer network security / Protected computer / Computer Fraud and Abuse Act / Mail and wire fraud / Racket / United States Code / Computer law / Criminal law / Law

. Cybercrime: A Sketch of 18 U.S.C[removed]and Related Federal Criminal Laws Charles Doyle Senior Specialist in American Public Law

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2012-07-31 18:25:02
489Law / Computer network security / Information technology audit / Cybercrime / Computer Fraud and Abuse Act / Hacking / United States v. Lori Drew / Protected computer / Mandatory sentencing / Crime / Computer law / Criminal law

. Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis Charles Doyle Senior Specialist in American Public Law

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2012-07-31 18:22:59
490Microsoft Windows / Computing / Cryptographic software / Encryption / Wireless security / Data security / Wi-Fi Protected Access / USB flash drive / Wi-Fi / Computer network security / Disk encryption / Cryptography

Multi-State Information Sharing and Analysis Center Monthly Security Tips NEWSLETTER   September 2012  

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2012-09-25 11:08:12
UPDATE