Protected computer

Results: 695



#Item
521Data security / Privacy / Data privacy / Health Insurance Portability and Accountability Act / Internet privacy / Data breach / Information security / Protected health information / Medical privacy / Ethics / Security / Computer security

Page | 1 PRIVACY INCIDENT REPORT (PIR) The information reported in this form will be strictly confidential. The information reported in this form will be used to review your determination of whether a breach has occurre

Add to Reading List

Source URL: www.dhcs.ca.gov

Language: English - Date: 2014-08-14 17:31:16
522Microsoft Windows / Computing / Cryptographic software / Encryption / Wireless security / Data security / Wi-Fi Protected Access / USB flash drive / Wi-Fi / Computer network security / Disk encryption / Cryptography

Monthly Security Tips NEWSLETTER September 2012 Volume 7, Issue 9

Add to Reading List

Source URL: cio.nebraska.gov

Language: English - Date: 2012-11-27 09:35:12
523Cyberwarfare / Network security / Password / Wireless access point / Wi-Fi Protected Access / Wi-Fi / Access control / Computer security / Virtual private network / Computer network security / Security / Computing

Arkansas Division of Legislative Audit – Information Systems Best Practices Checklist The following is a compilation of Information Systems best practices employed throughout industry and government, which have been ad

Add to Reading List

Source URL: www.astate.edu

Language: English - Date: 2013-10-14 16:10:42
524Criminal law / Government / National Information Infrastructure Protection Act / Protected computer / Computer Fraud and Abuse Act / Title 18 of the United States Code / United States Code / Computer law / Law / Information technology audit

Computer Fraud & Abuse Act

Add to Reading List

Source URL: www.flmd.uscourts.gov

Language: English - Date: 2013-06-14 17:23:11
525Computer storage / Data security / Information technology audit / Data management / Disk formatting / OS/2 / Data remanence / Hard disk drive / Host protected area / Computer hardware / Computing / Information science

January 9, 2009 Forensic Storage Media Preparation Tool Specification Draft 1 for Public Comment of Version 1.0 DRAFT 1 for Public Comment

Add to Reading List

Source URL: www.cftt.nist.gov

Language: English - Date: 2009-01-08 15:01:18
526Health Insurance Portability and Accountability Act / Power of attorney / Authorization / Privacy / Health insurance / Computer security / Privacy of telecommunications / Authorization hold / Law / Privacy law / Data privacy

Member/Dependent Authorization Request Form You may give The State Health Plan for Teachers and State Employees (SHP), hereinafter referred to as “the Plan”, written authorization to disclose your Protected Health In

Add to Reading List

Source URL: www.shpnc.org

Language: English - Date: 2013-03-28 11:33:53
527Computing / Internet / Email / Data security / Personally identifiable information / Internet privacy / Protected health information / Health Insurance Portability and Accountability Act / Encryption / Security / Cryptography / Computer security

HIPAA Privacy and Security: FAQs 1. Use of paper case/procedure log books or papers (e.g., CORES reports) containing PHI or PII (personally identifiable information) Q: What is the best practice regarding PHI/PII? A: The

Add to Reading List

Source URL: www.uwmedicine.org

Language: English - Date: 2013-11-15 14:35:11
528Geographic information systems / Earth / Cartography / Earth sciences / Global Earth Observation System of Systems / Group on Earth Observations / Global Biodiversity Information Facility / Remote sensing / Computer vision / Geography

A Digital Observatory for Protected Areas - DOPA, a GEO-BON contribution to the monitoring of African biodiversity DUBOIS Grégoire, CLERICI Marco, PEEDELL Stephen, MAYAUX BARTHOLOME Etienne, GREGOIRE Jean-Marie Philipp

Add to Reading List

Source URL: www.earthobservations.org

Language: English - Date: 2011-10-10 09:34:31
529Parallel ATA / Serial ATA / Hard disk drive / SCSI / BIOS / Disk formatting / Logical block addressing / Host protected area / Assertion / Computer hardware / Computing / AT Attachment

Microsoft Word - DA-ATP-pc-01.doc

Add to Reading List

Source URL: www.cftt.nist.gov

Language: English - Date: 2005-11-10 09:10:40
530Disk formatting / OS/2 / Information technology audit / Data remanence / Hard disk drive / Host protected area / SCSI / Assertion / Forensic science / Computing / Computer hardware / Data security

January 9, 2008 Forensic Media Preparation Tool Test Assertions and Test Plan Draft 1 for Public Comment of Version 1.0

Add to Reading List

Source URL: www.cftt.nist.gov

Language: English - Date: 2009-01-08 15:02:12
UPDATE