Protected computer

Results: 695



#Item
541Health Insurance Portability and Accountability Act / Law / Privacy / Data security / Personal Data Privacy and Security Act / Privacy law / Internet privacy / Computer security

Office of the Secretary Office for Civil Rights (OCR) Breach Notification for Unsecured Protected Health Information

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-05-13 01:00:00
542Computer security / United States government secrecy / Crime prevention / Classified information / Security guard / Asset / Declassification / Vulnerability / Sensitive Security Information / Security / National security / Data security

500. General 1. The Federal Government is responsible for stipulating and applying the required level of security for its information and assets. These levels are PROTECTED A, B, or C and CONFIDENTIAL, SECRET, TOP SECRET

Add to Reading List

Source URL: ssi-iss.tpsgc-pwgsc.gc.ca

Language: English - Date: 2014-06-25 11:01:56
543Malware / Antivirus software / Rogue software / Spyware / Keystroke logging / Internet privacy / Computer virus / Computer security / Internet security / Espionage / System software / Computer network security

If the computer you’re using now is not protected, identity thieves and other fraudsters may be able to get access and steal your personal information. Tips from the California Office of Privacy Protection By using saf

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:19:14
544Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Computer network security / Government procurement in the United States / Electronic health record / Principal / Threat / Protected health information / Law / Computer security / Health

STATE OF WISCONSIN State Copy [ ]

Add to Reading List

Source URL: www.dhs.wisconsin.gov

Language: English - Date: 2013-12-03 10:41:09
545Data protection / Information privacy / Privacy / Backup / USB flash drive / Password / Credit card / Database / Security / Data security / Computer security / Computing

Sensitive Data Protection Best Practices Sensitive Data Data, regardless of its physical form or characteristics, with the highest level of protection including, but not limited to, data protected by law, data protected

Add to Reading List

Source URL: www.ccm.edu

Language: English
546Wireless / Wireless networking / Wireless security / Wi-Fi Protected Access / Motorola / Mobile computing / Wireless access point / Windows Mobile / NetMotion Wireless / Computer network security / Technology / Computing

SPECIFICATION Sheet Mobility Services Platform (MSP) Management Software FEATURES

Add to Reading List

Source URL: www.qdata.com

Language: English - Date: 2009-01-14 00:19:42
547Identity / Shibboleth / Athens / Joint Information Systems Committee / Identity management / EDINA / Password / Single sign-on / JISC infoNet / Federated identity / Computer security / System software

Access Unlimited Access Protected Improving and extending service delivery through federated access management

Add to Reading List

Source URL: www.jisc.ac.uk

Language: English - Date: 2010-10-28 07:09:29
548Health Insurance Portability and Accountability Act / Privacy law / Health informatics / International standards / Computer security / Electronic health record / URAC / Protected health information / Health care provider / Health / Medicine / Data privacy

Approved by Board[removed]Policy on Participating Health Care Provider Policies and Procedures for the VHIE Definitions

Add to Reading List

Source URL: hcr.vermont.gov

Language: English - Date: 2011-05-08 23:01:01
549Networking hardware / Network architecture / Cryptographic protocols / Wireless networking / Server appliance / Wireless security / Wi-Fi Protected Access / Wi-Fi / Router / Computing / Technology / Computer network security

Small Office/Home Office Router Security

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2013-04-15 13:11:50
550Cryptographic protocols / Technology / Data / Wi-Fi / IEEE 802.1X / Wi-Fi Protected Access / Wireless security / Extensible Authentication Protocol / IEEE 802.11r-2008 / Computing / Computer network security / Wireless networking

Deploying iPhone and iPad Wi-Fi Out of the box, iPhone and iPad can securely connect to corporate or guest Wi-Fi networks, making it quick and simple to join available wireless networks whether you’re on campus or on

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2013-09-10 00:01:18
UPDATE