Protected computer

Results: 695



#Item
561Information technology audit / Criminal law / Privacy of telecommunications / Privacy law / Computer Fraud and Abuse Act / Hacking / Protected computer / United States Code / United States Senate / Computer law / Law / Government

October 1, 1986 CONGRESSIONAL RECORD — SENATE As a general rule, conduct which is illegal under section 705 of the Com­

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2011-07-18 18:17:22
562Privacy law / Data security / Law / Data privacy / Health Insurance Portability and Accountability Act / Information security / Protected health information / Privacy / Personal Data Privacy and Security Act / Computer security / Security / Ethics

COMPLIANCE policies AUDITS TRENDS

Add to Reading List

Source URL: www.cumc.columbia.edu

Language: English - Date: 2013-06-25 14:04:18
563Oceanography / Computer icon / Geographic information system / Earth / System software / File managers / Environment / Windows Explorer / Fisheries science / Marine conservation / Marine protected area

Draft TUTORIAL U.S. Marine Protected Areas Mapping Tool March 2010 The new U.S. Marine Protected Areas mapping tool allows users to access and explore classification and spatial data on all MPAs in the U.S using an onlin

Add to Reading List

Source URL: marineprotectedareas.noaa.gov

Language: English - Date: 2010-04-06 10:51:57
564Computer security / United States government secrecy / Crime prevention / Classified information / Security guard / Asset / Declassification / Vulnerability / Sensitive Security Information / Security / National security / Data security

500. General 1. The Federal Government is responsible for stipulating and applying the required level of security for its information and assets. These levels are PROTECTED A, B, or C and CONFIDENTIAL, SECRET, TOP SECRET

Add to Reading List

Source URL: iss-ssi.pwgsc-tpsgc.gc.ca

Language: English - Date: 2014-06-25 11:01:56
565Title 18 of the United States Code / United States Constitution / Criminal law / Computer law / National Information Infrastructure Protection Act / Protected computer / Law / Commerce Clause / Government

104TH CONGRESS " HOUSE OF REPRESENTATIVES 2d Session !

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2011-07-18 18:11:41
566Ethics / Computing / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Information security / Data breach / Protected health information / Password / Security / Data security / Computer security

Microsoft Word - HITECH EMAIL Breach Notification Requirements.docx

Add to Reading List

Source URL: www.cumc.columbia.edu

Language: English - Date: 2010-07-30 13:38:58
567Consumer electronics / Information science / Electronics / Computing / High-definition television / Linux distribution / HD DVD / Linux / PING / Audio storage / DVD / Computer storage media

[Proposed class or classes of copyrighted work(s) to be exempted]= Motion pictures protected by anti-access measures, such that access to the motion picture content requires use of a certain platform. [Brief summary of t

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2008-12-03 09:57:35
568IEEE 802.11 / Computing / Technology / Wireless / Wi-Fi Protected Access / IEEE 802.11i-2004 / Wired Equivalent Privacy / Wi-Fi / Wireless LAN / Wireless networking / Computer network security / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2014-07-22 16:22:08
569Identity theft / United States Federal Sentencing Guidelines / Computer crime / Theft / Protected computer / Internet privacy / Personally identifiable information / Crime / Crimes / Law / Criminal law

C:uments and SettingsFINal SettingspesE3B8CBal signed.wpd

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:20:50
570Law / Data privacy / Health Insurance Portability and Accountability Act / Computer security / Data security / Privacy / Information security / Protected health information / Internet privacy / Ethics / Privacy law / Security

TITLE: MITIGATING EFFECTS OF LOSS OR UNAUTHORIZED RELEASE OF PROTECTED HEALTH INFORMATION POLICY:

Add to Reading List

Source URL: www.cumc.columbia.edu

Language: English - Date: 2014-06-19 12:41:58
UPDATE