Public Data Group

Results: 472



#Item
171Security / Law enforcement / Mass surveillance / Regulation of Investigatory Powers Act / Crime prevention / BT Group / Surveillance / Telecommunications data retention / Lawful interception / Law / Computer law / National security

www.actnow.org.uk – Information Law Training and Resources for the Public Sector Access to Communications Data : The New Law Local authority officers investigating criminal offences, including benefit fraud, will soon

Add to Reading List

Source URL: www.actnow.org.uk

Language: English - Date: 2013-12-22 12:23:25
172

CDC Group plc Remuneration data, year ending 31 December 2013 CDC is a Government-owned public limited company and publishes remuneration bands for all its employees. In the table below you can see the breakdown of remun

Add to Reading List

Source URL: www.cdcgroup.com

- Date: 2014-06-26 09:30:23
    173Management / ESMF / Weather prediction / SME finance / World Bank Group / International Finance Corporation / Risk / Development / International economics / Economics

    Public Disclosure Copy INTEGRATED SAFEGUARDS DATA SHEET APPRAISAL STAGE Report No.: ISDSA7446 Date ISDS Prepared/Updated: 23-Mar-2014

    Add to Reading List

    Source URL: www-wds.worldbank.org

    Language: English - Date: 2014-03-24 14:46:22
    174Sage Group / Employee benefit / Health Insurance Portability and Accountability Act / Law / Business / North Carolina Public Schools Human Resource Management System / Management / Human resource management / Human resource management system

    Sage HRMS Benefits Messenger Cut the costs and complexity of benefits administration by securely automating the communication of employee benefits enrollment data to insurance carriers with Sage HRMS Benefits Messenger.

    Add to Reading List

    Source URL: na.sage.com

    Language: English - Date: 2014-03-31 15:10:04
    175Mathematics / Group theory / Subgroup / Group

    Suppression Overview In order to protect student privacy, aggregate data must sometimes be withheld public from display when it could potentially be used to identify or derive information about individual students. Supp

    Add to Reading List

    Source URL: reportcard.ospi.k12.wa.us

    Language: English - Date: 2014-09-09 13:48:34
    176Data modeling / Rule engines / Business rule management system / Artificial intelligence / IBM / Technology / IBM cloud computing / Tivoli Software / Constraint programming / ILOG / Computing

    IBM SOFTWARE GROUP Dramatically improve public services Solution Brief

    Add to Reading List

    Source URL: public.dhe.ibm.com

    Language: English - Date: 2010-05-07 02:31:16
    177ILOG / Computing / Artificial intelligence / Technology / Business rule management system / IBM / Risk management information systems / Corticon / Rule engines / Data modeling / Constraint programming

    IBM SOFTWARE GROUP Powering your decision making Solution Brief

    Add to Reading List

    Source URL: public.dhe.ibm.com

    Language: English - Date: 2010-05-07 02:31:17
    178Digital rights management / Canadian Internet Policy and Public Interest Clinic / Personal Information Protection and Electronic Documents Act / Canadian privacy law / Information privacy / Copyright / Open Rights Group / Internet privacy / Medical privacy / Law / Ethics / Privacy

    3. learning from data protection law at the nexus of copyright and privacy alex cameron Introduction 43 Intellectual Privacy Under Strain 44 A. The Analogue World 44

    Add to Reading List

    Source URL: idtrail.org

    Language: English - Date: 2009-03-27 16:31:07
    179Computing / PureXML / IBM System z9 / IBM Query Management Facility / DB2 / Z/OS / IBM DB2 / Software / Data management

    IBM Software Group DB2 10 for z/OS Proven, simplified and cost effective Data Management

    Add to Reading List

    Source URL: public.dhe.ibm.com

    Language: English - Date: 2010-10-15 14:33:41
    180Risk / Public safety / Chief information security officer / Enterprise risk management / Information security / IT risk management / Security / Computer security / Data security

    Modulo Hosts Second Annual Customer Advisory Board and First International User Group Conference Featuring Keynote by GRC and Security Industry Luminary Steve Hunt Leading CISOs and CSOs will discuss the latest innovatio

    Add to Reading List

    Source URL: www.prweb.com

    Language: English - Date: 2014-03-21 08:06:31
    UPDATE