Security breaches

Results: 272



#Item
121Sport in Australia / Contract / Public safety / Sports / Security / Lifesaving / Surf lifesaving

Breaches of Lifesaving Standards Guide VERSION CONTROL The record of changes to the Breaches of Lifesaving Standards Guide is outlined below:

Add to Reading List

Source URL: www.surflifesaving.com.au

Language: English
122Cyberwarfare / Computer network security / Data breach / Secure communication / Internet privacy / Information security / Health Insurance Portability and Accountability Act / Computer security / Security / Data security

Responding to a Data Security Breach 10 Steps Every Company Should Take to Manage Risk Data security breaches can have significant reputational, business, and legal costs for companies. Depending on the nature and severi

Add to Reading List

Source URL: www.cov.com

Language: English - Date: 2015-01-28 15:49:52
123International criminal law / Erga omnes / Peremptory norm / State responsibility / Public international law / Treaty / United Nations Security Council / Human rights / Nicaragua v. United States / Law / International relations / International law

260 Chapter III SERIOUS BREACHES OF OBLIGATIONS UNDER PEREMPTORY NORMS OF GENERAL INTERNATIONAL LAW Commentary

Add to Reading List

Source URL: legal.un.org

Language: English - Date: 2013-10-10 15:39:28
124Secure communication / Data security / National security / Data breach / Identity theft / Information security / Password / Internet privacy / Credit card / Security / Computer security / Computer network security

2014 Year of Mega Breaches & Identity Theft Findings from the 2014

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2015-03-04 11:28:55
125Cyberwarfare / Crime prevention / National security / Attack / Computer network security / Security / Computer security

NCC Group Webinar 4 secrets to a robust incident response plan (February 2015) Why do we need to plan? • Public reporting about breaches increased again in 2014

Add to Reading List

Source URL: www.nccgroup.com

Language: English - Date: 2015-02-10 14:15:07
126Attorney-client privilege / English law / Civil procedure / Adversarial system / Legal professional privilege / Lawsuit / Appeal / Trial / Settlement / Law / Court systems / Legal procedure

THE JUSTICE AND SECURITY GREEN PAPER I. What are the objections to the use of a closed material procedure in a civil trial? 1. The proposal breaches the first principle of natural justice, under which a party is entitled

Add to Reading List

Source URL: www.reprieve.org.uk

Language: English - Date: 2014-10-16 10:40:57
127Data security / Information security / National security / Kentucky Community and Technical College System / Public safety / Prevention / Computer security / Security / Education in Kentucky

KCTCS ADMINISTRATIVE POLICIES AND PROCEDURES[removed]Information and Information Technology Policy for Security Breaches and Suspected Security Breaches This policy applies to data in electronic form and not to hard copie

Add to Reading List

Source URL: legacy.kctcs.edu

Language: English - Date: 2010-11-11 08:48:54
128Safe / Locksmithing / Door / Technology / Locks / Security breaches / Security / Containers / Computer keyboard

www.LockState.com OPERATING INSTRUCTION for the LockState LS-35EPL CAUTION: Do not keep the keys in the safe. Thank you for purchasing the LockState LS-35EPL hotel and laptop safe. This safe will install easily on floor

Add to Reading List

Source URL: hi.atgimg.com

Language: English - Date: 2014-12-08 22:23:40
129Antivirus software / Spamming / Computer network security / Hacking / Symantec / Cross-site scripting / Malware / Phishing / Firefox / Software / Computing / Computer security

FigXX_data_breaches_by_sector_v1

Add to Reading List

Source URL: eval.symantec.com

Language: English - Date: 2009-04-17 13:33:31
130Crime prevention / Electronic commerce / National security / Secure communication / Audit committee / Business / National Cyber Security Division / International Cybercrime / Security / Computer network security / Computer security

november 24, 2014 A special report Target. Michaels Stores. Neimann-Marcus. Home Depot. Data breaches at these and other retailers ­compromised millions of consumers within the past 12 months, and caused billions of do

Add to Reading List

Source URL: www.morganlewis.com

Language: English - Date: 2014-12-18 14:04:01
UPDATE