Security breaches

Results: 272



#Item
181Business / Management / Biosecurity / Food safety / Technology

B1. Evaluate the evacuation plan for your school. Review existing evacuation plans and make changes if necessary. Establish measures to prevent security breaches during an evacuation. Assigned to:

Add to Reading List

Source URL: foodbiosecurity.nfsmi.org

Language: English - Date: 2007-11-21 10:52:04
182Office of Management and Budget / United States Department of Labor / Pension / Government / Finance / Economics / Employee Retirement Income Security Act / Employment compensation / Employee Benefits Security Administration

[removed]Federal Register / Vol. 65, No[removed]Tuesday, September 26, [removed]Notices which allows certain persons to correct possible fiduciary breaches of Part 4 of

Add to Reading List

Source URL: www.dol.gov

Language: English - Date: 2011-03-18 12:28:44
183Security / Data security / Health / Health informatics / Human rights / Data breach / Internet privacy / Information privacy / Medical privacy / Privacy / Ethics / Computer security

Australian Privacy Foundation Policy Position Protections Against eHealth Data Breaches 28 August 2009 http://www.privacy.org.au/Papers/eHealth-DataBreach[removed]pdf

Add to Reading List

Source URL: www.privacy.org.au

Language: English - Date: 2009-08-27 22:03:54
184United States Department of Labor / Pension / Employee benefit / Finance / Economics / Phyllis Borzi / Nonqualified deferred compensation / Employment compensation / Employee Retirement Income Security Act / Employee Benefits Security Administration

[removed]Federal Register / Vol. 65, No[removed]Tuesday, September 26, [removed]Notices which allows certain persons to correct possible fiduciary breaches of Part 4 of

Add to Reading List

Source URL: www.dol.gov

Language: English - Date: 2011-03-18 12:28:43
185Computer network security / Secure communication / Computer security / Privacy law / Data privacy / Health Insurance Portability and Accountability Act / Data breach / Practice management software / Protected health information / Security / Health / Health informatics

31 Managing Your Practice Could Your Practice Pass a HIPAA Audit? How to avoid common data breaches

Add to Reading List

Source URL: www.aaos.org

Language: English - Date: 2014-09-10 12:48:19
186Computer crimes / Security / Information technology audit / Computer law / Secure communication / Identity theft / Computer Fraud and Abuse Act / Computer Crime and Intellectual Property Section / Data breach / Cybercrime / Computer network security / Crime

Privacy in the Digital Age: Preventing Data Breaches and Combating Cybercrime

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2014-02-07 13:16:28
187Computing / ESET NOD32 / ESET / Kerio Connect / Kerio Control / Virus Bulletin / Kerio Technologies / Software / Antivirus software / System software

Datasheet ESET NOD32 Antivirus for Kerio Connect Without a reliable antivirus solution on your Kerio Connect, you risk tremendous costs in data loss, security breaches and missed business opportunities that can result f

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2012-11-28 14:37:31
188Data security / Privacy law / Privacy / National security / Health Insurance Portability and Accountability Act / Information security / Information privacy / Chief privacy officer / Internet privacy / Ethics / Security / Computer security

POLICY NUMBER[removed]July 8, 2014 POLICY: BREACHES OF PRIVACY & SECURITY OF PROTECTED HEALTH

Add to Reading List

Source URL: www.policies.uchc.edu

Language: English - Date: 2014-08-15 13:13:38
189Security / Ethics / Risk / Emergency management / Psychological resilience / Insurance / Business continuity / Cyber-security regulation / Management / Actuarial science / Public safety

Risk Nexus | Beyond data breaches: executive summary | April 2014 |Zurich Insurance Company Ltd | Atlantic Council

Add to Reading List

Source URL: www.atlanticcouncil.org

Language: English - Date: 2014-04-16 10:39:06
190Secure communication / Data breach / Data security / Identity theft / Security breach notification laws / ChoicePoint / Credit card / Internet privacy / Privacy / Security / Computer security / Computer network security

Prepared Statement Illinois Attorney General Lisa Madigan “Protecting Consumer Information: Can Data Breaches Be Prevented?” Subcommittee on Commerce, Manufacturing, and Trade Committee on Energy & Commerce United St

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2014-02-04 10:24:04
UPDATE