Security of Information Act

Results: 7334



#Item
41Cyberwarfare / Computer security / Security / Computing / International Multilateral Partnership Against Cyber Threats / Federal Information Security Management Act / National Cybersecurity Center of Excellence / Cyber-security regulation

Texas Commission Panelist and Speaker Statements

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2016-07-15 13:37:24
42Fisheries law / Fishing / Fisheries science / Natural environment / Fishing industry / Natural resources / Personally identifiable information / Privacy / Endangered Species Act / Privacy Office of the U.S. Department of Homeland Security / MagnusonStevens Fishery Conservation and Management Act / National Marine Fisheries Service

Version Number: U.S. Department of Commerce NOAA NMFS Privacy Impact Assessment

Add to Reading List

Source URL: www.cio.noaa.gov

Language: English - Date: 2016-07-26 15:07:51
43Government / Identity documents / Security / Prevention / REAL ID Act / United States Department of Homeland Security / Social Security number / Identity theft / Electronic Privacy Information Center / Surveillance / Personally identifiable information / Privacy

DEPARTMENT OF HOMELAND SECURITY DOCKET NO. DHSNotice of Proposed Rulemaking: Minimum Standards for Driver’s Licenses and Identification Cards Acceptable by Federal Agencies for Official Purposes COMMENTS OF

Add to Reading List

Source URL: epic.org

Language: English - Date: 2007-09-27 15:16:04
44Economy / Types of insurance / Finance / Money / Privacy law / Privacy / Insurance / Information privacy / Internet privacy / Medical privacy / Health Insurance Portability and Accountability Act

www.inspartners.com Cyber Security Liability Protection An Affordable Program with Choices for Every Need

Add to Reading List

Source URL: www.inspartners.com

Language: English - Date: 2015-07-20 09:52:53
45Cybercrime / Data Protection Act / Information privacy / Database / Law / Information / Open data / Data security

Terms and Conditions of Use of DataGeneral These Terms and Conditions set out the ways in which You can and cannot use Data (as defined

Add to Reading List

Source URL: www.sepa.org.uk

Language: English - Date: 2016-04-21 06:32:57
46Law / Digital rights / Human rights / Privacy / Privacy law / United States Department of Homeland Security / Politics / 93rd United States Congress / Privacy Act / Privacy Office of the U.S. Department of Homeland Security / Electronic Privacy Information Center / Internet privacy

DEPARTMENT OF HOMELAND SECURITY United States Customs and Border Protection Docket No. DHS

Add to Reading List

Source URL: epic.org

Language: English - Date: 2009-09-07 00:48:40
47Information privacy / Computing / Law / Privacy / Computer security / Internet privacy / HTTP cookie / Personally identifiable information / Personal Information Protection and Electronic Documents Act / Medical privacy / Data Protection Act / Data protection (privacy) laws in Russia

INFORMATION SHEET ACCORDING TO ARTICLE 13 OF THE LEGISLATIVE DECREEPersonal Information Protection Act) WHO PROCESSES THE INFORMATION (“HOLDER”) The personal information that can be processed is the person

Add to Reading List

Source URL: dynamicloset.com

Language: English - Date: 2015-09-29 03:26:21
48Prevention / Computer security / Safety / Security / Data security / Data Quality Act / Information security / Privacy / National Oceanic and Atmospheric Administration

Department of Commerce $ National Oceanic & Atmospheric Administration $ National Marine Fisheries Service

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2014-09-02 12:10:03
49Government / United States government secrecy / Mass surveillance / National Security Agency / Freedom of Information Act / Procurement / Office of Inspector General / Business / Security

List of National Security Agency (NSA) Inspector General (OIG) investigations closed

Add to Reading List

Source URL: www.governmentattic.org

Language: English - Date: 2016-07-01 15:23:02
50Prevention / Espionage / Security / Surveillance Devices Act / Independent Commission Against Corruption / Crime prevention / Law enforcement / National security / Audit / Surveillance / Covert listening device / Information technology audit

Report of an audit of applications for and execution of listening device warrants by the Independent Commission Against Corruption The Inspector of the Independent Commission

Add to Reading List

Source URL: www.oiicac.nsw.gov.au

Language: English - Date: 2015-06-15 22:42:00
UPDATE