BREACH

Results: 2727



#Item
991Efficient breach / Contract / Breach of contract / Expectation damages / Damages / Punitive damages / Breach of promise / Specific performance / Consideration in English law / Contract law / Law / Private law

Readers with comments should address them to:

Add to Reading List

Source URL: www.law.uchicago.edu

Language: English - Date: 2014-11-29 14:17:32
992Misrepresentation / Reliance damages / Damages / Efficient breach / United States contract law / Estoppel / Expectation damages / Restatement (Second) of Contracts / Tort / Law / Contract law / Contract

Microsoft Word - Markovits_Lead_WDF

Add to Reading List

Source URL: suffolklawreview.org

Language: English - Date: 2012-12-29 10:44:26
993Computing / Data security / Information security / Password / Personal Data Privacy and Security Act / Security breach notification laws / Security / Email / Computer security

Microsoft Word - NEW YORK STATE SECURITY BREACH REPORTING FORM_General Business Law[removed]

Add to Reading List

Source URL: ag.ny.gov

Language: English - Date: 2013-06-20 11:19:00
994Computer security / Secure communication / Computer network security / National security / Identity theft / Cloud computing / Phishing / Data breach / Information security / Security / Data security / Ethics

2013 Information Security Brochure_ID5.indd

Add to Reading List

Source URL: www.med.upenn.edu

Language: English - Date: 2014-03-28 09:56:58
995Computer security / Cyberwarfare / Data security / Data breach / National security / Identity theft / Safenet / Information privacy / Credit card / Security / Computer network security / Secure communication

BREACH LEVEL INDEX ANNUAL RECAP[removed]TOP BREACHES BY TYPE

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2014-02-14 15:17:44
996Computer security / Cyberwarfare / OWASP / Data breach / Computer network security / Security / Secure communication

Mobile Vulnerability and Exploitation John Sawyer – InGuardians Tom Eston – SecureState Kevin Johnson – Secure Ideas John Sawyer

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:56:50
997Computer network security / Public safety / Crime prevention / National security / Information security / Data breach / Data loss / Security / Computer security / Data security

UK-NTT_Com_Risk-Value_report_V3

Add to Reading List

Source URL: www.nttcomsecurity.com

Language: English - Date: 2014-11-10 06:20:37
998Payment systems / Financial economics / Credit / Credit card / Identity theft / Phishing / Debit card / Target Corporation / Credit history / Electronic commerce / Business / Merchant services

Phishing Alert – Watch For Fraudulent Package Delivery Emails The recent Target data breach made everyone sit up and take notice. Initially, news reports said about 40 million credit and debit cards may have been affe

Add to Reading List

Source URL: lancaster.ne.gov

Language: English - Date: 2014-02-27 12:32:48
999Computer security / Secure communication / Electronic commerce / National security / Crimeware / Data loss / Threat / Data breach / Vulnerability / Computer network security / Cyberwarfare / Security

Vertical Insight[removed]Data Breach Investigations Report HEALTHCARE Data breaches can be

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2014-05-12 20:00:00
1000Breach of confidence / Tort law / Data Protection Act / Human Rights Act / Law / Privacy law / Computer law

Patricia Barratt, Freedom of Information journal – Volume 5, Issue 1 ( September/October 2008 )

Add to Reading List

Source URL: www.pdpinternational.com

Language: English - Date: 2012-03-02 00:26:53
UPDATE