Computer surveillance

Results: 1478



#Item
771Politics of the United States / Computer law / Mass surveillance / Privacy of telecommunications / Government / Espionage / United States / Mitch McConnell / Information Technology Industry Council / Kentucky

The Honorable Harry Reid Majority Leader United States Senate Washington, DC[removed]November 18, 2014

Add to Reading List

Source URL: www.itic.org

Language: English - Date: 2014-11-18 16:56:39
772Malware / Threat / Espionage / Tibet / Targeted threat / Surveillance / Security / Computer security / Cyberwarfare

EXTENDED ANALYSIS: 2.1 Summary, Methodology, and Data Overview Communities @ Risk

Add to Reading List

Source URL: targetedthreats.net

Language: English - Date: 2014-11-18 13:36:26
773Privacy of telecommunications / Computer law / Privacy law / Mass surveillance / National security letter / Foreign Intelligence Surveillance Act / Surveillance / Internet privacy / Electronic Communications Privacy Act / National security / Law / Ethics

Wickr Transparency Report By Jennifer DeTrani, Wickr General Counsel October 14, 2014 Our Philosophy:

Add to Reading List

Source URL: www.wickr.com

Language: English - Date: 2014-10-22 11:53:07
774Mass surveillance / Privacy of telecommunications / Computer law / Crime prevention / Regulation of Investigatory Powers Act / Telecommunications data retention / Surveillance / Investigatory Powers Tribunal / Privacy / National security / Ethics / Law

Don’t Spy on Us: reforming surveillance in the UK September 2014

Add to Reading List

Source URL: www.dontspyonus.org.uk

Language: English - Date: 2014-09-22 07:12:12
775Computer security / Secure communication / Surveillance / Computer crimes / Keystroke logging / Data breach / Malware / Threat / Vulnerability / Cyberwarfare / Security / Computer network security

Keylogger malware in Hotel Business Centers

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-07-29 15:49:24
776Spyware / Computer network security / Surveillance / Keystroke logging / Computer virus / Espionage / Malware / Rogue software

Microsoft Word - NNEDV_SpywareAndSafety_2013

Add to Reading List

Source URL: nnedv.org

Language: English - Date: 2014-05-19 13:26:00
777Public health / Chronic / Health Information Systems Programme / Social determinants of health / Risk / Health / Management / Ethics

2013 October 2014 The Behavioral Risk Factor Surveillance System is a state-based computer-assisted telephone

Add to Reading List

Source URL: health.state.tn.us

Language: English - Date: 2014-11-03 09:42:41
778Law / Privacy of telecommunications / Privacy law / Privacy / National security / Mass surveillance / Computer law / Regulation of Investigatory Powers Act

Statement by the Interception of Communications Commissioner’s Office (IOCCO) on the publication of the Interception of Communications Commissioner’s 2013 Annual Report 08 April 2014 EMBARGOED FOR USE AFTER THE REPOR

Add to Reading List

Source URL: www.iocco-uk.info

Language: English - Date: 2014-05-09 03:39:43
779Electronic commerce / National security / Surveillance / Computer network security / Food Safety and Inspection Service / Security guard / Computer security / Security / Crime prevention / Public safety

North Carolina Department of Health and Human Services Division of Social Services Pat McCrory Governor Aldona Z. Wos, M.D.

Add to Reading List

Source URL: www.ncdhhs.gov

Language: English - Date: 2014-10-30 13:54:43
780Law / Computer law / Mass surveillance / Regulation of Investigatory Powers Act

Interception of Communications Commissioner’s Office (IOCCO) 1st September 2014 Circular to all Senior Responsible Officers1 under Chapter 2 of Part I of the Regulation of Investigatory Powers Act[removed]RIPA[removed]reg

Add to Reading List

Source URL: www.iocco-uk.info

Language: English - Date: 2014-09-15 08:26:10
UPDATE