Digital security

Results: 4317



#Item
181Computing / Law / Privacy / Copyright law / Data security / Cryptography / Computer security / Identity management / P3P / Digital rights management / Internet privacy / Digital Millennium Copyright Act

Towards Realistic Assumptions, Models, and Goals for Security Research

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-05-22 10:45:07
182Information privacy / Privacy / General Data Protection Regulation / European Union directives / Information / Data security / Data protection / European Digital Rights / European Union law / Data Protection Directive / Personally identifiable information / DPA

1 EDRi analysis on the most dangerous flexibilities allowed by the General Data Protection Regulation (*) General Note on divergences: One of the main reasons for adopting the main Data Protection Directive (DPD) in 19

Add to Reading List

Source URL: edri.org

Language: English - Date: 2016-07-11 06:14:36
183Internet privacy / Privacy / Computing / Identity management / Computer security / Digital media / Personally identifiable information / HTTP cookie / In re Gateway Learning Corp. / P3P

Cignition Privacy Policy Late updated: August 27, 2015 Welcome to Cignition (“Cignition” “we” or “us”). Please carefully read this Privacy Policy (“Privacy Policy”) before participating in Site activities

Add to Reading List

Source URL: d3lu156qfrczh0.cloudfront.net

Language: English - Date: 2016-04-12 18:58:07
184Cameras / Equipment / Technology / Imaging / Video / Optical devices / Pantiltzoom camera / Security engineering / EarthCam / Webcam / Digital camera

EarthCam Webcam Technology GigapixelCam A&E Specifications

Add to Reading List

Source URL: www.earthcam.net

Language: English - Date: 2012-06-13 20:48:23
185Technology / Internet privacy / Computing / Privacy / Digital media / Data security / Facebook / Privacy policy / Information privacy / New Orleans Baptist Theological Seminary / Personally identifiable information / Medical privacy

New Orleans Baptist Theological Seminary - PRIVACY POLICY Proposed: November 2015 Reviewed: December 2015 Approved: December 2015 Scope This policy applies to website visitors, current and potential students, alumni and

Add to Reading List

Source URL: www.nobts.edu

Language: English - Date: 2015-12-18 14:29:15
186Identity management / Computer access control / Computer security / Identity / Electronic identification / Authentication / Mobile signature / Recommender system / Multi-factor authentication / Digital identity / Privacy

Microsoft Word - SSEDIC Outcomes Y3 WP6_3v1 6.docx

Add to Reading List

Source URL: www.eid-ssedic.eu

Language: English - Date: 2014-06-09 09:30:04
187Technology / Information technology / Structure / Information and communications technology / Common Service Centers / E-government / E-governance / Digital divide / Akshaya project / Draft:ICT Security Policy System: A Case Study

Information and Communication Technology & Electronics Policy YearUttarakhand State) DEPARTMENT OF INFORMATION TECHNOLOGY GOVERNMENT OF UTTARAKHAND

Add to Reading List

Source URL: itda.uk.gov.in

Language: English - Date: 2016-08-10 01:41:47
188Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Electronic documents / SAFE-BioPharma Association / Certificate authority / Digital signature / Public key certificate / Professional certification

TeleTrusT – Bundesverband IT-Sicherheit e.V. Der IT-Sicherheitsverband. PRESS RELEASE Transatlantic Alliance:

Add to Reading List

Source URL: www.safe-biopharma.org

Language: English - Date: 2016-05-23 10:15:15
189Technology / Digital media / Electromagnetism / Mobile phones / Alarms / Security alarm / Pager

Print Form Security Alarm Contact Information Instructions: Departments must submit this form before a security alarm can be activated. If you have any questions, contact the Crime Prevention Unit, UCD Police Department

Add to Reading List

Source URL: police.ucdavis.edu

Language: English - Date: 2014-04-14 11:35:48
190Security / Prevention / Safety / Crime prevention / Mass media / Cybercrime / Cryptography / Password / International Federation of Journalists / Email / Computer security / Internet privacy

Safer, Smarter Journalism: Survey on Digital Security in South Asia’s Media Executive Summary

Add to Reading List

Source URL: samsn.ifj.org

Language: English - Date: 2016-05-25 02:25:11
UPDATE