Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...PATRIOT Act, the Homeland Security Act and other laws focused on national security, Congress has been active in changing the legal landscape for access to rea ...ing, National Security and the “Adverse Inference” Problem, 22 SANTA CLARA COMPUTER & HIGH TECH. L.J. 757, 764-766 (2006); Susan Freiwald, Uncertain Privacy: C ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • '''Can you mitigate database security risks?'''<br> ...ng data for order fulfillment, employee identification data such as social security numbers, and storing customer data such as shipping addresses and credit ca ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...h only peripherally addressed BCP to improve an organization's information security procedures. BS 25999's applicability extends to all organizations. In 2007, * Hacker (computer security)|Cyber attack ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ==Security== ...would require that organizations report to the OPC 'any material breach of security safeguards involving personal information under its control'. The proposed ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • ...privacy and security requirements and payment card industry ([[PCI:|PCI]]) security standards put a further onus on companies to stay abreast of ever-changing ==Privacy and Security Trade-offs== ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ===Title III: Computer Maintenance Competition Assurance Act=== ...computers could make certain temporary, limited copies while working on a computer. ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • #[[Amazon Web Services Security White Paper | Amazon Web Services Security White Paper]] #[[Applied Discovery Data Security & Privacy | Applied Discovery Data Security & Privacy]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...electronic documents or business data from one computer system to another computer system, i.e. from one trading partner to another trading partner without hu ..., specifying that "in EDI, the usual processing of received messages is by computer only. Human intervention in the processing of a received message is typical ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ::* Regulatory, audit, and security reports from key service providers ...rts, resolution of audit findings, format and contents of work papers, and security over audit materials.<br> ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...h Cir. 1991). The owner of the trade secret must, however, take reasonable security measures when it does disclose the information, such as requiring non-discl ## The extent of the security measures taken by the owner of the trade secret need not be absolute, but m ...
    7 KB (1,065 words) - 16:48, 13 April 2011
  • ...professionals who have experience in accounting, auditing, and information security. A SSAE 16 engagement allows a service organization to have its control pol | The Effects of Computer Processing on the Audit of Financial Statements ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...a law enforcement problem, but poses a serious national and international security threat as well. ...inst hostile foreign countries to further U.S. foreign policy and national security objectives. OFAC is also responsible for issuing regulations that restrict ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • ...n to companies such as electronic marketing, online privacy, registration, security, transfer, and breach notification, with analysis provided by [http://www.l ...ywords or specific URLs and blocks them before they can even appear on the computer requesting them), to encryption programs, to the very basic architecture of ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ==National Security Letters== ...ange of Internet-related communications service providers through National Security Letters. It requires only that the FBI director or his designee makes the r ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • ...e a policy in place to protect the information from foreseeable threats in security and data integrity ...ards Rule requires financial institutions to develop a written information security plan that describes how the company is prepared for, and plans to continue ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • ...nformation, important documents, and even documents necessary for homeland security. If the hacker were to gain this information, it would mean identity theft ...lly fabricated. The most common technique involves combining a real social security number with a name and birth date other than the ones associated with the n ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...use. The rapid growth of credit card use on the Internet has made database security lapses particularly costly; in some cases, millions of accounts have been c ...make unauthorized purchases on a card until it is canceled. Without other security measures, a thief could potentially purchase thousands of dollars in mercha ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • (1) having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such (2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains-- ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...urt, including hearsay and the foundation to establish the authenticity of computer records. Many courts have categorically determined that computer records are admissible under Federal Rule of Evidence 803(6), the hearsay e ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...0.14:| '''SOX.2.0.14''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contrac :::f. [[SOX.2.0.16:| '''SOX.2.0.16''']] A regular review of security, availability and processing integrity is performed by third-party service ...
    39 KB (5,914 words) - 17:55, 13 April 2007
View ( | ) (20 | 50 | 100 | 250 | 500)