Search results

Jump to navigation Jump to search
  • ...government to notify individuals if a security breach has compromised any personal information and placed them at risk of identity theft. North Carolina consu ...ocated in and out of North Carolina that conduct business in state or keep personal information of state residents are required to comply. Compliance falls und ...
    3 KB (488 words) - 13:02, 12 November 2011
  • ...cree 40 is to regulate the creation, utilization and storage of electronic documents and signatures in Panama, through a registration process and the supervisio ===Definition of Personal Data=== ...
    8 KB (1,135 words) - 17:53, 29 August 2014
  • ...ccepted, but the phrase it abbreviates has four common variants based on ''personal'', ''personally'', ''identifiable'', and ''identifying''. Not all are equi * National identification number ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • ...acy legislation in an effort to provide citizens with safeguards for their personal data.1 Some of these laws apply both to data transfers internally within a ...ed to adhere to certain “minimum standards” in processing “personal data.” Personal data is defined as “any information relating to an identified or identifiab ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • ...such data is a European Union directive which regulates the processing of personal data within the European Union. It is an important component of EU [[privac ...he seven principles governing the OECD’s recommendations for protection of personal data were: ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • ...is actually a misnomer because it is not literally possible to steal an [[Personal identity (philosophy)|identity]] as such - more accurate terms would be ''i ...ily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information ab ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...ompanies face fines of $250–1000 for each violation. Requiring a "personal identification number" (PIN) may also be a violation. ...s can guarantee delivery to a location, but they are not required to check identification and they are usually not involved in processing payments for the merchandis ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...law]], a '''fraud''' is an [[Intent (law)|intentional]] deception made for personal gain or to damage another individual; the related adjective is fraudulent. * [[Counterfeit]]ing of currency, documents or valuable goods ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...l may be found on the author's blog [http://michaelpeters.org/?p=5958 Your Personal CXO]. '''2. Threat Identification'''<br> ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...in dynamic page generation, providing data for order fulfillment, employee identification data such as social security numbers, and storing customer data such as shi ...ore, losing tapes in transit is only one way that companies can compromise personal data. In the most recent security failure, credit card companies admitted t ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • 2. telephone records, including caller identification records, cellular site and sector information, GPS data, and cellular netwo ...ds, including local and long distance telephone connection records, caller identification records, cellular site and sector information, GPS data, and cellular netwo ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...the customer’s accounts at the same financial institution, maintenance of personal information, etc. An acceptable use policy. It documents permitted system uses and activities for a specific user, and the consequen ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...al Rule, it is necessary for X12 transaction set processing . The encoded documents are the transaction sets, which are grouped in functional groups, used in d ...NPI does not replace a provider's DEA number, state license number, or tax identification number. The NPI is 10 digits (may be alphanumeric), with the last digit bei ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...warrants, [[roving wiretap]]s and the ability of the FBI to gain access to documents that reveal the patterns of U.S. citizens. The so-called "sneak and peek" l ...g the production of any tangible things (including books, records, papers, documents, and other items) for an investigation to protect against international ter ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...; see also United States v. Andrus, 483 F.3d 711, 718 (10th Cir. 2007) ("A personal computer is often a repository for private information the computer's owner ...of a person's life, there is greater potential for the 'intermingling' of documents and a consequent invasion of privacy when police execute a search for evide ...
    154 KB (23,956 words) - 13:16, 5 August 2011