The Internet Archive has digitized a microfilm copy of this work. It may be possible to borrow a copy for reading.
Filters
Page 71 of The CPA Journal Vol. 5, Issue 3
[page]
1935
The CPA Journal
This tells you what the law means, how it affects employers and employees, what every employer should do to pro- tect his interests, avoid over-payments and losses.
-
4. ...
new law to mean.
2. ...
Page 348 of Journal of Counseling and Development (JCD) Vol. 20, Issue 5
[page]
1942
Journal of Counseling and Development (JCD)
Naturally you want to know something about this law and what it means to you. ...
Most of us have a general idea of what we mean by security. ...
The laws of security
[chapter]
2003
Stealing the Network: How to Own the Box
In the following sections, we'll look at the laws and what they mean to us in our efforts to secure our networks and systems. ...
When you go to a "secure" Web page, you don't have to provide anything. Does that mean SSL is a scam? No-a piece of information has indeed been shared: the root certificate authority's public key. ...
Q: How much effort should I spend trying to apply these laws to a particular system that I'm interested in reviewing?
A: That depends on what your reason for review is. ...
doi:10.1016/b978-193183687-6.50014-5
fatcat:2vewfwdbobbofn2mk7axwfuwlm
Supplemental Material, sj-pdf-2-pch-10.1177_21501351211007102 - "No Official Help Is Available"—Experience of Parents and Children With Congenital Heart Disease During COVID-19
2021
Figshare
Darlington in World Journal for Pediatric and Congenital Heart Surgery ...
Supplemental Material, sj-pdf-2-pch-10.1177_21501351211007102 for "No Official Help Is Available"—Experience of Parents and Children With Congenital Heart Disease During COVID-19 by L. V. Marino, R. ...
For the purposes of data protection law, the University of Southampton is the 'Data Controller' for this study, which means that we are responsible for looking after your information and using it properly ...
doi:10.25384/sage.15019921.v1
fatcat:pwu3xxfyojalpcp57hmezpvliy
National Security: The Social Implications of the Politics of Transparency
2006
Prometheus
National security measures can be defined as those technical and nontechnical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur ...
Governments worldwide are beginning to implement information and communication security techniques as a way of protecting and enhancing their national security. ...
We have laws for stalking, and we have laws for wire-tapping and digital recordings but what have happened to our laws on privacy. ...
doi:10.1080/08109020601029912
fatcat:wi5cronzn5dgjn5f3j7m7qekr4
To have or not to have: the true privacy question
2013
Internet Policy Review
What does it mean "to have or not to have privacy" in the information age? ...
There is no justification for blanket surveillance. The right to security is an illusion. Instead of fighting windmills, we should fight for our right to privacy instead. ...
However, if we want to change the course of politics, we need to understand what blanket surveillance actually implies. What does it mean ‘to have or not to have privacy’ in the information age? ...
doi:10.14763/2013.4.223
fatcat:3oeeblfknjhcdnskpybsq7jk6q
ARE WE ASKING THE RIGHT QUESTIONS ABOUT ATTACHMENT?
2011
Family Court Review
However, for the practical context of family law, it would be more useful to be specific about what is meant, rather than use the word "attachment." ...
First, let me say thank you for involving me in this important project. ...
ATTACHMENT INFORMING FAMILY LAW McIntosh: What are the developmental priorities for our field to contemplate when thinking about secure-base development in an infant whose parents have separated? ...
doi:10.1111/j.1744-1617.2011.01385.x
fatcat:phjgwuxzhnf7liypjgr6riaoou
Page 38 of The Public Relations Journal Vol. 45, Issue 5
[page]
1989
The Public Relations Journal
Given the wasic facts, investors can judge for themselves what you have in mind. The laws target those individ- uals who have essential information and don’t share it. ...
“Our securities laws have exhibited strengths too easily overlooked’’
The crime in a securities transaction, if there is one, is often not so much what you do as it is that you didn’t let people know what ...
Page 180 of Management Review Vol. 25, Issue 6
[page]
1936
Management Review
What Will Social Security Mean to You?
Included in this pamphlet are the sub- jects: What will “Social Security” Mean to You? Social Security vs. ...
pushing the statistics and the laws of sup- ply and demand out of line, this ponderous profession has all too little information. ...
Supplemental Material, sj-pdf-1-pch-10.1177_21501351211007102 - "No Official Help Is Available"—Experience of Parents and Children With Congenital Heart Disease During COVID-19
2021
Figshare
Darlington in World Journal for Pediatric and Congenital Heart Surgery ...
Supplemental Material, sj-pdf-1-pch-10.1177_21501351211007102 for "No Official Help Is Available"—Experience of Parents and Children With Congenital Heart Disease During COVID-19 by L. V. Marino, R. ...
For the purposes of data protection law, the University of Southampton is the 'Data Controller' for this study, which means that we are responsible for looking after your information and using it properly ...
doi:10.25384/sage.15019918.v1
fatcat:miko6twb6na2fbsamigzpwliqe
GDPR and training: How to organize GDPR compliant online events
2020
Zenodo
Presentations from the webinar on organizing GDPR compliant online events, hosted by the OpenAIRE Community of Practice for Training coordinators. ...
must be clear about what your purposes for processing are from the start.• You need to record your purposes as part of your documentation obligations and specify them in your privacy information for individuals ...
and confidentiality (security) • A key principle of the GDPR is that you process personal data securely by means of 'appropriate technical and organisational measures' -this is the 'security principle ...
doi:10.5281/zenodo.4204422
fatcat:znbqjw5zbngkxodmwl3xecy5fy
A World Apart? Private Investigations in the Corporate Sector
2016
Erasmus Law Review
However, there are many additional sources of information (for example, site visits or observations), which might be available to corporate investigators. ...
It is argued that these factors contribute to a differentiation between public and private actors in the field of corporate security. ...
Of course they [law enforcement agencies] may demand information and we will have to provide that. But often they don't quite know what kind of information they need. ...
doi:10.5553/elr.000073
fatcat:qtzvfrbvurhdxklmu23cfnb2te
MACHINE-READABLE TRAVEL DOCUMENTS IN AVIATION SECURITY AND INFORMATION PRIVACY: AN ISLAMIC LAW PERSPECTIVE
2020
IIUM Law Journal
Its further provides punishment for whoever transgresses against information privacy. ...
For the purpose of preventing civil aviation offences and maintaining security of civil aviation, passengers are required to give biometric information which must be stored in the International Civil Aviation ...
This is done through the adoption of MRTDs in the interest of public safety and security. What is paramount is that such information must not be used for any purpose other than for what is collected. ...
doi:10.31436/iiumlj.v28i1.502
fatcat:ns2ods63wfdcjhxgvux6dtkmui
Page 421 of The American Economic Review Vol. 27, Issue 2
[page]
1937
The American Economic Review
Titles of the several chapters are: “What will ‘social security’ mean to you?” ...
What will social security mean to you? (Cambridge: Am. Inst. for Econ. Res. 1936. Pp. 64. $1.)
A brief, but pungent, analysis of the significance of the Social Security act. ...
Internet of Things: A Privacy Law Case Study
2015
Social Science Research Network
Indeed, two of the most discussed topics in the legal profession right now are privacy law and the implications that IoT may have on data privacy and security. ...
This document provides a comprehensive set of materials for such a seminar, on a fourteen-week calendar, that explores privacy law through the lens of the new technologies popularly known as "the Internet ...
." 34 In other words, data security is a means to an end of data privacy. ...
doi:10.2139/ssrn.2608473
fatcat:d4trwh7du5c5tl53thwmai23he
« Previous
Showing results 1 — 15 out of 413,868 results