Results 221 to 230 of about 1,014,505 (247)
Some of the next articles are maybe not open access.

The protection of genetic information

SALUTE E SOCIETÀ, 2010
The law pertaining to personal data has developed in Italy over a thirty-year span that took us from recognition of such data in the case law, in 1975, to its statutory protection, in 2003. This evolution would subsequently come to the point of specifically regulating the processing of genetic data as data revealing an individual's genetic makeup ...
openaire   +1 more source

Protection detail. Protecting against breach of electronic protected health information.

Journal of healthcare information management : JHIM, 2010
Covered entities need to conduct risk assessments that cover the requirements of HIPAA, HITECH and Meaningful use, and create a process for steady and consistent mitigation of known gaps and vulnerabilities based on risk. Reducing risk of vulnerabilities of unauthorized access to your ePHI can be done via safeguards and controls, plus audits and ...
Gerry, Blass, Susan A, Miller
openaire   +1 more source

ABOUTTECHNICALMEANS OF PROTECTION IN PROTECTION OF INFORMATION

Информационные технологии обеспечения комплексной безопасности в цифровом обществе: сборник материалов V Всероссийской молодежной научно-практической конференции, 2022
openaire   +1 more source

The protective shell of information

Business Information Review, 1990
Outlines the categories of information required to monitor the performance of a company, its industrial sector, competitors, customers and suppliers.
openaire   +1 more source

Legal protection of information

2003
"May 1990." "c1988. -- Published in Weaver, vol. 7, no. 1, Fall 1989."
openaire   +1 more source

Information aspects of Infraredesign protection

2012
Infracrvena zaštita dizajna proizvoda predstavlja originalno rješenje ne samo originalnog dizajna ili zaštitne marke proizvoda već pruža i mogućnost sigurnije komunikacije uopće. Premda se na takav način postiže određeni dojam konspirativnosti u prvom redu treba promatrati upravo aspekt sigurnosti bez obzira na povod i cilj primjene. Rad razmatra drugi
Žiljak Stanimirović, Ivana   +2 more
openaire  

Cryptographic methods of information protection

2020
The problem of protecting information for both an ordinary user and the entire Internet is regarded in the article. We analyze the basics of cryptographic protection of information. The article discusses the history of cryptography, the main tasks of cryptography, as well as cryptographic protection tools (cryptosystems, principles of operation of ...
openaire   +1 more source

The protection of human genetic information

Medical Journal of Australia, 2003
David, Weisbrot, Kerry J, Breen
openaire   +2 more sources

Home - About - Disclaimer - Privacy