Results 221 to 230 of about 1,014,505 (247)
Some of the next articles are maybe not open access.
The protection of genetic information
SALUTE E SOCIETÀ, 2010The law pertaining to personal data has developed in Italy over a thirty-year span that took us from recognition of such data in the case law, in 1975, to its statutory protection, in 2003. This evolution would subsequently come to the point of specifically regulating the processing of genetic data as data revealing an individual's genetic makeup ...
openaire +1 more source
Protection detail. Protecting against breach of electronic protected health information.
Journal of healthcare information management : JHIM, 2010Covered entities need to conduct risk assessments that cover the requirements of HIPAA, HITECH and Meaningful use, and create a process for steady and consistent mitigation of known gaps and vulnerabilities based on risk. Reducing risk of vulnerabilities of unauthorized access to your ePHI can be done via safeguards and controls, plus audits and ...
Gerry, Blass, Susan A, Miller
openaire +1 more source
ABOUTTECHNICALMEANS OF PROTECTION IN PROTECTION OF INFORMATION
Информационные технологии обеспечения комплексной безопасности в цифровом обществе: сборник материалов V Всероссийской молодежной научно-практической конференции, 2022openaire +1 more source
The protective shell of information
Business Information Review, 1990Outlines the categories of information required to monitor the performance of a company, its industrial sector, competitors, customers and suppliers.
openaire +1 more source
Legal protection of information
2003"May 1990." "c1988. -- Published in Weaver, vol. 7, no. 1, Fall 1989."
openaire +1 more source
Information aspects of Infraredesign protection
2012Infracrvena zaštita dizajna proizvoda predstavlja originalno rješenje ne samo originalnog dizajna ili zaštitne marke proizvoda već pruža i mogućnost sigurnije komunikacije uopće. Premda se na takav način postiže određeni dojam konspirativnosti u prvom redu treba promatrati upravo aspekt sigurnosti bez obzira na povod i cilj primjene. Rad razmatra drugi
Žiljak Stanimirović, Ivana +2 more
openaire
Types of Information Compromised in Breaches of Protected Health Information
Annals of Internal Medicine, 2020John Xuefeng, Jiang, Ge, Bai
openaire +2 more sources
Cryptographic methods of information protection
2020The problem of protecting information for both an ordinary user and the entire Internet is regarded in the article. We analyze the basics of cryptographic protection of information. The article discusses the history of cryptography, the main tasks of cryptography, as well as cryptographic protection tools (cryptosystems, principles of operation of ...
openaire +1 more source
The protection of human genetic information
Medical Journal of Australia, 2003David, Weisbrot, Kerry J, Breen
openaire +2 more sources

