Search results

Jump to navigation Jump to search
  • ...05/smli_tr-2005-147/TRCompareEPALandXACML.html A Comparison of Two Privacy Policy Languages:EPAL and XACML by Anne Anderson], Sun Microsystem Laboratories
    3 KB (111 words) - 09:04, 2 March 2023
  • ...ederal Trade Commission Report to Congress|url=https://www.ftc.gov/reports/privacy-online-fair-information-practices-electronic-marketplace-federal-trade-comm ...tion Study Commission, ''[http://epic.org/privacy/ppsc1977report/ Personal Privacy in an Information Society]'' (July 1977).</ref>
    34 KB (1,196 words) - 08:29, 2 March 2023
  • ...g-from-the-privacy-act/ DHS exempts dossiers used for "targeting" from the Privacy Act] February 2010</ref> ...iolating-the-privacy-act/ DHS can't opt out of liability for violating the Privacy Act | PapersPlease.org: April 21, 2011]</ref></ब्लॉककोट>
    21 KB (563 words) - 11:02, 2 March 2023
  • ..., एयरलाइंस और ट्रैवल एजेंसियों द्वारा अनिश्चित काल तक रखी जा सकती हैं।<ref>Privacy & Human Rights, 81.</ref> इसके अलावा, सीआरएस- ...सके बजाय, उन्हें व्यावसायिक लेनदेन डेटा के रूप में माना जाता है।<ref name="Privacy & Human Rights, 80"/>
    28 KB (601 words) - 11:00, 2 March 2023
  • ...6|series=ECOWS '06|url=http://seclab.illinois.edu/ampol-adaptive-messaging-policy}}</ref>
    16 KB (612 words) - 03:17, 16 August 2023
  • <ref name="N9xNj">{{Cite web|title=Referrer Policy: Default to strict-origin-when-cross-origin - Chrome Platform Status|url=ht
    24 KB (872 words) - 08:37, 22 May 2023
  • ...ong<ref>{{Cite web|url=https://zotac.com/page/privacy-policy|title=Privacy Policy of ZOTAC - Mini PCs and GeForce GTX Gaming Graphics Cards|work=ZOTAC|langua
    12 KB (676 words) - 11:17, 25 April 2023
  • ...s://papers.ssrn.com/sol3/papers.cfm?abstract_id=3944667 |journal=Rights to Privacy and Data Protection in Armed Conflict}}</ref>
    40 KB (1,148 words) - 00:46, 9 September 2022
  • ...>{{cite book|title=Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age|author=Levy, S.|date=2001|publisher=Penguin Publishing G ...York. ... [Diffie] was always concerned about individuals, an individual's privacy as opposed to Government secrecy. ... Diffie, now 50, is still committed to
    42 KB (1,773 words) - 10:54, 11 May 2023
  • ...|url=https://bits.blogs.nytimes.com/2011/06/22/canadian-inquiry-finds-privacy-issues-in-sale-of-used-products-at-staples |title=Data Privacy: Foundations, New Developments and the Big Data Challenge |series=Studies
    74 KB (1,624 words) - 15:35, 6 March 2023
  • ...vid Chaum]] || 2004 || "For numerous seminal contributions to security and privacy research and for visionary leadership in the role of IACR founder." ...tive contributions to cryptography and its application to the security and privacy of real world systems."
    38 KB (2,248 words) - 11:16, 11 May 2023
  • ...s://papers.ssrn.com/sol3/papers.cfm?abstract_id=3944667 |journal=Rights to Privacy and Data Protection in Armed Conflict |date=15 September 2021 |ssrn=3944667 ...ix.org/event/leet11/tech/full_papers/Nikiforakis.pdf "Exposing the Lack of Privacy in File Hosting Services] {{Webarchive|url=https://web.archive.org/web/2011
    51 KB (1,542 words) - 12:34, 4 March 2024
  • {{other uses|Policy (disambiguation)}}
    62 KB (1,922 words) - 14:12, 19 February 2023
  • ...012|archive-url=https://web.archive.org/web/20121115055603/http://epic.org/privacy/flutrends/EPIC_ltr_FluTrends_11-08.pdf|archive-date=15 November 2012|url-st
    35 KB (1,118 words) - 16:37, 26 September 2023
  • ...l|last=Dagher |display-authors=etal |first=Gaby G.|date=2018|title=Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic
    67 KB (1,111 words) - 13:01, 10 August 2023
  • ...May 2018}}</ref><ref>{{cite web|title="Black Boxes" in Passenger Vehicles: Policy Issues|url=https://fas.org/sgp/crs/misc/R43651.pdf|access-date=7 May 2018}} ...ttps://www.ncsl.org/research/telecommunications-and-information-technology/privacy-of-data-from-event-data-recorders.aspx |website=National Conference of Stat
    66 KB (1,255 words) - 11:23, 13 December 2023
  • <!-- This article may require editing to conform to the Neutral Point of View policy. Please see the talk-page to discuss this (this seems to be mostly related ...excerpt included in [http://wearcam.org/netcam_privacy_issues.html Netcam Privacy Issues] for more on security cameras in changing rooms</ref>
    23 KB (391 words) - 01:49, 13 June 2023
  • ...ument|url=https://www.rand.org/pubs/papers/P3544.html|title = Security and Privacy in Computer Systems|date = January 1967|last1 = Ware|first1 = Willis H.}}</ * [[Password policy]]
    24 KB (625 words) - 15:59, 11 May 2022
  • {{Short description|Technical and Policy systems to give users appropriate access}} ...barchive|url=https://web.archive.org/web/20090428062932/http://www.cdt.org/privacy/issues/pii/ |date=28 April 2009 }}, The Center For Democracy & Technology,
    73 KB (1,860 words) - 13:00, 18 September 2023
  • ...an Explanation' to a 'Right to Better Decisions'?|journal=IEEE Security & Privacy|volume=16|issue=3|pages=46–54|doi=10.1109/MSP.2018.2701152|ssrn=3052831|s ...ficial Intelligence: how might the New Zealand government respond?|journal=Policy Quarterly|volume=13|issue=4|doi=10.26686/pq.v13i4.4619|issn=2324-1101|doi-a
    46 KB (1,788 words) - 18:01, 20 June 2023
  • ...nt would prefer redirection to HTTPS and can handle <code>Content-Security-Policy: upgrade-insecure-requests</code> ...title=Verizon Injecting Perma-Cookies to Track Mobile Customers, Bypassing Privacy Controls|publisher=[[Electronic Frontier Foundation]]|access-date=2014-01-1
    69 KB (5,480 words) - 15:26, 10 July 2023
  • ...azine=Wired |url=https://www.wired.com/story/duckduckgo-quest-prove-online-privacy-possible/ |date=June 16, 2021|access-date=May 5, 2023}}</ref> सबसे ...कभी नहीं था|url=https://www.vox.com/recode/22981115/duckduckgo-free-speech-privacy-oops |access-date=2022-03-19 |website=Vox |language=en}}</ref>
    88 KB (3,940 words) - 12:33, 11 July 2023
  • ...ation for an initial public offering. 'Even the perception of security and privacy concerns, whether or not valid, may inhibit Internet user acceptance of our ...name, email address, age range, gender and zip code. What was the price of privacy? Digital Convergence offered each victim a $10 gift certificate to Radio Sh
    62 KB (3,519 words) - 20:16, 10 October 2023
  • ...ef><ref name=":73">{{Cite journal|last=Miller|first=Amalia|date=2009|title=Privacy Protection and Technology Diffusion: The Case of Electronic Medical Records ...P.|date=2014|title=Security of Electronic Medical Information and Patient Privacy: What You Need to Know|journal=Journal of the American College of Radiology
    132 KB (2,075 words) - 13:25, 11 May 2023
  • ...ional-security-letters/58484F2C1F5194891109319A878CF76F|journal=Journal of Policy History|language=en|volume=28|issue=3|pages=447–469|doi=10.1017/S08980306 ...cumentary film : ''FBI Unbound: How National Security Letters Violate Our Privacy'']
    37 KB (857 words) - 12:32, 25 April 2023
  • ...त्ता पर नीति बनाना|url=https://journalofethics.ama-assn.org/article/making-policy-augmented-intelligence-health-care/2019-02|journal=AMA Journal of Ethics|la ...rithmic Governance |url=https://zenodo.org/record/884116 |journal=Data for Policy 2017: Government by Algorithm? Conference, London |doi=10.5281/ZENODO.88411
    67 KB (2,216 words) - 23:22, 20 June 2023
  • ...त्ता पर नीति बनाना|url=https://journalofethics.ama-assn.org/article/making-policy-augmented-intelligence-health-care/2019-02|journal=AMA Journal of Ethics|la ...rithmic Governance |url=https://zenodo.org/record/884116 |journal=Data for Policy 2017: Government by Algorithm? Conference, London |doi=10.5281/ZENODO.88411
    68 KB (2,178 words) - 12:45, 27 July 2023
  • ...''' compliance, enhanced usability and accessibility. Includes privacy and policy area in Profile, course images on the dashboard, clearer icons and accessib ...improvements, Easily find duplicated items, Hide page last modified dates, Privacy enhancements, Message access control, Nextcloud integration, Context freezi
    45 KB (2,736 words) - 06:28, 15 June 2023
  • ...anner_Complaint.pdf |title=मोबाइल बॉडी स्कैनर शिकायत|publisher= Electronic Privacy Information Center |access-date= 2013-09-03}}</ref> ...और जब्ती के रूप में लगाया जा सकता है।<ref>{{cite web|url= https://epic.org/privacy/airtravel/backscatter/ | website = Epic | title= पूरे शरीर
    87 KB (3,900 words) - 13:09, 28 March 2023
  • ...|url=https://info.lycos.com/resources/privacy-policy/ |title=Lycos Privacy Policy|website=Lycos.com |date=May 11, 2023}}</ref>
    28 KB (976 words) - 16:36, 17 August 2023
  • ...work-post-2020-govt-response-minimum-annual-targets.pdf |title=Smart Meter Policy Framework Post 2020: Government Response to a Consultation on Minimum Annua ...ndation for Information Policy Research|website=Foundation For Information Policy Research}}</ref>
    112 KB (3,622 words) - 16:00, 10 February 2023
  • ...cy-policy.htm |title=ISA – International Sociological Association: Privacy Policy |publisher=International Sociological Association|access-date=2012-07-25}}<
    39 KB (1,913 words) - 08:42, 16 August 2023
  • ...e = Wired|url = https://www.wired.com/2009/05/libraries-warn-of-censorship-privacy-cost-in-googles-digital-library/|access-date = September 8, 2015|last1 = Si ...ive.org/web/20100812015123/http://hlpronline.com/2010/05/the-case-for-book-privacy-parity-google-books-and-the-shift-from-offline-to-online-reading/ |archive-
    92 KB (2,498 words) - 12:44, 25 April 2023
  • ...rithmic Governance |url=https://zenodo.org/record/884116 |journal=Data for Policy 2017: Government by Algorithm? Conference, London |doi=10.5281/ZENODO.88411 ...academic.oup.com/idpl/article/11/4/319/6403925 |journal=International Data Privacy Law |language=en |volume=11 |issue=4 |page=320 |doi=10.1093/idpl/ipab020 |i
    68 KB (2,071 words) - 18:03, 20 June 2023
  • .../ref><ref>{{Cite book |url=https://fas.org/sgp/crs/intel/98-327.pdf |title=Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Elect
    81 KB (2,545 words) - 22:35, 10 September 2022
  • ...ating Stakeholders' Visions of the Future |journal=Knowledge, Technology & Policy|date=December 2008 |volume=21 |issue=4 |pages=191–203 |doi=10.1007/s12130 ...tems, applications, and services - MobiSYS '04|chapter=An architecture for privacy-sensitive ubiquitous computing|date=June 2004|pages=177=189|doi=10.1145/990
    43 KB (1,164 words) - 03:29, 4 December 2023
  • ...-content/uploads/2019/06/Privacy-Preserved-Data-Sharing-for-Evidence-Based-Policy-Decisions.pdf {{Bare URL PDF|date=September 2022}}</ref><ref>Galois 2018 Te ...al machine with the capability to run privacy-preserving operations. Has a privacy-preserving programming language for data mining tools. Includes developer t
    95 KB (1,924 words) - 09:09, 25 May 2023
  • *Office of Strategy, Policy and Plans *Privacy Office
    130 KB (4,364 words) - 12:03, 14 August 2023
  • ...org/10.1007%2F1-4020-8090-5_3 Ross Anderson, "Cryptography and Competition Policy - Issues with ‘Trusted Computing’ ", in ''Economics of Information Secu ...rchive|url=https://web.archive.org/web/20070927060332/http://iase.disa.mil/policy-guidance/dod-dar-tpm-decree07-03-07.pdf |date=2007-09-27 }}</ref>
    103 KB (1,951 words) - 17:02, 4 July 2023
  • ...sified-information |access-date=17 April 2022 |website=Protective Security Policy Framework}}</ref> ....ca/pubs_pol/gospubs/TB_J2/dwnld/spmh_e.rtf|url-status=dead|title=Security Policy – Manager's Handbook|archive-date=1 June 2005}}</ref>
    115 KB (4,433 words) - 10:33, 11 May 2023
  • ...े हैं।<ref name="ReferenceA">Salomons, E., Sela, L., Housh, M. Hedging for privacy in smart water meters. Water Resources Research; 2020;56(9){{doi|10.1029/20 ...work-post-2020-govt-response-minimum-annual-targets.pdf |title=Smart Meter Policy Framework Post 2020: Government Response to a Consultation on Minimum Annua
    121 KB (3,537 words) - 11:48, 6 March 2023
  • ...o.org/publications/documents/NASCIO-dataMining.pdf ''Think Before You Dig: Privacy Implications of Data Mining & Aggregation''] {{webarchive|url=https://web.a ...क्षा और उपभोक्ता कल्याण पर बिग डेटा का प्रभाव|journal = Telecommunications Policy|pages = 1134–1145|volume = 38|issue = 11|doi = 10.1016/j.telpol.2014.10.0
    81 KB (2,474 words) - 08:22, 2 March 2023
  • *Office of Strategy, Policy and Plans *Privacy Office
    130 KB (4,114 words) - 04:15, 22 November 2022
  • ...ttps://anovaculinary.com/pages/terms/|title=Terms and Conditions & Privacy Policy {{!}} Anova Culinary|work=Anova Culinary|access-date=2017-03-07|language=en
    47 KB (2,387 words) - 13:04, 9 June 2023
  • ...जी कुंजी की सुरक्षा करना| book-title = 2015 IEEE Symposium on Security and Privacy| date = May 2015| isbn = 978-1-4673-6949-7|url = https://www.ieee-security.
    70 KB (2,401 words) - 12:02, 4 March 2024
  • ...t/fedlaws/publ_109-058.pdf |archive-date=2011-03-03 }} US Congress, Energy Policy Act of 2005</ref> ...ttps://spectrum.ieee.org/energy/the-smarter-grid/privacy-on-the-smart-grid Privacy on the Smart Grid]</ref>
    45 KB (501 words) - 15:08, 30 December 2022
  • 38 KB (550 words) - 20:25, 31 December 2022
  • ...77–389</ref><ref name="kristol">Kristol, David; ''HTTP Cookies: Standards, privacy, and politics'', ACM Transactions on Internet Technology, 1(2), 151–198, ...e.org/web/20141127185609/http://www.computerworld.com/article/2510494/data-privacy/microsoft-disables--supercookies--used-on-msn-com-visitors.html |archive-da
    174 KB (5,685 words) - 09:01, 2 March 2023
  • ...जी कुंजी की सुरक्षा करना| book-title = 2015 IEEE Symposium on Security and Privacy| date = May 2015| isbn = 978-1-4673-6949-7|url = https://www.ieee-security.
    76 KB (2,270 words) - 14:40, 24 August 2023
  • ...=Privacy>{{cite web |url=https://www.thersa.org/privacy |title=Our privacy policy |work=www.thersa.org |accessdate=2022-01-14}}</ref> कला, विनिर्माण और वाणिज्य के प्रोत्साहन के लिए रॉयल सोसाइटी (आरएसए),<ref name=Privacy/><ref>also trading as '''The Royal Society of the Arts, Manufactures and Co
    53 KB (1,918 words) - 03:30, 16 August 2023
  • ...y about IBM's decision. Announced in February 1983, IBM's object-code-only policy has been applied to a growing list of Big Blue system software products |ar ...last1=Strandburg|first1=Katherine J.|last2=Raicu|first2=Daniela Stan|title=Privacy and Technologies of Identity: A Cross-Disciplinary Conversation|date=2005|p
    117 KB (7,726 words) - 14:30, 6 July 2023
  • ...भविष्य के हितधारकों के दृष्टिकोण पर बातचीत|journal=Knowledge, Technology & Policy|date=December 2008 |volume=21 |issue=4 |pages=191–203 |doi=10.1007/s12130 ...र्राष्ट्रीय सम्मेलन की कार्यवाही - MobiSYS '04|chapter=An architecture for privacy-sensitive ubiquitous computing|date=June 2004|pages=177=189|doi=10.1145/990
    46 KB (1,014 words) - 16:02, 12 October 2023
  • ...-Time Intelligence – A GEOINT Singularity {{!}} Aerospace Center for Space Policy and Strategy |url=https://csps.aerospace.org/papers/future-ubiquitous-real-
    206 KB (6,572 words) - 17:47, 8 June 2023
  • ...t3=Elmar |title=क्लाउड कंप्यूटिंग कमजोरियों को समझना|journal=IEEE Security Privacy |date=March 2011 |volume=9 |issue=2 |pages=50–57 |doi=10.1109/MSP.2010.11
    110 KB (2,057 words) - 16:26, 6 April 2023
  • ...dition]] |date=2010-03-25| url=http://www.zdnet.com/blog/feeds/foursquares-privacy-loopholes/2607?pg=2 |access-date=2011-04-26}}</ref>
    50 KB (1,426 words) - 00:32, 1 January 2023
  • ...ै।<ref>Informants and Undercover Investigations: A Practical Guide to Law, Policy, Dennis G. Fitzgerald, CRC Press, Jan 24, 2007, page 204</ref> ...ence.co.uk/tscm-sweep-guide.html A simple guide to TSCM]'', How to protect privacy
    46 KB (1,614 words) - 00:29, 22 November 2022
  • ...s://www.theverge.com/2020/2/25/21152335/mozilla-firefox-dns-over-https-web-privacy-security-encryption|title=Firefox turns controversial encryption on by defa ...s://www.mozilla.org/projects/security/pki/psm/help_21/ssl_help.html |title=Privacy & Security Preferences&nbsp;– SSL |access-date=January 24, 2007 |date=Aug
    260 KB (15,670 words) - 09:48, 18 February 2023
  • ...n |first=Garth O. |title=WHOIS Running the Internet: Protocol, Policy, and Privacy |publisher=Wiley |year=2015 |isbn=9781118679555 |edition=1st |page=25}}</re
    48 KB (1,478 words) - 10:32, 27 July 2023
  • |Director of the [[Center on Privacy and Technology]] at the [[Georgetown University Law Center]] ...title=FTC Names Latanya Sweeney as Chief Technologist; Andrea Matwyshyn as Policy Advisor|url=https://www.ftc.gov/news-events/press-releases/2013/11/ftc-name
    78 KB (2,529 words) - 10:58, 2 March 2023
  • ...ts, in: "Essays on Deep Packet Inspection", Ottawa|website=Office of the [[Privacy Commissioner of Canada]]|author1=Hal Abelson|author2=Ken Ledeen|author3=Chr ...-15|title=ACoPE: An adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks|url=https://www.sciencedirect.com/sc
    101 KB (3,161 words) - 14:54, 15 May 2023
  • ...lling for Social Engineering: A Qualitative Analysis of Social Engineering Policy Recommendations |url=http://journals.sagepub.com/doi/10.1177/08944393221117
    95 KB (2,301 words) - 14:14, 2 March 2023
  • ...ni Ahmed and Sebastian Gianci, ''Zakat'', Encyclopedia of Taxation and Tax Policy, p. 479, quote: "As one of the Islam's five pillars, zakat becomes an oblig
    92 KB (4,912 words) - 08:07, 2 June 2023
  • ...E, Ashton H,(2012), "The Transparent Body – Medical Information, Physical Privacy and Respect for Body Integrity", in Mordini E, Tzovaras D (eds), ''Second G ...vacy-in-Biometrics-Based-Authentication-Systems.pdf Enhancing security and privacy in biometrics-based authentication systems]", ''IBM Systems Journal'', vol.
    136 KB (3,226 words) - 10:47, 8 December 2022
  • 51 KB (1,578 words) - 11:47, 3 January 2023
  • ...tching Where You're Driving? | date=13 June 2017 | publisher=Office of the Privacy Commissioner of Canada | access-date=17 January 2020}}</ref>
    184 KB (5,239 words) - 16:17, 4 December 2023
  • ...//www.tandfonline.com/doi/full/10.1080/08111146.2020.1853522|journal=Urban Policy and Research|volume=39|language=en|pages=106–119|doi=10.1080/08111146.202 ...rg/web/20220402131409/https://www.freepress.net/sites/default/files/legacy-policy/digital_denied_free_press_report_december_2016.pdf |date=2 April 2022 }} {{
    181 KB (6,290 words) - 07:09, 4 December 2023
  • ...o.org/publications/documents/NASCIO-dataMining.pdf ''Think Before You Dig: Privacy Implications of Data Mining & Aggregation''] {{webarchive|url=https://web.a ...क्षा और उपभोक्ता कल्याण पर बिग डेटा का प्रभाव|journal = Telecommunications Policy|pages = 1134–1145|volume = 38|issue = 11|doi = 10.1016/j.telpol.2014.10.0
    84 KB (2,262 words) - 12:55, 15 December 2022
  • ...iety.org/resources/deploy360/2014/privacy-extensions-for-ipv6-slaac/|title=Privacy Extensions for Stateless Address Autoconfiguration in IPv6|author=T. Narten ...or IPv6 SLAAC|url=https://www.internetsociety.org/resources/deploy360/2014/privacy-extensions-for-ipv6-slaac|website=Internet Society|access-date=17 January 2
    114 KB (3,322 words) - 20:05, 25 July 2023
  • ...licy|website=United States Patent and Trademark Office|publisher=Office of Policy and International Affairs|access-date=December 1, 2019}}</ref> *{{cite book|title=International guide to privacy|year=2004|chapter=Trade Secrets|chapter-url=https://books.google.com/books?
    69 KB (2,195 words) - 11:24, 9 September 2022
  • ...यौन सुरक्षा|author=Paige M. Padgett |journal=Sexuality Research and Social Policy: National Sexuality Resource Center |date=June 2007 |volume=4 |issue=2 |pag * [https://www.privacyrights.org/ Privacy Rights Clearinghouse]
    89 KB (3,219 words) - 08:33, 2 March 2023
  • ...in |first1=Douglas A. |title=Clashing Over Commerce: A History of US Trade Policy |date=November 2017 |publisher=University of Chicago Press}}</ref><ref name ...olicy Got to Do with Gender Inequality? Evidence from Asia." Global Social Policy 12.2 (2012): 183–89. Web</ref> इसके अलावा, जब [[न
    92 KB (3,228 words) - 08:11, 20 January 2024
  • 57 KB (1,663 words) - 19:11, 7 September 2022
  • ...e-post-evidence-and-statement-in-response-to-media-coverage-on-our-privacy-policy/ |url-status=live }}</ref>
    132 KB (8,592 words) - 12:33, 7 September 2022
  • ...Weymouth |first=Stephen |date=2023 |title=Digital Globalization: Politics, Policy, and a Governance Paradox |url=https://www.cambridge.org/core/elements/digi ...title=डिजिटल अर्थव्यवस्था को मापना|url=https://www.imf.org/en/Publications/Policy-Papers/Issues/2018/04/03/022818-measuring-the-digital-economy|journal=}}</r
    124 KB (3,773 words) - 17:15, 4 December 2023
  • ...n, S. M. (2009). Smart Grid. Electrical Power Transmission: Background and Policy Issues. The Capital.Net, Government Series. Pp. 1-42.</ref> ...% interconnection target in the context of CO2 mitigation†|journal=Climate Policy|volume=16|issue=5|pages=658–672|doi=10.1080/14693062.2016.1160864|doi-acc
    110 KB (2,707 words) - 11:11, 16 February 2023
  • ...नेबाजी की|work=109th Congress (2005–2006) H.R.4709 – Telephone Records and Privacy Protection Act of 2006 |year=2007}}</ref>
    100 KB (2,119 words) - 15:28, 12 October 2023
  • ...10925071533/https://wheels.blogs.nytimes.com/2011/09/22/changes-to-onstars-privacy-terms-rile-some-users|archive-date=September 25, 2011|website=[[The New Yor ...onsumerreports.org/cro/news/2011/09/gm-reverses-decision-on-onstar-privacy-policy/index.htm
    66 KB (1,279 words) - 11:32, 6 April 2023
  • ...क हेरफेर और इंटरनेट विज्ञापन आधारभूत संरचना|journal=Journal of Information Policy|volume=9|pages=370–410|doi=10.5325/jinfopoli.9.2019.0370|jstor=10.5325/ji [http://www.truste.com/consumer-privacy/about-oba/ TrustE, "What is Behavioral Advertising"]</ref>
    151 KB (3,018 words) - 08:15, 2 March 2023
  • ...ticum.brooklaw.edu/sites/default/files/print/pdfs/journals/journal-law-and-policy/volume-17/issue-1/jlp_v17i_7.pdf|archive-date=February 4, 2016|access-date= {{quote|The case hinges on privacy, the right of people not to have their likeness used in an ad without permi
    70 KB (4,008 words) - 22:21, 18 February 2023
  • ...p://securitymanagement.com/news/companies-seek-full-body-scans-ease-health-privacy-concerns-006852 |archive-date=October 6, 2014 }}</ref> ...ही प्रभावित हैं।<ref>{{cite news|url=http://www.abc.net.au/news/2012-02-06/privacy-questions-over-airport-body-scan-laws/3813760 |title=No opt-out rule for ai
    149 KB (5,035 words) - 20:59, 14 August 2023
  • ...archive-url=https://web.archive.org/web/20091019084422/http://www.aclu.org/privacy/spying/23279res20051229.html|archive-date=October 19, 2009|url-status=live} ...Supreme Court and the Powers of the Executive: The Adjudication of Foreign Policy|url=https://www.jstor.org/stable/449187|journal=Political Research Quarterl
    246 KB (11,074 words) - 18:31, 8 June 2023
  • ...on-technology/2015/11/windows-10-november-update-was-pulled-for-forgetting-privacy-settings-its-now-back/|access-date=November 25, 2015|website=Ars Technica|p ...r Application Guard]] and [[Windows Management Instrumentation|WMI]] Group Policy Service
    161 KB (12,886 words) - 14:02, 3 May 2023
  • ...clusive/exclusive-facebook-to-put-1-5-billion-users-out-of-reach-of-new-eu-privacy-law-idUSKBN1HQ00P |archive-date=23 April 2018 |url-status=live}}</ref> Simi ...ousin Brian Lenihan became finance minister, setting much of the Revenue's policy. Two years later, after continued entreaties by O'Rourke, the Revenue's off
    242 KB (15,204 words) - 06:58, 11 August 2023
  • ...hallenge: An introduction to the special issue |journal=Telecommunications Policy |date=October 2015 |volume=39 |issue=9 |pages=745–750 |doi=10.1016/j.telp ...eek the just': Social media and social justice |journal=Telecommunications Policy |date=October 2015 |volume=39 |issue=9 |pages=796–803 |doi=10.1016/j.telp
    213 KB (8,413 words) - 16:37, 28 January 2023
  • ...र|url=https://ieeexplore.ieee.org/document/8283433|journal=IEEE Security & Privacy|volume=16|issue=1|pages=24–33|doi=10.1109/MSP.2018.1331018|s2cid=3285319| ...R. Rohozinski, & J. Zittrain, (Eds.), Access Denied: The Practice and Policy of Global Internet Filtering, Cambridge: MIT Press. <nowiki>http://opennet.
    62 KB (4,953 words) - 15:37, 12 May 2023
  • ...] में बाधा के बिना।<ref>{{Citation|last=Keyser|first=Tobias|title=Security policy|date=2018-04-19|url=http://dx.doi.org/10.1201/9781315385488-13|work=The Inf ...//dx.doi.org/10.1080/15536548.2011.10855915|journal=Journal of Information Privacy and Security|volume=7|issue=3|pages=3–22|doi=10.1080/15536548.2011.108559
    295 KB (15,613 words) - 22:36, 8 September 2022
  • {{Further|Password policy}} ...ासवर्ड की दृढ़ता को स्वीकार करते हुए एक शोध एजेंडा|publisher=IEEE Security&Privacy |date=Jan 2012 |access-date=2015-06-20 |url-status=live |archive-url=https:
    147 KB (4,014 words) - 22:59, 17 December 2022
  • ...्स हार्डवेयर डेवलपमेंट के लिए निवेश पर रिटर्न।|journal= Science and Public Policy |volume= 43 |issue= 2 |pages= 192–195 |doi= 10.1093/scipol/scv034 |doi-a ...ty issues [online]. (2016). Available from http://www.replicant.us/freedom-privacy-security-issues.php. (Accessed 02/22/2016) "The freedom to use the hardware
    80 KB (3,045 words) - 12:33, 10 March 2023
  • ...प्रवर्तन]] पर इन कंपनियों के प्रभाव पर सवाल उठाया है।<ref>{{Citation|title=Privacy, power and censorship: how to regulate big tech|date=April 29, 2019|url=htt ...books?id=98owEAAAQBAJ&pg=PT132 |title=Issues for Debate in American Public Policy: Selections from CQ Researcher |date=September 14, 2021 |isbn=9781071835258
    170 KB (6,937 words) - 17:05, 8 July 2023
  • ...hallenge: An introduction to the special issue |journal=Telecommunications Policy |date=October 2015 |volume=39 |issue=9 |pages=745–750 |doi=10.1016/j.telp ...लिए बाज़ारों में आर्थिक प्रोत्साहन|journal=Harvard Journal of Law & Public Policy |year=1990 |volume=13 |issue=909 |pages=867–910}}</ref><ref name="Heyligh
    214 KB (7,942 words) - 17:27, 7 August 2023
  • ...builds. The earlier [[Long-term support]] and Short-term support lifecycle policy was cancelled.<ref>{{cite web |title=Release and support cycle |url=https:/ ....0 Release |url=https://www.joomla.org/announcements/release-news/5748-the-privacy-tool-suite-by-joomla-joomla-3-9-is-here.html |website=Joomla.org |date=30 O
    81 KB (4,719 words) - 23:57, 14 June 2023
  • ...रिभाषा और शासन की चुनौती: विशेष मुद्दे का परिचय|journal=Telecommunications Policy |date=October 2015 |volume=39 |issue=9 |pages=745–750 |doi=10.1016/j.telp ...्याय की तलाश करो': सोशल मीडिया और सामाजिक न्याय|journal=Telecommunications Policy |date=October 2015 |volume=39 |issue=9 |pages=796–803 |doi=10.1016/j.telp
    241 KB (7,318 words) - 12:53, 23 February 2023
  • ...michstate/reader.action?docID=10021934|title=Euthanasia, Ethics and Public Policy: an Argument against Legislation|last=Keown|first=John|date=2002|website=Pr
    176 KB (5,185 words) - 22:16, 15 August 2023
  • ...talog/item/default.asp?ttype=2&tid=11329 ''Access Denied: The Practice and Policy of Global Internet Filtering''] {{webarchive|url=https://web.archive.org/we ...talog/item/default.asp?ttype=2&tid=11329 ''Access Denied: The Practice and Policy of Global Internet Filtering''] {{webarchive|url=https://web.archive.org/we
    226 KB (7,491 words) - 16:22, 11 May 2023
  • ...pressnews.com/news/us-world/us/article/Boy-Scouts-ranks-drop-after-year-of-policy-change-5229744.php}}</ref> ...siness/2012/09/18/corporations-giving-big-money-boy-scouts-despite-antigay-policy |access-date=January 4, 2013 |publisher=The Advocate}}</ref>
    208 KB (9,394 words) - 08:38, 11 August 2023
  • ...rlands]|oclc=846492852}}</ref>{{blockquote|Cyberwarfare is an extension of policy by actions taken in cyberspace by state actors (or by non-state actors with ...rivacy-security-research-upcoming-battlefield-things|title=Implications of Privacy & Security Research for the Upcoming Battlefield of Things {{!}} Journal of
    259 KB (9,541 words) - 12:04, 27 July 2023
  • ...ं कई कमियों और संभावित सुधारों पर प्रकाश डाला गया था।<ref>{{cite web|title=Privacy and Security: A modern and transparent legal framework|url=http://isc.indep
    132 KB (5,111 words) - 10:48, 11 May 2023
  • ...https://web.archive.org/web/20181007200857/http://www.historyandpolicy.org/policy-papers/papers/history-of-tax-havens|archive-date=7 October 2018|url-status=
    394 KB (18,647 words) - 18:26, 9 July 2023
  • ...nt under law... is the authorized imposition of deprivations—of freedom or privacy or other goods to which the person otherwise has a right, or the imposition ...ss/1372651 "An Economic Analysis of the Criminal Law as Preference-Shaping Policy"], ''Duke Law Journal'', Feb 1990, Vol. 1, Kenneth Dau-Schmidt
    70 KB (3,293 words) - 17:40, 18 June 2023
  • ...="levine">{{cite web |first=John |last=Levine |website=Internet and e-mail policy and practice |title=मेनसलीज़ ब्लॉग|url=https://jl ...जब तक कि पार्टियों के बीच पहले से कोई व्यावसायिक संबंध नही होता है।<ref>[[Privacy and Electronic Communications (EC Directive) Regulations 2003]]</ref><ref>{
    90 KB (3,072 words) - 20:35, 30 June 2023

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)