Search results

Jump to navigation Jump to search
  • ...nt would prefer redirection to HTTPS and can handle <code>Content-Security-Policy: upgrade-insecure-requests</code> ...title=Verizon Injecting Perma-Cookies to Track Mobile Customers, Bypassing Privacy Controls|publisher=[[Electronic Frontier Foundation]]|access-date=2014-01-1
    69 KB (5,480 words) - 15:26, 10 July 2023
  • ...azine=Wired |url=https://www.wired.com/story/duckduckgo-quest-prove-online-privacy-possible/ |date=June 16, 2021|access-date=May 5, 2023}}</ref> सबसे ...कभी नहीं था|url=https://www.vox.com/recode/22981115/duckduckgo-free-speech-privacy-oops |access-date=2022-03-19 |website=Vox |language=en}}</ref>
    88 KB (3,940 words) - 12:33, 11 July 2023
  • ...ation for an initial public offering. 'Even the perception of security and privacy concerns, whether or not valid, may inhibit Internet user acceptance of our ...name, email address, age range, gender and zip code. What was the price of privacy? Digital Convergence offered each victim a $10 gift certificate to Radio Sh
    62 KB (3,519 words) - 20:16, 10 October 2023
  • ...ef><ref name=":73">{{Cite journal|last=Miller|first=Amalia|date=2009|title=Privacy Protection and Technology Diffusion: The Case of Electronic Medical Records ...P.|date=2014|title=Security of Electronic Medical Information and Patient Privacy: What You Need to Know|journal=Journal of the American College of Radiology
    132 KB (2,075 words) - 13:25, 11 May 2023
  • ...ional-security-letters/58484F2C1F5194891109319A878CF76F|journal=Journal of Policy History|language=en|volume=28|issue=3|pages=447–469|doi=10.1017/S08980306 ...cumentary film : ''FBI Unbound: How National Security Letters Violate Our Privacy'']
    37 KB (857 words) - 12:32, 25 April 2023
  • ...त्ता पर नीति बनाना|url=https://journalofethics.ama-assn.org/article/making-policy-augmented-intelligence-health-care/2019-02|journal=AMA Journal of Ethics|la ...rithmic Governance |url=https://zenodo.org/record/884116 |journal=Data for Policy 2017: Government by Algorithm? Conference, London |doi=10.5281/ZENODO.88411
    67 KB (2,216 words) - 23:22, 20 June 2023
  • ...त्ता पर नीति बनाना|url=https://journalofethics.ama-assn.org/article/making-policy-augmented-intelligence-health-care/2019-02|journal=AMA Journal of Ethics|la ...rithmic Governance |url=https://zenodo.org/record/884116 |journal=Data for Policy 2017: Government by Algorithm? Conference, London |doi=10.5281/ZENODO.88411
    68 KB (2,178 words) - 12:45, 27 July 2023
  • ...''' compliance, enhanced usability and accessibility. Includes privacy and policy area in Profile, course images on the dashboard, clearer icons and accessib ...improvements, Easily find duplicated items, Hide page last modified dates, Privacy enhancements, Message access control, Nextcloud integration, Context freezi
    45 KB (2,736 words) - 06:28, 15 June 2023
  • ...anner_Complaint.pdf |title=मोबाइल बॉडी स्कैनर शिकायत|publisher= Electronic Privacy Information Center |access-date= 2013-09-03}}</ref> ...और जब्ती के रूप में लगाया जा सकता है।<ref>{{cite web|url= https://epic.org/privacy/airtravel/backscatter/ | website = Epic | title= पूरे शरीर
    87 KB (3,900 words) - 13:09, 28 March 2023
  • ...|url=https://info.lycos.com/resources/privacy-policy/ |title=Lycos Privacy Policy|website=Lycos.com |date=May 11, 2023}}</ref>
    28 KB (976 words) - 16:36, 17 August 2023
  • ...work-post-2020-govt-response-minimum-annual-targets.pdf |title=Smart Meter Policy Framework Post 2020: Government Response to a Consultation on Minimum Annua ...ndation for Information Policy Research|website=Foundation For Information Policy Research}}</ref>
    112 KB (3,622 words) - 16:00, 10 February 2023
  • ...cy-policy.htm |title=ISA – International Sociological Association: Privacy Policy |publisher=International Sociological Association|access-date=2012-07-25}}<
    39 KB (1,913 words) - 08:42, 16 August 2023
  • ...e = Wired|url = https://www.wired.com/2009/05/libraries-warn-of-censorship-privacy-cost-in-googles-digital-library/|access-date = September 8, 2015|last1 = Si ...ive.org/web/20100812015123/http://hlpronline.com/2010/05/the-case-for-book-privacy-parity-google-books-and-the-shift-from-offline-to-online-reading/ |archive-
    92 KB (2,498 words) - 12:44, 25 April 2023
  • ...rithmic Governance |url=https://zenodo.org/record/884116 |journal=Data for Policy 2017: Government by Algorithm? Conference, London |doi=10.5281/ZENODO.88411 ...academic.oup.com/idpl/article/11/4/319/6403925 |journal=International Data Privacy Law |language=en |volume=11 |issue=4 |page=320 |doi=10.1093/idpl/ipab020 |i
    68 KB (2,071 words) - 18:03, 20 June 2023
  • .../ref><ref>{{Cite book |url=https://fas.org/sgp/crs/intel/98-327.pdf |title=Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Elect
    81 KB (2,545 words) - 22:35, 10 September 2022
  • ...ating Stakeholders' Visions of the Future |journal=Knowledge, Technology & Policy|date=December 2008 |volume=21 |issue=4 |pages=191–203 |doi=10.1007/s12130 ...tems, applications, and services - MobiSYS '04|chapter=An architecture for privacy-sensitive ubiquitous computing|date=June 2004|pages=177=189|doi=10.1145/990
    43 KB (1,164 words) - 03:29, 4 December 2023
  • ...-content/uploads/2019/06/Privacy-Preserved-Data-Sharing-for-Evidence-Based-Policy-Decisions.pdf {{Bare URL PDF|date=September 2022}}</ref><ref>Galois 2018 Te ...al machine with the capability to run privacy-preserving operations. Has a privacy-preserving programming language for data mining tools. Includes developer t
    95 KB (1,924 words) - 09:09, 25 May 2023
  • *Office of Strategy, Policy and Plans *Privacy Office
    130 KB (4,364 words) - 12:03, 14 August 2023
  • ...org/10.1007%2F1-4020-8090-5_3 Ross Anderson, "Cryptography and Competition Policy - Issues with ‘Trusted Computing’ ", in ''Economics of Information Secu ...rchive|url=https://web.archive.org/web/20070927060332/http://iase.disa.mil/policy-guidance/dod-dar-tpm-decree07-03-07.pdf |date=2007-09-27 }}</ref>
    103 KB (1,951 words) - 17:02, 4 July 2023
  • ...sified-information |access-date=17 April 2022 |website=Protective Security Policy Framework}}</ref> ....ca/pubs_pol/gospubs/TB_J2/dwnld/spmh_e.rtf|url-status=dead|title=Security Policy – Manager's Handbook|archive-date=1 June 2005}}</ref>
    115 KB (4,433 words) - 10:33, 11 May 2023

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)