Search for: "Center for Information Technology Policy"
Results 1461 - 1480
of 5,254
Sorted by Relevance
|
Sort by Date
19 Dec 2014, 8:39 am
The physician and his staff allegedly were not following hospital policy and applicable law requiring employees to encrypt and physically secure laptops containing protected health information and personal information. [read post]
6 Aug 2019, 6:30 am
An effective method to ensure compliance with the policy is through cellphone blocking technology. [read post]
16 May 2023, 12:01 am
He is a visiting scientist with the Lurie Center for Disability Policy in the Heller School for Social Policy and Management at Brandeis University, and principal of Claypool Consulting. [read post]
27 Oct 2016, 8:48 am
OCR began investigating OHSU after the large public academic health center and research university centered in Portland, Oregon, submitted three HIPAA breach reports affecting thousands of individuals, including two reports involving unencrypted laptops and another large breach involving a stolen unencrypted thumb drive: On March 23, 2013, HHS received notification from OHSU regarding a breach of its unsecured electronic protected health information (“ePHI”)… [read post]
19 Mar 2025, 11:34 am
” Following this keynote, Access Now’s MENA Policy and Advocacy D [read post]
5 Jul 2024, 11:30 pm
In this Government Technology Q&A, Jerry Dotson, vice president of public sector, Avaya Government Solutions, explains how the right CX platform lets government organizations implement new contact center technologies easily and efficiently. [read post]
5 Jul 2024, 11:30 pm
In this Government Technology Q&A, Jerry Dotson, vice president of public sector, Avaya Government Solutions, explains how the right CX platform lets government organizations implement new contact center technologies easily and efficiently. [read post]
3 Jan 2013, 7:15 am
Information Technology. [read post]
22 Dec 2023, 5:17 am
This process not only fosters ethical information management but also strikes a necessary balance between transparency and the protection of sensitive information. [read post]
11 Nov 2024, 6:41 am
“Meta collected this sensitive information and used it for individualized services, making only vague mentions of this use in their data policy without specific consent,” Lee stated. [read post]
15 Feb 2011, 11:51 am
David Doniger, Policy Director, NRDC Climate Center, Washington, D.C. [read post]
20 Mar 2014, 3:13 pm
They were more cross-cutting issues like overall environmental policy or investment policies. [read post]
14 May 2022, 9:39 am
Solutions for Compliance & Information Governance creates, optimizes, and manages scalable information governance practices through advisement & assessments, technology & workflow implementations, and more with over 40 Legal Hold implementations, as well as executing around cyber security, AML / KYC, privacy, and policy management needs. [read post]
28 Oct 2007, 9:34 am
That connectivity might be between technology companies and their users, whose identities they seek otherwise to control. [read post]
7 Apr 2020, 10:17 am
Enable security features that block malicious email, such as anti-phishing and anti-spoofing policies. [read post]
5 Jun 2014, 12:28 am
" Joana Varon, Center for Technology and Society (Brazil):"Snowden has provided us with the most powerful tool of our current era: information. [read post]
18 May 2022, 1:07 pm
The brief was signed by 20 tech-industry and advocacy groups, including the Chamber of Progress; Anti-Defamation League; Connected Commerce Council; Consumer Technology Association; Engine Advocacy; Family Online Safety Institute; HONR Network Inc.; Information Technology & Innovation Foundation; Interactive Advertising Bureau; IP Justice; LGBT Tech Institute; Multicultural Media, Telecom and Internet Council; National Association for the Advancement of Colored People;… [read post]
6 Sep 2013, 1:20 pm
Policy/Law. [read post]
19 Mar 2007, 8:18 am
For more information, visit www.fortiva.com. [read post]
23 Aug 2016, 4:00 am
The policy behind this rule is that it is not a good idea to interfere with technological innovation unless a provider exercises some control over, or has specific knowledge about, infringing behavior. [read post]