Search results
From LIMSWiki
Jump to navigationJump to search
Page title matches
- ...-53 controls, with ties to LIMSpec/Appendix 1.16 System and communications protection}}260 bytes (31 words) - 20:05, 24 July 2020
- {{wikipedia::Children's Online Privacy Protection Act}}454 bytes (59 words) - 20:04, 21 June 2016
- {{wikipedia::United States Environmental Protection Agency}}400 bytes (52 words) - 20:53, 27 March 2024
- {{wikipedia::Data Protection Directive}}422 bytes (54 words) - 20:30, 21 June 2016
- |agency_name = Environmental Protection Agency |logo = Environmental Protection Agency logo.svg8 KB (1,078 words) - 20:56, 31 May 2024
- {{wikipedia::General Data Protection Regulation}}440 bytes (56 words) - 20:33, 21 June 2016
- {{wikipedia::IT Baseline Protection Catalogs}}429 bytes (56 words) - 21:57, 21 June 2016
- {{wikibooks::Radiation Oncology/Physics/Radiation Protection}}282 bytes (38 words) - 18:07, 13 July 2016
- {{wikipedia::Patient Protection and Affordable Care Act}}429 bytes (57 words) - 21:02, 16 August 2016
- |title_full = The effect of the General Data Protection Regulation on medical research '''Background''': The enactment of the General Data Protection Regulation (GDPR) will impact on European data science. Particular concerns26 KB (3,723 words) - 15:04, 25 April 2017
- |title_full = Rethinking data sharing and human participant protection in social science research: Applications from the qualitative realm ...tive scholars already employ a variety of strategies for human-participant protection implicitly or informally during the research process. In this practice pape32 KB (4,728 words) - 20:13, 28 December 2017
- ...cial Publication 800-53 controls, with ties to LIMSpec/Appendix 1.10 Media protection}}240 bytes (29 words) - 20:02, 24 July 2020
- ...53 controls, with ties to LIMSpec/Appendix 1.11 Physical and environmental protection}}261 bytes (31 words) - 20:03, 24 July 2020
Page text matches
- ...ection Law, demonstrates China's great willingness towards a stronger data protection regime and more flexible regulatory mechanism. ...orts of less developed regions—especially those that have not enacted data protection laws—from entering the world of global dataflow. It further leads to the68 KB (9,682 words) - 19:21, 31 July 2021
- ...aphical proximity to European Union (EU) member states, the [[General Data Protection Regulation]] (GDPR) may impose additional obligations. '''Keywords''': data protection, privacy preserving technologies, qualitative research, vignettes, intervie91 KB (12,825 words) - 19:20, 7 February 2023
- |title_full = The effect of the General Data Protection Regulation on medical research '''Background''': The enactment of the General Data Protection Regulation (GDPR) will impact on European data science. Particular concerns26 KB (3,723 words) - 15:04, 25 April 2017
- ...[[Information security|data security]] and [[Information privacy|privacy]] protection. ...adopting corresponding policies for data storage and data access. Privacy protection complies with laws and regulations and de-identifies sensitive patient info80 KB (10,705 words) - 17:50, 28 June 2023
- ...ect privacy-specific threats and assess the degree of compliance with data protection legislation. Furthermore, a privacy impact assessment (PIA) is conducted in ...rotection Regulation]] (GDPR)<ref name=":2">{{Cite web |title=General Data Protection Regulation (GDPR) |url=https://gdpr-info.eu/ |publisher=Intersoft Consultin136 KB (18,556 words) - 18:40, 6 October 2021
- ...ing-left:10px; padding-right:10px;"|Penalty for conducting inadequate data protection practices [RLEGD] A breach of a regulation like the [[General Data Protection Regulation]] (GDPR) or the Nagoya Protocol can result in high fines. At wor74 KB (9,357 words) - 23:47, 29 April 2024
- ...urity, data vulnerability, biological data, biosecurity, data access, data protection ...afforded by data sharing and analysis, this paper highlights current data protection policies, potential risks of data exploitation by malicious actors, and pot47 KB (6,188 words) - 18:25, 18 June 2019
- ...ange of cybersecurity standards and frameworks are available to ensure the protection of data in different industries; however, this review paper aims to provide ...52/COBIT5-Student-Book |publisher=ISACA}}</ref> Satisfactory cybersecurity protection can be achieved by adopting a cybersecurity framework that describes the sc94 KB (12,503 words) - 17:15, 16 March 2023
- ...ethical issues to arise from the literature review were informed consent, protection from harm, privacy and control of data, vulnerabilities and disclosure, com ===Protection from harm===67 KB (9,997 words) - 21:00, 19 September 2021
- ...ion]] [FDA], [[United States Environmental Protection Agency|Environmental Protection Agency]] [EPA], [[International Organization for Standardization]] [ISO], e :Planning builds in reliability, security, and protection against loss. (Oh, and it allows us to work better, too!)218 KB (34,907 words) - 16:00, 29 March 2024
- ...sures Index and Vulnerability Index: Indicators of Critical Infrastructure Protection and Vulnerability |author=Petit, F.D.P.; Bassett, G.W.; Buehring, W.A. et a :describes the protection, control, and accountability of biological materials in order to prevent th35 KB (4,741 words) - 16:07, 7 May 2019
- ...mes based on data anonymization and differential privacy approaches in the protection of healthcare data privacy. We highlight the strengths and limitations of t ...rsonal Data Protection Act.<ref name="CareyData18">{{cite book |title=Data Protection: A Practical Guide to UK and EU Law |author=Carey, P. |publisher=Oxford Uni45 KB (5,857 words) - 16:49, 12 April 2021
- ...reliability of laboratory results, issues of financial sustainability, and protection of the environment play an important role in decision-making in both indust ...s |last2=Eeckhoudt |first2=Louis |date=1985-01 |title=Self-insurance, self-protection and increased risk aversion |url=https://linkinghub.elsevier.com/retrieve/p87 KB (11,995 words) - 15:43, 16 May 2023
- ...|author=U.S. Environmental Protection Agency |publisher=U.S. Environmental Protection Agency |date=March 2019 |accessdate=28 May 2019}}</ref> The [[Centers for D ...|author=U.S. Environmental Protection Agency |publisher=U.S. Environmental Protection Agency |date=December 1994 |accessdate=28 May 2019}}</ref><ref name="USACEG91 KB (13,354 words) - 21:08, 19 September 2021
- .../title-40/part-3 |title=Electronic Code of Federal Regulations - Title 40: Protection of Environment - Part 3: Cross-media Electronic Reporting |publisher=U.S. G ...ls for States, Tribes, and Local Governments |publisher=U.S. Environmental Protection Agency |date=August 2015 |accessdate=07 January 2022}}</ref>8 KB (1,078 words) - 20:45, 19 January 2022
- ====3.1.1. Data protection==== ...tyle="background-color:white; padding-left:10px; padding-right:10px;"|Data protection56 KB (7,679 words) - 18:43, 6 October 2021
- ...ms are threatened or corrupted. Just as food safety regulations target the protection of human health, incorporating cyber biosecurity strategies for the food an ...Small farm producers view their data with a sense of personal privacy and protection.<ref name="SykutaBig16" /> Small businesses often use their internet-linked38 KB (5,248 words) - 15:02, 9 April 2019
- ...ackground-color:white; padding-left:10px; padding-right:10px;"|Information protection processes<br />and procedures (PR.IP) ...t policies, processes, and procedures, as well as technology to assist the protection of information systems and relevant assets, were lacking. Therefore, in agg53 KB (7,071 words) - 18:38, 6 October 2021
- |title_full = Rethinking data sharing and human participant protection in social science research: Applications from the qualitative realm ...tive scholars already employ a variety of strategies for human-participant protection implicitly or informally during the research process. In this practice pape32 KB (4,728 words) - 20:13, 28 December 2017
- ...es, particularly involving the major concerns of data security and privacy protection due to data being located in different distributed places. ...stinguish secure application cloning on VM<ref name="HaoSMOC15" /> and the protection of VMs from a malicious hypervisor<ref name="JinH-SVM15">{{cite journal |ti44 KB (6,151 words) - 18:54, 14 October 2019