Search results
From LIMSWiki
Jump to navigationJump to search
Page title matches
- |agency_name = Environmental Protection Agency |logo = Environmental Protection Agency logo.svg8 KB (1,078 words) - 20:56, 31 May 2024
- ...iki> magic word, when their protection status does not correspond with the protection template used on them. ...in <nowiki><noinclude></nowiki> tags. To fix this problem, simply move the protection template within the <nowiki><noinclude></nowiki> tags, [http://en.wikipedia3 members (0 subcategories, 0 files) - 23:31, 29 May 2013
- |title_full = The effect of the General Data Protection Regulation on medical research '''Background''': The enactment of the General Data Protection Regulation (GDPR) will impact on European data science. Particular concerns26 KB (3,723 words) - 15:04, 25 April 2017
Page text matches
- ...4 Cloud Security Principles that "include important considerations such as protection of data in transit, supply chain security, identity and authentication, and ...ground-color:white; padding-left:10px; padding-right:10px;"|[[General Data Protection Regulation]] (GDPR)49 KB (6,378 words) - 20:45, 16 August 2023
- ...|author=U.S. Environmental Protection Agency |publisher=U.S. Environmental Protection Agency |date=March 2019 |accessdate=28 May 2019}}</ref> The [[Centers for D ...|author=U.S. Environmental Protection Agency |publisher=U.S. Environmental Protection Agency |date=December 1994 |accessdate=28 May 2019}}</ref><ref name="USACEG91 KB (13,354 words) - 21:08, 19 September 2021
- protection = { class = 'ambox-protection',5 KB (440 words) - 17:05, 22 November 2014
- -- env.protectionLevels - the protection levels table of the title object. -- The protection levels table of the title object.36 KB (4,448 words) - 16:25, 22 November 2014
- .../title-40/part-3 |title=Electronic Code of Federal Regulations - Title 40: Protection of Environment - Part 3: Cross-media Electronic Reporting |publisher=U.S. G ...ls for States, Tribes, and Local Governments |publisher=U.S. Environmental Protection Agency |date=August 2015 |accessdate=07 January 2022}}</ref>8 KB (1,078 words) - 20:45, 19 January 2022
- ...iki> magic word, when their protection status does not correspond with the protection template used on them. ...in <nowiki><noinclude></nowiki> tags. To fix this problem, simply move the protection template within the <nowiki><noinclude></nowiki> tags, [http://en.wikipedia3 members (0 subcategories, 0 files) - 23:31, 29 May 2013
- ====3.1.1. Data protection==== ...tyle="background-color:white; padding-left:10px; padding-right:10px;"|Data protection56 KB (7,679 words) - 18:43, 6 October 2021
- ...ms are threatened or corrupted. Just as food safety regulations target the protection of human health, incorporating cyber biosecurity strategies for the food an ...Small farm producers view their data with a sense of personal privacy and protection.<ref name="SykutaBig16" /> Small businesses often use their internet-linked38 KB (5,248 words) - 15:02, 9 April 2019
- ====PE-1 Physical and environmental protection policy and procedures==== ...pe, roles, responsibilities, and enforcement of physical and environmental protection action but also to address how those policies and procedures will be implem7 KB (925 words) - 23:06, 13 December 2019
- ...ackground-color:white; padding-left:10px; padding-right:10px;"|Information protection processes<br />and procedures (PR.IP) ...t policies, processes, and procedures, as well as technology to assist the protection of information systems and relevant assets, were lacking. Therefore, in agg53 KB (7,071 words) - 18:38, 6 October 2021
- ===Appendix 1.11 Physical and environmental protection=== ...pe, roles, responsibilities, and enforcement of physical and environmental protection action but also to address how those policies and procedures will be implem7 KB (926 words) - 15:58, 21 March 2023
- ...ns, standards, and guidance (Table 1) that tie into data retention and the protection of that retained data have been found (and that list will certainly continu ...andard-protection-privacy-and-personal WADA International Standard for the Protection of Privacy and Personal Information (ISPPPI) 10.0]<br />51 KB (6,191 words) - 15:13, 21 March 2023
- {| class="ombox ombox-protection" style="font-size:90%; text-align: center; margin:auto;" ...| {{Tnavbar-header|[[:Category:Protection templates|Protection templates]]|Protection templates}}2 KB (210 words) - 18:46, 24 October 2013
- |title_full = Rethinking data sharing and human participant protection in social science research: Applications from the qualitative realm ...tive scholars already employ a variety of strategies for human-participant protection implicitly or informally during the research process. In this practice pape32 KB (4,728 words) - 20:13, 28 December 2017
- ...es, particularly involving the major concerns of data security and privacy protection due to data being located in different distributed places. ...stinguish secure application cloning on VM<ref name="HaoSMOC15" /> and the protection of VMs from a malicious hypervisor<ref name="JinH-SVM15">{{cite journal |ti44 KB (6,151 words) - 18:54, 14 October 2019
- * WAMPAC (Wide Area Monitoring Protection and Control), which ensures the security of the power system; ...</ref> To mitigate such concerns, and in response to Europe's General Data Protection Regulation (GDPR), utilities have embarked on educating customers regarding72 KB (10,776 words) - 18:50, 14 October 2019
- ====SI-3 Malicious code protection==== ...ds the organization employ, configure, and regularly update malicious code protection mechanisms at information system entry and exit points. The configuration o7 KB (990 words) - 23:18, 13 December 2019
- ...-certified [[Respirator#United States norms|N95]] or equivalent, or higher protection.); and ...nts and prolonged wear will reduce the integrity of the glove and decrease protection to the user. Gloves should always be inspected before use, to check they ar37 KB (5,198 words) - 17:24, 23 November 2020
- ...r Emergency Response Team CERT-UK, together with the U.K.’s Centre for the Protection of National Infrastructure, define four subtypes of threat intelligence in ...free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) |work=EUR-Lex |publisher=European Union |date=27 April 2016 |ac75 KB (9,816 words) - 19:15, 27 October 2020
- ====SI-3 Malicious code protection==== ...ds the organization employ, configure, and regularly update malicious code protection mechanisms at information system entry and exit points. The configuration o8 KB (1,109 words) - 16:05, 21 March 2023