Search results
From LIMSWiki
Jump to navigationJump to search
- ...Azure_Regions-2021.pdf |format=PDF |title=Enabling Data Residency and Data Protection in Microsoft Azure Regions |publisher=Microsoft Corporation |date=April 202 ...com/en-us/azure/security/fundamentals/threat-detection |title=Azure threat protection |author=Lanfear, T.; Mel; Wren, B. et al. |work=Microsoft Documentation |pu26 KB (3,472 words) - 19:33, 11 April 2024
- * WAMPAC (Wide Area Monitoring Protection and Control), which ensures the security of the power system; ...</ref> To mitigate such concerns, and in response to Europe's General Data Protection Regulation (GDPR), utilities have embarked on educating customers regarding72 KB (10,776 words) - 18:50, 14 October 2019
- ====SI-3 Malicious code protection==== ...ds the organization employ, configure, and regularly update malicious code protection mechanisms at information system entry and exit points. The configuration o7 KB (990 words) - 23:18, 13 December 2019
- ...800-53 controls, with ties to LIMSpec/Media protection|Appendix 1.10 Media protection]] ...ical and environmental protection|Appendix 1.11 Physical and environmental protection]]11 KB (1,433 words) - 19:02, 21 March 2023
- ...hould only be used for messageboxes relating to moves and merges, and page protection, respectively. | type = protection11 KB (1,565 words) - 02:08, 5 June 2011
- Journal:BlueTrace: A privacy-preserving protocol for community-driven contact tracing across borders==Data protection and privacy safeguards== * Each health authority is responsible for the storage and protection of users’ identifiers and shared encounter history.39 KB (5,544 words) - 01:48, 15 May 2020
- ...9 outbreak |author=European Data Protection Board |publisher=European Data Protection Board |date=April 2020 |accessdate=17 September 2021}}</ref>—at least mak ...have to choose between an efficient response to the current crisis and the protection of our fundamental rights: we can achieve both."<ref name="EDPBGuidelines2041 KB (5,670 words) - 16:35, 17 September 2021
- ===Data protection and security=== In view of the increasing requirements towards data protection standards in Europe, and especially Germany, data privacy officers and clin49 KB (6,662 words) - 19:52, 14 July 2020
- ...me, are of relevance and effectively point out that correct infrastructure protection and IT best practices are in place at FPHAG. ...compliance.<ref name=":9">{{Cite web |last=European Commission |title=Data Protection |url=https://ec.europa.eu/info/law/law-topic/data-protection_en |publisher=100 KB (13,544 words) - 18:31, 6 October 2021
- ...s from the qualitative realm|Rethinking data sharing and human participant protection in social science research: Applications from the qualitative realm]]"''' ...ot depositors. ('''[[Journal:Rethinking data sharing and human participant protection in social science research: Applications from the qualitative realm|Full ar77 KB (10,993 words) - 20:36, 3 April 2024
- table.ambox-protection { table.imbox-protection {38 KB (4,398 words) - 18:38, 18 September 2022
- |agency_name = Environmental Protection Agency |logo = Environmental Protection Agency logo.svg8 KB (1,078 words) - 20:56, 31 May 2024
- ...d Laboratory Practices''' ('''GALP''') was a [[United States Environmental Protection Agency|U.S. EPA-based]] conglomeration of "regulations, policies, and guida ...|author=U.S. Environmental Protection Agency |publisher=U.S. Environmental Protection Agency |date=10 August 1995 |archivedate=21 October 2013}}</ref>4 KB (591 words) - 22:39, 7 January 2022
- {{Template category|help=no|type=protection}} {{protection templates}}4 members (0 subcategories, 0 files) - 23:28, 24 October 2013
- -- Protection template configuration -- cfg['protection-reason-edit']18 KB (2,047 words) - 16:24, 22 November 2014
- ...name="SweeneyAchiev02">{{cite journal |title=Achieving k-anonymity privacy protection using generalization and suppression |journal=International Journal of Unce ...journal |title=Bottom-up generalization: a data mining solution to privacy protection |journal=Proceedings from the Fourth IEEE International Conference on Data53 KB (6,885 words) - 02:00, 13 November 2018
- ...wikipedia:Network segmentation|Segmentation]] is one way of improving data protection. The aim of this study was to investigate information technology (IT) and m ...control systems |journal=International Journal of Critical Infrastructure Protection |author=Genge, B.; Graur, F.; Haller, P. |volume=11 |pages=24–38 |year=2046 KB (6,325 words) - 19:02, 3 August 2020
- ===Protection level category=== ...ll be added to [[:Category:Templates using TemplateStyles with a different protection level]].3 KB (411 words) - 16:50, 10 March 2020
- Global considerations will be addressed around the General Data Protection Regulation (GDPR). Data protection regulations concerning personal data including phone number, credit card in4 KB (553 words) - 17:23, 12 June 2023
- ...been classified as violating the standard without harming the trade-secret protection or affecting the generality of the standard. Unfortunately, the DICOM stand ===Data protection (privacy)===52 KB (7,447 words) - 19:56, 9 October 2023