Works matching DE "CONFIDENTIAL records"
Results: 283
Court-ordered assessments and routine access to confidential health information: findings from a regional forensic mental health service.
- Published in:
- Psychiatry, Psychology & Law, 2021, v. 28, n. 4, p. 576, doi. 10.1080/13218719.2020.1805814
- By:
- Publication type:
- Article
Psychologists' Collection and Management of Clients' Information: An Ethico-legal Perspective.
- Published in:
- Psychiatry, Psychology & Law, 2016, v. 23, n. 6, p. 826, doi. 10.1080/13218719.2016.1160745
- By:
- Publication type:
- Article
Academics should not remain silent on hacking.
- Published in:
- Nature, 2013, v. 504, n. 7480, p. 333, doi. 10.1038/504333a
- By:
- Publication type:
- Article
The "Worst Law in Technology": HOW THE COMPUTER FRAUD AND ABUSE ACT ALLOWS BIG BUSINESSES TO COLLECT AND SELL YOUR PERSONAL INFORMATION.
- Published in:
- Brooklyn Law Review, 2022, v. 87, n. 3, p. 1077
- By:
- Publication type:
- Article
Better Regulation of Industry-Sponsored Clinical Trials Is Long Overdue.
- Published in:
- Journal of Law, Medicine & Ethics, 2009, v. 37, n. 3, p. 410, doi. 10.1111/j.1748-720X.2009.00402.x
- By:
- Publication type:
- Article
Data and Safety Monitoring Boards: Some Enduring Questions.
- Published in:
- Journal of Law, Medicine & Ethics, 2009, v. 37, n. 3, p. 496, doi. 10.1111/j.1748-720X.2009.00410.x
- By:
- Publication type:
- Article
Currents in Contemporary Ethics.
- Published in:
- Journal of Law, Medicine & Ethics, 2009, v. 37, n. 3, p. 507, doi. 10.1111/j.1748-720X.2009.00411.x
- By:
- Publication type:
- Article
Clinical trial registration in physiotherapy research.
- Published in:
- 2013
- By:
- Publication type:
- Letter
GEOGRAPHICAL INFORMATION AS 'PERSONAL INFORMATION'.
- Published in:
- Oxford University Commonwealth Law Journal, 2010, v. 10, n. 2, p. 185, doi. 10.5235/147293410794895322
- By:
- Publication type:
- Article
Analysis: PECUNIARY REMEDIES FOR BREACH OF CONFIDENCE.
- Published in:
- King's Law Journal, 2010, v. 21, n. 2, p. 355, doi. 10.5235/096157610792240795
- By:
- Publication type:
- Article
THE COLLATERAL CONSEQUENCES OF SCHOOL DISCIPLINARY RECORDS.
- Published in:
- Michigan State Law Review, 2024, v. 2024, n. 1, p. 175
- By:
- Publication type:
- Article
ADJUDICATING CLASSIFIED INFORMATION.
- Published in:
- St. John's Law Review, 2011, v. 85, n. 4, p. 1275
- By:
- Publication type:
- Article
ABUSE, NEGLECT AND DEPENDENCY--Confidentiality of Records.
- Published in:
- Juvenile & Family Law Digest, 2011, v. 43, n. 1, p. 5574
- Publication type:
- Article
PERSONALIZED GENOMICS: A NEED FOR A FIDUCIARY DUTY REMAINS.
- Published in:
- Rutgers Computer & Technology Law Journal, 2011, v. 37, n. 2, p. 281
- By:
- Publication type:
- Article
Genomics and Privacy: Implications of the New Reality of Closed Data for the Field.
- Published in:
- PLoS Computational Biology, 2011, v. 7, n. 12, p. 1, doi. 10.1371/journal.pcbi.1002278
- By:
- Publication type:
- Article
The Digitized Self as Public Tender: Conceptualizing Informational Privacy at the Intersection of Information Technology, Commerce, and Public Policy.
- Published in:
- Atlantic Journal of Communication, 2007, v. 15, n. 4, p. 231, doi. 10.1080/15456870701465281
- By:
- Publication type:
- Article
Bank Data Disclosure in Great Britain.
- Published in:
- Social Policy, 2016, v. 46, n. 2, p. 51
- By:
- Publication type:
- Article
Transference of PIM Research Prototype Concepts to the Mainstream: Successes or Failures.
- Published in:
- Interacting with Computers, 2015, v. 27, n. 2, p. 73, doi. 10.1093/iwc/iwt059
- By:
- Publication type:
- Article
Direct-to-Consumer Genomics, Social Networking, and Confidentiality.
- Published in:
- American Journal of Bioethics, 2009, v. 9, n. 6/7, p. 45, doi. 10.1080/15265160902893924
- By:
- Publication type:
- Article
Optimal ECC Based Hybrid Signcryption for MANET Security.
- Published in:
- International Journal on Intelligent Electronics Systems, 2016, v. 10, n. 1, p. 7, doi. 10.18000/ijies.30149
- By:
- Publication type:
- Article
Private Information and Insurance Rejections.
- Published in:
- Econometrica, 2013, v. 81, n. 5, p. 1713, doi. 10.3982/ECTA10931
- By:
- Publication type:
- Article
Signalling Standards for Progress: Bridging the Divide Between a Valid Consent to Use Patient Data Under Data Protection Law and the Common Law Duty of Confidentiality.
- Published in:
- Medical Law Review, 2021, v. 29, n. 3, p. 411, doi. 10.1093/medlaw/fwab014
- By:
- Publication type:
- Article
The not-so-secret life of five-year-olds: legal and ethical issues relating to disclosure of information and the depiction of children on broadcast and social media.
- Published in:
- Journal of Media Law, 2016, v. 8, n. 2, p. 198, doi. 10.1080/17577632.2016.1239942
- By:
- Publication type:
- Article
The Value of Privacy.
- Published in:
- Journal of Media Law, 2010, v. 2, n. 1, p. 67, doi. 10.1080/17577632.2010.11427354
- By:
- Publication type:
- Article
Information Privacy and Online Behaviors.
- Published in:
- Journal of Internet Commerce, 2002, v. 1, n. 4, p. 55, doi. 10.1300/J179v01n04_04
- By:
- Publication type:
- Article
Commentary: the Past, Present, and Future of the Global Raptor Impact Network.
- Published in:
- Journal of Raptor Research, 2021, v. 55, n. 4, p. 605, doi. 10.3356/JRR-21-13
- By:
- Publication type:
- Article
Calling on Jefferson: the 'custodiary' as the fourth estate in the Democratic Project.
- Published in:
- Contemporary Politics, 2010, v. 16, n. 3, p. 279, doi. 10.1080/13569775.2010.501650
- By:
- Publication type:
- Article
NEWS.
- Published in:
- ComputerWorld Hong Kong, 2016, p. 6
- Publication type:
- Article
US Congress asks Yahoo execs to testify in China case.
- Published in:
- ComputerWorld Hong Kong, 2007, v. 24, n. 10, p. 25
- By:
- Publication type:
- Article
FAA v. Cooper: Bombarding the Privacy Act with the "Canon of Sovereign Immunity".
- Published in:
- Mercer Law Review, 2013, v. 64, n. 3, p. 785
- By:
- Publication type:
- Article
Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health.
- Published in:
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/7016554
- By:
- Publication type:
- Article
A Legal Primer for Social Media.
- Published in:
- Marketing Health Services, 2010, v. 30, n. 3, p. 30
- By:
- Publication type:
- Article
PRIVACY COSTS AND PERSONAL DATA PROTECTION: ECONOMIC AND LEGAL PERSPECTIVES.
- Published in:
- Berkeley Technology Law Journal, 2009, v. 24, n. 3, p. 1061
- By:
- Publication type:
- Article
A survey: applications of blockchain in the Internet of Vehicles.
- Published in:
- 2021
- By:
- Publication type:
- Literature Review
Ethics in occupational medicine.
- Published in:
- 2009
- By:
- Publication type:
- Editorial
LIVES OF QUIET DESPERATION: THE CONFLICT BETWEEN MILITARY NECESSITY AND CONFIDENTIALITY.
- Published in:
- Creighton Law Review, 2011, v. 44, n. 4, p. 1003
- By:
- Publication type:
- Article
REVAMPING PART 2: AN ANALYSIS OF REVISIONS TO THE FEDERAL SUBSTANCE USE DISORDER TREATMENT CONFIDENTIALITY REGULATIONS.
- Published in:
- Journal of Health Care Law & Policy, 2023, v. 26, n. 2, p. 215
- By:
- Publication type:
- Article
HIPAA, KATZ, AND THE PRIVACY GAP.
- Published in:
- Journal of Health Care Law & Policy, 2021, v. 24, n. 2, p. 203
- By:
- Publication type:
- Article
EFFECTS OF CONFIDENTIALITY ON PERFORMANCE RATINGS OF PROFESSIONAL HEALTH PERSONNEL.
- Published in:
- Personnel Psychology, 1963, v. 16, n. 4, p. 385, doi. 10.1111/j.1744-6570.1963.tb01284.x
- By:
- Publication type:
- Article
An Advanced Encryption Standard in Memory (AESIM) Efficient, High Performance S-box Based AES Encryption and Decryption Architecture on VLSI.
- Published in:
- Wireless Personal Communications, 2022, v. 123, n. 4, p. 3081, doi. 10.1007/s11277-021-09278-2
- By:
- Publication type:
- Article
Consumer online privacy concerns and responses: a power-responsibility equilibrium perspective.
- Published in:
- Journal of the Academy of Marketing Science, 2007, v. 35, n. 4, p. 572, doi. 10.1007/s11747-006-0003-3
- By:
- Publication type:
- Article
Nested image steganography scheme using QR-barcode technique.
- Published in:
- Optical Engineering, 2009, v. 48, n. 5, p. 057004
- By:
- Publication type:
- Article
Freedom of Information Request Denied Because Disclosure Could Harm Relevant Unions.
- Published in:
- Plans & Trusts, 2018, v. 36, n. 6, p. 32
- By:
- Publication type:
- Article
Are Your Clinical Photographs Secure?
- Published in:
- Journal of Visual Communication in Medicine, 2009, v. 32, n. 1, p. 34, doi. 10.1080/17453050802687997
- By:
- Publication type:
- Article
Written-response interview protocols: an innovative approach to confidential reporting and victim interviewing in sexual assault investigations.
- Published in:
- Policing & Society, 2018, v. 28, n. 6, p. 631, doi. 10.1080/10439463.2016.1187146
- By:
- Publication type:
- Article
Raw Material: UNHCR's Individual Case Files as a Historical Source, 1951–75.
- Published in:
- History Workshop Journal, 2021, v. 92, p. 226, doi. 10.1093/hwj/dbab019
- By:
- Publication type:
- Article
Cellphone Privacy.
- Published in:
- Conflict Resolution & Negotiation Journal, 2012, v. 2012, n. 4, p. 17
- By:
- Publication type:
- Article
EVALUATION OF VOCATIONAL SELF ESTEEM LEVELS OF THE TURKISH COACHES.
- Published in:
- Nigde University Journal of Physical Education & Sport Sciences / Nigde Üniversitesi Beden Egitimi ve Spor Bilimleri Dergisi, 2012, v. 6, n. 2, p. 161
- By:
- Publication type:
- Article
EPIDEMIOLOGICAL CHANGES IN OESOPHAGEAL CANCER AT NATIONAL HOSPITAL, BLOEMFONTEIN: 1995, 2000 AND 2005.
- Published in:
- African Journal of Primary Health Care & Family Medicine, 2010, v. 2, n. 1, p. 1, doi. 10.4102/phcfm.v2i1.100
- Publication type:
- Article
Are Clinical Records Really That Important? The Dearth of Research and Practice Guidelines in MFT Literature.
- Published in:
- American Journal of Family Therapy, 2009, v. 37, n. 5, p. 373, doi. 10.1080/01926180902754729
- By:
- Publication type:
- Article