Works matching DE "EMAIL privacy"
Results: 33
Legislative Update: Taking the Library Message to Washington D.C.
- Published in:
- Alki: The Washington Library Association Journal, 2016, v. 32, n. 2, p. 6
- By:
- Publication type:
- Article
PROCESAL PENAL.
- Published in:
- Actualidad Jurídica (1578-956X), 2016, n. 42, p. 257
- Publication type:
- Article
ThinkUKnow cyber safety program.
- Published in:
- Access (10300155), 2016, v. 30, n. 3, p. 45
- Publication type:
- Article
Should we be using e‐vouchers to compensate research participants? Acceptability among opioid agonist treatment clients.
- Published in:
- Drug & Alcohol Review, 2021, v. 40, n. 7, p. 1356, doi. 10.1111/dar.13287
- By:
- Publication type:
- Article
You've Got Mail: The Flaws and Fixes for E-Mail Search and Seizure in the Wake of Preventive Medicine Associates v. Commonwealth.
- Published in:
- New England Journal on Criminal & Civil Confinement, 2015, v. 41, n. 1, p. 117
- By:
- Publication type:
- Article
We Know You've Got Mail.
- Published in:
- Tennessee Bar Journal, 2013, v. 49, n. 12, p. 12
- By:
- Publication type:
- Article
Big Bets: How Large-Scale Change Really Happens.
- Published in:
- AASA Journal of Scholarship & Practice, 2024, v. 21, n. 2, p. 31
- By:
- Publication type:
- Article
Formal online discussions: reflections on process.
- Published in:
- Educational Technology & Society, 2005, v. 8, n. 1, p. 1
- By:
- Publication type:
- Article
AGENCY'S EMAIL PRIVACY TRUMPS DISCLOSURE OF PUBLIC RECORDS UNDER THE PENNSYLVANIA RIGHT-TO-KNOW LAW: A SURVEY ANALYZING THE HOLDING OF EASTON AREA SCHOOL DISTRICT V. BAXTER AND THE COURT'S BATTLE WITH IDENTIFYING EMAILS AS PUBLIC RECORDS.
- Published in:
- Widener Law Journal, 2013, v. 22, n. 2, p. 435
- By:
- Publication type:
- Article
Safeguarding Client Property.
- Published in:
- Bench & Bar of Minnesota, 2013, v. 70, n. 7, p. 14
- By:
- Publication type:
- Article
Mastering the Stay-in-Touch Communication.
- Published in:
- Journal of Financial Planning, 2019, v. 32, n. 7, p. 21
- By:
- Publication type:
- Article
Don't Let Clients Become Identity Theft Victims.
- Published in:
- Journal of Financial Planning, 2015, v. 28, n. 5, p. 24
- By:
- Publication type:
- Article
PRESERVING HISTORY, PRESERVING PRIVACY : E-MAIL, ARCHIVAL ETHICS, AND THE LAW.
- Published in:
- Archival Issues: Journal of the Midwest Archives Conference, 2010, v. 32, n. 2, p. 99
- By:
- Publication type:
- Article
PREVENTING EMAIL BREACHES.
- Published in:
- Veterinary Team Brief, 2017, v. 5, n. 6, p. 12
- By:
- Publication type:
- Article
Business Information Exchange System with Security, Privacy, and Anonymity.
- Published in:
- Journal of Electrical & Computer Engineering, 2016, p. 1, doi. 10.1155/2016/7093642
- By:
- Publication type:
- Article
COOKIES AND WIRES: CAN FACEBOOK LURE USERS INTO DIVULGING INFORMATION UNDER THE WIRETAP ACT'S PARTY EXCEPTION?
- Published in:
- Cornell Law Review, 2021, v. 106, n. 7, p. 1937
- By:
- Publication type:
- Article
AGAINST EMPLOYER DUMPSTER-DIVING FOR EMAIL.
- Published in:
- South Carolina Law Review, 2012, v. 64, n. 2, p. 323
- By:
- Publication type:
- Article
Cyber Stalking: A Nuisance to the Information Technology.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 98
- By:
- Publication type:
- Article
Protecting Attorney-Client Privilege When Utilizing E-mail.
- Published in:
- Leadership & Organizational Management Journal, 2016, v. 2016, n. 1, p. 66
- By:
- Publication type:
- Article
Agencies as Adversaries.
- Published in:
- California Law Review, 2017, v. 105, n. 5, p. 1375, doi. 10.15779/Z38H12V721
- By:
- Publication type:
- Article
Privacy Challenges in Contemporary Social Web.
- Published in:
- International Journal of Interdisciplinary Social Sciences, 2011, v. 5, n. 10, p. 143, doi. 10.18848/1833-1882/CGP/v05i10/51918
- By:
- Publication type:
- Article
BAND-AID ON A BULLET WOUND: WHY THE EMAIL PRIVACY ACT IS NECESSARY TRIAGE IN FEDERAL TECHNOLOGY LAW.
- Published in:
- DePaul Journal of Art, Technology & Intellectual Property Law, 2014, v. 24, n. 2, p. 339
- By:
- Publication type:
- Article
Does Your Organization Have Safeguards in Place to Ensure the Use of Email Does Not Lead to Compliance Issues?
- Published in:
- Journal of Health Care Compliance, 2013, v. 15, n. 3, p. 37
- By:
- Publication type:
- Article
Toward E-Mail Governance: Policies and Practices in the Government of Canada.
- Published in:
- Canadian Journal of Information & Library Sciences, 2017, v. 41, n. 3, p. 169
- By:
- Publication type:
- Article
Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 13, p. 4425, doi. 10.3390/app10134425
- By:
- Publication type:
- Article
Toward practical encrypted email that supports private, regular-expression searches.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 5, p. 397, doi. 10.1007/s10207-014-0268-3
- By:
- Publication type:
- Article
PROBLEMS AT THE REGISTER: RETAIL COLLECTION OF PERSONAL INFORMATION AND THE DATA BREACH.
- Published in:
- Case Western Reserve Law Review, 2015, v. 65, n. 3, p. 861
- By:
- Publication type:
- Article
Transparency and Control in Email Communication: The More the Supervisor is Put in cc the Less Trust is Felt.
- Published in:
- Journal of Business Ethics, 2021, v. 168, n. 4, p. 733, doi. 10.1007/s10551-019-04220-w
- By:
- Publication type:
- Article
THE USE OF THE ELECTRONIC PLATFORM OF PUBLIC ADMINISTRATION SERVICES AND ITS FREE TOOLS PROVIDED BY THE PUBLIC ADMINISTRATION IN THE KUJAWY-POMORZE PROVINCE.
- Published in:
- Studia i Materialy Polskiego Stowarzyszenia Zarzadzania Wiedza / Studies & Proceedings Polish Association for Knowledge Management, 2012, n. 61, p. 136
- By:
- Publication type:
- Article
Mining Your Life for Their Profit.
- Published in:
- In These Times, 2013, v. 37, n. 10, p. 17
- By:
- Publication type:
- Article
Categorizing human phishing difficulty: a Phish Scale.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa009
- By:
- Publication type:
- Article
TIPS FOR THOSE WHO WISH TO WRITE FOR PUBLICATION OR PRESENTATION.
- Published in:
- International Journal of Choice Theory & Reality Therapy, 2012, v. 32, n. 1, p. 39
- By:
- Publication type:
- Article
Multi-Recipient E-mail Messages: Privacy Issues and Possible Solutions.
- Published in:
- Advances in Electrical & Computer Engineering, 2021, v. 21, n. 4, p. 115, doi. 10.4316/AECE.2021.04013
- By:
- Publication type:
- Article