Works matching DE "COMPUTER insurance"
Results: 11
Are Your EDP Operations Insured?
- Published in:
- Management Review, 1966, v. 55, n. 8, p. 25
- Publication type:
- Article
The right cybersecurity controls mitigate risks.
- Published in:
- Industrial Management, 2016, v. 58, n. 6, p. 28
- By:
- Publication type:
- Article
CYBER-INSURANCE ISSUES: MANAGING RISK BY TYING NETWORK SECURITY TO BUSINESS GOALS.
- Published in:
- CPA Journal, 2002, v. 72, n. 11, p. 10
- By:
- Publication type:
- Article
Cyberliability Insurance: To Buy or Not to Buy?
- Published in:
- Journal of Health Care Compliance, 2015, v. 17, n. 1, p. 51
- By:
- Publication type:
- Article
WHY THE INSURANCE INDUSTRY CANNOT PROTECT AGAINST HEALTH CARE DATA BREACHES.
- Published in:
- Journal of Health Care Law & Policy, 2017, v. 19, n. 2, p. 275
- By:
- Publication type:
- Article
A closer look at cyber insurance.
- Published in:
- ComputerWorld Hong Kong, 2017, p. 30
- By:
- Publication type:
- Article
The Techno-Neutrality Solution to Navigating Insurance Coverage for Cyber Losses.
- Published in:
- Penn State Law Review, 2018, v. 122, n. 3, p. 645
- By:
- Publication type:
- Article
Cyber Risks, Systemic Risks, and Cyber Insurance.
- Published in:
- Penn State Law Review, 2018, v. 122, n. 3, p. 613
- By:
- Publication type:
- Article
Insuring Against Privacy Claims Following A Data Breach.
- Published in:
- Penn State Law Review, 2018, v. 122, n. 3, p. 683
- By:
- Publication type:
- Article
NAVIGATING CYBER COVERAGES FOR MODERN DAY CYBERCRIMES.
- Published in:
- Tort Trial & Insurance Practice Law Journal, 2019, v. 54, n. 3, p. 911
- By:
- Publication type:
- Article
VIRUSES, TROJANS, AND SPYWARE, OH MY! THE YELLOW BRICK ROAD TO COVERAGE IN THE LAND OF INTERNET OZ.
- Published in:
- Tort Trial & Insurance Practice Law Journal, 2014, v. 49, n. 2, p. 529
- By:
- Publication type:
- Article