Livros sobre o tema "Privacy practices"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Privacy practices".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Data Security Council of India. DSCI privacy framework: Best practices. New Delhi: Data Security Council of India, 2010.
Encontre o texto completo da fonteGrumbling, Emily, ed. Privacy Research and Best Practices. Washington, D.C.: National Academies Press, 2016. http://dx.doi.org/10.17226/21879.
Texto completo da fonteProtecting patron privacy: Safe practices for public computers. Santa Barbara, California: Libraries Unlimited, An Imprint of ABC-CLIO, LLC, 2015.
Encontre o texto completo da fonteR, Elden Charles, ed. Wireless security and privacy: Best practices and design techniques. Boston: Addison-Wesley, 2003.
Encontre o texto completo da fonteWakulowsky, Lydia. Personal Health Information Protection Act: Implementing best privacy practices. 2a ed. Markham, Ont: LexisNexis Canada, 2011.
Encontre o texto completo da fonteEzor, Jonathan. Privacy and data protection in business: Laws and practices. New Providence, NJ: LexisNexis, 2012.
Encontre o texto completo da fonteMilne, George R. A business perspective on database marketing and consumer privacy practices. Cambridge, Mass: Marketing Science Institute, 1998.
Encontre o texto completo da fonteGauthronet, Serge. Practices to implement the OECD privacy guidelines on global networks. Paris, France: OECD, 1998.
Encontre o texto completo da fonteMilne, George R. A business perspective on database marketing and consumer privacy practices. Cambridge, Mass: Marketing Science Institute, 1998.
Encontre o texto completo da fonteInternet and wireless privacy: A legal guide to global business practices. Toronto: CCH Canada, 2003.
Encontre o texto completo da fonteUnited States. General Accounting Office. Accounting and Information Management Division. Internet privacy: Comparison of federal agency practices with FTC's fair information principles. Washington, DC: The Office, 2000.
Encontre o texto completo da fonteUnited States. General Accounting Office. Accounting and Information Management Division. Internet privacy: Comparison of federal agency practices with FTC's fair information principles. Washington, DC: The Office, 2000.
Encontre o texto completo da fontePersonal data privacy and protection in a survillance era: Technologies and practices. Hershey, PA: Information Science Reference, 2011.
Encontre o texto completo da fonteUnited States. General Accounting Office. Accounting and Information Management Division. Internet privacy: Comparison of federal agency practices with FTC's fair information principles. Washington, DC: The Office, 2000.
Encontre o texto completo da fontePhelps, Joseph E. Marketer's information practices and privacy concerns: How willing are consumers to provide personal information for shopping benefits? Cambridge, Mass: Marketing Science Institute, 1999.
Encontre o texto completo da fonteAlberta, Service. FOIP guidelines and practices 2009. Edmonton, Alta: Government of Alberta, 2009.
Encontre o texto completo da fonteWellness, Alberta Alberta Health and. Alberta's Health Information Act: Health Information Act guidelines and practices. Edmonton: Alberta Health & Wellness, 2001.
Encontre o texto completo da fonteVeil: Modesty, privacy, and resistance. Oxford, UK: Berg, 1999.
Encontre o texto completo da fonteMarx, Gary T. Social aspects of changes in worker monitoring and computer/communications privacy and security practices. Washington: [The Office], 1986.
Encontre o texto completo da fonteSamarati, Pierangela, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis e Damien Sauveron, eds. Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12368-9.
Texto completo da fonteDavies, J. Eric. Data protection and the library and information community: Some guidelines for policy, initiatives and practices. London: Library Association, 1985.
Encontre o texto completo da fonteDavies, J. Eric. Data protection and the library and information community: Some guidelines for policy, initiatives and practices. London: Library Association, 1985.
Encontre o texto completo da fonteWashington (State). Governor's Work Group on Commercial Access to Government Electronic Records. Agency survey results: Current agency practices concerning commercial access to government electronic records. Olympia, Wash: Washington State Dept. of Information Services, 1996.
Encontre o texto completo da fonteGaston, S. J. Protecting your money, privacy & identity from theft, loss & misuse: Practical steps for today's world! Toronto, ON: Canadian Institute of Chartered Accountants, 2002.
Encontre o texto completo da fonteCanada. Office of the Privacy Commissioner. Review of the personal information handling practices of the Canadian Firearms program: Final report. Ottawa: Office of the Privacy Commissioner, 2001.
Encontre o texto completo da fonteKenesa, Ahmad, e McQuay Terry, eds. Foundations of information privacy and data protection: A survey of global concepts, laws and practices. Portsmouth, N.H: International Association of Privacy Professionals, 2012.
Encontre o texto completo da fonteMandell, William M. Accessing medical records under the new federal privacy regulations: What Massachusetts attorneys need to know on how the HIPAA privacy regulations affect their practices. [Boston, Mass.]: MCLE, 2003.
Encontre o texto completo da fontePrivacy makeover: The essential guide to best practices : how to protect assets and foster consumer loyalty. Madison, WI: Bell House Press, 2008.
Encontre o texto completo da fonteUnited States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. Information privacy: Industry best practices and technological solutions : hearing before ... 107th Congress, 1st session, June 21, 2001. Washington, DC: U.S. G.P.O., 2001.
Encontre o texto completo da fonteMilne, George R. Trust and concern in consumers' perceptions of marketing information management practices. Cambridge, Mass: Marketing Science Institute, 1998.
Encontre o texto completo da fonteThe new battle over workplace privacy: How far can management go? what rights do employees have? : safe practices to minimize conflict, confusion, and litigation. New York: AMACOM, 1998.
Encontre o texto completo da fontePreventing Harassment Through Outbound Number Enforcement (PHONE) Act: Hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Ninth Congress, second session, on H.R. 5304, November 15, 2006. Washington: U.S. G.P.O., 2006.
Encontre o texto completo da fonteUnited States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. Information privacy: Industry best practices and technological solutions : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, June 21, 2001. Washington: U.S. G.P.O., 2001.
Encontre o texto completo da fonteUnited States. Congress. House. Committee on Government Operations. Government Information, Justice, and Agriculture Subcommittee. Data protection, computers, and changing information practices: Hearing before the Government Information, Justice, and Agriculture Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred First Congress, second session, May 16, 1990. Washington: U.S. G.P.O., 1991.
Encontre o texto completo da fonteOffice, General Accounting. Employee privacy: Computer-use monitoring practices and policies of selected companies : report to the ranking minority member, Subcommittee on 21st Century Competitiveness, Committee on Education and the Workforce, House of Representatives. [Washington, D.C.]: The Office, 2002.
Encontre o texto completo da fonteInternet data brokers: Who has access to your private records? : hearings before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, second session, June 21, June 22, and September 29, 2006. Washington: U.S. G.P.O., 2006.
Encontre o texto completo da fonteHewlett-Packard's pretexting scandal: Hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, second session, September 28, 2006. Washington: U.S. G.P.O., 2006.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on Finance. Subcommittee on Social Security and Family Policy. Privacy of social security records: Hearing before the Subcommittee on Social Security and Family Policy of the Committee on Finance, United States Senate, One Hundred Second Congress, second session, February 28, 1992. Washington: U.S. G.P.O., 1992.
Encontre o texto completo da fonteBos, Jurjen Norbert Eelco. Practical privacy. [Leiden]: J.N.E. Bos, 1992.
Encontre o texto completo da fonteWhite, Stephen. Private practices. London: Piatkus, 1993.
Encontre o texto completo da fontePrivate practices. New York, N.Y., U.S.A: Viking, 1993.
Encontre o texto completo da fonteWhite, Stephen. Private practices. [s.l: s.n.], 1994.
Encontre o texto completo da fontePreventing Harassment through Outbound Number Enforcement (PHONE) Act of 2007: Report (to accompany H.R. 740) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2007.
Encontre o texto completo da fonteUnited States. Congress. House. Committee on Energy and Commerce. Subcommittee on Communications, Technology, and the Internet, ed. Behavioral advertising: Industry practices and consumers' expectations : joint hearing before the Subcommittee on Commerce, Trade, and Consumer Protection and the Subcommittee on Communications, Technology, and the Internet of the Committee on Energy and Commerce, House of Representatives, One Hundred Eleventh Congress, first session, June 18, 2009. Washington: U.S. G.P.O., 2012.
Encontre o texto completo da fonteDickenson, John. Private practice. New York: Ivy Books, 1989.
Encontre o texto completo da fonteDickenson, John. Private practice. New York: Ivy Books, 1989.
Encontre o texto completo da fonteFarb, Daniel. HIPAA 3D Notice of Privacy Practices. UniversityOfHealthCare, 2003.
Encontre o texto completo da fonte(Editor), Alessandro Acquisti, Stefanos Gritzalis (Editor), Costos Lambrinoudakis (Editor) e Sabrina di Vimercati (Editor), eds. Digital Privacy: Theory, Technologies, and Practices. AUERBACH, 2007.
Encontre o texto completo da fonteAlessandro, Acquisti, ed. Digital privacy: Theory, technologies, and practices. New York: Auerbach Publications, 2008.
Encontre o texto completo da fonteFarb, Daniel. HIPAA Focused Training 3D Notice of Privacy Practices. UniversityOfHealthCare, 2003.
Encontre o texto completo da fonte