Mostrando 35,381 - 35,400 Resultados de 41,703 Para Buscar '"Documental"', tiempo de consulta: 0.15s Limitar resultados
  1. 35381
    Publicado 2019
    “…"Research has uncovered shocking violations of ethical and legal standards by the "good guys"--including Judge John Sirica, Archibald Cox, and Leon Jaworski. Documents that the Watergate Special Prosecution Force was an avenging army drawn from the ranks of Nixon's most partisan foes. …”
    Libro
  2. 35382
    Publicado 2020
    Tabla de Contenidos: “…Schwinghammer oChapter 1: Introduction: How to Use This Casebook oChapter 2: Active Learning Strategies oChapter 3: Patient Communication: Getting the Most Out of That One-on-One Time oChapter 4: The Patient Care Plan oChapter 5: Documentation of Pharmacist Encounters and Interventions oChapter 6: Pediatrics: Children Are Not Just Little Adults Level III oChapter 7: Geriatrics: Falling Frannie Level II oChapter 8: Palliative Care: Helpful Hospice Level III oChapter 9: Clinical Toxicology: Acetaminophen Toxicity: If One Is Good, More Is Better Level II oChapter 10: Cyanide Exposure: Expect the Unexpected Level II oChapter 11: Chemical Threat Agent Exposure: Name That Poison Level II *Section 2: Cardiovascular Disorders Section Editor: Julia M. …”
    Libro electrónico
  3. 35383
    Publicado 2017
    Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. …”
    Libro electrónico
  4. 35384
    Publicado 2012
    “…Viewing curriculum as genuine inquiry into what is worth knowing, rather than simply a curricular document, this book explores the significances instilled and nurtured through aesthetic play. …”
    Acceso restringido con credenciales, usuarios UPSA
    Libro electrónico
  5. 35385
    “…Viewing curriculum as genuine inquiry into what is worth knowing, rather than simply a curricular document, this book explores the significances instilled and nurtured through aesthetic play. …”
    Enlace del recurso
    Libro electrónico
  6. 35386
    Publicado 2010
    “…La francophonie 100 textes es el segundo volumen de la trilogía compuesta por La francophonie 100 fiches, francophonie 100 textes y francophonie 100 documents (de próxima publicación). Se trata de un cuaderno de actividades que permite mejorar, por una parte, la comprensión de la "francophonie/Francophonie" y, por otra, perfeccionar y afianzar los conocimientos léxicos de nuestros estudiantes dentro del ámbito B1 y B2 del Marco Común Europeo de Referencia para las lenguas extranjeras…”
    Enlace del recurso
    Electrónico
  7. 35387
    por Khlevniuk, Oleg
    Publicado 2004
    “…Russian historian Oleg Khlevniuk has mined the contents of extensive archives, including long-suppressed state and Communist Party documents, to uncover the secrets of the Gulag and how it became a central component of Soviet ideology and social policy."…”
    Libro
  8. 35388
    por Gatica, Mónica
    Publicado 2013
    “…The book is intended for readers interested in Latin American history, migration studies, and social memory, and it draws on a combination of interviews, archival documents, and personal narratives to shed light on the lived experiences of these individuals and their enduring impact on regional identity…”
    Libro electrónico
  9. 35389
    por Pla, Dolores
    Publicado 2023
    “…This book is a comprehensive catalog of oral histories from Spanish refugees in Mexico, compiled by the Instituto Nacional de Antropología e Historia (INAH). It documents the experiences of Spanish exiles who fled their homeland during the Spanish Civil War and the subsequent dictatorship. …”
    Libro electrónico
  10. 35390
    por Soriano Hernández, Silvia
    Publicado 2022
    “…Authored by Silvia Soriano Hernández, it documents the indigenous and social movements in response to government policies perceived as anti-popular. …”
    Libro electrónico
  11. 35391
    por Aretz, Isabel
    Publicado 2008
    “…The book is a meticulous documentation of the country's folk music, aiming to preserve and analyze the cultural heritage embedded within. …”
    Libro electrónico
  12. 35392
    por Weiss, Andrea
    Publicado 2014
    “…El document dibuixa l'ambient intel·lectual femení del París d'entreguerres, hi apareixen Berenice Abbott, Margaret Anderson, Djuna Barnes, Natalie Clifford Barney, Sylvia Beach, Germaine Beaumont, Romaine Brooks, Bryther (Winifred Ellerman), Lily de Clermont-Tonnerre, Colette, Nancy Cunar, H. …”
    Libro
  13. 35393
    por Fernández Bueno, Aída
    Publicado 2024
    “…Through a series of documented conversations held between 2008 and 2010, the book provides insights into Calonge's scholarly pursuits and personal reflections, emphasizing the humanistic aspects of his studies. …”
    Libro electrónico
  14. 35394
    Publicado 2005
    “…Though much has been made of the classic era of cinephilia from the 1950s to the 1970s, <i>Cinephilia</i> documents the latest generation of cinephiles and their use of new technologies. …”
    Libro electrónico
  15. 35395
    Publicado 1985
    “…To work as a historian of ancient India, knowledge of Sanskrit remains fundamental: without it, no intimate contact with the culture of this immense country, no possible reading of documents in their original language. But Sanskrit is not all of India. …”
    Libro electrónico
  16. 35396
    Publicado 2014
    “…The text affirms the primacy of archives as evidence and sources of the historical narrative, and looks back on the different stages of work on archives, from the location to the interpretation of documents. Both praised and criticized, this text remains undeniably modern and deserves to appear on the bedside tables of all apprentice researchers in the social sciences. …”
    Libro electrónico
  17. 35397
    Publicado 2016
    “…Olive tree products provide a number of documented presentations of the production and quality of the two most important olive tree products: virgin olive oil and table olives. …”
    Libro electrónico
  18. 35398
    por Sánchez Alvarez, Miguel
    Publicado 2019
    “…The book 'Vigília Lula Livre: um movimento de resistência e solidariedade' by Áurea Lopes documents the sociopolitical movement that emerged in support of former Brazilian President Luiz Inácio Lula da Silva during his imprisonment. …”
    Libro electrónico
  19. 35399
    Publicado 2000
    “…Using primary research - including internal party documents - it concludes that rather than right-wing and extremist, the core ideology of these parties is xenophobic nationalist, including also a mix of law and order and welfare chauvinism. …”
    Libro electrónico
  20. 35400
    Publicado 2019
    “…Using previously unexamined film footage, photographic documentation, performance programs, and other historical and contemporary sources, Emily Wilcox challenges the commonly accepted view that Soviet-inspired revolutionary ballets are the primary legacy of the socialist era in China's dance field. …”
    Libro electrónico