Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Emigration and immigration 13
- History 11
- Business & Economics 5
- Development 5
- Government policy 5
- Historia 5
- Data protection 4
- Derecho Laboral y Seguridad Social 4
- Management 4
- Politics and government 4
- Security measures 4
- African diaspora 3
- Biblia 3
- Computer networks 3
- Concilis i sínodes 3
- Derecho 3
- Economic aspects 3
- Education 3
- Emigration and immigration law 3
- Església Catòlica 3
- Holocaust, Jewish (1939-1945) 3
- Jews 3
- Literatura 3
- Oratoria 3
- Petrus Lombardus 3
- Philosophy 3
- Teología 3
- Teología dogmática 3
- Africa 2
- Application software 2
-
281Publicado 2016“…The need to leave Germany became clear and many rabbis made use of the visas they had been offered. Their resettlement in Britain was hampered by additional obstacles such as internment, deportation, enlistment in the Pioneer Corps. …”
Libro electrónico -
282Publicado 2017“…The need to leave Germany became clear and many rabbis made use of the visas they had been offered. Their resettlement in Britain was hampered by additional obstacles such as internment, deportation, enlistment in the Pioneer Corps. …”
Libro electrónico -
283Publicado 2018“…Carefully selected and painstakingly translated, these survivor accounts were first published between 1946 and 1948 in the Yiddish journal Fun Letzten Khurben (†̃From the Last Destruction') in postwar Germany, by refugees waiting in †̃Displaced Person' camps, in the American zone of occupation, for the arrival of travel documents and visas. These accounts have not previously been available in English…”
Libro electrónico -
284por Wihtol de Wenden, Catherine“…The book thereby shows the extent of bargaining involved in migration and international relations, the so called “soft diplomacy of migrations” as seen in the EU/Turkish agreement on borders in 2016, or the EU negotiations with Maghreb or Sub-Saharan countries on read missions against development programs and visas. As such this reader provides a must read to students, academics, researchers and policy makers and everyone who wants to learn more about the international relations aspects of migration governance…”
Publicado 2023
Libro electrónico -
285por Appelt, Silvia“…The analysis also shows that mobility can be positively influenced by convergence in economic conditions and resources dedicated to R&D, as well as reduced visa-related restrictions…”
Publicado 2015
Capítulo de libro electrónico -
286Publicado 2017Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. Visa 102 3 Cybersecurity Requirements for Specific Industries 105 3.1 Financial Institutions: Gramm-Leach-Bliley Act Safeguards Rule 106 3.1.1 Interagency Guidelines 106 3.1.2 Securities and Exchange Commission Regulation S-P 109 3.1.3 FTC Safeguards Rule 110 3.2 Financial Institutions and Creditors: Red Flag Rule 112 3.2.1 Financial Institutions or Creditors 116 3.2.2 Covered Accounts 116 3.2.3 Requirements for a Red Flag Identity Theft Prevention Program 117 3.3 Companies that use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS) 118 3.4 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule 121 3.5 Electric Utilities: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards 127 3.5.1 CIP-003-6: Cybersecurity - Security Management Controls 127 3.5.2 CIP-004-6: Personnel and Training 128 3.5.3 CIP-006-6: Physical Security of Cyber Systems 128 3.5.4 CIP-007-6: Systems Security Management 128 3.5.5 CIP-009-6: Recovery Plans for Cyber Systems 129 3.5.6 CIP-010-2: Configuration Change Management and Vulnerability Assessments 129 3.5.7 CIP-011-2: Information Protection 130 3.6 Nuclear Regulatory Commission Cybersecurity Regulations 130 4 Cybersecurity and Corporate Governance 133 4.1 Securities and Exchange Commission Cybersecurity Expectations for Publicly Traded Companies 134 4.1.1 10-K Disclosures: Risk Factors 135 4.1.2 10-K Disclosures: Management's Discussion and Analysis of Financial Condition and Results of Operations (MD&A) 137 4.1.3 10-K Disclosures: Description of Business 137 4.1.4 10-K Disclosures: Legal Proceedings 138 4.1.5 10-K Disclosures: Examples 138 4.1.5.1 Wal-Mart 138 4.1.5.2 Berkshire Hathaway 143 4.1.5.3 Target Corp 144 4.1.6 Disclosing Data Breaches to Investors 147 4.2 Fiduciary Duty to Shareholders and Derivative Lawsuits Arising from Data Breaches 150 4.3 Committee on Foreign Investment in the United States and Cybersecurity 152 4.4 Export Controls and the Wassenaar Arrangement 154 5 Anti-Hacking Laws 159 5.1 Computer Fraud and Abuse Act 160 5.1.1 Origins of the CFAA 160 5.1.2 Access without Authorization and Exceeding Authorized Access 161 5.1.2.1 Narrow View of "Exceeds Authorized Access" and "Without Authorization" 163 5.1.2.2 Broader View of "Exceeds Authorized Access" and "Without Authorization" 167 5.1.2.3 Attempts to Find a Middle Ground 169 5.1.3 The Seven Sections of the CFAA 170 5.1.3.1 CFAA Section (a)(1): Hacking to Commit Espionage 172 5.1.3.2 CFAA Section (a)(2): Hacking to Obtain Information 172 5.1.3.3 CFAA Section (a)(3): Hacking a Federal Government Computer 176 5.1.3.4 CFAA Section (a)(4): Hacking to Commit Fraud 178 5.1.3.5 CFAA Section (a)(5): Hacking to Damage a Computer 181 5.1.3.5.1 CFAA Section (a)(5)(A): Knowing Transmission that Intentionally Damages a Computer Without Authorization 181 5.1.3.5.2 CFAA Section (a)(5)(B): Intentional Access Without Authorization that Recklessly Causes Damage 184 5.1.3.5.3 CFAA Section (a)(5)(C): Intentional Access Without Authorization that Causes Damage and Loss 185 5.1.3.5.4 CFAA Section (a)(5): Requirements for Felony and Misdemeanor Cases 186 5.1.3.6 CFAA Section (a)(6): Trafficking in Passwords 188 5.1.3.7 CFAA Section (a)(7): Threatening to Damage or Obtain Information from a Computer 190 5.1.4 Civil Actions under the CFAA 193 5.1.5 Criticisms of the CFAA 195 5.2 State Computer Hacking Laws 198 5.3 Section 1201 of the Digital Millennium Copyright Act 201 5.3.1 Origins of Section 1201 of the DMCA 202 5.3.2 Three Key Provisions of Section 1201 of the DMCA 203 5.3.2.1 DMCA Section 1201(a)(1) 203 5.3.2.2 DMCA Section 1201(a)(2) 208 5.3.2.2.1 Narrow Interpretation of Section (a)(2): Chamberlain Group v. …”
Libro electrónico -
287por Katseli, Louka T.“…Major challenges for EU policymaking to maximise the gains from migration for both sending and receiving countries could include better management of migration and human resources, smart visa policies to facilitate circular migration and greater synergies between migration and development assistance programmes in the context of poverty reduction strategy initiatives…”
Publicado 2006
Capítulo de libro electrónico -
288Publicado 2022“…Featuring contributions from key legal specialists in EU migration and asylum law, chapters in this Research Handbook consider a variety of issues including, but not limited to, the role of the institutional framework, visas, borders, family and labour migration, refugee protection, mobility, solidarity, and externalisation. …”
Libro -
289por Khalid, Shahid F., 1944-“…Applications include: Live data acquisition via Internet or intranet sources using Data Socket technology GUI controls created and manipulated in real time Advanced features of graph and table controls 3-D data plotting with Open GL Communications with VXI devices using VISA Creating and using function panels and instrument drivers The material is organized to present information with maximum clarity, keeping the reader in mind. …”
Publicado 2002
Libro electrónico -
290Publicado 2010“…Now, as biometric technologies appear poised for broader use, increased concerns about national security and the tracking of individuals as they cross borders have caused passports, visas, and border-crossing records to be linked to biometric data. …”
Libro electrónico -
291Publicado 2017“…Mais que uma eventual "essência" geográfica, a presente coleção visa captar a diversidade e a dinâmica exogâmica que acompanha a história da disciplina. …”
Libro electrónico -
292por Engman, Michael“…Slow and unpredictable procedures for issuing business visas and work permits, and quota limitations for work permits, give rise to operational challenges. …”
Publicado 2007
Capítulo de libro electrónico -
293por Prahalad, C. K.“…Christopher Rodrigues, CEO, Visa International "An important and insightful work showing persuasively how the privatesector can be put at the center of development, not just as a rhetoricalflourish but as a real engine of jobs and services for the poor." …”
Publicado 2005
Libro electrónico -
294Publicado 2021“…Este livro apresenta a metodologia de Project-based Learning (PBL) ou Aprendizagem baseada em Projeto, desde a sua fase de preparação até à sua implementação num curso de Engenharia. Nesse sentido, visa constituir-se como um recurso de apoio a todos os interessados em implementar PBL, nos seus contextos de ensino e de aprendizagem. …”
Libro electrónico -
295Publicado 2022“…No entanto, a realidade é bastante mais complexa, como esta obra visa demonstrar. A relação entre a sociedade portuguesa e a PIDE foi sempre muito mais activa e multifacetada do que tem sido reconhecido até hoje. …”
Libro -
296por Isac Sánchez, Juan José“…Vea cuán complejo y bien organizado está todo allí dentro y como esas miles de millones de neuronas se coordinan y organizan para que usted piense y razone, y calcule y sopese y disfrute con el arroz a banda o los festivales de Eurovisión. Venga. Saque la Visa y remate. Nos lo vamos a pasar bomba…”
Publicado 2019
Libro -
297Publicado 2012“…—Michael O’Hara Lynch, Head of Global Sponsorship, Visa “At a time when consumers have the power to use media where and how they choose, to like, dislike, and share their opinion on products and corporations, brand engagement is the best answer to build emotional and enduring relationships between brands and all their relevant communities. …”
Libro electrónico -
298Publicado 2010“…." - Janice Vandenbrink, Senior Vice President of Global Systems at Visa International "Dave is a truly extraordinary blend of creative genius and business person with flair." - Rita Clifton, Chairman of Interbrand "Real creativity has me in awe, and Dave Stewart is one of the most thrilling creative minds I have ever met." …”
Libro electrónico -
299Publicado 2011“…—Michael O’Hara Lynch, Head of Global Sponsorship, Visa “At a time when consumers have the power to use media where and how they choose, to like, dislike, and share their opinion on products and corporations, brand engagement is the best answer to build emotional and enduring relationships between brands and all their relevant communities. …”
Grabación de sonido -
300Publicado 2021“…A must-read for any aspiring and seasoned devops/release automation engineer. Giridharan Kesavan, Visa A very useful resource, not only for setting up and using Jenkins for CI/CD, but also for understanding the importance of Packer, Terraform, Docker, and Kubernetes. …”
Grabación no musical