Search

Your search keyword '"Identity theft -- Prevention"' showing total 535 results

Search Constraints

Start Over You searched for: Descriptor "Identity theft -- Prevention" Remove constraint Descriptor: "Identity theft -- Prevention"
535 results on '"Identity theft -- Prevention"'

Search Results

51. Iago's net: notes for an international legal regime to combat identity-related crime.

52. Emerging markets: the coming African tsunami of information insecurity

53. Your good name: protecting yourself from physician identity theft

55. HIPAA and the Stimulus Law: protecting health information.

56. Despite enforcement delays, red flag rules cannot be overlooked

57. Patient access in 2009: financial crisis, new rules among new challenges in 2009

59. OIG issues 2009 work plan: MSP, EMTALA, medical identity theft among front-end issues under scrutiny

60. Malicious intent

62. Privacy, data security, and identity theft prevention.

64. Protect your ID online

65. Identity crisis

66. 'Alter reality': governing the risk of identity theft

67. Protecting IT Forensic Reports In The Wake Of A Data Breach

68. THE FACES OF FRAUD; A look at identity theft's impact on auto finance and how dealers and lenders can guard against it

69. Your world ..... hacked

70. The ID theft you haven't heard of ... yet: they're not just going on shopping sprees anymore. Now thieves are using your personal info (or your child's) to get a job, buy a house, and have major surgery--which wrecks not just your bank account but also your medical records

71. Data breaches damage control after the dam bursts.

72. Identity theft and fraud prevention program

73. Who's minding the data

74. Phantom menace

75. Identity theft and libraries

76. Shedding light on your ID and the dark web

77. Simple steps can protect identity from cybertheft

78. Making It Complicated To Freeze a Child's Credit

79. An old-school solution to identity theft

82. Group test: event management; You have to be aware of security breaches to be able to act on them. Peter Stephenson looks at a range of appliances and software options that monitor data and raise the alarm if something's amiss

84. New Jersey and Pennsylvania adopt data security breach laws.

85. Protect Your Well dentity

86. What Can Banks Offer in the Debate Over Digital Identity?

87. There Are Plenty Of RFID-Blocking Products, But Do You Need Them?

88. The S.E.C. Dusts Off a Never-Used Cyber Enforcement Tool

89. Protect kids from ID theft

90. Banking has changed, but criminals haven't

91. Targeting Illegal Immigrants Through ID Theft Laws

92. A HOW-TO GUIDE FOR IDENTITY THEFT (AND PROTECTION)

93. Are Credit Cards Safe?

94. Preventing New Age Identity Theft

95. Today's 101: Preventing Identity Theft

96. Color of Money: Freezing Credit

97. Getting Personal: Local and State Governments Are Posting Highly Personal Identity Information Of Their Residents On The Internet

98. ID theft red flags

99. How HIPAA, HITECH, and FTC changes affect you: you will need to comply with these new rules

Catalog

Books, media, physical & digital resources