Search

Your search keyword '"Computer crimes -- Laws, regulations and rules"' showing total 2,980 results

Search Constraints

Start Over You searched for: Descriptor "Computer crimes -- Laws, regulations and rules" Remove constraint Descriptor: "Computer crimes -- Laws, regulations and rules"
2,980 results on '"Computer crimes -- Laws, regulations and rules"'

Search Results

1. Reinventing Operational Risk Regulation for a World of Climate Change, Cyberattacks, and Tech Glitches.

2. VENTURE CAPITAL CULPABILITY: POTENTIAL LIABILITIES FOR VENTURE CAPITAL INVESTMENT OF FRAUDULENT PORTFOLIO COMPANIES.

3. On the Hook: Venue, Vicinage, and Double Jeopardy's Relationship with Modern Data Crimes.

4. Australian cops bust underworld app through compromised software updates

5. INDEMNIFICATION FOR COMMERCIAL SPACE SERVICES VENDORS.

6. Cancel Carte Blanche for the Information Industries: Federalizing U.C.C. Article 2.

7. Addressing Unlawful Cyber Operations in Armed Conflict Through Human Rights Bodies Instead of the International Criminal Court.

9. LOSS PATROL: A Top to Bottom Look at Protecting Your Operation Against Retail Shrink

10. Decriminalizing Trivial Computer Use: The Need to Narrow the Computer Fraud and Abuse Act (CFAA) After Van Buren.

11. SCREEN SCRAPING IN AUSTRALIAN FINANCE.

12. RUSTY WEAPONS IN A DIGITAL BATTLESPACE.

13. PERSONAL INFORMATION EXPOSURE ONLINE PUTS CORRECTIONAL OFFICERS AT RISK. HERE'S WHAT TO DO ABOUT IT

14. Millions of tinted glass windows vehicles ply on roads with fake permits

15. Private firms and open sources are giving spies a run for their money

16. Who Watches the Watchmen? Content Moderation in Social Media.

18. GoTyme Bank and PNP ACG team up to pursue cybercriminals

20. Little-known phone number rule could see you cut off or hacked; Consumer group Which? has issued a warning to mobile phone users about the dangers of certain numbers being recycled and re-issued to new customers

27. COMPUTER CRIMES.

28. 6 months imprisonment for concealing digital evidence: Anti-Cybercrime Law

29. Legal Review: Law Governing Cyberbullying & Cyber Attacks In Malaysia

30. Are India's Companies Ready To Tackle Data Breaches?

31. Kaspersky and AFRIPOL strengthen partnership in combating cybercrime by signing new cooperation agreement

32. SEC Settles Charges For Alleged Misleading Disclosures, Shedding Light On Materiality In Cyber Context

33. Using Gmail? Take This Step To Secure Your Account

34. The Federal Government Has Officially Signed The Designation And Protection Of Critical National Information Infrastructure Order 2024

35. You Don't Negotiate With Team Rocket: How Game Freak May Have Responded To A Cyber Attack

36. Recommended Practices For Drafting And Reviewing Your Incident Response Plans

37. Data And Cyber School: Beware Of Business Email Compromise

38. Cybersecurity Awareness Month: Installing Updates To Fix Bugs And Vulnerabilities

39. Free Minds Initiative Calls for Increased Public Awareness and Regulations Against the Rising Cyber Threats Impacting Europe

40. Countdown For New Cyber Security Laws

41. Nigeria: Nigeria Lost More Than $500m to Cybercrime in One Year - EFCC

42. EU: MEMBER STATES SHOULD VOTE 'NO' ON UN CYBERCRIME TREATY

43. Posting Google Reviews In The UAE: What You Need To Know

44. Cyber Insurance: A Safety Net, Not A Substitute, For Security

45. Cyber Insurance For Operational Technology: Where Computers Touch The Real World (Podcast)

46. Advancing AI Across Insurance

47. Department Of Justice Continues To Focus On AI This Week

48. The Impact Of The 2024 CrowdStrike Incident On Cyber Insurance (Video)

49. Cybersecurity Threats Affecting Businesses In September 2024

50. Nigerian president orders crackdown on stolen vehicle trafficking

Catalog

Books, media, physical & digital resources