TITLE

PRIVACY

PUB. DATE
September 2000
SOURCE
International Law Update;Sep2000, Vol. 6, p141
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Focuses on the European Commission's decision on the adequacy of protection of personal data transferred from the European Union to the United States.
ACCESSION #
3602383

 

Related Articles

  • On Secrecy Outage Probability and Average Secrecy Rate of Large-Scale Cellular Networks. Tao, Liwei; Yang, Weiwei; Cai, Yueming; Chen, Dechuan // Wireless Communications & Mobile Computing;6/7/2018, p1 

    We investigate the secrecy performance in large-scale cellular networks, where both Base Stations (BSs) and eavesdroppers follow independent and different homogeneous Poisson point processes (PPPs). Based on the distances between the BS and user, the intended user selects the nearest BS as...

  • Security.  // Communications News;Aug95, Vol. 32 Issue 8, p59 

    Describes communication security products. MicroVault's Micro-Vault PC; Elementrix's Secure FTP and Secure E-Mail.

  • Securing Internet VPNs. Kosiur, Dave // PC Week;08/25/97, Vol. 14 Issue 36, p89 

    Discusses the use of virtual private networks (VPN), or a secure connection between two or more locations over the Internet. Why VPNs are attractive to corporations; Security issues; Work by the Internet Engineering Task Force on the IPSec standard which will define open protocols for a secure...

  • New safety protocol: An open-and-shut case?  // Process Engineering;May/Jun2011, Vol. 92 Issue 3, p34 

    The article reports on the development of OpenSafety, a protocol for safety-oriented data transfer in automation networks.

  • No More Nosy Neighbors, No More Shared Files. Bannan, Karen J. // Inter@ctive Week;10/26/98, Vol. 5 Issue 42, pI-12 

    Reports that providers of cable data services have taken some definitive steps to close a security gap that allowed subscribers' hard drives to be invaded by their neighbors. Incident which pointed out the security limitations of cable modem networks; Ways to lock down personal computers to bar...

  • ATM users don't need to worry about data eavesdroppers. Tanzillo, Kevin // Communications News;Jul94, Vol. 31 Issue 7, p47 

    Reports on how data transmitted across ATM circuits are prevented from being read by someone else. Contrasts between traditional time division multiplexing and ATM; TDM's use of time slots to assign users to channels while ATM uses headers or labels to assign traffic to virtual circuits.

  • PATHGROUP UTILIZES PRIVATEEXPRESS SECURE MESSAGING NETWORK.  // Networks Update;Apr2001, p1 

    Reports that PrivateExpress, a provider of secure messaging network solution for business communications, has put its solution in operation at PathGroup Inc., a Tennessee-based pathology testing laboratory. PrivateExpress Secure Messaging Network; Secure means of transmitting patient and...

  • Sense of Security. Bernstel, Janet Bigham // Bank Marketing;Apr2000, Vol. 32 Issue 4, p29 

    Provides information on the importance for customers to trust their financial institution when dealing with online security. Use of the Secure Socket Layer, which protects data during transmission; Significance of educating staff about security.

  • Making Internet safe for the transfer of insurance data. Rubenstein, David // Corporate Legal Times;Jul99, Vol. 9 Issue 92, p46 

    Reports on efforts by the Federation of Insurance and Corporate Counsel (FICC) to establish standards for the secure and efficient electronic communication of information regarding claims and claims litigation. Formation of the Insurance Industry Internet Standards Task Force; Efficiency gains;...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics