Learn Privacy
Study Privacy using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
MTLBE
MTLBE
By: Kchianna Lauren Coronel
(P) L4.1: Evolution of MT (Module-based), (P) L4.2: Presidents of PAMET and PASMETH (Module-based), (P) Lesson 4.3 PAMET and PASMETH's Worthwhile Contributions ...30Decks2,572Flashcards40Learners -
Torts
Torts
By: Amanda Frantz
Intentional Torts Involving Personal Injury, Defenses to Intentional Torts, Intentional Torts to Property Interests ...18Decks450Flashcards82Learners -
ACA Code Of Ethics
ACA Code Of Ethics
By: Tyler Ross
Section A: The Counseling Relationship, Section F: Supervision, Training, And Teaching, Section G: Research And Publication ...9Decks265Flashcards99Learners -
Computer science AS level
Computer science AS level
By: Nandor Vilmos
Chapter 1 Information representation, Chapter 2 Communication and Internet Technologies, Chapter 3 Hardware ...15Decks343Flashcards325Learners -
anglais ( 20/01/15)
anglais ( 20/01/15)
By: Chloé carante
31.The Invasion Of Privacy, 36. The State Of The Planet, 39. Endangered Seas ...24Decks906Flashcards4Learners -
2.0 ISO/IEC
2.0 ISO/IEC
By: Host Mom
Week 1 - General Systems theory, Data, Information and Knowledge, Week 2 - Organising Data and Database Applications, Week 4 - e-Business Systems ...44Decks913Flashcards7Learners -
NCM 110
NCM 110
By: Rica Mae Marin
nursing informatics, history n.i, Computer system ...8Decks250Flashcards2Learners -
Azure Foundations
Azure Foundations
By: Steve G
Describe Cloud Concepts, Core Azure Architectural Components, Describe core solutions and management tools on Azure ...7Decks114Flashcards10Learners -
Information Security
Information Security
By: Christian Edvall
L2 - Passwords and password cracking, F3 - Threats, L4 Malicious Software and Application Attacks ...9Decks184Flashcards7Learners -
GCSE Computer Science
GCSE Computer Science
By: Meghan Pereira
Algorithms, Computer Hardware, Software ...14Decks304Flashcards51Learners -
Torts
Torts
By: Cole Benson
Intentional Torts, Negligent Crimes, Strict Liability and Products Liability ...8Decks363Flashcards1Learner -
Communication theory
Communication theory
By: Nana Strand
Face Negotiation Theory (Relationship), Identity Management Theory (Relationship), Relational Dialectics Theory (Relationship) ...7Decks117Flashcards54Learners -
Torts II
Torts II
By: Peyton Annoni
Strict Liability, Nuisance, Products Liability ...7Decks90Flashcards3Learners -
LAWS101B
LAWS101B
By: Harry Gilbertson
Negligence, Privacy, Legal System Today ...5Decks83Flashcards2Learners -
RES 1
RES 1
By: DENISE DANIELLE MORAGA
Nature of Inquiry and Research and Qualitative Research, Quantitative Research, Variables, Ethics, Data Privacy and Research Ethics3Decks162Flashcards10Learners -
WEEK 4 (MOD 1)
WEEK 4 (MOD 1)
By: Herlita Carcallas
REVENUE CYCLE CONCEPTS, IMPORTANCE OF COMMUNICATION, CONFIDENTIALITY & SECURITY ...5Decks104Flashcards1Learner -
Law
Law
By: Emma Kelly
Irish Legal System, Fundamental Rights, Freedom of Expression ...9Decks134Flashcards3Learners -
New Media Challenges
New Media Challenges
By: Verena Visser
Lecture 1, Lecture 2: An introduction to privacy, Lecture 3: Personalization, Privacy concerns and Information sharing ...20Decks329Flashcards2Learners -
HEALTHCARE LAW
HEALTHCARE LAW
By: Lelona Mahlangeni
STUDY UNIT 1, STUDY UNIT 2.1, STUDY UNIT 4 ...9Decks83Flashcards1Learner -
Constitutional Law
Constitutional Law
By: user delete
Federal Judicial Power, The Federal Legislative Power, The Federal Executive Power ...14Decks333Flashcards103Learners -
MT 6313 (2nd Shifting)
MT 6313 (2nd Shifting)
By: BAI JANNAH ABDULKARIM
RA 9165 (Comprehensive Dangerous Drugs), RA 9288 (Newborn Screening Act of 2004), RA 7170 (Organ Donation Act of 1991) ...5Decks495Flashcards6Learners -
CIPM
CIPM
By: Kim Beban
Intro, 1: Introduction to Privacy Program Management, 1.1: Responsibilities of a Privacy Program Manager ...14Decks61Flashcards4Learners -
N1080
N1080
By: Alexa Schiavone
Intro to Therapeutic Relationships, Privacy and Confidentiality, General Survey & Interview ...10Decks253Flashcards1Learner -
Nursing 1012 Midterm
Nursing 1012 Midterm
By: danielle astles
History of Nursing, Nursing as a Profession, Leadership ...16Decks277Flashcards16Learners -
Info 1200 Midterm
Info 1200 Midterm
By: Andrew James
Foundations Key Concepts, Privacy and Surveillance Key Concepts, Trust and Security Key Concepts3Decks49Flashcards1Learner -
GSP
GSP
By: Judith Nachbagauer
Symmetrische Kyptographie, Asymmetrische K, Digitale Signaturen, Zertifikate und PKI ...5Decks106Flashcards1Learner -
Food
Food
By: Deleted Deleted
Lesson 1, AJ at Work, Privacy3Decks61Flashcards1Learner -
NCUA
NCUA
By: Claire Gartmann
UCC ARTICLES 3 &4- LAW OF CHECKS AND SHARE DRAFTS, EXPEDITED FUNDS AVAILABILITY AND REG CC, EFT ACT AND REG E ...12Decks149Flashcards1Learner -
Development of Self as Nurse
Development of Self as Nurse
By: julia racine
nursing as a caring profession, therapeutic nurse client relationship, consent privacy and confidentiality ...6Decks70Flashcards17Learners -
recht voor de creatieve industrie
recht voor de creatieve industrie
By: J L
H1 Rechtsbronnen, H4 Rechtsbronnen, H2 Auteursrecht: de basis ...13Decks409Flashcards4Learners