86 results
Advanced search
Data Privacy
25-48
/Total: 86 results

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (3) Information Divulgence by Internal Wrongdoing"
Publication:Business Houmu Vol.25 No.1

Article etc.
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Publication:Business Houmu Vol.25 No.1

Article etc.
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”
Publication:Business Houmu Vol.25 No.1

Article etc.
"Series: Technology x Copyright - Keywords for Promoting a Better Understanding (8): AI-Related Regulations in the State of California (1): Digital Replicas"
Publication:Copyright No.763 Vol.64

Article etc.
"Special Feature: AI and Law -Risks and Outlook in the Era of Generative AI Part 2 [Papers] Current and Future Status of AI Law and Policies of the Japanese Government"
Publication:Rule of Law No.215

Article etc.
"Key Issues Concerning the Handling of Children's Personal Information"
Publication:NBL No.1276

Article etc.
"About the 'Act on the Protection of Personal Information - Interim Report for the Review on the so-called Triennial Revision'"
Publication:Accounting & Auditing Journal Vol.36 No.11

Article etc.
"Series: Technology x Copyright - Keywords for Promoting a Better Understanding (7): Fine-tuning"
Publication:Copyright No.762 Vol.64

Article etc.
"AI Guidelines for Business Ver 1.0 (1st ed.)"
Publication:NBL Additional Volume No.190

Article etc.
"Series: Technology x Copyright - Keywords for Promoting a Better Understanding (6): Prompt Engineering"
Publication:Copyright No.761 Vol.64

Article etc.
"(Special Feature: Future of Economic Security) Essential Infrastructure Screening System - Supply Chain Cybersecurity"
Publication:Julist No.1601

Article etc.
"Legal Actions Against Perpetrators of Impersonation or Unauthorized Log-ins and Reporting to Authorities"
Publication:UNITIS

Article etc.
"Cross-Sector Cybersecurity Laws (Vol. 10): Cybersecurity and Disaster Prevention - Development of BCPs for Cyber Risk"
Publication:NBL No.1272

Article etc.
"Series: Technology x Copyright - Keywords for Promoting a Better Understanding (5): Technology to Reject Collection by Crawler"
Publication:Copyright No.760 Vol.64

Article etc.
"International Comparative Legal Guide to: Data Protection Laws and Regulations 2024 - Indonesia Chapter"
Publication:International Comparative Legal Guide to: Data Protection Laws and Regulations 2024 11th Edition

Article etc.
"Panel discussion: AI Guidelines for Business (Part 1) Commentary on AI Guidelines for Business"
Publication:NBL No.1270

Article etc.
"Cross-Sector Cybersecurity Laws (Vol. 9): Cybersecurity and Crisis Management - Focusing on External Cyberattacks"
Publication:NBL No.1270

Article etc.
”Japan's DPA publishes interim summary of amendments to data protection regulations”
Publication:International Association of Privacy Professionals (IAPP)