86 results
Advanced search
Data Privacy
49-72
/Total: 86 results

Article etc.
"Series: Technology x Copyright - Keywords for Promoting a Better Understanding (4): Originator Profile"
Publication:Copyright
No.759 Vol.64
No.759 Vol.64

Article etc.
"Special Feature 1: Cybersecurity [Round-Table Talk] Cybersecurity from the Viewpoint of the Personal Information Protection Act"
Publication:Jurist No.1599

Article etc.
"Special Feature 1: Cybersecurity - Overview and Issues of Legislation on Cybersecurity"
Publication:Jurist No.1599

Article etc.
"AI Governance Consultation (Final Chapter): AI Governance - Concluding Episode"
Publication:Business Houmu
Vol.24 No.8
Vol.24 No.8

Article etc.
"Publication of 'AI Guidelines for Business Ver 1.0' and 'General Understanding on AI and Copyright in Japan'"
Publication:Accounting & Audit Journal
Vol.36
Vol.36

Article etc.
"Series: Technology x Copyright - Keywords for Promoting a Better Understanding (3): Digital Watermark"
Publication:Copyright
No.758 Vol.64
No.758 Vol.64

Article etc.
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Final): Non-Work-Related Criminal Acts"
Publication:Business Houmu
Vol.24 No.7
Vol.24 No.7

Article etc.
"AI Governance Consultation (5): Developers (2)"
Publication:Business Houmu
Vol.24 No.7
Vol.24 No.7

Article etc.
"Series: Technology x Copyright - Keywords for Promoting a Better Understanding (2): EU AI Act"
Publication:Copyright
No.757 Vol.64
No.757 Vol.64

Article etc.
"AI Governance Consultation (4): Developers (1)"
Publication:Business Houmu
Vol.24 No.6
Vol.24 No.6

Article etc.
"Series: Technology x Copyright - Keywords for Promoting a Better Understanding (1): Basic Act on Promotion of Responsible AI (Tentative Name)"
Publication:Copyright
No.756 Vol.64
No.756 Vol.64

Article etc.
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 5): Unauthorized Use of Software, Etc."
Publication:Business Houmu
Vol24 No.5
Vol24 No.5

Article etc.
"Cross-Sector Cybersecurity Laws (Vol. 5): Cybersecurity x Economic Security - Focusing on Infrastructure Protection and Security Clearance"
Publication:NBL
No.1262
No.1262

Article etc.
"AI Governance Consultation (3): AI Governance "AI User Businesses" (2)"
Publication:Business Houmu
Vol.24 No.4
Vol.24 No.4

Article etc.
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 4): Trade Secret Infringement"
Publication:Business Houmu
Vol.24 No.4
Vol.24 No.4

Article etc.
"Special Feature 1: Review of Key Points that Tend to be Overlooked in Internal Regulations for Personal Information Protection - Privacy Policies and Personal Information Protection Policies"
Publication:Business Houmu
Vol.24 No.3
Vol.24 No.3

Article etc.
"AI Governance Consultation (2): AI Governance "AI User Businesses" (1)"
Publication:Business Houmu
Vol.24 No.3
Vol.24 No.3

Article etc.
"AI Governance Consultation (1): AI Governance "Introduction""
Publication:Business Houmu
Vol.24 No.2
Vol.24 No.2