(confidentiality)

  • 81Twelve-Step Program — A Twelve Step Program is a set of guiding principles outlining a course of action for recovery from addiction, compulsion, or other behavioral problems. Originally proposed by Alcoholics Anonymous (AA) as a method of recovery from alcoholism,[1]… …

    Wikipedia

  • 82Cream Holdings Ltd v Banerjee and the Liverpool Post and Echo Ltd — Cream Holdings Ltd v Banerjee and the Liverpool Post and Echo Ltd …

    Wikipedia

  • 83Crimen sollicitationis — For the song of the same title, please see Crimen sollicitationis (song) The Latin expression crimen sollicitationis refers to a sexual advance made before, during or immediately after administration (even simulated) of the Sacrament of… …

    Wikipedia

  • 84Data General Corp. v. Digital Computer Controls, Inc. — Data General Corp. v. Digital Computer Controls, Inc. was a 1971 case in which the Delaware Court of Chancery determined that widespread, confidential disclosure of trade secrets does not necessarily compromise their secrecy. Data General… …

    Wikipedia

  • 85IPsec — Internet Protocol Security (IPsec) is a suite of protocols for securing Internet Protocol (IP) communications by authenticating and/or encrypting each in a data stream. IPsec also includes protocols for cryptographic key establishment.… …

    Wikipedia

  • 86Anonymous remailer — An anonymous remailer is a server computer which receives messages with embedded instructions on where to send them next, and which forwards them without revealing where they originally came from. There are Cypherpunk anonymous remailers,… …

    Wikipedia

  • 87United States Census Bureau — Bureau of the Census Seal Logo …

    Wikipedia

  • 88Consumer privacy — laws and regulations seek to protect any individual from loss of privacy due to failures or limitations of corporate customer privacy measures. They recognize that the damage done by privacy loss is typically not measurable, nor can it be undone …

    Wikipedia

  • 89Restorative justice — Criminology and penology Theories Causes and correlates of crime Anomie Differential association theory Deviance …

    Wikipedia

  • 90Electronic business — Electronic business, commonly referred to as eBusiness or e business , or an internet business, may be defined as the application of information and communication technologies (ICT) in support of all the activities of business. Commerce… …

    Wikipedia