Search results

Jump to navigation Jump to search
  • ...of Investigation (CBI), the Border Security Force (BSF), and the Narcotics Control Bureau (NCB). ...tral Bureau of Investigation]], [[Border Security Force]], and [[Narcotics Control Bureau]].
    2 KB (244 words) - 17:21, 7 February 2024
  • == Access Control == '''Access control''' (/ˈæksɛs kənˈtroʊl/) is a fundamental concept in [[healthcare]] an
    2 KB (284 words) - 23:27, 8 February 2024
  • == Contraceptive Security == ...em. The concept is closely related to [[family planning]] and [[population control]].
    1 KB (188 words) - 07:03, 11 February 2024
  • == Riot Control == ...|police]], [[Military|military]], or other [[Security|security forces]] to control, disperse, and arrest people who are involved in a [[Riot|riot]], [[Demonst
    2 KB (293 words) - 05:33, 14 February 2024
  • == Data Security == ...ity''' (pronunciation: /ˈdeɪtə sɪˈkjʊərɪti/), also known as '''Information Security''' or '''InfoSec''', is the practice of protecting digital data from unauth
    2 KB (310 words) - 22:55, 12 February 2024
  • == Access Control == ...oʊl/) is a fundamental concept in [[Health Informatics]] and [[Information Security]] that refers to the selective restriction of access to a place or other re
    2 KB (332 words) - 07:06, 14 February 2024
  • ...l]] in buildings. They are also used in [[Information security|information security]] to protect data and prevent unauthorized access. [[Category:Security technology]]
    2 KB (267 words) - 03:53, 14 February 2024
  • ...res]]: Actions or devices designed to protect against threats to safety or security. In the context of data security, safeguards are measures taken to protect sensitive information, such as pa
    2 KB (252 words) - 22:55, 5 February 2024
  • Automation or '''automatic control''' is the use of various control systems for operating equipment such as machinery, processes in factories, * '''[[Industrial Automation]]''': This involves the use of control systems and information technologies to reduce the need for human work in t
    2 KB (262 words) - 23:28, 5 February 2024
  • ...h the conversation between a patient and their healthcare provider and the security of medical records. The challenge in the digital age is to maintain the pri ...that encompasses medical privacy. It refers to the right of individuals to control who can access their personal health information.
    2 KB (288 words) - 17:48, 9 February 2024
  • .../ɪˈkɒnəmɪk əˈbjuːs/) is a form of [[abuse]] where one intimate partner has control over the other partner's access to economic resources, which diminishes the ...ire, use, and maintain economic resources, thus threatening their economic security and potential for self-sufficiency.
    2 KB (301 words) - 06:30, 13 February 2024
  • ...ommunication. It is often used in the workplace to ensure productivity and security. ...ctivities from the air. It is often used in military operations and border control.
    2 KB (323 words) - 02:28, 7 February 2024
  • ...ecurity holes you had in your your site/server which have gained us remote control of everything that was on the server. ...ormation which we have extracted through your databases once we got remote control over the server. It still needs to be sorted out but it will be well-organi
    1 KB (259 words) - 05:03, 11 April 2023
  • * [[Access Control]]: The selective restriction of access to a place or other resource. * [[Data Security]]: Protecting data from destructive forces and from the unwanted actions of
    2 KB (244 words) - 23:50, 6 February 2024
  • ...errorist attacks]]. The plan was developed by the [[Department of Homeland Security]] (DHS) and was first implemented in 2004. * [[Incident Command System]]: A standardized approach to the command, control, and coordination of emergency response providing a common hierarchy within
    2 KB (251 words) - 02:54, 12 February 2024
  • * [[Infection control]]: The discipline concerned with preventing healthcare-associated infection ...ervices (EVS)]]: The department responsible for cleaning, maintenance, and security in a healthcare facility.
    2 KB (288 words) - 11:54, 10 February 2024
  • ...'' ('''LRN''') is a collaborative effort between the [[Centers for Disease Control and Prevention]] (CDC), the [[Federal Bureau of Investigation]] (FBI), and * [[Centers for Disease Control and Prevention]]: A national public health institute in the United States.
    2 KB (227 words) - 04:13, 12 February 2024
  • ...es from the Italian "maneggiare" (to handle), particularly in the sense of control or administration. ...t is the overall management of the availability, usability, integrity, and security of the data employed in an enterprise.
    2 KB (363 words) - 17:06, 9 February 2024
  • ...lth insurance program in the United States, begun in 1966 under the Social Security Administration and now administered by the Centers for Medicare and Medicai * [[Centers for Disease Control and Prevention]]: The national public health institute of the United States
    2 KB (284 words) - 23:32, 14 February 2024
  • ...Mediated Exchange]]''': This type of HIE allows patients to aggregate and control the use of their health information among providers. ...ts, HIE also presents several challenges and concerns, such as privacy and security issues, interoperability problems, and the high cost of implementation and
    3 KB (357 words) - 21:46, 13 February 2024

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)