enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. List of public disclosures of classified information - Wikipedia

    en.wikipedia.org/wiki/List_of_public_disclosures...

    Luxembourg Leaks: A leak based on confidential information about Luxembourg’s tax rulings set up by PricewaterhouseCoopers from 2002 to 2010 to the benefits of its clients. This investigation resulted in making available to the public tax rulings for over three hundred multinational companies based in Luxembourg.

  3. Privacy for research participants - Wikipedia

    en.wikipedia.org/wiki/Privacy_for_research...

    Researchers publish data that they get from participants. To preserve participants' privacy, the data goes through a process to de-identify it. The goal of such a process would be to remove protected health information which could be used to connect a study participant to their contribution to a research project so that the participants will not suffer from data re-identification.

  4. Trade secret - Wikipedia

    en.wikipedia.org/wiki/Trade_secret

    A trade secret is a form of intellectual property comprising confidential information that is not generally known or readily ascertainable, derives economic value from its secrecy, and is protected by reasonable efforts to maintain its confidentiality. [1] [2] [3] Well-known examples include the Coca-Cola formula and the recipe for Kentucky ...

  5. Information sensitivity - Wikipedia

    en.wikipedia.org/wiki/Information_sensitivity

    The confidentiality of sensitive business information is established through non-disclosure agreements, a legally binding contract between two parties in a professional relationship. NDAs may be one-way, such as in the case of an employee receiving confidential information about the employing organization, or two-way between businesses needing ...

  6. Protected health information - Wikipedia

    en.wikipedia.org/wiki/Protected_health_information

    Covered Entities often use third parties to provide certain health and business services. If they need to share PHI with those third parties, it is the responsibility of the Covered Entity to put in place a Business Associate Agreement that holds the third party to the same standards of privacy and confidentiality as the Covered Entity. [6]

  7. Certificate of confidentiality - Wikipedia

    en.wikipedia.org/wiki/Certificate_of_confidentiality

    Certificates of confidentiality protect information, documents, and/or biospecimens that contain identifiable, sensitive information related to a participant. [5] The certificate of confidentiality policy and 42 U.S. Code §241(d) define identifiable, sensitive information as information that is about an individual and that is gathered or used during the course of research where the following ...

  8. Sensitive security information - Wikipedia

    en.wikipedia.org/wiki/Sensitive_Security_Information

    The cover sheet used for Sensitive Security Information.. Sensitive security information (SSI) is a category of United States sensitive but unclassified information obtained or developed in the conduct of security activities, the public disclosure of which would constitute an unwarranted invasion of privacy, reveal trade secrets or privileged or confidential information, or be detrimental to ...

  9. Confidentiality - Wikipedia

    en.wikipedia.org/wiki/Confidentiality

    A few jurisdictions have made this traditionally discretionary duty mandatory. For example, see the New Jersey and Virginia Rules of Professional Conduct, Rule 1.6. In some jurisdictions, the lawyer must try to convince the client to conform his or her conduct to the boundaries of the law before disclosing any otherwise confidential information.