Sentences with phrase «data on criminal activity»

Not exact matches

Security — Protecting against criminal activity of various kinds — hacking, fraud, DDOS attacks and so on — will increase in importance as the volumes of research data continue to grow, along with the sources from which it is drawn, and as the research data infrastructure grows in complexity.
Nowadays, staying ahead of crooks and criminals intent on fraudulent activity often means collecting, storing and disclosing the penultimate type of sensitive personal data available: basic biometrics.
However, (i) Consob has a general duty to inform the competent public prosecutor of any facts it ascertains within its supervisory activities that may constitute a criminal offence and (ii) with respect to market abuse violations, the Italian Legislative Decree No. 58 of 24 February 1998 (TUF) sets forth a broader duty of mutual cooperation between public prosecutors and Consob, including, inter alia, exchange of information, documents and data, as well as sharing reports on investigations.
They include a policy Communication setting out the Commission's objectives and two legislative proposals: a Regulation setting out a general EU framework for data protection and a Directive on protecting personal data processed for the purposes of prevention, detection, investigation or prosecution of criminal offences and related judicial activities.
The use of trace data is known from a variety of contexts: the research from search engines, criminal activity, online social media, education, physical movement patterns, and so on shows the same thing, that our behaviour can be predicted — with varying degrees of accuracy — down to the individual level.
• Demonstrated expertise in securing premises and performing patrolling duties, aimed at ensuring community and premises safety • Track record of monitoring surveillance equipment and following up on nefarious or suspicious activities • Focused on preventing losses and damages by «keeping an eye open» at all times and recording and following up on abnormal occurrences • Proficient in coordinating information security compliance activities and implementing security policies and procedures • Documented success in performing information security risk analysis aimed at deriving data for security processes • Demonstrated good judgement and problem - solving skills to deal with security issues of variable natures within standardized situations • Adept at physically controlling violent or unruly individuals along with the ability to subdue individuals after running in pursuit • Skilled in coordinating and implementing disaster recovery programs and managing security incident responses • Familiar with conducting armed stationary, foot and vehicle patrols, targeted at deterring criminal activity, misconduct and breach of community rules • Knowledge of initiating and monitoring informal investigations of security infractions and violations
Child Protection and Adult Crime: Using Investigator Assignment to Estimate Causal Effects of Foster Care (PDF - 156 KB) Doyle, Joseph J. Journal of Political Economy, 116 (4), 2008 Uses data from Illinois to examine the impact of foster care on adult arrests and criminal activity.
a b c d e f g h i j k l m n o p q r s t u v w x y z