Traducción: de espanol

I am in possession of confidential information

Mira otros diccionarios:

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • 2007 Formula One espionage controversy — The 2007 Formula One espionage controversy, also known as Spygate, involves allegations that the McLaren Formula One team was passed confidential technical information from the Ferrari team, and that the Renault F1 team was passed confidential… …   Wikipedia

  • automobile racing — Sport practiced in a variety of forms on roads, tracks, or closed circuits. It includes Grand Prix racing, speedway racing (including the Indianapolis 500), stock car racing, sports car racing, drag racing, midget car racing, and karting, as well …   Universalium

  • Closed sessions of the United States House of Representatives — Seal of the House of Representatives The United States House of Representatives rarely meets in closed session. Contents 1 Rules of the House …   Wikipedia

  • Insider trading — is the trading of a corporation s stock or other securities (e.g. bonds or stock options) by individuals with potential access to non public information about the company. In most countries, trading by corporate insiders such as officers, key… …   Wikipedia

  • List of Dexter characters — This is a list of characters from the Showtime TV series Dexter and the Jeff Lindsay novels, including Darkly Dreaming Dexter (on which the show was based), Dearly Devoted Dexter, Dexter in the Dark, Dexter by Design, and Dexter is Delicious.… …   Wikipedia

  • Cybercrime and Countermeasures — Cyber crime, or computer crime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the …   Wikipedia

  • Jencks v. United States — SCOTUSCase Litigants=Jencks v. United States ArgueDate=October 17 ArgueYear=1956 DecideDate=June 3 DecideYear=1957 FullName=Jencks v. United States, Certiorari to the United States Court of Appeals for the Fifth Circuit, No. 23 USVol=353… …   Wikipedia

  • Natural justice — A tondo of an allegory of justice (1508) by Raphael in the Stanza della Segnatura (Room of the Apostolic Signatura) of the Apostolic Palace, Vatican City …   Wikipedia

  • The Tyco Guide to Ethical Conduct — has been developed to advise employees on what the correct practices and procedures are, when working for Tyco, the guide also outlines examples of unethical behaviour and ways in which it can be reported. On May 6th 2003 the guide was rolled out …   Wikipedia


Compartir el artículo y extractos

Link directo
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.